You are here:-CyberSecurity


Chinese Cyberspies Target National Data Center in Asia

By | 2018-06-14T03:11:40+00:00 June 13th, 2018|Categories: CyberSecurity|

A China-linked cyber espionage group has targeted a national data center in Central Asia and experts believe the goal is to conduct watering hole attacks on the country’s government websites. The threat actor is tracked as LuckyMouse, Emissary Panda, APT27 and Threat Group 3390. The group has been active since at least 2010,

Google Removes Inline Installation of Chrome Extensions

By | 2018-06-14T02:23:37+00:00 June 13th, 2018|Categories: CyberSecurity|

Google this week detailed plans to completely remove the inline installation of Chrome extensions from its web browser by the end of the year. Introduced in 2011, inline installation was meant to make it easier for users to add extensions to the browser by installing them directly from the developer’s website instead of

SAP Releases Critical Updates for Two Security Notes

By | 2018-06-14T01:36:12+00:00 June 13th, 2018|Categories: CyberSecurity|

Of the ten Security Notes in SAP’s June 2018 Security Patch Day, five were updates for previously released Notes, including two rated Hot News (Critical severity). Impacting SAP Business Client (version 6.5) and SAP BASIS (versions 7.31, 7.40, 7.50, 7.51, 7.65, 7.66), the two Hot News Security Notes feature CVSS scores of 9.8

DHS HART Biometric Database Raises Security, Civil Liberties Concerns

By | 2018-06-14T00:39:36+00:00 June 13th, 2018|Categories: CyberSecurity|

In February 2018, Northrop Grumman Corporation announced that it had been awarded a $95 million contract to develop increments one and two of the Department of Homeland Security (DHS) Homeland Advanced Recognition Technology (HART) system. The announcement said very little about HART, except that it is a "multi-modal processing and matching technology that

Extending Trend Micro’s Container Protection with Deep Security Smart Check –

By | 2018-06-14T02:55:37+00:00 June 13th, 2018|Categories: CyberSecurity|

DevOps is not a single person or business unit, it is a development philosophy that exists within many organizations. DevOps teams build new applications for business growth, and extend critical monolithic applications into modern architectures. A key tenet of this philosophy uses microservices to make applications lightweight and easier to develop, test, and

Australia Agrees Solomons Internet Cable After China Concern

By | 2018-06-13T23:51:22+00:00 June 13th, 2018|Categories: CyberSecurity|

Australia will help fund and build an underseas communications cable to the Solomon Islands, it was agreed Wednesday, after the Pacific nation was convinced to drop a contract with Chinese company Huawei.  The impoverished country and Huawei inked a deal in late 2016 to construct the fibre-optic cable from Australia to Honiara to

Amazon EKS, Amazon ECS and Deep Security Smart Check –

By | 2018-06-14T02:07:36+00:00 June 13th, 2018|Categories: CyberSecurity|

Containers present a new opportunity for teams. An opportunity to deploy faster, more consistently, and with a simplicity rarely seen. But in order to make that happen a lot of infrastructure needs to be setup ahead of time. A cluster of hosts for the container runtime, an orchestration layer, and—of course—security throughout. To

LuckyMouse hits national data center to organize country-level waterholing campaign

By | 2018-06-13T13:41:22+00:00 June 13th, 2018|Categories: CyberSecurity|

What happened? In March 2018 we detected an ongoing campaign targeting a national data center in the Central Asia that we believe has been active since autumn 2017. The choice of target made this campaign especially significant – it meant the attackers gained access to a wide range of government resources at one

Microsoft Releases Mitigations for Spectre-Like ‘Variant 4’ Attack

By | 2018-06-13T11:01:11+00:00 June 13th, 2018|Categories: CyberSecurity|

Updates released by Microsoft on Tuesday for its Windows operating system add support for a feature that should prevent attacks involving the recently disclosed speculative execution vulnerability known as “Variant 4.” Researchers from several organizations warned in January that processors from Intel, AMD, ARM and other companies are affected by vulnerabilities that allow

Microsoft Patches 11 Critical RCE Flaws in Windows, Browsers

By | 2018-06-13T05:34:06+00:00 June 12th, 2018|Categories: CyberSecurity|

Microsoft’s Patch Tuesday updates for June 2018 address a total of 50 vulnerabilities, including nearly a dozen critical remote code execution flaws affecting Windows and the company’s Edge and Internet Explorer web browsers. None of the security holes patched this month appear to have been exploited for malicious purposes, but one of them