Articles about Security

Security vendor consolidation or best of breed? Why you must do both

Trends in cybersecurity (like many areas of technology and life) tend to make pendulum-like swings over time. One such shifting debate is around security tool philosophy: is it best to use an array of best-in-class tools or consolidate to a single, “do it all” security platform?

I argue that it is essential to planfully and strategically implement a hybrid approach. By combining some best-of-class tools with integrated platforms, you can eliminate the chaos of countless single tools and embrace the advanced benefits of today’s platforms, while still having some high-value, niche solutions to provide the necessary layers of protection for the security armor. It’s important to avoid dependence on a single vendor to also avoid implementing that vendor’s weaknesses/blind spots across the enterprise; yet these solutions offer many advantages.

Continue reading

Shielding the lifelines: Protecting energy and infrastructure from cyber threats

The energy and infrastructure sectors serve as the backbone of global stability and economic health, underpinning nearly all facets of modern society. As such, the integrity and reliability of these systems are paramount, and failure to maintain their uptime could lead to unprecedented disruptions in daily life. This reality underscores the pressing need to safeguard these sectors from evolving cybersecurity threats.

However, the very importance of energy and infrastructure makes them prime targets for cybercriminals. The surge in sophisticated email-based attacks, such as business email compromise (BEC) and vendor email compromise (VEC), poses a significant risk. These cyber tactics, often characterized by deceptive social engineering and the absence of traditional threat indicators, allow attackers to bypass conventional security measures easily. Understanding these attacks is the first step towards developing robust defenses against them.

Continue reading

Microsoft is great, but not enough for email security

Microsoft-Email

Microsoft 365 is the default software in SMEs, and understandably. The software offers a comprehensive set of productivity tools; flexible, scalable, and affordable licensing options, and compliance and security capabilities. However, given the ever-growing and persistent threat of cyberattacks, for email security, the standard security safeguards offered are insufficient.

Analysis of over 1 billion emails worldwide shows that emails are the preferred vehicle of cybercriminals. Email-delivered malware remains a favorite, increasing by 276 percent between January and December of last year. Additionally, attachments are growing as a threat. In Q4 of 2023, EML attachments increased 10-fold. Criminals are sending malicious payloads via EML files because they get overlooked when attached to the actual phishing email, which comes out clean.

Continue reading

Microsoft is deprecating 1024-bit RSA certificate support in Windows 10 and Windows 11 to boost security

Security padlock

Microsoft has quietly announced plans to deprecate TLS server authentication certificates using RSA keys with key lengths shorter than 2048 bits.

The change means that it will not be possible to use 1024-bit keys, although Microsoft is yet to reveal exactly when the changeover will start. This is important information for companies using aging hardware and software as it will mean weaker keys can no longer be used for authentication.

Continue reading

Immutability: A boost to your security backup

As the volume of data continues to increase and the threat landscape continues to evolve, it is increasingly important for organizations to protect backup data from unwanted deletion. Threats today can take the form of a malicious insider deleting backup data or a targeted cyberattack on the backups themselves. Modern ransomware attacks often first seek out and destroy backups before moving on to encrypting production data. However, companies will benefit from implementing immutability, the act of making data writable but noneditable for a defined period of time, as part of their data protection arsenal to help avoid or recover from a loss of production data situation.

The rise in cyber incidents, which according to the Veeam Data Protection Trends Report 2023 is the leading cause of outages over the past three years, is bringing the need for immutability to the fore, particularly as most organizations reported having fallen victim to cyber incidents, on average, twice a year.

Continue reading

Microsoft releases KB5035845 update for Windows 10, with security fixes, new Windows share features and more

Hand holding Windows 10 logo

Windows 10 users have a new security update to install in the form of the KB5035845 update. In addition to addressing a number of security issues, this mandatory update also kills the Windows Backup app for many people and introduces various other changes.

One of the most interesting additions to be found in the KB5035845 update are improvements to Windows share. There are also fixes for various issues in Windows 10 including Windows Hello problems.

Continue reading

Microsoft releases KB5035853 security update for Windows 11 fixing 0x800F0922 error and more

Windows 11 on convertible laptop

Microsoft has released a new security update for Windows 11. KB5035853 is a mandatory update which not only addresses security issues, but also introduces changes to make Windows 11 compliant with new DMA legislation in Europe.

On top of this, the update fixes the 0x800F0922 error which many people started to experience back in February. The KB5035853 update also features various other changes and additions such as the arrival of support for the USB 80Gbps standard.

Continue reading

Meta adds a new label to show whether third-party WhatsApp chats are secure

Close-up of WhatsApp icon

New rules in Europe means that WhatsApp will have to offer interoperability with other messaging apps and platforms. This is something that Meta has already been talking about, having published its preference for third parties to use the Signal Protocol as the foundation for these E2EE communications.

Use of the Signal Protocol will not be a requirement for interoperability, but whatever protocol is used by a third-party messaging app or platform, it will need to show they offer "the same security guarantees as Signal". To communicate security to users, WhatsApp is introducing a new "end-to-end encrypted" label that will be added to secure chats.

Continue reading

Microsoft quietly extends the availability of Windows 11 22H2 updates

Windows 11 on convertible laptop

To little fanfare, Microsoft has announced that anyone choosing to stick with Windows 11 22H2 will be able to install optional updates for longer than previously planned.

Despite having started to forcibly upgrade some Windows 11 22H2 systems to Windows 11 23H2, Microsoft has had a change of heart about how it will handle updates for the older version of the operating system moving forward. The company had previously said that non-security updates would not be available after this month, but there's a new extended deadline in place now.

Continue reading

Ransomware resurgence: Tackling the new generation of cyber threats


Sadly, there has never been a better phrase than ‘survival of the fittest’ to describe cyber criminal groups. They are constantly refining their tactics to cause greater disruption and earn even bigger profits. The ransomware ecosystem is a resilient and lucrative business model, and attacks are causing huge pain for organizations.

Just look at the recent attack on the British Library. The attack rendered the British Library’s website inoperative, and it’s been reported the institution may have to spend £7 million to recover. The Rhysida group, who were responsible for the attack, disseminated hundreds of thousands of confidential documents on the internet, encompassing both customer and employee information.

Continue reading

Authy desktop apps for Windows, macOS, and Linux reach end-of-life: Here's what you need to know

There is some shocking and sad news that will impact Authy users globally. You see, Twilio has announced the end-of-life for its desktop applications on Windows, macOS, and Linux platforms, slated for March 19, 2024. This move highlights a change in the company's strategy, emphasizing the transition towards mobile-centric security solutions.

Authy has been a staple for users seeking an extra layer of security beyond traditional passwords. The desktop applications have provided a convenient way for users to manage their authentication tokens directly from their computers. However, with the upcoming discontinuation, Authy is urging its user base to migrate to its mobile applications.

Continue reading

Breaking Bitlocker: Watch Microsoft's Windows disk encryption being bypassed in just 43 seconds

Microsoft BitLocker is a full-disk encryption feature included in certain editions of Windows operating systems, designed to enhance the security of data stored on a computer or external drives. It serves as a crucial component of Microsoft's broader approach to data protection and aims to safeguard sensitive information against unauthorized access, particularly in scenarios where devices might be lost, stolen, or otherwise fall into the wrong hands.

BitLocker operates by encrypting the entire contents of a disk drive, including the operating system, system files, and user data. It uses a symmetric encryption algorithm, typically AES (Advanced Encryption Standard), to secure the data. To access the encrypted information, a user must provide a pre-boot authentication password or use additional authentication methods, such as a PIN or a USB key.

Continue reading

Quantum computing: The data security conundrum

One of the biggest challenges of digital technology today is around security systems and data. In response to this, sophisticated algorithms have been designed to encrypt data and protect it through frameworks known as symmetric cryptography. While this has proven successful, advancements in quantum computing -- which utilizes quantum mechanics to solve complex problems faster than conventional computers -- could potentially turn data security on its head.

IBM, Microsoft and Google have already turned their attention to quantum computing and, as a result, commercially viable quantum computers are not too far from becoming a reality. In fact the global quantum computing market size in terms of revenue was estimated to be USD 866 Million in 2023 and is poised to reach USD 4,375 Million by 2028, growing at a CAGR of 38.3 percent from 2023 to 2028. This is raising concerns that these computers might pose a threat to current public-key cryptography algorithms and potentially expose sensitive data. As such, data security needs to be a step ahead, with more advanced cryptographic algorithms that minimise potential risks and ensure the safeguarding of data in a quantum computing world.

Continue reading

Four reasons your agency's security infrastructure isn't agile enough

Part 1. In an ever-changing world, today’s organizations must have the technology in place to evolve along with it. In the government, agencies need to remain adaptive to achieve their missions in the face of policy changes, geopolitical conflict, and private sector advancements.

For years, enterprise teams have implemented agile software development methodologies to improve their ability to service their users rapidly and reliably; government agencies must follow suit. However, for organizations using or considering agile software development methodologies -- private or public sector -- the security architecture that protects their assets must be equally adaptable. 

Continue reading

0patch beats Microsoft to the punch and fixes serious EventLogCrasher vulnerability that affects every version of Windows

0patch

Just over a week ago, details emerged of a worrying 0day vulnerability affecting everything from Windows 7 to Windows 11, and Windows Server 2008 R2 to Windows Server 2022. The EventLogCrasher vulnerability allows a low-privileged attacker to disable Windows logging on all computers in a Windows domain and any local computer, thereby compromising intrusion detection and forensic capabilities.

Microsoft is yet to issue a fix for the problem, and this is concerning given not only the scale of the issue, but also the importance of the logging tool. As it has done before, micropatching firm 0patch has risen to the challenge and released a free patch which can be installed by everyone.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.