This Week in Technology

This Week in Technology

By Eric Corcoran
Posted in Technology Week in Review
On May 21, 2020

ICYMI: Check out the link below if you missed our latest live panel webinar "Incident Response: How to Detect & Recover Remotely".

https://bit.ly/2XaFz73

Monday 5/18

Ready-made COVID-19 Themed Phishing Templates Copy Government Websites Worldwide (Proofpoint)

Threat actors are continuing to try and take advantage of people worldwide as the pandemic continues—and most recently their efforts have included using fake websites, associated with COVID-19 financial assistance, to steal credentials.

https://bit.ly/3cMs1W0

3 Unorthodox Ways to Further Protect your Digital Accounts from Fraud (F5 Networks)

Since we will continue to live with passwords for the foreseeable future, here are some unorthodox tips on how to further protect your digital accounts from Account Takeover fraud.

https://bit.ly/3bFb0LV

Tuesday 5/19

Mobile adware: the silent plague with no origin (Check Point)

Check Point’s Cyber Security Report 2020 shows that in 2019, 27% of companies suffered a cyber-attack because the security of a mobile device was breached.

https://bit.ly/3bMZbTY

Verizon's data breach report highlights how unsecured cloud storage opens door to attacks

The plague of enterprises leaving cloud storage holding private data unprotected is starting to show up in the security statistics and is one of the few attacks on the rise.

https://zd.net/2AK6XBt

 

Wednesday 5/20

Citrix and Check Point Software Technologies Team to Deliver Next-Generation Firewall

Citrix and Check Point announced plans to enable easy deployment and management of additional next-generation firewalls within Citrix SD-WAN to provide companies with extra layers of security to protect their assets at branches and beyond.

https://bit.ly/3e43lsc

Nvidia unleashes new generation of GPU hardware

Nvidia has announced its first new GPU architecture in three years, and it’s clearly designed to efficiently support the various computing needs of artificial intelligence and machine learning.

https://bit.ly/3g6RawK

Thursday 5/21

How to Secure Your Data Everywhere? It’s Easy With Unified Cloud Edge (McAfee)

McAfee’s Unified Cloud Edge (UCE) is a combination of endpoint DLP, web SaaS proxy and CASB, covering all the potential data leak vectors: endpoint, unsanctioned shadow IT apps, sanctioned apps (including email) and cloud to cloud transfers.

https://bit.ly/2TpRmNP

Accelerated Cloud Adoption Drives Security-as-a-Service (Cyberark)

The accelerated journey to the cloud is also driving a parallel demand for scalable “as-a-service” security solutions that can protect remote workforces from cyber attacks, secure cloud workloads and mitigate the risk of damaging data breaches.

https://bit.ly/2LMuqEj

Analyzing Dark Crystal RAT, a C# backdoor (FireEye)

Through publishing this blog post we aim to help defenders look for indicators of compromise and other telltale signs of Dark Crystal RAT, and to assist fellow malware researchers new to .NET malware, or who encounter future variants of this sample.

https://bit.ly/2XvBR8v