The core focus of architecture, and of those who practice it as a profession, is to plan the design, layout, and construction of buildings. The Data Architects and System Architects employed in the planning and building of business-critical data infrastructures have a similarly vital role to play in their industries. Read on to find out more about these intriguing professions.
Top 5 Security links
Intel Fixes Critical Bugs in Management Engine, Its Secret CPU-On-Chip
F5 DROWNing, not waving, in crypto fail
Four Years Later, We Have a New OWASP Top 10
5 information security threats that will dominate 2018
Uber concealed massive hack that exposed data of 57m users and drivers
With the end of the year fast approaching, we’ve all been wondering what 2018 has in store. Forrester Research has provided the answers in its latest report, entitled “Predictions 2018: The Honeymoon for AI is over”. The study predicts that artificial intelligence (AI) will finally become more than just hype. Companies will increasingly start to realize that AI requires significant effort in terms of planning, delivery, and management – and the profession of aata engineere will become ever-more critical to the implementation of the technology.
This weeks top stories is that research by Google and the University of California found that phishing attacks are more efficient than data breaches at getting criminals into victim’s account and that the average person still has can’t pick a good password, and security researchers described a proof-of-concept exploit dubbed AVgater that affects multiple antivirus products and can lead to a full system takeover.
Github has announced a new feature to their dependency graph that will warn developers about vulnerable dependencies in their projects.
You can also read about Malwarebytes researchers warning IT workers seeking love online to beware “CatPhishing” scams, and in an interview Premera Blue Cross CISO and vice president sizes up healthcare security threats for 2018.
Top 5 Security links
Google study finds phishing attacks more efficient than data breaches
AVGater abuses antivirus software for local system takeover
Github Will Warn Developers About Vulnerable Dependencies in Their Projects
Beware Catphishing attacks targeting the hearts of security pros
A CISO Sizes Up Healthcare Security Threats for 2018
This weeks top stories is that the recent Intel Chips running Minix for their Management Engine have debugging ports that can be reached over USB, USB is also a theme in Linux Kernel patching these days with more than 40 security issues discovered.
Amazon has updated their AWS Dashboard to warn admins when they are exposing S3 buckets.
Researchers at Volexity has been tracking the Vietnamese threat actor APT32 group since May 2017 and claim they are one of the most advanced APTs in the threat landscape.
Top 5 Security links
Intel’s super-secret Management Engine firmware now glimpsed, fingered via USB
Don’t worry about those 40 Linux USB security holes. That’s not a typo
Amazon Updates AWS Dashboard to Warn Admins When They’re Exposing S3 Buckets
Misconfigured Amazon S3 Buckets Expose Users, Companies to Stealthy MitM Attacks
Vietnamese APT32 Group is One of the Most Advanced APTs in the Threat Landscape
This weeks top stories is that the Reaper IoT Botnet is not fully mobilized according to report, and that Heathrow Airport Security Plans was found on memory stick on a street in London.
European Union member states have drafted a diplomatic document which states serious cyber-attacks by a foreign nation could be construed as an act of war.
If you are looking for some in-depth reading, Sophos has released its 2018 Malware Forecast report concluding that ransomware-as-a-service will see the insidious malware spread rapidly beyond personal computers in the year ahead. Proofpoint researchers uncovered a long-running malvertising campaign and has a nice write up and threat actor profile: KovCoreG, The Kovter Saga.
Top 5 Security Links
Reaper IoT Botnet Not Fully Mobilised, Says Report
Heathrow Airport Security Plans Found on Memory Stick
EU to Declare Cyber-Attacks “Act of War”
Threat Actor Profile: Kovcoreg, The Kovter Saga
Sophos: 2018 Malware Forecast Report