Skip to main content

Dormant North American Networks Suspiciously Resurrected at Once

CIA Controlled Second Swiss Encryption Firm, Report Claims
  Your SecurityWeek Briefing Webcasts
RSS Feed
11.30.20


Monday, November 30, 2020


AWS Security Webinar

Webinar: Securing AWS Environments

Join this webinar on Dec. 1 at 1PM ET as we provide an overview of how enterprises can secure AWS estates with dozens of accounts and multiple asset types.

Register Now



COVID-19 Is Requiring Us to Implement Cyber Distancing
Keeping a 'six foot distance' between our digital home life and digital work life can go a long way when it comes to safeguarding our most sensitive data, too.
Read the Full Column
by Tim Bandos




Why Better Password Hygiene Should Be Part of Your New Year's Resolutions
Ultimately, organizations must assume that bad actors are already in their networks. And consumers must realize they're constant targets.
Read the Full Column
by Torsten George





The Changing Face of OT Security
In lock step with digital transformation projects, organizations are adopting the best practice of centralizing responsibility and accountability for securing the OT environment with the CISO.
Read the Full Column
by Galina Antova



Choosing the Right Threat Intelligence Mix
Knowing that threat intelligence is readily available and proving its worth is one thing, understanding how to use it within your security operations program is quite another.
Read the Full Column
by AJ Nash




5G Security Risk vs. Reward
To reap the benefits of 5G and ensure security, organizations must be smarter, fully educated and willing to work alongside the tech.
Read the Full Column
by Laurence Pitt




The Term "Threat Intelligence" is Poisoned. It Does Not Mean What You Think it Means.
When intelligence becomes a capability and not just subscriptions to feeds, we can gain the full value of intelligence as the foundation to security operations.
Read the Full Column
by Marc Solomon




Security-Driven Networking Will Drive the Future of Digital Innovation
SD-WAN connections are designed to constantly shift and adjust, replacing one connection that has become unstable with another without interrupting application performance.
Read the Full Column
by John Maddison



Securing Data-in-Use With Confidential Computing
It is reasonable to assume that within five years the term "confidential compute" will become superfluous and an assumed native component of all cloud services.
Read the Full Column
by Gunter Ollmann





AWS Security Webinar

Advanced Tips for Securing Large AWS Environments

Join this webinar on Dec. 1 at 1PM ET as we provide an overview of how enterprises can secure AWS estates with dozens of accounts and multiple asset types.

Register Now




See All Recent Articles at SecurityWeek.Com

Tens of Dormant North American Networks Suspiciously Resurrected at Once: More than fifty networks in the North American region suddenly burst to life after being dormant for a long period of time, Spamhaus reveals. Read More

Report Claims CIA Controlled Second Swiss Encryption Firm: Swiss politicians have voiced outrage and demanded an investigation after revelations that a second Swiss encryption company was allegedly used by the CIA and its German counterpart to spy on governments worldwide. Read More

UK to Ban New Huawei Gear Installations After Sept: U.K. telecom companies won't be allowed to install Huawei equipment in their high-speed 5G networks after September 2021, the British government said Nov. 30, 2020, hardening its line against the Chinese technology company. Read More

WebKit Vulnerabilities Allow Remote Code Execution via Malicious Websites: The WebKit browser engine is affected by several vulnerabilities, including ones that can be exploited for remote code execution by convincing the targeted user to visit a malicious website. Read More

SD-WAN Product Vulnerabilities Allow Hackers to Steer Traffic, Shut Down Networks: Vulnerabilities discovered by researchers in SD-WAN products from Silver Peak (now owned by HP), Cisco, Citrix and VMware can be exploited to steer traffic or completely shut down a company's network. Read More

Vietnam-Linked Cyberspies Use New macOS Backdoor in Attacks: Trend Micro's security researchers have identified a new macOS backdoor that they believe is used by the Vietnamese threat actor OceanLotus. Read More

Media Production Giant Banijay Hit by Ransomware: Banijay, one of the world's largest media production and distribution companies, has been hit by the DoppelPaymer ransomware. Read More

Financial Impact of Ransomware Attack on Sopra Steria Could Reach €50 Million: European IT services provider Sopra Steria estimates that a recent ransomware attack will have a negative financial impact of between €40 million and €50 million. Read More

U of Vermont Medical Center Continuing Cyber-Attack Recovery: The University of Vermont Medical Center is continuing to recover from the cyber attack late last month that crippled access to electronic records at the Burlington hospital. Read More

Three Nigerians Arrested for Cybercrime Operation Targeting 150 Countries: Three Nigerian nationals have been arrested in Lagos for their suspected involvement in Business Email Compromise (BEC) scams. Read More

Canon Says Data Stolen in August 2020 Ransomware Attack: Imaging and optical giant Canon this week revealed that data was stolen in a ransomware attack it fell victim to in early August 2020. Read More

US Extends TikTok Sale Deadline to December 4: The US Treasury has extended by seven days the November 27 deadline given to the Chinese owner of TikTok to sell the popular social media platform's American business. Read More

Drupal Releases Out-of-Band Security Updates Due to Availability of Exploits: Drupal released an out-of-band security update just before Thanksgiving to patch code execution vulnerabilities for which exploit code exists. Read More

Unofficial Patch Released for Windows 7 Zero-Day Vulnerability: An unofficial patch is now available through ACROS Security's 0patch service for a zero-day vulnerability identified earlier this month in Windows 7 and Windows Server 2008 R2. Read More

Man United Unable to Fully Restore Systems After Cyberattack: Manchester United has been unable to fully restore its computer systems a week after being targeted in a cyberattack. Read More

EU Plans New Rules Giving Europeans More Control of Data: The European Union is laying out new standards for data giving Europeans more control over their personal information as it seeks to counter the power of U.S. and Chinese tech companies. Read More

Danish News Agency Rejects Ransom Demand After Hacker Attack: Denmark's biggest news agency has been hit by a ransomware attack that forced editorial systems to be shut down as about a quarter of its 100 servers have been damaged. Read More





To help make sure the SecurityWeek Briefing reaches you, please add news@securityweek.com to your address book.

© 2020 Wired Business Media



Comments

Popular posts from this blog

{White Paper} Legacy Codebase Risk - Addressing Open Source Tech Debt In Your Software Supply Chain

Tech Debt Best Practices: Minimizing opportunity cost & security risk - Get the White Paper You received this resource as part of your SecurityWeek subscription or because you have attended a Webcast or downloaded a White paper from SecurityWeek in the past. This email is strictly controlled and distributed by SecurityWeek and your email address has not been shared with any third party. Tech Debt Best Practices: Minimizing Opportunity Cost & Security Risk - Get the White Paper SecurityWeek Subscriber, Legacy codebases are one of today's biggest software supply chain risks. Nearly 80% of codebases are never updated, and 91% of organizations have faced supply chain attacks exploiting open source vulnerabilities. We're hoping you weren't one of them! The flexibility of developing with open source provides unmatched innovation, but with that has come the implicit cost of accumulating tech...

Chinese Hackers Have Been Probing DNS Networks Globally for Years: Report

Island Raises $175M as Enterprise Browser Startups Defy Tech Giants Tuesday, April 30 , 2024 LATEST CYBERSECURITY HEADLINES Island Secures $175M Investment as Enterprise Browser Startups Defy Tech Giants Why Using Microsoft Copilot Could Amplify Existing Data Quality and Privacy Issues Chinese Hackers Have Been Probing DNS Networks Globally for Years: Report Finnish Hacker Gets Prison for Accessing Thousands of Psychotherapy Records and Demanding Ransoms FCC Fines Wireless Carriers for Sharing User Locations Without Consent SafeBase Scores $33M Series B Investment Vulnerability in R Programming Language Could Fuel Supply Chain Attacks Docker Hub Users Targeted With Imageless, Malicious Repositories Critical Vulnerabilities in Judge0 Lead to Sandbox Escape, Host Takeover CISA Rolls Out New Guidelines to Mitigate AI Risks to US Critical Infrastructure Apptega Raises $15 Million for Cybersecurity ...

ICS Cybersecurity Conference: Save $600 and register by April 30th

Registration & CFP Now Open for ICSCC25 – Don't Miss the ICS Pioneer Rate! Registration and CFP are Open! Buy your ticket by 4/30 and Save $600 Greetings! We’re excited to announce that registration and the Call for Presentations (CFP) are officially open for SecurityWeek's 2025 ICS Cybersecurity Conference. We’re returning to the beautiful InterContinental Atlanta from  October 27–30, 2025 , for another unforgettable week of expert insights, hands-on learning, and valuable connections with peers and innovators in the industrial cybersecurity space. Purchase your ticket by April 30th to get the ICS Pioneer Rate of $1795 -- a savings of $600 on a full conference pass. (GOV rate of $1595) Are you ready to share your expertise, lessons learned, or groundbreaking research with the community? The Call for Presentations (CFP) is open and we’re accepting proposals fo...