EDR and Cloud Workload Security on the Agenda for Bitdefender at Infosecurity EUROPE

/
What are your plans for 5-7 June 2018 ? If you are a security professional attending Infosecurity Europe, in London we will be happy to meet with you, answer your questions and offer our insights on the latest cyber security trends ... Read More
ZipperDown Demo

ZipperDown Programming Vulnerability Could Let Hackers Execute Code in iOS Apps

A recently discovered vulnerability in iOS applications could allow hackers to execute code within affected apps, provided the device is connected to an attacker-controlled Wi-Fi network. The number of potentially vulnerable applications is estimated at around 10 percent of iOS applications, and the programming error has been validated by an ... Read More
Signal App Delivers Timely Patch for Code Injection Vulnerability that Allows Remote Code Execution

Signal App Delivers Timely Patch for Code Injection Vulnerability that Allows Remote Code Execution

A recent vulnerability in the Signal messaging application that enables encrypted communication between parties, could have enabled attackers to arbitrarily remotely execute code on the victim’s device without any user interaction. Security researchers Iván Ariel Barrera Oro, Alfredo Ortega and Juliano Rizzo accidentally triggered the vulnerability while exchanging URLs that ... Read More

42 Percent of Security Professionals Ignore Security Warnings

Some 42 percent of IT security professionals ignore critical security issues, especially if they don’t know how to fix them (16 percent), according to a recent survey of 155 IT professionals by Oyutpost24 ... Read More
Twitter Plain Text Password Bug Prompts Users for Immediate Password Change

Twitter Plain Text Password Bug Prompts Users for Immediate Password Change

Twitter has warned its 330 million users to immediately change their passwords, as a result of a bug that caused passwords to be logged in plaintext before being hashed. Although Twitter says passwords are stored using the bcrypt hashing algorithm, it seems they were inadvertently placed in an internal log ... Read More
Critical Vulnerability in Docker Tool for Windows Allows RCE; Patch Available

Critical Vulnerability in Docker Tool for Windows Allows RCE; Patch Available

A recent vulnerability in the Windows Host Compute Service Shim (hcsshim) library that allows users to import Docker container images in Docker for Windows could have enabled remote code execution on the Windows host. The open source hcsshim library was developed by Microsoft as a wrapper for use with its ... Read More
Unspecified GitHub Bug Internally Exposes Passwords in Plaintext

Unspecified GitHub Bug Internally Exposes Passwords in Plaintext

In a series of emails to its users, popular code repository website GitHub revealed that some account passwords were inadvertently collected in plaintext by their internal logging systems, prompting an immediate password reset for affected accounts. GitHub revealed no details as to the specific nature of the bug, only mentioning ... Read More

MSPs Must Prepare for New Cyber Attacks

The main goal of MSPs is to help businesses grow by ensuring agility, scalability, and security. This means MSPS need to constantly learn and adapt to sophisticated threats, and deliver a full complement of security services and technologies that address individual risks for each company. Consequently, MSPs need to stay ... Read More

What Security Risks Should MSPs Expect in 2018

/ / enterprise security
As IT operations are becoming more complex and require both advanced infrastructure and security expertise to increase the overall security posture of the organization, the managed service provider (MSP) industry is gaining more traction and popularity ... Read More
Cryptocurrency Mining Craze Going for Data Centers

Coin Miner Reports Outrank Ransomware by Two Orders of Magnitude, According to Bitdefender Telemetry

Bitdefender telemetry revealed that from September 2017 until February 2018, ransomware reports have followed a descending curve, while coin miner reports have increased by 130 percent by January 2018. Interestingly, cryptojacking is currently one of the fastest spreading cyber threats, already outranking ransomware’s exposure by a factor of 1 to ... Read More
Loading...