How COVID-19 has changed IT’s focus and plans for 2021
The COVID-19 pandemic – and the lockdowns that followed last spring – wrought changes across IT operations and strategy as businesses and employees adjusted to a new environment. But what changes were made, and which ones are likely to last? Spiceworks Ziff Davis, a B2B tech marketplace, polled 1,073 IT buyers in North America and […] more…Razer Customer Data Exposed by Server Misconfiguration
A server misconfiguration has resulted in data pertaining to thousands of Razer customers being exposed to the Internet. A Singaporean-American manufacturer of gaming hardware, software, and systems, Razer also provides e-sports and financial services to its customers. read more more…How IBM’s Watson could boost productivity during the New Normal
IBM had a briefing this week on how its Watson AI product was used at the U.S. Open and something jumped out at me that could help overtaxed workers get more work done. I’m hearing a lot of complaints about people having to jump into back-to-back virtual meetings – and getting less done as a result. With […] more…Warner Music Discloses Data Breach Affecting e-Commerce Websites
Warner Music Group last week started informing customers of its e-commerce websites that their personal information may have been compromised as a result of a data breach suffered by an external service provider. read more more…Digital Education: The cyberrisks of the online classroom
This past spring, as the COVID-19 pandemic took hold, online learning became the new norm as universities and classrooms around the world were forced to close their doors. By April 29, 2020, more than 1.2 billion children across 186 countries were impacted by school closures. Shortly after schools began to transition to emergency remote learning, […] more…IT threat evolution Q2 2020. Mobile statistics
IT threat evolution Q2 2020. Review IT threat evolution Q2 2020. PC statistics These statistics are based on detection verdicts of Kaspersky products received from users who consented to provide statistical data. Quarterly figures According to Kaspersky Security Network, the second quarter saw: 1,245,894 detected malicious installers, of which 38,951 packages were related to mobile […] more…IT threat evolution Q2 2020. PC statistics
IT threat evolution Q2 2020. Review IT threat evolution Q2 2020. Mobile statistics These statistics are based on detection verdicts of Kaspersky products received from users who consented to provide statistical data. Quarterly figures According to Kaspersky Security Network, in Q2: Kaspersky solutions blocked 899,744,810 attacks launched from online resources in 191 countries across the […] more…IT threat evolution Q2 2020
IT threat evolution Q2 2020. PC statistics IT threat evolution Q2 2020. Mobile statistics Targeted attacks PhantomLance: hiding in plain sight In April, we reported the results of our investigation into a mobile spyware campaign that we call ‘PhantomLance’. The campaign involved a backdoor Trojan that the attackers distributed via dozens of apps in Google […] more…Operation PowerFall: CVE-2020-0986 and variants
In August 2020, we published a blog post about Operation PowerFall. This targeted attack consisted of two zero-day exploits: a remote code execution exploit for Internet Explorer 11 and an elevation of privilege exploit targeting the latest builds of Windows 10. While we already described the exploit for Internet Explorer in the original blog post, […] more…Microsoft adds 6 months support to Windows 10 1803, again cites pandemic
Microsoft on Wednesday stretched support for a third version of Windows 10, again citing the coronavirus pandemic and its impact on business. The Redmond, Wash. developer extended security support for Windows 10 Enterprise 1803 and Windows 10 Education 1803 by six months, to May 11, 2021. The original end-of-support date was to be Nov. 10. […] more…Transparent Tribe: Evolution analysis,part 2
Background + Key findings Transparent Tribe, also known as PROJECTM or MYTHIC LEOPARD, is a highly prolific group whose activities can be traced as far back as 2013. In the last four years, this APT group has never taken time off. They continue to hit their targets, which typically are Indian military and government personnel. […] more…Is it EOL for IE11? (Not yet.)
Microsoft last week began a process that will, eventually if not immediately, result in it canning Internet Explorer (IE), the browser it’s built since 1994. To read this article in full, please click here (Insider Story) more…Lifting the veil on DeathStalker, a mercenary triumvirate
State-sponsored threat actors and sophisticated attacks are often in the spotlight. Indeed, their innovative techniques, advanced malware platforms and 0-day exploit chains capture our collective imagination. Yet these groups still aren’t likely to be a part of the risk model at most companies, nor should they be. Businesses today are faced with an array of […] more…Transparent Tribe: Evolution analysis,part 1
Background and key findings Transparent Tribe, also known as PROJECTM and MYTHIC LEOPARD, is a highly prolific group whose activities can be traced as far back as 2013. Proofpoint published a very good article about them in 2016, and since that day, we have kept an eye on the group. We have periodically reported their […] more…Time to think different on Apple’s Stocks app
Apple likes to say it only releases things when it thinks they will make a difference, which rather begs the question: “What does Apple’s Stocks app actually do, and why has it been part of iOS since the beginning?” Are there a billion stockholders? There are over 1.5 billion iOS users in the world. Each […] more…How Unsecure gRPC Implementations Can Compromise APIs, Applications
By David Fiser (Security Researcher) Enterprises are turning to microservice architecture to build future-facing applications. Microservices allow enterprises to efficiently manage infrastructure, easily deploy updates or improvements, and help IT teams innovate, fail, and learn faster. It also allows enterprises to craft applications that can easily scale with demand. Additionally, as enterprises switch architectures — […] more…More information
- Email fraudsters foiled by a smiley
- High Severity Flaws Patched in Rockwell Automation Tools
- IT Services Firm Bitmarck Takes Systems Offline Following Cyberattack
- Border agents could be forced to get a warrant before searching devices
- USCYBERCOM Shares More North Korean Malware Samples
- AMTSO Releases Sandbox Evaluation Framework
- What if your security camera were an insecurity camera?
- Cryptomining isn’t going to make you rich
- Appogee becomes one-stop shop for enterprise iOS deployment
- Resolved: Maintenance to The RS6K Lab