Email attacks are source of stress for security professionals
Security professionals in Europe experience a high workload due to e-mail attacks. Investigating their fraudulent nature takes a long time. 7 percent of EU security teams receive more than 50 suspicious emails a day, while 32 percent receive between 6 and 50 of these emails every day.
Barracuda... Read more
F5 Networks acquires Shape Security to improve app security
F5 Networks, specialist in network traffic management, is taking over Shape Security for approximately 1 billion dollars. That American company is known for its fraud detection platform for airlines, banks, government agencies and retailers.
With the acquisition, F5 Networks wants to improve its... Read more
New ransomware strain encrypts data after stealing it
A ransomware strain from the Zeppelin group can steal data and then encrypt it. Many forms of ransomware, only encrypt data, but do not steal it first.
Examples include REvil, Maze, and Snatch, which steal the encrypted data first. Zeppelin can also do this now. Cybersecurity firm Morphisec made... Read more
Google blocks ‘less secure apps’ for G Suite from June 2020
Apps that ask for your G Suite account username and password, to sign in directly to your G Suite-account, will no longer be able to access G Suite starting from February 15th, 2021. Google considers apps that use this login method to be 'less secure apps' and will only allow logins with an OAuth t... Read more
Google unveils framework for cloud-native security
In a new white paper, Google explains how it keeps its cloud-native architecture safe within the organisation. These kinds of whitepapers from Google are interesting, because in the past they have served as a source of inspiration for start-ups and other companies.
The new framework was christen... Read more
Windows vulnerability abused to launch targeted attack
A new zero-day vulnerability (CVE-2019-1458) in Windows, discovered by antivirus company Kaspersky, has been used during the cyber attack Operation WizardOpium. With this vulnerability, malicious parties can bypass the security mechanisms in Google Chrome.
Kaspersky's exploit prevention encounte... Read more
‘Cyber-attacks occur more and more at the hardware level’
Dell EMC warns that hackers are increasingly trying to penetrate at hardware level. That's what ITproportal writes in a report.
According to a study by Dell, in 2019 hackers invaded at least two-thirds of all organizations surveyed via a hardware vulnerability. Almost half of them were hit at le... Read more
Hackers harass residents after taking over Ring cameras
Instead of being able to see and hear who is at the door, Ring users are being harassed after hackers have gained access to their cameras.
In America, several reports have been going around in the last few days from owners of a Ring camera, indicating that strangers can play sound through the sp... Read more
ISC² provides universal cybersecurity certificates
ISC² presents itself as the largest non-profit cybersecurity
membership association in the world. The organisation has more than 140,000
members and provides nine cybersecurity certifications. Techzine recently spoke
with the non-profit organisation to find out exactly what role ISC² plays in
the... Read more
Mobile malware wriggling towards top cyber threats
A rare event, albeit not a positive one: For the first time in three years, a mobile trojan has been able to penetrate the top ten of most threatening malware at this moment. XHelper focuses specifically on Android users.
Last month's Global Threat Index features Check Point Software Technologie... Read more