Software Contract Solutions

A zero-day and testing of key printing features will drive August Windows updates

Though a DNS-spoofing vulnerability in Windows has been rated as a zero-day, the focus for this month’s updates should be on testing key Windows features prior to deployment. Though a DNS spoofing vulnerability in Windows (CVE-2020-1464) has been rated as a zero-day due to reports of exploitation in the wild, the focus for this month’s … Read more

Security teams struggle to keep pace with cloud threats

Security professionals face challenges in keeping pace with cloud deployments and migrations, and the additional security threats they open up. Misconfiguration, unauthorised access and account hijacking are the most pressing of a number of threats to public cloud environments, which are now reaching a level where security operations are finding it more and more of a … Read more

Second wave of Covid-19 cyber attacks locked in

A further increase in cyber attacks exploiting the Covid-19 coronavirus pandemic is highly likely in the near future, especially if there is substantial progress towards a vaccine, according to Interpol. The organisation said that should a vaccine become available, it was highly probable that there will be a second spike in phishing attacks related to vaccines and other … Read more

Cisco urges patching flaws in data-center, SD-WAN gear

Cisco has issued a number of critical security advisories for its data center manager and SD-WAN offerings that customers should deal with now. Cisco has issued a number of critical security advisories for its data center manager and SD-WAN offering customers should deal with now. On the data center side, the most critical – with a … Read more

Counterfeit Cisco switches raise network security alarms

F-Secure details enterprise security threats posed by counterfeit network gear. In a disconcerting event for IT security professionals, counterfeit versions of Cisco Catalyst 2960-X Series switches were discovered on an unnamed business network, and the fake gear was found to be designed to circumvent typical authentication procedures, according to a report from F-Secure. F-Secure says its investigators found that while … Read more

Social engineering hacks weaken cybersecurity during the pandemic

Disinformation, malware, and an array of cyberattacks are rising as fast as case counts. Cybersecurity inevitably suffers when scares infect the populace. The COVID-19 outbreak appears to be the most acute global crisis since the Second World War. Every aspect of the COVID-19 crisis has been exploited by opportunistic hackers, terrorists, and other criminals. In … Read more

Making the case for cloud-based security

Cloud-based security tools can hasten threat detection and response, but adoption will depend on where an enterprise is on the cloud readiness scale. The pace at which threat actors are carrying out cyber attacks has been accelerating in recent years thanks to easy access to infection vectors through offerings like ransomware-as-a-service, rendering many traditional on-premise security tools ineffective. … Read more

Coronavirus: Cyber crime landscape evolving as lockdown eases

As some countries begin to gradually ease Covid-19 lockdown measures, cyber criminals’ tactics are changing, but the pandemic remains a tempting lure. Threat researchers at Check Point say they have observed a dramatic decrease in malicious Covid-19 coronavirus domains in Europe and North America as national lockdown measures begin to ease, but the danger is by … Read more

Microsoft is buying CyberX to bolster its Azure IoT security

Azure IoT users can look for additional security and monitoring capabilities as Microsoft announces plans to buy CyberX. Microsoft has announced it will purchase the industrially focused network security vendor CyberX for an undisclosed sum in an effort to bolster the security capabilities of its Azure IoT platform. The acquisition strikes at the heart of two key IIoT security … Read more

As work-at-home increases, so do attacks on VoIP and unified communications

Businesses use on-prem and cloud-based unified communications (UC) to connect distributed workforces but often don’t realize the security threats hidden within popular UC services, but they should, and they should address them. There has been a sharp rise in eMeetings, Voice over IP (VoIP) and other UC capabilities as companies shift to a work-from-home (WFH) … Read more