With many IT projects, security is often an afterthought, but that approach puts the business at significant risk. The rise of IoT adds orders of magnitude more devices to a network, which creates many more entry points for threat actors to breach. A bigger problem is that many IoT devices are easier to hack than […]
Archives for February 2019
Twitter to liaise with India’s election body, boost hiring ahead of polls
Twitter Inc plans to boost hiring in India and appoint an officer to liaise with the Election Commission (EC), a senior executive said on Tuesday, responding to concerns about political misuse of social media ahead of this year’s general elections. Speaking a day after an Indian parliamentary committee told the company to engage more with […]
Hackers target Elasticsearch clusters in fresh malware campaign
Security researchers have observed a spike in attacks from multiple threat actors targeting Elasticsearch clusters, in what is believed to be attempts to place malware on victims’ machines. Attackers appear targeting clusters using versions 1.4.2 and lower, and are leveraging old vulnerabilities to pass scripts to search queries and drop the attacker’s payloads, according to […]
MWC 2019: VMware says telcos must move 5G infrastructure into the cloud to stay ahead
VMware made many announcements at MWC 2019 and they all centred around one common theme: network virtualisation. “If a telco wants to progress in the future, they need to think software-defined,” said Gabriele di Piazza, VP products & solutions for telco at VMware. “More and more communication service providers (CSPs) are turning to VMware to […]
Bare metal flaw allows hackers to put backdoors into cloud servers
A new flaw has been discovered by security researchers that could enable hackers to install backdoors on the firmware of bare-metal cloud servers that stay active even when the customer using the hardware has been re-assigned elsewhere. Called “Cloudbourne”, the vulnerability was first discovered by researchers at the Eclypsium Research Team, who detailed their findings […]
Cisco and Telenor Group Extend Partnership To collaborate on Cloud, Security and Open vRAN for 5G
Barcelona – Mobile World Congress – February 27, 2019 – Cisco CEO Chuck Robbins and Telenor Group CEO Sigve Brekke met today to further strengthen the companies’ strategic collaboration by signing a Joint Purpose Agreement 2.0. Together, Cisco and Telenor Group will expand their joint innovation across cybersecurity, cloud and the digital workplace, and willexplore Open Virtualized RAN […]
Quickbooks launches MTD suite for small businesses
Quickbooks has made its Making Tax Digital suite widely available for small businesses and accountants, which includes software that will allow users to continue to file VAT using spreadsheets. The updated tools will ensure that anyone filing a VAT return using the tools will be compliant with the government’s new digital tax legislation, set to […]
Sauce Labs doubles down on EU growth with Frankfurt data centre
Sauce Labs has launched a virtual data centre in Germany and expanded its London office to keep up with European data demands, the company has announced. It’s a reflection of the company’s success in the EMEA region and, after doubling its European workforce, it now needs office space to support its rapid growth. “Since establishing […]
‘Cloudborne’ IaaS Attack Allows Persistent Backdoors in the Cloud
The administrator of your personal data will be Threatpost, Inc., 500 Unicorn Park, Woburn, MA 01801. Detailed information on the processing of personal data can be found in the privacy policy. In addition, you will find them in the message confirming the subscription to the newsletter.
Linux security: Cmd provides visibility, control over user activity
There’s a new Linux security tool you should be aware of — Cmd (pronounced “see em dee”) dramatically modifies the kind of control that can be exercised over Linux users. It reaches way beyond the traditional configuration of user privileges and takes an active role in monitoring and controlling the commands that users are able to run […]