Day: August 6, 2020

The Next Step In SSD Evolution: NVMe Zoned Namespaces Explained

FallOutBoyTonto writes: In June we saw an update to the NVMe standard. The update defines a software interface to assist in actually reading and writing to the drives in a way to which SSDs and NAND flash actually works. Instead of emulating the traditional block device model that SSDs inherited from hard drives and earlier…


Using IoT Botnets to Manipulate the Energy Market

Tohid Shekari, phD candidate at Georgia Tech, talks about the session that he and Georgia Tech professor Raheem Beyah gave about a stealthy and adaptable way to use IoT botnets for financial gain or market downfall. …read more Source:: DarkReading


Black Hat 2020: Satellite Comms Globally Open to $300 Eavesdropping Hack

Attackers can listen in on internet traffic for high-value targets a continent away, like shipping fleets and oil installations, using some basic home-television gear. …read more Source:: Threatpost


Intel blueprints – 20GB of source code, specs, docs – spill onto internet, Chipzilla denies hack

Leaker only ‘a bit concerned’ about getting sued Swiss IT consultant Tillie Kottmann on Thursday published a trove of purportedly confidential Intel technical material, code, and documents related to various processors and chipsets.… …read more Source:: Register


Broadcom: Staying Safe with WastedLocker Ransomware Variant on the Prowl

SPONSORED CONTENT: Stealthier and more patient than some predecessors, WastedLocker lingers surreptitiously for as long as it needs to for maximum payoff, says Jon DiMaggio with Broadcom’s Symantec division. He explains how Windows servers are at a different risk level than their open-source counterparts, and how WastedLocker identifies “valuable” targets. …read more Source:: DarkReading


Remotely Hacking Operations Technology Systems

Marco Balduzzi senior research scientist with Trend Micro, tells us how the often-overlooked ICS protocol gateways contain serious vulnerabilities that allow attackers to hack OT systems remotely. …read more Source:: DarkReading


Hiring a CISO: The evolving role of your security executive

Before COVID, cybersecurity was a concern for businesses everywhere. In fact, in Microsoft’s 2019 Global Risk Perception Survey, 57 percent of companies ranked cybersecurity as a higher risk than economic uncertainty and brand reputation or damage. Looking ahead, what does all of this mean for the role of the Chief Information Security Officer (CISO)? Not…


Authentication vs. authorization | Why we need authorization standards and what it means for enterprise cybersecurity

Twenty years ago, almost everything in the IT world was on-premises: hardware and software, including the tools you used to verify who your users were and what they could do in your systems. In today’s cloud-native world, almost nothing is on-prem, and because of the explosion of apps, remote users and devices, it has become…


Apple Launches Public Beta of macOS Big Sur, Its Biggest Desktop OS Update in Years

The public beta of macOS Big Sur, the next major release of Apple’s Mac operating system, is now available. From a report: The new update brings a big visual overhaul to macOS while also adding a number of brand-new enhancements. If you’re thinking about installing the macOS Big Sur public beta, be warned that it’s…


Making the business case for security by design

Organizations need to evolve their thinking around cybersecurity to stay ahead of these changing threats. A holistic approach that effectively builds security into all infrastructure and processes from the ground up is cost-effective and necessary to safeguard valuable employee and customer data. This requires an overall shift in philosophy – and adopting the concept of…