Breaking News

Want to survive the downturn? Better build a platform
When you look at the most successful companies in the world, they are almost never just one simple service. Instead, they offer a platform with a range of services and an ability to connect to it to allow external partners and developers to extend the base functionality that the company provides. Aspiring to be a […] [...]
Zoom will enable waiting rooms by default to stop Zoombombing
Zoom is making some drastic changes to prevent rampant abuse as trolls attack publicly shared video calls. Starting April 5th, it will require passwords to enter calls via Meeting ID, as these may be guessed or reused. Meanwhile, it will change virtual waiting rooms to be on by default so hosts have to manually admit […] [...]
In the wake of COVID-19, UK puts up £20M in grants to develop resilience tech for critical industries
Most of the world — despite the canaries in the coal mine — was unprepared to cope with the coronavirus outbreak that’s now besieging us. Now, work is starting to get underway both to help manage what is going on now and better prepare us in the future. In the latest development, the UK government today […] [...]
CIOs are dead tired of dumb tech. Pulse has $6.5M to help them help each other
The technology that runs our companies these days is staggering in its complexity. We have moved from a monolith to a microservices world, from boxes to SaaS, and while that has added agility to the enterprise, it has come at the cost of a metric f-ton of services and software platforms required by every team […] [...]
Collibra nabs another $112.5M at a $2.3B valuation for its big data management platform
GDPR and other data protection and privacy regulations — as well as a significant (and growing) number of data breaches and exposées of companies’ privacy policies — have put a spotlight on not just the vast troves of data that businesses and other organizations hold on us, but also how they handle it. Today, one […] [...]
Zoom freezes feature development to fix security and privacy issues
Zoom has been widely criticized over the past couple of weeks for terrible security, a poorly designed screensharing feature, misleading dark patterns, fake end-to-end-encryption claims and an incomplete privacy policy. Despite that, the video conferencing service has attracted a ton of new users thanks to the coronavirus lockdowns around the world — the company reached […] [...]
A former chaos engineer offers 5 tips for handling online disasters remotely
It’s often the small things that can make all the difference when working remotely; things that seem obvious in the moment, but may have been overlooked. [...]
Okta launches Lifecycle Management Workflows to make building identity-centric processes easy
Okta, the popular identity and access management service, today used its annual (and now virtual) user conference to launch Lifecycle Management Workflows, a new tool that helps IT teams build and manage IFTTT-like automated processes with the help of an easy to use graphical interface. The new service is an extension of Okta’s existing automation […] [...]
Xerox drops $34B HP takeover bid amid COVID-19 uncertainty
Xerox announced today that it would be dropping its hostile takeover bid of HP. The drama began last fall with a flurry of increasingly angry letters between the two companies, and confrontational actions from Xerox, including an attempt to take over the HP board that had rejected its takeover overtures. All that came crashing to […] [...]
Palo Alto Networks to acquire CloudGenix for $420M
Palo Alto Networks announced today that it has an agreement in place to acquire CloudGenix for $420 million. CloudGenix delivers a software-defined wide area network (SD-WAN) that helps customers stay secure by setting policies to enforce compliance with company security protocols across distributed locations. This is especially useful for companies with a lot of branch […] [...]
Microsoft launches Edge Zones for Azure
Microsoft today announced the launch of Azure Edge Zones, which will allow Azure users to bring their applications to the company’s edge locations. The focus here is on enabling real-time low-latency 5G applications. The company is also launching a version of Edge Zones with carriers (starting with AT&T) in preview, which connects these zones directly […] [...]
Amid shift to remote work, application performance monitoring is IT’s big moment
In recent weeks, millions have started working from home, putting unheard-of pressure on services like video conferencing, online learning, food delivery and e-commerce platforms. While some verticals have seen a marked reduction in traffic, others are being asked to scale to new heights. Services that were previously nice to have are now necessities, but how […] [...]
Xage adds full-stack data protection to blockchain security platform
Xage, a startup that has been taking an unusual path to secure legacy companies like oil and gas and utilities with help from the blockchain, announced a new data protection service today. Xage CEO Duncan Greatwood, says that up until this point, the company has concentrated on protecting customers at the machine layer, but today’s […] [...]
Axonius nabs $58M for its cybersecurity-focused network asset management platform
As companies get to grips with a wider (and, lately, more enforced) model of remote working, a startup that provides a platform to help track and manage all the devices that are accessing networked services — an essential component of cybersecurity policy — has raised a large round of growth funding. Axonius, a New York-based […] [...]
DataStax launches Kubernetes operator for open source Cassandra database
Today, DataStax, the commercial company behind the open source Apache Cassandra project, announced an open source Kubernetes operator developed by the company to run a cloud native version of the database. When Sam Ramji, chief strategy officer at DataStax, came over from Google last year, the first thing he did was take the pulse of […] [...]
Atlassian’s Confluence gets a new template gallery
Confluence, Atlassian’s content-centric collaboration tool for teams, is making it easier for new users to get started with the launch of an updated template gallery and 75 new templates. They incorporate what the company has learned from its customers and partners since it first launched the service back in 2004. About a year ago, Atlassian […] [...]
SMB loans platform Kabbage to furlough a ‘significant’ number of staff, close office in Bangalore
Another tech unicorn is feeling the pinch of doing business during the coronavirus pandemic. Today, Kabbage, the SoftBank-backed lending startup that uses machine learning to evaluate loan applications for small and medium businesses, is furloughing a “significant number” of its U.S. team of 500 employees, according to a memo sent to staff and seen by […] [...]
Turbo Systems hires former Looker CMO Jen Grant as CEO
Turbo Systems, a three-year old, no-code mobile app startup, announced today it has brought on industry veteran Jen Grant to be CEO. Grant, who was previously vice president of marketing at Box and chief marketing officer at Elastic and Looker, brings more than 15 years of tech company experience to the young startup. She says […] [...]
Tech giants should let startups defer cloud payments
Google, Amazon and Microsoft are the landlords. Amidst the coronavirus economic crisis, startups need a break from paying rent. They’re in a cash crunch. Revenue has stopped flowing in, capital markets like venture debt are hesitant and startups and small-to-medium sized businesses are at risk of either having to lay off huge numbers of employees […] [...]
Salesforce’s Benioff pledges no ‘significant’ layoffs for 90 days
In a Twitter thread on Tuesday, Salesforce CEO Marc Benioff outlined an eight-step plan to keep people safe and find treatments and a vaccine for the COVID-19 virus, all while working to find a way to get people back to work safely. He also asked that all CEOs take a 90-day “no lay off” pledge […] [...]

Security News

Keys Used to Encrypt Zoom Meetings Sent to China: Researchers
Zoom encryption keys sent to China A recent analysis of the Zoom video conferencing application revealed that the keys used to encrypt and decrypt meetings may be sent to servers in China, even if all participants are located in other countries. read more [...]
Hacker 'Ceasefire' Gets Little Traction as Pandemic Fuels Attacks
Internet users have seen a surge in COVID-related cyberattacks and fraud schemes which could add to the misery of the pandemic, even as some hackers have called for dialing back their criminal efforts. read more [...]
Apple Awards Researcher $75,000 for Camera Hacking Vulnerabilities
A white hat hacker says he has earned $75,000 from Apple for reporting several Safari vulnerabilities that can be exploited to hijack the camera and microphone of devices running iOS or macOS. read more [...]
Researchers Discover Hidden Behavior in Thousands of Android Apps
Thousands of mobile applications for Android contain hidden behavior such as backdoors and blacklists, a group of researchers has discovered. With smartphones being part of our every-day lives, millions of applications are being used for a broad variety of activities, yet many of these engage in behaviors that are never disclosed to their users. read more [...]
Unpatched Flaw in Discontinued Plugin Exposes WordPress Sites to Attacks
A stored cross-site scripting (XSS) vulnerability in the Contact Form 7 Datepicker WordPress plugin will not receive a patch, leaving websites exposed to attacks, WordPress security firm Defiant reports. read more [...]
Twitter Tells Users Firefox Possibly Exposed Personal Information
Twitter informed users on Thursday that their personal information may have been exposed due to the way the Firefox web browser stores cached data. read more [...]
How Humans "LEAD" the Way to More Effective Use of Threat Intelligence
When the theme, Human Element, was announced for RSA Conference 2020 (RSAC), I was gratified. It’s a topic I never tire of because not only do I believe that there is no “silver bullet” technology, I believe it’s the humans who really lead the way to greater security efficiency and effectiveness. read more [...]
Zoom's Security and Privacy Woes Violated GDPR, Expert Says
Zoom Security Risks, Privacy and GDPR Compliance Home working and learning has led to a boom in videoconferencing, with Zoom a major beneficiary. But concerns over privacy and security raise important questions: is Zoom safe, and is it even GDPR compliant? read more [...]
Researcher Finds New Class of Windows Vulnerabilities
A security researcher has discovered over 25 different potential vulnerabilities in Windows, including some that could lead to elevation of privileges. read more [...]
Class Action Lawsuit Filed Against Marriott Over New Data Breach
Law firm Morgan & Morgan announced on Thursday that it has filed a class action lawsuit against Marriott over the recently disclosed data breach that has impacted as many as 5.2 million individuals. read more [...]
Firefox, IE Vulnerabilities Exploited in Attacks on China, Japan
Vulnerabilities patched earlier this year in Firefox and Internet Explorer have been exploited by an advanced persistent threat (APT) actor in attacks aimed at China and Japan. read more [...]
Browser Makers Delay Removal of TLS 1.0 and 1.1 Support
Google, Microsoft and Mozilla are delaying plans to disable support for the Transport Layer Security (TLS) 1.0 and 1.1 protocols in Chrome, Edge, Internet Explorer, and Firefox. read more [...]
Remaining Nimble During Times of Rapid Change
There is an adage that goes, "the only constant is change." And that has never been more true than right now, as organizations are having to rapidly adapt to current world events at an unprecedented pace. And traditionally, the aspect of networks that have had the hardest time adjusting to such rapid change has been security.  read more [...]
Watchdog Finds New Problems With FBI Wiretap Applications
The Justice Department inspector general has found additional failures in the FBI’s handling of a secretive surveillance program that came under scrutiny after the Russia investigation, identifying problems with dozens of applications for wiretaps in national security investigations. read more [...]
Coronavirus Malware Makes Devices Unusable by Overwriting MBR
A newly discovered piece of malware is taking advantage of the current COVID-19 pandemic to render computers unusable by overwriting the MBR (master boot record). read more [...]
Zoom Vulnerabilities Expose Users to Spying, Other Attacks
Security researchers discovered recently that the Zoom video conferencing app is affected by vulnerabilities that can be exploited to spy on users, escalate privileges on the system, and capture Windows credentials. The company says it’s working on patching these flaws. read more [...]
Nigerian Threat Actors Specializing in BEC Attacks Continue to Evolve
The Nigerian business email compromise (BEC) threat actors referred to as SilverTerrier have intensified assaults on multiple industries and should be considered an established threat, Palo Alto Networks says. read more [...]
Vollgar Campaign Targets MS-SQL Servers With Backdoors, Crypto-Miners
A recently uncovered attack campaign that stayed under the radar since May 2018 has targeted Microsoft SQL servers with backdoors and crypto-miners, Guardicore Labs reveals. read more [...]
Keeping Your Security Strategy on Track Amidst Tactical Distractions
“Goodbye to Rosie, the queen of Corona” - Paul Simon, Me and Julio Down by the Schoolyard read more [...]