“The number of cyber-attacks increased by a third in 2018.
The number of cyber attacks worldwide has quadrupled in the second half of 2018 compared to the first half of that year. In Belgium, nearly 15 percent of companies were hit by five or more cyber attacks last year. That's what figures from F-Secure show.
The Finnish cybersecurity specialist, with its... Read more
Cisco advises Nexus switch owners to disable POAP function
Cisco has advised owners of Nexus switches to disable a feature called PowerOn Auto Provisioning (POAP) for security reasons. POAP is now enabled by default in NX-OS, the operating system on Nexus.
POAP is an automatic provisioning and zero-touch deployment feature that helps device owners with the... Read more
Google’s new Web Risk API protects apps from malicious URLs
Google has added more security features to its cloud platform. These include the Web Risk API, which is a service for developers who want to build extra security into their applications. The function is now available as a beta version, reports Silicon Angle.
Web Risk API lets client applications che... Read more
Lethal killer malware code Triton expands worldwide
The fraudulent killer malware code called Triton can disable security systems that prevent catastrophic industrial accidents. The code, designed to intentionally endanger human lives, was discovered in 2017 at a petrochemical plant in Saudi Arabia. The hackers behind Triton would now focus on North ... Read more
VMware launches its own firewall for extra layer of security enterprise apps
VMware has launched its own firewall. The Firewall is designed to provide an extra layer of security for enterprise applications. That's what Silicon Angle reports.
The new Service-defined Firewall builds on two of the company's existing products. One is the NSX network management and security platf... Read more
IBM launches blockchain test service for enterprises
IBM's X-Force Red security team, which focuses on hacking software to detect and remove vulnerabilities, has launched a new blockchain test service. The service is designed to help enterprises test and secure their private blockchains.
Blockchains are essentially distributed databases that use a pee... Read more
Unpatched Docker hosts target of cryptojacking campaign
Hackers have successfully attacked hundreds of unpatched Docker hosts. The cybercriminals were able to use the hosts to run cryptomining scripts. That puts security firm Imperva in a new report, reports Silicon Angle.
The new wave of attacks on Docker follows the announcement of a vulnerability in F... Read more
W3C declares the passwordless WebAuthn to be the official standard
The World Wide Web Consortium (W3C) has announced that WebAuthn is now an official Internet standard, reports Venturebeat. With the standard it is possible to log in without using a password.
WebAuthn was first announced by W3C and the FIDO Alliance in November 2015. W3C is the body that manages al... Read more
CyberArk Labs discovers the possibility of accessing sensitive data via containers
CyberArk Labs has discovered that it is possible for hackers to manipulate so-called defense-in-depth strategies to access sensitive information. Known kernel vulnerabilities can be used in container environments, allowing an attacker to escape to the host.
Security tools for Linux - such as seccomp... Read more
Thunderclap leak makes Thunderbolt computers vulnerable to attacks
A team of researchers has discovered a new vulnerability in Thunderbolt's data transfer specification. The vulnerability is called Thunderclap and can open up computers to serious attacks from otherwise harmless USB-C or DisplayPort hardware.
Thunderclap uses the privileged, direct memory access (D... Read more