NSA advises security pros to use designated enterprise DNS resolvers to lock down DoH on corporate networks. @mjb CreativeCommons (Credit: CC BY-NC-ND 2.0) The National Security Agency is recommending that security teams use designated DNS resolvers to lockdown DNS over HTTPS (DoH), effectively preventing eavesdropping, manipulation and exfiltration of DNS
Author: Steve Zurier
Legal recourse? Nissan balances competitive and security fallout from source code leak
News that source code of Nissan North America tools leaked online because of a misconfigured Git server spurs questions not only about potential cyberattacks by bad actors, but also whether competitors could use the sensitive data against the automobile giant. Nissan offerings associated with the leaked source code ran the gamut
Chinese espionage group APT27 moves into ransomware
Researchers have discovered that the Chinese espionage group APT27 has moved into more financially-motivated cybercrimes, using ransomware to encrypt core servers at major gaming companies worldwide. In a blog released by Profero and Security Joes, researchers said the team first started following APT27 closely in early 2020 when they responded to
Financial services industry hit with tens of millions of attacks per day
DDoS attacks hit Citrix Application Delivery Controllers, hindering customer performance
Exterior of the Citrix Systems headquarters in Santa Clara, California. (Citrix Systems Inc./CC BY 3.0) Citrix reported Thursday a DDoS attack that was hitting its Citrix Application Delivery Controllers (ADCs), the networking products that let security and network teams manage the delivery speed and quality of applications to end users. According to
Vulnerabilities found in Dell Wyse thin clients could enable access to arbitrary files
Researchers reported Monday that they found two vulnerabilities in Dell Wyse thin client devices. (Jjpwiki/CC BY-SA 4.0) Researchers reported Monday that they found two vulnerabilities in Dell Wyse thin client devices that were given scores of 10 under the Common Vulnerability Scoring System – the highest severity rating. Health care cybersecurity provider
Google outage tied to authentication system outage, not supply chain attacks
Google applications were offline Monday morning due to an authentication system outage.(CC BY 2.0) A number of Google applications were offline Monday morning due to an authentication system outage, the technology giant confirmed. The outage Monday morning caused a stir among security experts, wondering whether the incident might have ties to a
Kmart, a vulnerable target, among those hit in Egregor ransomware attack spree
The fast-moving Egregor ransomware added Kmart to its list of retail targets, one day before the same attack group hit the Vancouver metro. The fast-moving Egregor ransomware has already hit other recognizable companies, most notably Barnes and Noble. Egregor first emerged in September and since then more than 70 companies have
Why backups are not a cure-all for ransomware attacks
Inside a heavily secured data center. (Photo: MediaNews Group/The Mercury News via Getty Images / Contributor) In a webinar sponsored by KnowBe4 earlier this month, 78 percent of attendees surveyed said backups won’t save companies from the aftermath of a ransomware attack. The webinar, 5 Top IT Security Myths Your CISO Believes Are True, was hosted by Erich Kron, the