banner advert
BIOMETRICS
Technology | February 2022
Facial recognition technology, behavioural biometrics, biometric authentication, homomorphic encryption and more – all are vying to emerge on top as our digital lives come under ever greater threat
OUTDATED TECHNOLOGIES
Feature | February 2022
More than a third of security technologies used by organisations globally are considered outdated – and this at a time when attacks are being unleashed like never before
CALL FOR BACKUP ANSWERED!
Case Study | February 2022
In-built ransomware protection enables rapid recovery of individual files and emails areas
banner advert
TRIPLE PAYBACK
Opinion | February 2022
Steven Usher, Senior Security Analyst, Brookcourt Solutions, offers his insights into the three areas he believes you should be looking at to stay ahead in the coming year
banner advert
SECURITY ACTION NOW
Industry Focus | February 2022
Paul Harris, Managing Director at Pentest Limited, discusses the importance of security within tech projects
RANSOM RAIDS ROCKET
News | February 2022
Organisations hit by massive ransomware and ransom DDoS assaults
Cloud & Cyber Security Expo London is back live – don’t miss it!
Events | February 2022
Register now for Europe’s leading industry happening and meet the experts who can help keep your business safe
BOOSTING CYBER TALENT POOL
Feature | February 2022
Lack of cyber talent is now a critical issue as threat actors ramp up their efforts to hack British businesses
HACKERS’ ROUTE TO TOTAL CONTROL
Feature | February 2022
Ransomware hackers have the power not just to take files, but also to impact the running of an entire organisation
banner advert
‘KILLERWARE’ AND CO. TIGHTEN GRIP
Feature | February 2022
Use of deep fake tech, ‘killerware’, ransomware and insider threats are all forecast to rise in 2022
ALLIANCE FORMED TO BOOST SKILLS AND TRAINING
News | February 2022
Move aims to enhance and develop careers, skills and training in cyber security
WINNERS CELEBRATE AWARDS SUCCESS
Awards | February 2022
December 2021 was a truly momentous month for all involved in the Computing Security Awards – we were 'back in the room' with a live gathering at a London hotel to celebrate the occasion. Below, we relive more of those magic moments when the winners were revealed:
Advanced Persistent Threat (APT) Solution of the Year
Awards | February 2022
Winner: Hornetsecurity - Advanced Threat Protection
Runner-up: McAfee - McAfee APT
Data Loss Prevention Solution of the Year
Awards | February 2022
Winner: Veritas - BackUp Exec 21
Runner-up: SecurEnvoy - SecureIdentity Data Loss Prevention
Cyber Security Compliance Award
Awards | February 2022
Winner: Xcina Consulting
Runner-up: Adisa
AI and Machine Learning Based Security Solution of the Year
Awards | February 2022
Winner: Heimdal Security - Heimdal Threat Prevention
Runner-up: VIPRE Security - Email Security Attachment Sandboxing
Comment

Welcome to the February 2022 issue of your Computing Security Newsletter.

It is deeply concerning to see that Linux, a core part of digital infrastructure, is quickly becoming an attacker’s ticket into a multi-cloud environment.

Now, VMware has released a threat report titled ‘Exposing Malware in Linux-Based Multi-Cloud Environments’. Key findings that detail how cybercriminals are using malware to target Linux-based operating systems include:

•Ransomware is evolving to target host images used to spin workloads in virtualized environments

•89% of cryptojacking attacks use XMRig-related libraries

•More than half of Cobalt Strike users may be cybercriminals or at least using Cobalt Strike illicitly.

“Cybercriminals are dramatically expanding their scope and adding malware that targets Linux-based operating systems to their attack toolkit, in order to maximise their impact with as little effort as possible,” says Giovanni Vigna, senior director of threat intelligence at VMware.

Rather than infecting an endpoint and then navigating to a higher value target, cybercriminals have discovered that compromising a single server can deliver the massive payoff and access they’re looking for.

With current malware countermeasures mostly focused on addressing Windows-based threats, this leaves many public and private cloud deployments vulnerable to attacks on Linux-based operating systems – a weakness that organisations on this continuum need to be very aware, and wary, of.

Brian Wall, Editor
Computing Security


To make sure you get your copy of the Newsletter emailed to you personally, every time, click here to register.

Follow us :

Published by: BTC 35 Station Square Petts Wood BR5 1LZ
Tel: +44 (0) 1689 616 000

Privacy Policy. To unsubscribe click here.