Jan 24, 2025Ravie LakshmananTelecom Security / Vulnerability A group of academics has disclosed details of over 100 security vulnerabilities impacting LTE and 5G implementations that could be exploited by an attacker to disrupt access to service and even gain a foothold into the cellular core network. The 119 vulnerabilities, assigned 97 unique CVE identifiers, span seven LTE … [Read more...] about Over 100 Security Flaws Found in LTE and 5G Network Implementations
security
Simplifying Zero Trust Security for the Modern Workplace
Organizations face an evolving array of cyber threats these days. As attackers have become more sophisticated, it is important to adopt a comprehensive security strategy that includes a layered approach and increased protection for the modern workplace. That includes the home office, branch, campus, coffee shop, or anywhere in between. Cisco’s Enhanced User Protection … [Read more...] about Simplifying Zero Trust Security for the Modern Workplace
Modern Security for Legacy Environments
Many organizations across critical industries such as healthcare, manufacturing and energy rely on legacy Windows operating systems to run essential equipment. These systems, while operationally vital, are notoriously difficult and costly to upgrade — leaving them vulnerable to modern cyber threats. CrowdStrike is addressing this challenge by expanding our legacy support … [Read more...] about Modern Security for Legacy Environments
Security for Enterprise AI Adoption
Today, we are witnessing artificial intelligence radically reshape the way we do business. Last year, we published our Cisco AI Readiness Index, which provided critical insights into the state of enterprise AI adoption. In both our survey results and my own conversations with business leaders, a common trend was evident. Despite growing pressures to harness this … [Read more...] about Security for Enterprise AI Adoption
CrowdStrike Strengthens Container Security with Registry Scanning
Organizations of all sizes require security tools to meet their complex hybrid cloud needs. As their cloud environments and workloads evolve, this includes solutions that can scan for vulnerabilities in container images regardless of their location across public and private cloud environments. The problem is, most organizations lack this capability. Many use tools that … [Read more...] about CrowdStrike Strengthens Container Security with Registry Scanning
Neglected Domains Used in Malspam to Evade SPF and DMARC Security Protections
Cybersecurity researchers have found that bad actors are continuing to have success by spoofing sender email addresses as part of various malspam campaigns. Faking the sender address of an email is widely seen as an attempt to make the digital missive more legitimate and get past security mechanisms that could otherwise flag it as malicious. While there are safeguards such as … [Read more...] about Neglected Domains Used in Malspam to Evade SPF and DMARC Security Protections
Researchers Uncover Major Security Flaw in Illumina iSeq 100 DNA Sequencers
Jan 07, 2025Ravie LakshmananFirmware Security / Malware Cybersecurity researchers have uncovered firmware security vulnerabilities in the Illumina iSeq 100 DNA sequencing instrument that, if successfully exploited, could permit attackers to brick or plant persistent malware on susceptible devices. "The Illumina iSeq 100 used a very outdated implementation of BIOS firmware … [Read more...] about Researchers Uncover Major Security Flaw in Illumina iSeq 100 DNA Sequencers
Elastic Security among top solutions in AV-Comparatives Business Test
Delivering exceptional performance and protection in rigorous evaluationsElastic Security has achieved remarkable results in the recent AV-Comparatives Business Security Test. This independent assessment underscores our commitment to providing world-class malware protection.Why the AV-Comparatives Business Security Test mattersAV-Comparatives is a highly respected organization … [Read more...] about Elastic Security among top solutions in AV-Comparatives Business Test
Severe Security Flaws Patched in Microsoft Dynamics 365 and Power Apps Web API
Jan 02, 2025Ravie LakshmananVulnerability / Data Protection Details have emerged about three now-patched security vulnerabilities in Dynamics 365 and Power Apps Web API that could result in data exposure. The flaws, discovered by Melbourne-based cybersecurity company Stratus Security, have been addressed as of May 2024. Two of the three shortcomings reside in Power Platform's … [Read more...] about Severe Security Flaws Patched in Microsoft Dynamics 365 and Power Apps Web API
Unify Security Posture and Protection for Faster Cloud Detection and Response
Adversaries are taking aim at cloud environments, as evidenced by the 75% increase in cloud intrusions in 2023. Organizations are under growing pressure to ensure they have measures in place to effectively detect, investigate and respond to cloud-focused attacks. Cloud detection and response (CDR) is uniquely challenging for SOC teams due to their limited visibility into … [Read more...] about Unify Security Posture and Protection for Faster Cloud Detection and Response