Fortinet removes SSH and database backdoors from its SIEM product
Fortinet has released patches this month to remove two backdoor accounts from FortiSIEM, the company's Security Information and Event Management (SIEM) product. Due to the sensitive nature of the data processed by a SIEM product and its central role in a company's cyber-security defenses, any backdoor mechanism in these systems is considered a dangerous and highly critical vulnerability.
Old Scams Getting New Life in the Cloud (Netskope)
The ease of rapidly switching to new URLs and cheap hosting cost makes services such as Alibaba, AWS, and Azure a viable target for the scammers. The object store names can be randomly generated using a DGA (domain generation algorithm) to make shutting down the scams difficult.
In a Competitive World, Cybersecurity Must Be an Enabler, Not a Roadblock
The main mission of cybersecurity in the coming years will be to help organizations leverage the power of big data and the cloud to achieve big goals, while maintaining safe environments for their people to innovate.
Ixia, a Keysight Business, Enhances Active Network Monitoring Platform with Machine Learning
The addition of machine learning enables Hawkeye to help enterprises shorten outages and improve network uptime by quickly detecting, identifying and resolving network anomalies.
This giant botnet has just sprung back to life pushing a big phishing campaign
After seemingly disappearing towards the end of 2019, Emotet has now returned with a giant email-spamming campaign, as detailed by researchers at cybersecurity company Proofpoint.
Tackling the Next Generation of Threats with Shape and F5
What sets Shape and F5 apart is F5’s ability to capture high fidelity data from our position in front of millions of mission-critical customer applications combined with the sophisticated AI-assisted analytics platform from Shape. By integrating Shape and F5, we are executing on our vision to create an advanced set of security capabilities that can handle today’s most sophisticated attacks.
Why Should You Care About VDI and Desktop-as-a-Service?
Both VDI and DaaS can centralize management and reduce the impacts of cost and complexity, making it easier to manage a large number of desktops and end-user applications, thereby simplifying daily operations.
CrowdStrike Delivers Protection for Critical Windows Certificate Spoofing Vulnerability
CrowdStrike has created a dashboard to identify systems vulnerable to CVE-2020-0601. The dashboard is provided free of charge to customers who have the CrowdStrike endpoint detection and response (EDR) solution, Falcon Insight™.
Check Point Research partners with Microsoft Azure to create a safer, better secured cloud infrastructure
The above vulnerabilities were disclosed and fixed by Microsoft and assigned as CVE-2019-1372 and CVE-2019-1234. Microsoft acknowledged these vulnerabilities were relevant to Azure Cloud and Azure Stack.
Cisco Patches Two High-Severity Bugs in its Small Business Switch Lineup
Cisco Systems released security patches on Wednesday for high-severity vulnerabilities affecting over a half dozen of its small business switches. The flaws allow remote unauthenticated adversaries to access sensitive information and level denial-of-service (DoS) attacks against affected gear.