Category: Security

Security is more important than ever. Cybersecurity has been a problem from the start of IT and it will be till the end. It all started with endpoint and network security, but today, we are also facing with cloudsecurity and managing employees to incorporate good security practices.

All these new technologies that help us innovate also helps cybercriminals and state sponsored hackers to get new tools they can use to get access to our systems, and in a worst case scenario, access to our most valuable data and business secrets. Also, with new legislation in place like GDPR, you need to make sure everything is secure, otherwise you just don’t lose your reputation, but you can also be fined by the government. Protecting IT-environments is more important than ever.

Endpoint Security

Your first line of defense is usually endpoint protection. The devices your employees work with need to be protected against ransomware and other malware which can bring lots and lots of trouble. This nowadays the most basic form of protection and many of the bigger vendors and suites can help you achieve this.

Network security

Network security is a bit more advanced, where you can manage which traffic goes across your network. You can also connect different networks together with e.g. SD-WAN. So, you can run protection software and share data between multiple locations. The trend we see in network protection on the datacenter side is to lock down the traffic by only allowing known, benevolent traffic sources. Regarding office networking, we see new initiatives like ZScaler coming up, where you tunnel all your staff over the network of ZScaler so they can analyse the traffic and block patterns that they marked as malicious. Especially for companies with employees that travel a lot, this is a smart solution.

Cloud security

Many thought that bringing workloads to the cloud would reduce their responsibility of doing security. It is now clear that this is not the case. Most cloud vendors practice the “shared responsibility” approach. This means that big hyperscalers can offer a first line of defense against well known threats and port scanners. For the more sophisticated attacks that are directly pointed at your servers, you need to have your protection in place.

Microsoft warns about two apps with incorrect root certificates

Microsoft warns about two apps with incorrect root certificates

Microsoft today published a security advisory in which it warns of two applications that have accidentally installed two root certificates on users' computers and then leaked the private keys. The mistakes make that malicious people can take advantage of unsuspecting users of the two apps. Third par... Read more

date4 years ago
Mimecast adds threat information from mail to IBM QRadar

Mimecast adds threat information from mail to IBM QRadar

Mimecast, provider of e-mail and data security, makes its e-mail security information available for the threat intelligence solution IBM QRadar. This gives security teams a better understanding of potential vulnerabilities, current attacks and potential threats via e-mail. IBM QRadar groups and moni... Read more

date4 years ago
Hacker places malware in popular JavaScript library

Hacker places malware in popular JavaScript library

A hacker has managed to place code in a popular JavaScript library that steals bitcoin. This is a library that many companies use. The impact could therefore potentially be very large, although there is still some uncertainty about this. The hack included placing code in Event-Stream, a JavaScript ... Read more

date4 years ago
Linux cryptominer steals passwords and turns off antivirus software

Linux cryptominer steals passwords and turns off antivirus software

Researchers from the Russian antivirus manufacturer Dr. Web have found a new form of malware that steals passwords and turns off antivirus software. This is an unnamed trojan, which focuses on Linux. That's what ZDNet reports. The trojan itself is a gigantic shell script with over 1,000 lines of co... Read more

date4 years ago
“Cybercriminals abuse encrypted data traffic more often.

“Cybercriminals abuse encrypted data traffic more often.

Cyber threats are on the increase and are becoming increasingly sophisticated. That's what security company Fortinet says in its Global Threat Landscape Report for the third quarter of this year. Encrypted data traffic, for example, is being abused more and more often and there is a growing number o... Read more

date4 years ago

Rowhammer attacks can bypass ECC memory protection

Researchers at the Vrije Universiteit in Amsterdam have described in a paper a new variation of the Rowhammer attack, which makes the attack successful on ECC memory. Rowhammer is a group of exploits that exploit an error in the design of modern memory cards. A memory card stores temporary data as s... Read more

date4 years ago
Dropbox researchers accidentally found 3 zero days in Apple software

Dropbox researchers accidentally found 3 zero days in Apple software

The Dropbox red team accidentally discovered a zero day in Apple software. While one of the company's teams was investigating how its software responds to cyber-attacks, it discovered a number of zero-day vulnerabilities. The Offensive Security red team - a group of specialists tasked with attackin... Read more

date4 years ago
U.S. ask allies not to buy network equipment from Huawei

U.S. ask allies not to buy network equipment from Huawei

The United States is asking allies in Europe to stop purchasing network equipment from Huawei, China. The hope is that a subsidy for companies and governments to buy equipment from other companies will make them change their minds. For example, the U.S. government intends to enforce its ban on Chine... Read more

date4 years ago

Emotet malware includes unique infrastructure to prevent down-time

According to security company Trend Micro, Emotet's malware corridor deliberately designed the backbone infrastructure of its server in two separate clusters. Researchers analyzed 571 samples of the group's malware. It allowed them to extract the IP addresses of 721 Emotet command-and-control (C&... Read more

date4 years ago
1 184 185 186 187 188 198