Articles about Security

Hacker group has targeted Asia Pacific governments in five-year campaign

Hacker

Researchers at Check Point have uncovered a China-based hacker group that has been targeting multiple national Governments in the APAC region over the past five years, to gather political intelligence and conduct espionage.

Targets include Australia, Indonesia, Philippines, Vietnam, Thailand, Myanmar and Brunei. After infiltrating one government body, the hacker group uses that body’s contacts, documents and servers to launch targeted phishing attacks against new government targets.

Continue reading

Collaboration between teams helps boost security confidence

team collaboration

Organizations using software to help their IT and information security teams collaborate and align are three times more confident in the effectiveness of their information security efforts according to a new study.

The report from security automation specialist SaltStack shows that 54 percent of InfoSec leaders say they communicate effectively with IT professionals, but only 45 percent of IT professionals agree.

Continue reading

Vulnerabilities allow hackers access to two popular VPNs

VPN tiles

New research from VPNpro has found that two of the top 20 premium VPN apps have crucial vulnerabilities that can allow hackers to push fake updates and install malicious programs or steal user data.

The vulnerabilities in PrivateVPN and Betternet, can allow hackers to intercept communications and force the apps to download a fake update. The update may be automatically installed or the user prompted to install it.

Continue reading

Women are better at cybersecurity than men

Couple with laptops

Women are better at cybersecurity and protecting themselves online, new research by password manager app NordPass suggests.

The survey shows that women are more concerned about the potential harm of their personal online accounts being hacked. They also tend to use unique passwords more often than men.

Continue reading

Zoom has another security update on the way to cut down on Zoombombing

Zoom logo on a building

It seems like it's been a little while since we heard much about Zoom, but we're still in the company's self-imposed 90-day security clean-up operation.

Having already released numerous updates to help lock down the video conferencing software, Zoom is about to release a new update that will help clamp down on the problem of Zoombombing for people with free accounts.

Continue reading

ESET improves security management for Azure users

cloud padlock

As organizations move more of their systems to the cloud, they need security solutions that maintain visibility while keeping them safe.

Cybersecurity company ESET is releasing an upgraded version of its Security Management Center for Microsoft Azure, aimed at providing complete, real-time network visibility.

Continue reading

More than half of cyberattacks infiltrate environments without detection

Attack route

While organizations continue to invest significant amounts in security controls and assume that this means assets are fully protected, the reality is that a majority of attacks successfully infiltrate production environments without their knowledge.

This is among the findings of a new report from Mandiant Solutions -- the threat intelligence arm of FireEye -- based on real attacks, specific malicious behaviors, and actor-attributed techniques and tactics.

Continue reading

'SideScanning' technology offers deeper multi-cloud visibility

Cloud visibilty

While network scanners and agent-based security tools are commonplace, they come with significant operational costs, but still offer only partial visibility, leaving the organization vulnerable to breaches.

Orca Security has produced a patent pending SideScanning technology, which is based on reading the workloads' run time block storage out of band, and cross-referencing this with cloud context pulled directly from the cloud vendors' APIs.

Continue reading

SMBs are ahead of the game on security

security meter

It’s a generally held view that smaller businesses are more vulnerable to cyber threats than larger ones but a new report from Cisco Security suggests this may not actually be the case.

In its 2020 SMB Cybersecurity Report the company reveals that SMBs are maturing and mirroring larger organizations' approaches to a variety of security issues, including data breach disclosure, customer data inquiries, threat hunting and more.

Continue reading

How ransomware attacks are making the most of the COVID-19 crisis [Q&A]

Ransomware

Ransomware is a business that's thriving in the current climate, but what's behind this and what wider problems do attacks create for businesses?

We had a socially-distanced chat with Chris Morales, head of security analytics at network detection and response specialist Vectra to find out more.

Continue reading

Check Point uncovers flaws in online learning platforms

Online learning

Researchers from Check Point have found serious vulnerabilities in the widely-used WordPress plugins that are used for large-scale online learning by top academic institutions and major businesses.

By exploiting the flaws in LearnPress, LearnDash and LifterLMS, students, as well as unauthenticated users, can abuse security flaws in order to steal personal information, siphon money and attain teacher privileges on the platform.

Continue reading

Why payroll security is even more essential now remote work is the norm

payroll

The COVID-19 pandemic is changing the way people work and do business. As governments worldwide impose compulsory community quarantines and lockdowns, many are turning to the internet to continue operating their businesses or doing their jobs. Teleworking is becoming the new normal with everyone expected to observe physical distancing to avoid the pandemic spreading.

Among other systems, payroll is one of the workflows worth examining amidst the changes brought about by the pandemic. As companies adopt remote work arrangements to avoid complete operational shutdown, those that have been manually processing their payroll need to find ways to adjust to the new situation.

Continue reading

Bugcrowd seeks to disrupt the pen test market with new service

penetration testing

Traditional penetration testing solutions often fail to provide the rapid, reliable and fully integrated security testing that fits with businesses' go-to-market timelines.

Crowdsourced security company Bugcrowd is looking to change this with the launch of its Classic Pen Test, powered by the Bugcrowd platform and focused on providing customers with on-demand access to methodology-driven pen testing at a fixed price.

Continue reading

Sophos pushes out emergency patch to fix XG Firewall zero-day vulnerability

Sophos

Following the discovery of an SQL injection vulnerability in its XG Firewall product, Sophos has released an emergency patch to protect users against hackers.

The vulnerability affects both physical and virtual XG Firewall units, and signs of attacks were first noticed last week. Attackers exploiting the vulnerability on unpatched firewalls would be able to access all local usernames and hashed passwords of any local user accounts, including local device admins, user portal accounts, and accounts used for remote access.

Continue reading

New Android ransomware masquerades as FBI message

Ransomware sign

Researchers at Check Point have discovered a new variant of Android malware called Black Rose Lucy that, when downloaded, encrypts files on the infected device and displays a ransom note in the browser claiming to be an official message from the FBI.

First discovered by Check Point in September 2018, Lucy is a Malware-as-a-Service dropper that originated in Russia and downloads and installs new threats with ransomware capabilities.

Continue reading

BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.