Cybereason Uncovers Malware Distributed via Bitbucket Repositories

Cybereason, a provider of endpoint protection software, today disclosed that it discovered a malware campaign that has been leveraging Bitbucket repositories from Atlassian to launch cyberattacks. Assaf Dahan, senior director for threat research at Cy… Continue reading Cybereason Uncovers Malware Distributed via Bitbucket Repositories

Cybereason Uncovers Malware Distributed via Bitbucket Repositories

Cybereason, a provider of endpoint protection software, today disclosed that it discovered a malware campaign that has been leveraging Bitbucket repositories from Atlassian to launch cyberattacks. Assaf Dahan, senior director for threat research at Cy… Continue reading Cybereason Uncovers Malware Distributed via Bitbucket Repositories

Siemens Mobility, Claroty Partner to Secure OT Networks

Siemens Mobility Inc. this week announced it has allied with Claroty to secure operational technology (OT) and industrial networking environments. Emanuel Salmona, vice president of partnerships for Claroty, said under the terms of the agreement the u… Continue reading Siemens Mobility, Claroty Partner to Secure OT Networks

Imperva Report: Third of Vulnerabilities Lack Fix

An analysis of the vulnerabilities that were disclosed in 2019 conducted by Imperva, a provider of firewall management software, finds there was a 17.6% increase compared to 2018, with 22% of those vulnerabilities representing either high (18%) or sev… Continue reading Imperva Report: Third of Vulnerabilities Lack Fix

Concentric Applies Deep Learning Algorithms to Data Security

Fresh of raising an additional $7 million in funding, Concentric has launched a tool that employs deep learning algorithms to enable cybersecurity teams to identify documents and repositories where sensitive data has been stored. Company CEO Karthik K… Continue reading Concentric Applies Deep Learning Algorithms to Data Security

Eclypsium Researchers Demonstrate Direct Memory Attacks

Researchers from Eclypsium, a provider of secure firmware, disclosed this week that they have been able to launch successful direct memory access (DMA) attacks that bypass security frameworks such as UEFI Secure Boot, Intel Boot Guard, HP Sure Start a… Continue reading Eclypsium Researchers Demonstrate Direct Memory Attacks

Qualys Reveals Critical OpenBSD Mail Server Security Flaw

Qualys Research Labs disclosed this week a security flaw in the OpenSMTPD mail server used within the OpenBSD distribution of Linux that allows a cyberattacker to execute arbitrary shell commands with elevated privileges at a root level. Jimmy Graham,… Continue reading Qualys Reveals Critical OpenBSD Mail Server Security Flaw

Check Point Reveals Azure Cloud Security Flaw

Check Point Software Technologies revealed today its researchers were able to exploit a flaw to take over servers in the Microsoft Azure Cloud. The flaw in the Azure App Service used to deploy applications could have allowed hackers to bypass the way … Continue reading Check Point Reveals Azure Cloud Security Flaw

Check Point Aims to Expand Reach of Cloud Service

Check Point Software Technologies this week previewed additional capabilities for its Infinity Next cloud service that will be added this year, including support for Linux platforms and a raft of internet of things (IoT) devices. Speaking at the compa… Continue reading Check Point Aims to Expand Reach of Cloud Service

Check Point Reveals Zoom Video Hack

Check Point Software Technologies today revealed that it discovered a cybersecurity flaw that potentially allowed cybersecurity criminals to eavesdrop on video calls provided by Zoom. Yaniv Balmas, head of Cyber Security Research for Check Point, said… Continue reading Check Point Reveals Zoom Video Hack