Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for Thin clients from a  ...

 Business

The year 2020, with its pandemic and forced self-isolation, has raised a number of fundamentally new questions for businesses. One — has any company ever had to calculate depreciation for employees’ use of home chairs, monitors, and desks before? — has become quite relevant. The greatest burden has fallen on   show more ...

the IT and security departments. The former had little warning they’d have to provide staff with a remote workplace environment, and the latter needed urgently to develop new information security strategies for a world in which the security perimeter is everywhere. Pessimists predicted the collapse of IT, but that did not happen; for the most part, companies were able to reorganize their operations fairly quickly. However, transitions have varied. Businesses whose employees mainly used laptops even before the pandemic have lucked out. Those that already had an active BYOD policy in place had a great advantage as well. As a result, some of the world’s leading companies have decided to make their employees across the board remote workers to reduce costs. Several global IT giants, including Oracle, Rimini Street, and Okta, said that their partial shedding of office space has had a positive impact on their bottom lines. Ensuring security has proved more complicated. Many information security departments were not ready. First, people were suddenly working from their local home networks using their own networking equipment, which was not monitored, administered, or even updated by the company. Second, devices began seeing use by entire families for a variety of tasks, not all having to do with company business. For example, parents and children were using the same laptops during alternating sessions to work and study. Moreover, in some cases the same machine connected to the networks of two different companies, which neither security staff appreciated. Do you know which companies have faced the fewest problems, in terms of both IT and security? It has been those that actively use virtualization technologies, or more specifically virtual desktop infrastructure (VDI). What are virtual desktops? By and large, desktop virtualization attempts to separate the employee’s workspace from the physical device they use to work. The company arranges a computing cluster using its infrastructure (or lease capacity), deploys a virtualization platform, and creates virtual machines for each employee. The virtual machine image contains all of the software that the employee needs. Employees can connect to their virtual desktops (and the corporate resources they have permission to use) from any device, including desktop computers, thin clients, laptops, and tablets. Generally speaking, they can even use a phone — provided they can connect a keyboard, mouse, and monitor to it (some enthusiasts actually work using such a setup). And the practice is not restricted to telecommuting or working over the Internet. Some companies use virtual desktops in the office as well, because, in fact, the technology offers businesses quite a few benefits, including: Ease of maintenance: The data storage system stores preconfigured images of virtual machines for each employee or for workgroups with similar responsibilities, and all of them are managed centrally, reducing the load on the IT department; Scalability: If an employee suddenly needs more computing power or access to more RAM, the administrator can assign the required resources to them rather than having to upgrade their equipment; Resilience: If a device that connects to the virtual machine fails, an employee can simply connect from another one without losing any data or wasting time; Security: As you can imagine, Kaspersky views this as the most important advantage, and it is particularly strong for remote desktop technology that is used in conjunction with thin clients. Virtual desktops, thin clients, and security From a security point of view, virtual desktops are good if for no other reason than that they protect the software that employees use from meddling. Of course, users can change work files and interface settings, but those are stored separately from the virtual machine. Any changes made to software — and any malicious code downloaded to the virtual machine — disappear after a reboot. That does not mean virtual machines can go unprotected, but it greatly reduces the chances of an APT hiding on a work computer. However, as we mentioned above, users receive the maximum security benefits by connecting to virtual desktops from thin clients. A thin client is a terminal-mode device. It often doesn’t even have any internal storage, being just a box that connects to a server and lets users connect a monitor and peripheral devices (configuration may vary depending on the specific model). The thin client does not process or store any work data. Of course, a thin client requires a good communications channel. In recent years, however, that’s not much of a hurdle. Communication between a thin client and a server is usually conducted over an encrypted protocol, solving the problem of the unreliable network environment. Of course, from the user’s point of view, it’s a much less versatile device than, say, a laptop. You cannot use it to play games, connect to third-party information systems, or do a variety of other things that may be forbidden in the workplace anyway. It is also worth noting this type of device solves one of the potential problems of hardware theft; with no data stored, none can leak. Judging from the companies’ growing interest in ensuring the information security of remote work, we anticipate an ever-growing need for turnkey remote desktop infrastructure solutions. Most likely, the most workable plan will be to use public cloud services to avoid having to modify physical infrastructure significantly. So, it looks like we’re approaching a stage in which major companies transition to VDI. That is one of the reasons we are actively developing our expertise in this area and working on the solutions for thin clients based on our operating system, KasperskyOS.

image for Spotlight Podcast: C ...

 Business

Thirty eight years after it was founded, RSA Security is embarking on what may be its most challenging journey yet: cybersecurity startup. In this Spotlight podcast we're joined by RSA CTO Zulfikar Ramzan about the company's path forward as an independent company. The post Spotlight Podcast: CTO Zulfikar   show more ...

Ramzan on RSA’s Next Act: Security...Read the whole entry... » Related StoriesSpotlight Podcast: Taking a Risk-Based Approach to Election SecurityHow NIST Is Securing The Quantum EraEpisode 188: Crowdsourcing Surveillance with Flock Safety

image for Spotlight Podcast: D ...

 Business

Thirty eight years after it was founded, RSA Security is embarking on what may be its most challenging journey yet: cybersecurity startup. In this Spotlight podcast we're joined by RSA CTO Zulfikar Ramzan about the company's path forward as an independent company. The post Spotlight Podcast: Dr. Zulfikar   show more ...

Ramzan on RSA’s Next Act: Security...Read the whole entry... » Related StoriesSpotlight Podcast: Taking a Risk-Based Approach to Election SecurityHow NIST Is Securing The Quantum EraEpisode 188: Crowdsourcing Surveillance with Flock Safety

 Trends, Reports, Analysis

At a time when healthcare organizations are dealing with the COVID-19 crisis, they must make sure they continue to give adequate attention to data security.

 Laws, Policy, Regulations

A lawsuit seeking class-action status has been filed against Morgan Stanley, claiming the financial organization failed to properly safeguard PII when the company discarded old computer equipment.

 Breaches and Incidents

AusCERT said that after analyzing the data with cyber-security firm Cosive, it determined that the leaked data originated from K7Maths, an online service providing school e-learning solutions.

 Malware and Vulnerabilities

The remote code execution flaw, which was assigned the highest possible CVSS score of 10, allows unauthenticated attackers to execute arbitrary code and upload malicious files on vulnerable websites.

 Companies to Watch

?Ava, a unified security company, announced the completion of the merger between Jazz Networks, an insider threat detection and response company, and Vaion, an end-to-end video security provider.

 Companies to Watch

Network security policy management provider FireMon announced Tuesday that it has secured $40 million in debt financing from Silicon Valley Bank (SVB).

 Malware and Vulnerabilities

In a new variant, Emotet malware hides behind an iOS-themed Word document template that requests users to 'Enable Content' to download payloads on the targeted systems.

 Malware and Vulnerabilities

The TA542 cybercriminal group was observed making enhancements to the Emotet malware. It recently expanded its target area to Indonesia, Philippines, Sweden, and India, besides its usual targets.

 Feed

The CGI and FastCGI implementations in the Go standard library behave differently from the HTTP server implementation when serving content. In contrast to the documented behavior, they may return non-HTML data as HTML. This may lead to cross site scripting vulnerabilities even if uploaded data has been validated during upload. Versions 1.15 and 1.14.7 and below are affected.

 Feed

Ubuntu Security Notice 4487-1 - Todd Carson discovered that libx11 incorrectly handled certain memory operations. A local attacker could possibly use this issue to escalate privileges. Jayden Rivers discovered that libx11 incorrectly handled locales. A local attacker could possibly use this issue to escalate privileges.

 Feed

Ubuntu Security Notice 4488-1 - Jan-Niklas Sohn discovered that the X.Org X Server incorrectly handled the input extension protocol. A local attacker could possibly use this issue to escalate privileges. Jan-Niklas Sohn discovered that the X.Org X Server incorrectly initialized memory. A local attacker could possibly   show more ...

use this issue to obtain sensitive information. Jan-Niklas Sohn discovered that the X.Org X Server incorrectly handled the XkbSelectEvents function. A local attacker could possibly use this issue to escalate privileges. Various other issues were also addressed.

 Feed

Red Hat Security Advisory 2020-3539-01 - This release of Red Hat build of Thorntail 2.7.1 includes security updates, bug fixes, and enhancements. For more information, see the release notes listed in the References section. Issues addressed include denial of service, deserialization, and improper authorization vulnerabilities.

 Feed

Ubuntu Security Notice 4486-1 - Wen Xu discovered that the XFS filesystem implementation in the Linux kernel did not properly validate meta-data information. An attacker could use this to construct a malicious xfs image that, when mounted, could cause a denial of service.

 Feed

Ubuntu Security Notice 4485-1 - Timothy Michaud discovered that the i915 graphics driver in the Linux kernel did not properly validate user memory locations for the i915_gem_execbuffer2_ioctl. A local attacker could possibly use this to cause a denial of service or execute arbitrary code. It was discovered that the   show more ...

Kvaser CAN/USB driver in the Linux kernel did not properly initialize memory in certain situations. A local attacker could possibly use this to expose sensitive information. Various other issues were also addressed.

 Feed

Ubuntu Security Notice 4483-1 - Chuhong Yuan discovered that go7007 USB audio device driver in the Linux kernel did not properly deallocate memory in some failure conditions. A physically proximate attacker could use this to cause a denial of service. Fan Yang discovered that the mremap implementation in the Linux   show more ...

kernel did not properly handle DAX Huge Pages. A local attacker with access to DAX storage could use this to gain administrative privileges. Various other issues were also addressed.

 Feed

Ubuntu Security Notice 4484-1 - It was discovered that the cgroup v2 subsystem in the Linux kernel did not properly perform reference counting in some situations, leading to a NULL pointer dereference. A local attacker could use this to cause a denial of service or possibly gain administrative privileges.

 Feed

Ubuntu Security Notice 4482-1 - Fabian Vogt discovered that Ark incorrectly handled symbolic links in tar archive files. An attacker could use this to construct a malicious tar archive that, when opened, would create files outside the extraction directory.

 Feed

Red Hat Security Advisory 2020-3600-01 - Ansible is a simple model-driven configuration management, multi-node deployment, and remote-task execution system. Ansible works over SSH and does not require any software or daemons to be installed on remote nodes. Extension modules can be written in any language and are transferred to managed machines automatically.

 Feed

Red Hat Security Advisory 2020-3602-01 - Ansible is a simple model-driven configuration management, multi-node deployment, and remote-task execution system. Ansible works over SSH and does not require any software or daemons to be installed on remote nodes. Extension modules can be written in any language and are transferred to managed machines automatically.

 Feed

Red Hat Security Advisory 2020-3601-01 - Ansible is a simple model-driven configuration management, multi-node deployment, and remote-task execution system. Ansible works over SSH and does not require any software or daemons to be installed on remote nodes. Extension modules can be written in any language and are transferred to managed machines automatically.

 Feed

Red Hat Security Advisory 2020-3580-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.

 Feed

Red Hat Security Advisory 2020-3579-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.

 Feed

Cybercriminal groups are constantly evolving to find new ways to pilfer financial information, and the latest trick in their arsenal is to leverage the messaging app Telegram to their benefit. In what's the latest tactic adopted by Magecart groups, the encrypted messaging service is being used to send stolen payment details from compromised websites back to the attackers. "For threat actors,

 Feed only

Graham Cluley Security News is sponsored this week by the folks at Immersive Labs. Thanks to the great team there for their support! Attacks and breaches are a fact of life. They happen. What’s most important is how well your organisation responds. And technology isn’t enough. Your staff must be ready too.   show more ...

Immersive Labs delivers … Continue reading "Free ebook: Aligning cyber skills with the MITRE ATT&CK framework"

 Guest blog

Hackers are exploiting a critical vulnerability that may be affecting hundreds of thousands of websites running WordPress. The vulnerability lies in versions of the popular third-party plugin WordPress File Manager, which has been installed on over 700,000 websites. Read more in my article on the Hot for Security blog.

2020-09
Aggregator history
Wednesday, September 02
TUE
WED
THU
FRI
SAT
SUN
MON
SeptemberOctoberNovember