CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, CVE-2021-27065: Four Zero-Day Vulnerabilities in Microsoft Exchange Server Exploited in the Wild

CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, CVE-2021-27065: Four Zero-Day Vulnerabilities in Microsoft Exchange Server Exploited in the Wild

Four zero-day vulnerabilities in Microsoft Exchange servers have been used in chained attacks in the wild. Background On March 2, Microsoft published out-of-band advisories to address four zero-day vulnerabilities in Microsoft Exchange Server that have been exploited in the wild. In a blog post, Microsoft attributes the exploitation of these flaws to a state-sponsored group it calls HAFNIUM. The group has historically targeted U.S.-based institutions, which include “infectious disease researchers, law firms, higher education institutions,…

Read More

Palo Alto Networks Completes Acquisition of Bridgecrew

Palo Alto Networks Completes Acquisition of Bridgecrew

SANTA CLARA, Calif., March 2, 2021 /PRNewswire/ — Palo Alto Networks (NYSE: PANW), the global cybersecurity leader, announced that it has completed its acquisition of Bridgecrew, a developer-first cloud security company. The acquisition will enable “shift left” security, with Prisma® Cloud becoming the first cloud security platform to deliver security across the full application lifecycle. “We are excited to welcome Bridgecrew to the Palo Alto Networks family,” said Nikesh Arora, chairman and CEO of Palo…

Read More

Securing the cloud in 2021: 3 steps to cloud-based identity

Securing the cloud in 2021: 3 steps to cloud-based identity

Securing the cloud in 2021: 3 steps to cloud-based identity | 2021-03-02 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn…

Read More

EU leaders aim at boosting defense and security, including cybersecurity

EU leaders aim at boosting defense and security, including cybersecurity

During a video conference of the members of the European Council, EU leaders agreed on a new strategy aimed at boosting defense and security.  During the recent video conference of the members of the European Council (25-26 February 2021), NATO chief Jens Stoltenberg highlighted the importance to define a strategy to boost defense and security. “We want to act more strategically, to defend our interests and to promote our values.” said Charles Michel, President of the…

Read More

Should you pay up when hit by ransomware? There are several things to consider first

Should you pay up when hit by ransomware? There are several things to consider first

Whether paying ransom for data held hostage makes sense depends on many variables. Experts define the variables and why they’re important. Image: vchal, Getty Images/iStockphoto Whether to pay ransom in order to unlock hijacked data or stop a Distributed Denial of Service attack is a hot topic right now. Like many other issues, on the surface it appears to be a simple yes or no decision. However, if you take in the whole picture, making…

Read More

Why it’s time to stop setting SELinux to Permissive or Disabled

Why it’s time to stop setting SELinux to Permissive or Disabled

Too many people shrug off SELinux on their data center systems. Jack Wallen says it’s time to stop giving into that siren song so your operating systems are weakened. Image: iStock/sdecoret Given the kerfuffle that has been CentOS lately, and the number of inevitable forks that will rise out of the ashes, there will probably be a large percentage of admins migrating to, or finally deploying, a Linux distribution based on Red Hat Enterprise Linux…

Read More

Satanic Temple Loses Cyber-squatting Lawsuit

Satanic Temple Loses Cyber-squatting Lawsuit

A federal judge in Washington state has dismissed a cyber-squatting claim brought by the Washington Chapter of The Satanic Temple. The United Federation of Churches LLC, doing business as The Satanic Temple, filed a lawsuit against a group of former Temple members who it claimed erased the contents of the Temple’s social media accounts and replaced it with content that was critical of the organization. In 2014, the Washington Chapter created a business page on Facebook to…

Read More

Medal of Honor Holders’ Identities Stolen

Medal of Honor Holders’ Identities Stolen

A threat actor stole the identities of recipients of the US Congressional Medal of Honor and used their personal data to purchase goods from American military exchanges.  According to a Secret Service search warrant application obtained by The Daily Beast, the identities of a third of the living holders of the US government’s highest and most prestigious military decoration were stolen in the attack. In the affidavit, Special Agent Matthew O’Neill writes the United States Secret Service…

Read More

Hacking Proprietary Protocols with Sharks and Pandas | McAfee Blogs

Hacking Proprietary Protocols with Sharks and Pandas | McAfee Blogs

The human race commonly fears what it doesn’t understand.  In a time of war, this fear is even greater if one side understands a weapon or technology that the other side does not.  There is a constant war which plagues cybersecurity; perhaps not only in cybersecurity, but in the world all around us is a battle between good and evil.  In cyber security if the “evil” side understands or pays more attention to a technology…

Read More
1 2,375 2,376 2,377 2,378 2,379 2,555