Anomali ThreatStream Sunburst Backdoor Custom Dashboard Provides Machine Readable IOCs Related To SolarWinds Supply Chain Attack

Anomali ThreatStream Sunburst Backdoor Custom Dashboard Provides Machine Readable IOCs Related To SolarWinds Supply Chain Attack

SolarWinds, a provider of IT management and monitoring software deployed by thousands of global customers, was breached between March and June of 2020 by an Advanced Persistent Threat (APT) that cybersecurity company FireEye is tracking as UNC2452. As part of the supply chain attack, the APT compromised the company’s Orion business software with trojanized malware known as Sunburst, which opens a backdoor into the networks of customers who executed Orion updates. Immediately following news of…

Read More

5 minutes with Brian Soby – Understanding Software as a Service (SaaS)

5 minutes with Brian Soby – Understanding Software as a Service (SaaS)

5 minutes with Brian Soby – Understanding Software as a Service (SaaS) | 2020-12-29 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy…

Read More

How companies can use automation to secure cloud data

How companies can use automation to secure cloud data

Data automation allows companies to conduct operations more consistently, securely, and reliably. Learn how one company tackled the challenges. Image: iStock/ADragan Data automation is going to be a major focus for my team of system administrators in 2021. Since I work for a financial organization, security is a paramount concern, so this is an area in which we intend to hit the ground running in the New Year. SEE: Managing the multicloud (ZDNet/TechRepublic special feature)…

Read More

Why stateful machine learning could help cybersecurity efforts

Why stateful machine learning could help cybersecurity efforts

AI and machine learning have the potential to take a bite out of cybercrime, but let’s not forget the human factor. Image: iStockphoto/AndreyPopov Artificial Intelligence (AI) is being touted as a technology that will reduce cybercrime. Ed Bishop, cofounder and CTO at Tessian, agrees that AI will help but only if it is configured to protect people. “Despite thousands of cybersecurity products, data breaches are at an all-time high,” writes Bishop in his sponsored VentureBeat…

Read More

Microsoft updates Azure Stack HCI

Microsoft updates Azure Stack HCI

Microsoft has updated its Azure Stack HCI software, an on-premises version of its Azure cloud services to try and catch up with hyperconverged infrastructure (HCI) leaders VMware and Nutanix. Hyperconverged infrastructure is where compute, storage, and networking are all tightly integrated on the same server in a cluster. The tight hardware and software integration makes it easier to deploy than having to configure the parts separately. Azure Stack HCI was launched in 2019 and is…

Read More

Hacking Christmas Gifts: Remote Control Cars

Hacking Christmas Gifts: Remote Control Cars

If high-tech gadgets are on your holiday shopping list, it is worth taking a moment to think about the particular risks they may bring. Under the wrong circumstances, even an innocuous gift may introduce unexpected vulnerabilities. In this blog series, VERT will be looking at some of the Internet’s best-selling holiday gifts with an eye toward their possible security implications. Some of the risks discussed in this series may be over the top and even…

Read More

A Different Kind of Virus – A Review of Ransomware in 2020

A Different Kind of Virus – A Review of Ransomware in 2020

As if dealing with COVID-19 were not enough, 2020 turned out to be a banner year for another troublesome strain of virus— ransomware. Malicious actors grew more sophisticated, daring and brutal. They also hit a number of high-profile targets. For those of you who didn’t keep up with all of the developments in the ransomware space, we’ve broken down some of the most important events and trends of the year here. Growing in Scale and…

Read More

5 reasons why scams survive, thrive, and succeed

5 reasons why scams survive, thrive, and succeed

5 reasons why scams survive, thrive, and succeed | 2020-12-29 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

Five steps to secure your business – From the C-suite to the assembly line

Five steps to secure your business – From the C-suite to the assembly line

Five steps to secure your business – From the C-suite to the assembly line | 2020-12-29 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and…

Read More

Implementing Security on All Edges

Implementing Security on All Edges

Hybrid networks, multi-cloud, Internet-of-Things, remote work and digital innovations are all driving more distributed networks and a much more expansive attack surface. The network perimeter that used to be so clearly defined now extends across a spectrum of enterprise facilities, branch offices, homes, other remote locations and multiple clouds.  The reality is that security needs to be on the LAN edge, WAN edge and cloud edge.  All edges must now be secured, but how do…

Read More
1 3,668 3,669 3,670 3,671 3,672 3,823