Hackers use cloud services to enhance their flexibility and speed
Are underground cloud services a thing Well, they are quite real, and criminals are taking advantage of their presence to accelerate attacks and give compromised businesses no room to react.
This information comes from Trend Micro’s new report on cybersecurity. The firm found terabytes of inte... Read more
Danish intelligence agency helped NSA spy on Europe
The National Security Agency, an American intelligence agency, has had access to Danish intelligence networks to spy on several countries in northern Europe for years.
This is reported by the Danish website DR. According to a whistleblower within the Danish intelligence service FE, the FE had an... Read more
Intel fixed leaks that can be used to install malicious firmware
Last week, Intel rolled out fixes for some vulnerabilities that allowed attackers to install malicious firmware in millions of computers using Intel CPUs.
The number of sensitive documents stored on computers over the past ten years has increased. This prompted hardware and software developers t... Read more
Barracuda acquires Fyde and launches new product
Security company Barracuda has broadened its offer with the acquisition of Fyde. Barracuda will continue to sell Fyde products under the Barracuda name.
Fyde is a Zero Trust Network Access provider. Companies can use it to secure their cloud environment by specifying which user is allowed to acc... Read more
Microsoft issues patches for 112 security flaws
This month's security patch release addresses critical vulnerabilities including a Windows kernel flaw.
It's that time of the month when Microsoft issues security patches, and the November 2020 release is a sizeable one. In all, Microsoft has released fixes for 112 newly discovered security vul... Read more
Researchers find power leakage attacks that threaten Intel CPUs
A multinational team of security researchers have identified a new threat to machines using Intel CPUs.
An international team of security researchers from TU Graz, CISPA and the University of Birmingham are presenting new side-channel attacks. These are attacks which use fluctuations in software... Read more
New version of ransomware targets Linux systems
The new iteration of the notorious RansomEXX ransomware targets machines running the Linux operating system.
Most ransomware up until now has been best known for attacking computers running the Microsoft Windows operating system. However, last week industry experts detected a new version of the ... Read more
European Council wants ‘master key’ for encrypted messages
The European Council of Ministers is working on a proposal that would oblige chat applications such as WhatsApp and Signal to develop methods for intelligence services to view messages on the platforms.
The proposal follows a recent terrorist attack that took place in Vienna. A sympathizer of th... Read more
Many websites will soon stop working on older Android phones
Android phones with Android 7.1.1 or older will soon be unable to reach many websites. This applies to websites with a TLS certificate from Let's Encrypt. A workaround is available.
For years, Let's Encrypt has been distributing free TLS certificates to websites that want to secure their connect... Read more
McAfee says more than 400 new cyber threats were detected every minute in Q2
In 2020’s second quarter, there were more than 400 new cybersecurity threats recorded every minute, according to a report from McAfee. The new malware samples grew by 11.5% in the same period. Covid-19 themed attacks and PowerShell malware has dominated the entire landscape.
Donoff Office docu... Read more