FreakOut malware targets Linux users by exploiting multiple vulnerabilities
Linux-based systems are generally touted for their high levels of security, but this does not mean that they are completely immune to threats. Illustrating this, security firm Check Point Software has shared details of a series of attacks based on the FreakOut malware.
The company says that the aim of the malware appears to be the creation of an IRC botnet which could be used to launch DDoS attacks, run crypto miners, and more. Linux users running certain products are being warned to get their systems patched as soon as possible to avoid problems.
Serious Windows 10 flaw could corrupt your hard drive if you open a folder
A security researcher has revealed details of a strange bug that could result in an NTFS hard drive becoming corrupt in Windows 10, as well as the unsupported Windows XP. What makes the bug so serious and unusual is that it can be triggered without the user having to open a file.
The bug -- which has been shown to have been around for three years or so -- can cause a hard drive to be corrupted if a user simply views the contents of a folder that includes a specially crafted file. Although Microsoft is aware of the issue affecting the $i30 NTFS attribute, a fix has yet to be produced.
Over half of organizations suffer malware incidents on remote devices
According to a new report from mobile security specialist Wandera 52 percent of organizations experienced a malware incident on a remote device in 2020, up from 37 percent in 2019.
The report is based on captured data from Wandera's global network of 425 million sensors across both corporate-owned and BYOD assets, making it the world’s largest and most insightful mobile data set.
Over 22 billion records exposed in breaches in 2020
From January through October 2020 there have 730 publicly disclosed events resulting in over 22 billion records exposed worldwide according to a new report from Tenable's Security Response Team (SRT).
Of breaches analyzed 35 percent were linked to ransomware attacks, resulting in major financial cost, while 14 percent of breaches were the result of email compromises.
Why testing is vital to securing modern enterprises [Q&A]
New tool helps businesses secure their IT assets
One of the major challenges faced by IT and security teams is that they don't have a clear picture or understanding of all their assets -- laptops, servers, cloud, virtual, and IoT.
This leads to a lot of time and effort trying to identify what they have and decide whether it complies with security policies. Device security platform Armis is launching a new standalone asset management solution that's designed to deliver better visibility.
The state of SOCs in a post-COVID world [Q&A]
The past year and the rapid changes it has brought have placed a good deal of pressure on security analysts and made their work vitally important.
A new report from Respond Software and the Ponemon Institute takes a look at the state of security operations centers (SOCs) and how they're coping.
Security incidents hit more than half of businesses storing data in the cloud
Over half (54 percent) of organizations that store customer data in the cloud had security incidents in 2020. As a result, as many as 62 percent plan to remove sensitive data from the cloud or have already done so to improve their data security.
These are the findings of a new report from Netwrix which shows the most common types of cloud security incidents in 2020 are phishing (reported by 40 percent of organizations), ransomware or other malware (24 percent), and accidental data leakage (17 percent).
Businesses need to take Teams security seriously
Microsoft Teams has been one of the winners of the pandemic, with usage in December 2020 estimated at 115 million daily users, growing from 32 million in early March.
But this success has also made Teams a tempting target for hackers. Cloud security specialist Avanan has released a new report, based on analysis of nearly 200 enterprise customers, looking at the risks of using teams and how to combat them.
Get 'Cybersecurity: The Beginner's Guide' ($23.99 value) FREE for a limited time
It's no secret that there is a huge talent gap in the cybersecurity industry. Everyone is talking about it including the prestigious Forbes Magazine, Tech Republic, CSO Online, DarkReading, and SC Magazine, among many others. Additionally, Fortune CEO's like Satya Nadella, McAfee's CEO Chris Young, Cisco's CIO Colin Seward along with organizations like ISSA, research firms like Gartner too shine light on it from time to time.
Cybersecurity: The Beginner's Guide puts together all the possible information with regards to cybersecurity; such as why you should choose it, the need for it, and how can you be part of it and fill the cybersecurity talent gap bit by bit.
Exium launches secure 5G network as a service
As noted in our 5G predictions roundup at the end of last year, one of the concerns about the rollout is that it introduces extra risks.
In order to provide a safer option Exium is launching its Secure 5G network as a service, based on emerging clean network standards being promoted by the US Department of State, the EU and others.
Encryption, zero trust and the quantum threat -- security predictions for 2021
We've already looked at the possible cybercrime landscape for 2021, but what about the other side of the coin? How are businesses going to set about ensuring they are properly protected next year?
Josh Bregman, COO of CyGlass thinks security needs to put people first, "2020 has been incredibly stressful. Organizations should therefore look to put people first in 2021. Cybersecurity teams are especially stressed. They've been tasked with securing a changing environment where more people than ever before are working remotely. They've also faced new threats as cyber criminals have looked to take advantage of the pandemic: whether through phishing attacks or exploiting weaknesses in corporate infrastructure. Being proactive, encouraging good cyber hygiene and executing a well thought out cyber program will go a long way towards promoting a peaceful and productive 2021, not least because it will build resiliency."
How secure SD-WAN can improve security and cut costs [Q&A]
Securing enterprise networks has always been a challenge, but 2020 and the shift to remote working has made it even more so.
Fortunately secure SD-WAN technology can help businesses to deal with the new landscape as well as reducing costs and making strong security accessible to more organizations. We spoke to Mike Wood CMO of Versa Networks to find out more.
Fraudulent eCommerce purchase values jump 70 percent over 2019
2020 has been a boom year for eCommerce, with average daily transaction volumes equal to 88 percent of the volume achieved during Black Friday weekend 2019 according to digital trust and safety specialist Sift.
It also finds the average attempted fraudulent purchase value has risen to over $700 from October through November 2020, a 70 percent year-on-year increase compared to the same period in 2019.
How the MITRE Shield can help organizations better address their adversaries [Q&A]
The MITRE ATT&CK framework is now used by many organizations to help them understand and counter threats. Less well known is the latest addition, MITRE Shield.
We spoke to Carolyn Crandall, chief deception officer and CMO at Attivo Networks to find out more about how this can be used along with MITRE ATT&CK to better address adversaries.
© 1998-2026 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.
