Subscribe to Email Updates

Subscribe

All about Virtualization and Cloud Security | Recent Articles:

15 Hot Tools To Come Out of Black Hat and Def Con

Aug 07 by Ericka Chickowski

Security summer camp is upon us as the cybersecurity industry convenes on Las Vegas this week for Black Hat and Def Con. In addition to presenting a ton of important research on new vulnerabilities and exploit methods, many security researchers will be sharing with attendees a smorgasbord of new and updated open source tools. Between speaker tracks at both shows, Black Hat Arsenal, and DEF CON Demo Days, presenters will unveil and demo dozens of freebies designed to help their colleagues with a range of offensive and defensive security activities.

Read More

Protecting Against SWAPGS Attack with Bitdefender Hypervisor Introspection

Aug 06 by Andrei Florescu
  • Speculative execution-based attacks exploit CPU architecture flaws to allow attackers to leak sensitive information from privileged operating system kernel memory
  • The SWAPGS Attack leverages a new speculative execution vulnerability discovered by Bitdefender security researchers
  • The SWAGS Attack circumvents all existing side-channel attack mitigations and allows attackers to gain unprivileged access to kernel sensitive data
  • Bitdefender Hypervisor Introspection technology mitigates the SWAPGS Attack on unpatched Windows systems running on Citrix Hypervisor or KVM hypervisor

Today, multiple industry software and hardware vendors have published security advisories for CVE-2019-1125 related to a newly discovered side-channel attack, dubbed SWAPGS Attack. The SWAPGS Attack was identified and reported by Bitdefender security researchers working on hypervisor introspection and anti-exploit technologies. This led to a coordinated disclosure process that has included several strategic industry partners.

Read More

How to manage the headache of defending Industrial IT Infrastructures (Industrial IoT) – Part 1

Aug 06 by Bogdan Carlescu

This is the first of a two-part series of blog posts covering the challenges of securing Industrial IT infrastructures. This part covers:

Read More

New Cyber Security Alliance Aims to Fight Back

Aug 05 by Bob Violino

There’s clearly a sense of combativeness building on the part of cyber security leaders, teams, and organizations worldwide. Weary of seeing cyber criminals and other bad actors break into networks and systems seemingly at will to steal sensitive data, they are taking steps to bolster the overall effectiveness of security programs.

Read More

Join Bitdefender at Black Hat 2019 for a Legendary Experience

 

*Update* 4PM PDT on 8/06/2018 - Bitdefender senior researchers Dan Horea Luțaș and Andrei Vlad Luțaș recently uncovered a new speculative-execution vulnerability and demonstrated how it can be exploited via a side-channel style attack, dubbed SWAPGS Attack. The vulnerability has been publicly reported today as CVE-2019-1125. Be sure to join us on August 7th at 10:20 AM in Ballroom K to learn more about the SWAPGS attack.

 

In August, all roads lead to Las Vegas – that is if you want to meet the best security professionals, penetration testers and malware investigators in the world. Over the past 22 years, Black Hat has become the leading information security event in the world.

Read More

Fraudsters Are Trying to Steal $8.7 Million Every Single Day through Business Email Compromise

Aug 01 by Graham Cluley

The Financial Crimes Enforcement Network (FinCEN), part of the US Department of the Treasury, has released an alert to financial institutions that fraudsters are attempting to steal much more money through Business Email Compromise than previously believed.

Read More

New York Businesses Must Now Report a Breach Even if Private Data Was Merely ‘Viewed’

Jul 31 by Filip Truta

New York is joining other US states in expanding its definition of a data breach to include unauthorized “viewing” of data. The amendment also expands the definition of private information.

Read More

Framework Aims to Enhance the Security of Software

Jul 30 by Bob Violino

Software is powering much of the world today, from the largest computing machines to the smallest devices that can fit on a computer chip. That means there is a greater opportunity than ever for security breaches. As any end user knows, even the highest quality software can come with vulnerabilities.

Read More

Surprise: Healthcare Organizations Confident in Their Cybersecurity Efforts

Jul 29 by George V. Hulme

Risk management firm LexisNexis Risk Solutions, in conjunction with Information Security Media Group (ISMG), recently announced the results of an online survey they conducted to identify current trends in healthcare cybersecurity. The survey is based on responses from more than 100 participants working within including hospitals, physician group practices and payers. The survey was conducted over the spring of 2019.

Read More

Breach Costs Keep Creeping Upward with Financial Fallout Lasting Years

Jul 26 by Ericka Chickowski

The cost of data breaches keeps increasing for companies, and new research indicates that the financial impact can continue to sap company coffers for years after the incident occurs. Released this week, the 2019 Cost of a Data Breach Report from Ponemon Institute showed that the average data breach now costs companies $3.92 million globally. This represents a 12% rise in breach costs over the last five years.

Read More

Lost Business Remains Top Contributor to Data Breach Costs for a Fifth Straight Year

Jul 25 by Filip Truta

Costs associated with a data breach have surged this year to $3.92 million, according to IBM’s latest Cost of a Data Breach study. And more than a third of it stems from lost business.

Read More

Data-Collecting Firms Have Only One Shot at Seeding Trust in Their Userbase, New Research Shows

Jul 23 by Filip Truta

As data protection authorities start to dish out GDPR-related fines, businesses in the US must learn to better communicate their data-handling practices to customers. The pressure is on for businesses to seed trust in their user base.

Read More

Cloud Security




Subscribe to Blog Updates

Latest Tweets