ZeroFox acquires IDX via SPAC merger with plans to go public
ZeroFox, a cybersecurity firm, is set to go public via a special-purpose acquisition company merger with L&F Acquisition Corp. The merger is not the only thing ZeroFox announced on Monday since it also said it is acquiring Theft Guard Solutions (also known as IDX).
The SPAC merger puts ZeroF... Read more
UK National Crime Agency finds 225 million stolen passwords
The agency donated the passwords to an anti-hacking public service site
This week, Britain's National Crime Agency (NCA) recovered a database of 225 million login credentials from cyber-criminals. They had stolen this data from real users' email addresses and passwords.
The NCA then donated ... Read more
BlackBerry releases Guard 2.0, focuses on XDR functionality
BlackBerry releases a major update of its MDR service. Guard 2.0 offers XDR functionality. The service is based on technology from partner Exabeam.
Guard 2.0 expands Guard 1.0 with XDR functionality (Extended Detection and Response). With this, BlackBerry wants to offer its customers more endpoi... Read more
VMware warns of vulnerable two-factor authentication Verify
VMware is warning customers about a vulnerability in its Verify two-factor authentication solution. Hackers appear to be able to circumvent the primary security measure for which Verify was designed.
VMware indicates that the security problem threatens its Workspace ONE Access product. VMware Ve... Read more
Log4j 2.16 vulnerable to DoS attacks, emergency patch 2.17 advised
The impact of the infamous vulnerability in Java library Log4j drags on. Although the initial issue was resolved with patches 2.14, 2.15 and 2.16, the latter version appears to be susceptible to abuse as well. Security researchers found an entrance for Denial of Service (DoS) attacks. Log4j 2.17 wa... Read more
The next target for cybercriminals: cloud containers
The way containers work makes them particularly vulnerable to attack, with wide-ranging consequences.
As digital transformation takes hold in the enterprise community, migrating to the cloud has become a deeply entrenched trend. A big part of this cloud migration has been the widespread adoption... Read more
Fortinet guarantees secure network access with Zero Trust
Zero Trust is seen as an essential security model to secure enterprise networks. However, security vendors envision the model in different ways. Fortinet determined that secure network access should be the goal. We discussed the topic with Robert Tom, Systems Engineer at Fortinet.
The idea behin... Read more
Veeam appoints new CEO: Anand Eswaran tasked with billion-dollar growth
Veeam appoints a new CEO. Anand Eswaran is tasked with boosting the organization's annual recurring revenue from one to two billion dollars.
According to Veeam, the changing of the guard allows its current CEO (William Largent) to focus on chairing the Board of Directors. Anand Eswaran, former C... Read more
Microsoft fixes Windows AppX Installer exploit, blocks Emotet spread
Microsoft squashes multiple vulnerabilities in its solutions. Among them is critical spoofing vulnerability CVE-2021-43890, frequently exploited for Emotet, Trickbot and Bazaloader attacks.
Microsoft releases a December update fixing various vulnerabilities through no less than 67 patches. In No... Read more
Log4j update: 60 variations of Log4Shell, hundreds of thousands of attacks
The severity of the vulnerability in Log4j is anything but theoretical. Cybercriminals are scanning ports worldwide to find entry points for abuse. Security researchers observed hundreds of thousands of attacks.
In the past few days, Check Point Research recognized 470,000 network scan attempts.... Read more