article thumbnail

‘Extremely bad’ vulnerability found in widely used logging system

The Verge

If exploited, the vulnerability allows remote code execution on vulnerable servers, giving an attacker the ability to import malware that would completely compromise machines. The vulnerability is found in log4j, an open-source logging library used by apps and services across the internet.

System 142
article thumbnail

Microsoft Reports on Techniques Used by SolarWinds Hackers

SecureWorld News

The attack included the use of malware delivery methods, anti-forensic behavior, and operational security (OPSEC). If you are not caught up on all of the drama of the SolarWinds attack, check out our coverage of the unfolding events. The firewall rules were also methodically removed after the network reconnaissance was completed.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Understanding the Essential Pillars of Phishing Mitigation

SecureWorld News

Malware and attackers can "break in" in various ways. Technical controls Installing technical controls can allow for a more secure system, and anti-malware, anti-spam, and content filtering controls are a good start. Also known as spamming, phishing is typically done through email, SMS, and phone attacks.

article thumbnail

Why you must extend Zero Trust to public cloud workloads

CIO Business Intelligence

Why securing cloud workloads is an urgent matter In recent years, major cloud service providers encountered 6,000 malware samples actively communicating with them, underlining the magnitude of cloud security challenges. It’s not as simple as just extending traditional firewall capabilities to the cloud. 8 Complexity.

Cloud 135
article thumbnail

China's 'Volt Typhoon' Targeting U.S. Infrastructure, Microsoft Warns

SecureWorld News

According to the Microsoft Threat Intelligence announcement , Volt Typhoon gains initial access to targeted organizations through internet-facing security devices, specifically Fortinet FortiGuard firewalls. Notably, China-backed APT groups demonstrate advanced capabilities, leveraging custom malware and tools to evade detection.

article thumbnail

Browser Isolation: The Missing Piece in Your Security Puzzle

SecureWorld News

Cyberattacks such as malware infiltration and vulnerability exploitation continue to make headlines, attacking companies of various sizes. However, conventional solutions such as antivirus, firewalls, and other detection and blocking tools can only offer a limited level of security.

article thumbnail

Trend Micro’s Enterprise Play

Network World

I spent a few days with Trend Micro last week at its Insight event here in Boston. Most recently, Trend added machine learning for pre- and post-execution prevention/detection of 0-day malware which puts it on a par with the next-generation endpoint security crowd. Oh, and Trend also offers its own EDR functionality as well.

Trends 60