TLS-Encrypted Malware Volumes Double in Just Months

TLS-Encrypted Malware Volumes Double in Just Months

The volume of malware hidden in encrypted traffic has doubled over the past few months as threat actors look to circumvent security tools, according to Sophos. The security vendor claimed that 23% of the malware it detected in 2020 was encrypted with the Transport Layer Security (TLS) protocol. However, in the first three months of 2021, the figure had grown to reach nearly 46%. The rise can be linked to an overall increase in use…

Read More

The threat landscape for the water industry

The threat landscape for the water industry

The threat landscape for the water industry | 2021-04-23 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

The role of transparency in establishing security assurance

The role of transparency in establishing security assurance

The role of transparency in establishing security assurance | 2021-04-23 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

Personalization and behavior modeling: a new approach to security training

Personalization and behavior modeling: a new approach to security training

Personalization and behavior modeling: a new approach to security training | 2021-04-23 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn…

Read More

The boom in collaboration software creates extra security risks

The boom in collaboration software creates extra security risks

While the software solutions have made it easier to work from home, they’ve also made it easier to launch malware. TechRepublic’s Karen Roby spoke with Otavio Freire, president, CTO and co-founder of SafeGuard Cyber, about security issues in collaboration software. The following is an edited transcript of their conversation. Karen Roby: We do all of our work now, or the good majority of it, through things like this, right? Zoom and Teams, and we’re talking…

Read More

China-linked APT used Pulse Secure VPN zero-day to hack US defense contractors

China-linked APT used Pulse Secure VPN zero-day to hack US defense contractors

At least one China-linked APT group exploited a new zero-day flaw in Pulse Secure VPN equipment to break into the networks of US defense contractors. According to coordinated reports published by FireEye and Pulse Secure, two hacking groups have exploited a new zero-day vulnerability in Pulse Secure VPN equipment to break into the networks of US defense contractors and government organizations worldwide. The statement reveals that one of the two hacking groups was a China-linked cyber espionage group….

Read More

Parrot OS Security edition is a Linux desktop distribution geared for security admins

Parrot OS Security edition is a Linux desktop distribution geared for security admins

Security professionals would be well-served with this Linux distribution that offers a wide range of penetration and vulnerability testing tools. Image: gorodenkoff/Getty Images/iStockphoto Sometimes, choosing a Linux distribution is a challenge. Given how many options are available, anyone faced with the selection could find their head spinning in a dizzying display of confusion. For certain types of users, the selection gets a bit more focused. A particular type of user is one who either places…

Read More

Costco Issues Scam Warning

Costco Issues Scam Warning

Costco Wholesale Corporation is warning American internet users to be wary of more than a dozen digital scams targeting its customer base.  On its website, the American multinational corporation has published screenshots of 14 “prominent fraudulent emails, texts, and posts” in which cyber-criminals are impersonating Costco.  The majority of the traps use financial benefits to lure victims, promising free products, financial reimbursements, exclusive offers, cash-back rewards, and gift cards worth $50. Many try to trick to victims into…

Read More

Hands-On-Lab for Oracle Cloud VMware Solution – VMware Cloud Community

Hands-On-Lab for Oracle Cloud VMware Solution – VMware Cloud Community

Oracle Cloud VMware Solution was made generally available on August 6th, 2020, in all oracle regions and Oracle’s dedicated region cloud@customer service offering. The Oracle Cloud VMware Solution is a customer-managed, VMware Cloud Verified environment consisting of vCenter Server, ESXi hosts, vSAN, and NSX. Also included is VMware HCX to provide seamless migrations, network extension capabilities, and more from on-premises to Oracle Cloud VMware Solution. Customers have complete control over the environment, including the underlying ESXi hosts and VMware Host Client…

Read More
1 2,391 2,392 2,393 2,394 2,395 2,658