The Evolution of IoT Linux Malware Based on MITRE ATT&CK TTPs

The Evolution of IoT Linux Malware Based on MITRE ATT&CK TTPs

New IoT botnet techniques During the observation period, we noted four new techniques added to threat actors’ arsenals. One is a newly implemented technique in botnet families called Masquerading: Match Legitimate Name or Location (T1036.005). It is a Defense Evasion technique that likely reflect the manufacturers’ increasing interest and efforts in securing these IoT devices or appliances. The technique involves adversaries trying to match the name and location of legitimate and trusted programs to hide…

Read More

Top 10 Azure Cloud Configuration Mistakes

Top 10 Azure Cloud Configuration Mistakes

Top misconfigured rules for Azure services Let’s look at three top misconfigured services for Azure and the Conformity rule for that service with the highest misconfiguration rate. Service: Azure Activity LogRule(s): “Create alert for ‘delete PostgreSQL database’ events” and “create alert for ‘create/update PostgreSQL database’ events” The top misconfigured rules for Azure Activity Log are related to PostgreSQL, a fully managed database-as-a-service platform. “Create alert for ‘delete PostgreSQL database’ events” and “create alert for ‘create/update…

Read More

Android malware infected more than 300,000 devices with banking trojans

Android malware infected more than 300,000 devices with banking trojans

The initial apps in Google Play were safe, but the creators found a way around the Play Store’s protections to install malware on Android users’ devices. Here’s how it happened and how to stay safe. Image: marchmeena29, Getty Images/iStockphoto A November report from ThreatFabric revealed that more than 300,000 Android users unknowingly downloaded malware with banking trojan capabilities, and that it bypassed the Google Play Store restrictions. The cybercriminals developed a method for successfully infecting Android…

Read More

IBM offers one-stop-shop for mainframe hybrid cloud initiatives

IBM offers one-stop-shop for mainframe hybrid cloud initiatives

While cloud companies such as AWS are offering enterprise customers new ways to get applications off the mainframe and into the cloud, IBM moved this week to keep them on the Big Iron. IBM rolled out a portal  it calls the IBM Z and Cloud Modernization Center which offers an assortment of tools, training, resources and ecosystem partners to help IBM Z clients accelerate the modernization of mainframe applications, data and processes to work with…

Read More

Gartner: Diversity, equity and inclusion is key to better I&O teams

Gartner: Diversity, equity and inclusion is key to better I&O teams

“Why should an I&O leader care about diversity and inclusion? Why do you need to be involved in this at all? What good will it do you?” The answer to her questions, Debra Logan, a vice president and Gartner fellow told a virtual conference this week, is about building better infrastructure and operations (I&O) teams. “I’m not asking you to have faith,” she said. “I’m not asking you to do it for non-business reasons. I’m…

Read More

AMD: The Phoenix of tech

AMD: The Phoenix of tech

Five years ago, AMD was hanging on by a thread. Sales had dropped below $1 billion per quarter. Its client and server CPUs were no longer competitive with Intel’s. Its Opteron server-CPU market share was less than one percent. Its GPU products were a little better but Nvidia had the mindshare. Then two things happened: Dr. Lisa Su ascended to the CEO position, and it developed the Zen microarchitecture, a clean-sheet, from-scratch redesign of the…

Read More

Prepare to take the CISSP certification exam that can turbocharge your cybersecurity career

Prepare to take the CISSP certification exam that can turbocharge your cybersecurity career

If you are a cybersecurity professional with at least five years of experience, you can take the exam that will boost your career with an elite certification. Here’s a great way to prepare. Image: iStock/LeoWolfert Cybersecurity skills are among the most in-demand in the tech industry, and that isn’t likely to change any time in the near future with good reason. And Certified Information Systems Security Professional (CISSP) is considered one of the most valuable…

Read More

5 Ways the U.S. DoD’s CMMC Program May Impact Research Universities – Cisco Blogs

5 Ways the U.S. DoD’s CMMC Program May Impact Research Universities – Cisco Blogs

In the United States, the Department of Defense (DoD) is increasing the security measures required to participate in their research funding programs. This comes in the form of the Cybersecurity Maturity Model Certification (CMMC). Cisco’s Advisory CISO and former Chief Information Security Officer at The Ohio State University, Helen Patton, explained CMMC to Forbes as “A high-level security protocol established by and for the Department of Defense (DoD) intended to harden critical or vulnerable digital assets”. (The…

Read More

AWS Outage Hits Eastern US

AWS Outage Hits Eastern US

Amazon‘s cloud computing network suffered a five-hour outage on Tuesday, chiefly impacting individuals and businesses in the eastern United States. Online services provided by a swathe of companies were disrupted by the incident at Amazon Web Services, which also affected Amazon’s own e-commerce business. Gaming site League of Legends PUBG went down, and Tinder, Coinbase, Netflix, Slack, Ticketmaster, Instacart, Robinhood, and Disney+ were disrupted. Other companies waylaid by the outage included the Associated Press, whose publishing…

Read More

The new Firefox 95 might be the most secure web browser on the market

The new Firefox 95 might be the most secure web browser on the market

The latest version of Firefox is now available and includes an important step forward for web browser security. Image: Jack Wallen Firefox, the little browser that could, continues chugging along. And while other browsers are constantly battling one crisis or another, the Mozilla developers are addressing what matters most for modern web browsers: security. This time around, the developers have released Firefox 95, which includes a new subsystem, called RLBox.  RLBox is a new method…

Read More
1 3,409 3,410 3,411 3,412 3,413 4,352