Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for Why CISA is Warning  ...

 A Little Sunshine

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) said today it is investigating a breach at business intelligence company Sisense, whose products are designed to allow companies to view the status of multiple third-party online services in a single dashboard. CISA urged all Sisense customers to reset   show more ...

any credentials and secrets that may have been shared with the company, which is the same advice Sisense gave to its customers Wednesday evening. New York City based Sisense has more than 1,000 customers across a range of industry verticals, including financial services, telecommunications, healthcare and higher education. On April 10, Sisense Chief Information Security Officer Sangram Dash told customers the company had been made aware of reports that “certain Sisense company information may have been made available on what we have been advised is a restricted access server (not generally available on the internet.)” “We are taking this matter seriously and promptly commenced an investigation,” Dash continued. “We engaged industry-leading experts to assist us with the investigation. This matter has not resulted in an interruption to our business operations. Out of an abundance of caution, and while we continue to investigate, we urge you to promptly rotate any credentials that you use within your Sisense application.” In its alert, CISA said it was working with private industry partners to respond to a recent compromise discovered by independent security researchers involving Sisense. “CISA is taking an active role in collaborating with private industry partners to respond to this incident, especially as it relates to impacted critical infrastructure sector organizations,” the sparse alert reads. “We will provide updates as more information becomes available.” Sisense declined to comment when asked about the veracity of information shared by two trusted sources with close knowledge of the breach investigation. Those sources said the breach appears to have started when the attackers somehow gained access to the company’s code repository at Gitlab, and that in that repository was a token or credential that gave the bad guys access to Sisense’s Amazon S3 buckets in the cloud. Both sources said the attackers used the S3 access to copy and exfiltrate several terabytes worth of Sisense customer data, which apparently included millions of access tokens, email account passwords, and even SSL certificates. The incident raises questions about whether Sisense was doing enough to protect sensitive data entrusted to it by customers, such as whether the massive volume of stolen customer data was ever encrypted while at rest in these Amazon cloud servers. It is clear, however, that unknown attackers now have all of the credentials that Sisense customers used in their dashboards. The breach also makes clear that Sisense is somewhat limited in the clean-up actions that it can take on behalf of customers, because access tokens are essentially text files on your computer that allow you to stay logged in for extended periods of time — sometimes indefinitely. And depending on which service we’re talking about, it may be possible for attackers to re-use those access tokens to authenticate as the victim without ever having to present valid credentials. Beyond that, it is largely up to Sisense customers to decide if and when they change passwords to the various third-party services that they’ve previously entrusted to Sisense. Earlier today, a public relations firm working with Sisense reached out to learn if KrebsOnSecurity planned to publish any further updates on their breach (KrebsOnSecurity posted a screenshot of the CISO’s customer email to both LinkedIn and Mastodon on Wednesday evening). The PR rep said Sisense wanted to make sure they had an opportunity to comment before the story ran. But when confronted with the details shared by my sources, Sisense apparently changed its mind. “After consulting with Sisense, they have told me that they don’t wish to respond,” the PR rep said in an emailed reply. Nicholas Weaver, a researcher at University of California, Berkeley’s International Computer Science Institute (ICSI) and lecturer at UC Davis, said a company entrusted with so many sensitive logins should absolutely be encrypting that information. “If they are hosting customer data on a third-party system like Amazon, it better damn well be encrypted,” Weaver said. “If they are telling people to reset credentials, that means it was not encrypted. So mistake number one is leaving Amazon credentials in your Git archive. Mistake number two is using S3 without using encryption on top of it. The former is bad but forgivable, but the latter given their business is unforgivable.” Update, 6:49 p.m., ET: Sisense’s CISO Dash just sent an update to customers directly. The latest advice from the company is far more detailed, and involves resetting a potentially large number of access tokens across multiple technologies, including Microsoft Active Directory credentials, GIT credentials, web access tokens, and any single sign-on (SSO) secrets or tokens. The full message from Dash to customers is below: “Good Afternoon, We are following up on our prior communication of April 10, 2024, regarding reports that certain Sisense company information may have been made available on a restricted access server. As noted, we are taking this matter seriously and our investigation remains ongoing. Our customers must reset any keys, tokens, or other credentials in their environment used within the Sisense application. Specifically, you should: – Change Your Password: Change all Sisense-related passwords on http://my.sisense.com – Non-SSO: – Replace the Secret in the Base Configuration Security section with your GUID/UUID. – Reset passwords for all users in the Sisense application. – Logout all users by running GET /api/v1/authentication/logout_all under Admin user. – Single Sign-On (SSO): – If you use SSO JWT for the user’s authentication in Sisense, you will need to update sso.shared_secret in Sisense and then use the newly generated value on the side of the SSO handler. – We strongly recommend rotating the x.509 certificate for your SSO SAML identity provider. – If you utilize OpenID, it’s imperative to rotate the client secret as well. – Following these adjustments, update the SSO settings in Sisense with the revised values. – Logout all users by running GET /api/v1/authentication/logout_all under Admin user. – Customer Database Credentials: Reset credentials in your database that were used in the Sisense application to ensure continuity of connection between the systems. – Data Models: Change all usernames and passwords in the database connection string in the data models. – User Params: If you are using the User Params feature, reset them. – Active Directory/LDAP: Change the username and user password of users whose authorization is used for AD synchronization. – HTTP Authentication for GIT: Rotate the credentials in every GIT project. – B2D Customers: Use the following API PATCH api/v2/b2d-connection in the admin section to update the B2D connection. – Infusion Apps: Rotate the associated keys. – Web Access Token: Rotate all tokens. – Custom Email Server: Rotate associated credentials. – Custom Code: Reset any secrets that appear in custom code Notebooks. If you need any assistance, please submit a customer support ticket at https://community.sisense.com/t5/support-portal/bd-p/SupportPortal and mark it as critical. We have a dedicated response team on standby to assist with your requests. At Sisense, we give paramount importance to security and are committed to our customers’ success. Thank you for your partnership and commitment to our mutual security. Regards, Sangram Dash Chief Information Security Officer”

image for Knostic Brings Acces ...

 Feed

Led by industry veterans Gadi Evron and Sounil Yu, the new company lets organizations adjust how much information LLMs provide based on the user's role and responsibilities.

 Malware and Vulnerabilities

Only three critical vulnerabilities were fixed as part of the April 2024 Patch Tuesday updates, but there are over 67 remote code execution bugs. More than half of the RCE flaws are found within Microsoft SQL drivers, likely sharing a common flaw.

 Identity Theft, Fraud, Scams

ARC Labs recently analyzed a phishing email used in a credential harvesting campaign that leveraged a lure notifying the target they received a voice message and needed to visit a link to access it.

 Malware and Vulnerabilities

Fortinet fixed a dozen vulnerabilities in multiple products, including a critical-severity remote code execution (RCE) issue, tracked as CVE-2023-45590 (CVSS score of 9.4), in FortiClientLinux.

 Malware and Vulnerabilities

The vulnerability, which carries a perfect 10 base severity score, is tracked as CVE-2024-24576. It affects the Rust standard library, which was found to be improperly escaping arguments when invoking batch files on Windows using the Command API.

 Malware and Vulnerabilities

First identified in late 2021, Raspberry Robin is a Windows worm initially seen targeting technology and manufacturing organizations. It has since grown to become one of the most prevalent threats facing enterprises.

 Trends, Reports, Analysis

The report from the Department for Science, Innovation and Technology (DSIT), painted security as more of an afterthought for UK businesses, especially when considering the figures about how breaches are handled.

 Feed

Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals   show more ...

to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs). This is the source code release.

 Feed

An access control issue in Trimble TM4Web version 22.2.0 allows unauthenticated attackers to access a specific crafted URL path to retrieve the last registration access code and use this access code to register a valid account. If the access code was used to create an Administrator account, attackers are also able to register new Administrator accounts with full rights and privileges.

 Feed

Ubuntu Security Notice 6727-1 - It was discovered that NSS incorrectly handled padding when checking PKCS#1 certificates. A remote attacker could possibly use this issue to perform Bleichenbacher-like attacks and recover private data. This issue only affected Ubuntu 20.04 LTS. It was discovered that NSS had a timing   show more ...

side-channel when performing RSA decryption. A remote attacker could possibly use this issue to recover private data.

 Feed

Ubuntu Security Notice 6728-2 - USN-6728-1 fixed vulnerabilities in Squid. The fix for CVE-2023-5824 caused Squid to crash in certain environments on Ubuntu 20.04 LTS. The problematic fix has been reverted pending further investigation. Joshua Rogers discovered that Squid incorrectly handled collapsed forwarding. A   show more ...

remote attacker could possibly use this issue to cause Squid to crash, resulting in a denial of service. This issue only affected Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. Joshua Rogers discovered that Squid incorrectly handled certain structural elements. A remote attacker could possibly use this issue to cause Squid to crash, resulting in a denial of service. Joshua Rogers discovered that Squid incorrectly handled Cache Manager error responses. A remote trusted client can possibly use this issue to cause Squid to crash, resulting in a denial of service. Joshua Rogers discovered that Squid incorrectly handled the HTTP Chunked decoder. A remote attacker could possibly use this issue to cause Squid to stop responding, resulting in a denial of service. Joshua Rogers discovered that Squid incorrectly handled HTTP header parsing. A remote trusted client can possibly use this issue to cause Squid to crash, resulting in a denial of service.

 Feed

Ubuntu Security Notice 6728-1 - Joshua Rogers discovered that Squid incorrectly handled collapsed forwarding. A remote attacker could possibly use this issue to cause Squid to crash, resulting in a denial of service. This issue only affected Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. Joshua Rogers discovered that Squid   show more ...

incorrectly handled certain structural elements. A remote attacker could possibly use this issue to cause Squid to crash, resulting in a denial of service.

 Feed

Red Hat Security Advisory 2024-1752-03 - An update is now available for Red Hat OpenShift GitOps v1.12.1 for Argo CD CLI and MicroShift GitOps. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System base score, which gives a detailed severity   show more ...

rating, is available for each vulnerability from the CVE link in the References section. Issues addressed include bypass and denial of service vulnerabilities.

 Feed

Apple on Wednesday revised its documentation pertaining to its mercenary spyware threat notification system to mention that it alerts users when they may have been individually targeted by such attacks. It also specifically called out companies like NSO Group for developing commercial surveillance tools such as Pegasus that are used by state actors to pull off "individually targeted

 Feed

Fortinet has released patches to address a critical security flaw impacting FortiClientLinux that could be exploited to achieve arbitrary code execution. Tracked as CVE-2023-45590, the vulnerability carries a CVSS score of 9.4 out of a maximum of 10. "An Improper Control of Generation of Code ('Code Injection') vulnerability [CWE-94] in FortiClientLinux may allow an unauthenticated attacker to

 Feed

GitGuardian is famous for its annual State of Secrets Sprawl report. In their 2023 report, they found over 10 million exposed passwords, API keys, and other credentials exposed in public GitHub commits. The takeaways in their 2024 report did not just highlight 12.8 million new exposed secrets in GitHub, but a number in the popular Python package repository PyPI. PyPI,

 Feed

A threat actor tracked as TA547 has targeted dozens of German organizations with an information stealer called Rhadamanthys as part of an invoice-themed phishing campaign. "This is the first time researchers observed TA547 use Rhadamanthys, an information stealer that is used by multiple cybercriminal threat actors," Proofpoint said. "Additionally, the actor appeared to

 Feed

GitGuardian is famous for its annual State of Secrets Sprawl report. In their 2023 report, they found over 10 million exposed passwords, API keys, and other credentials exposed in public GitHub commits. The takeaways in their 2024 report did not just highlight 12.8 million new exposed secrets in GitHub, but a number in the popular Python package repository PyPI. PyPI,

 Celebrities

MPs aren't just getting excited about an upcoming election, but also the fruity WhatsApp messages they're receiving, can we trust AI with our health, and who on earth is pretending to be a producer for the Drew Barrymore TV show? All this and much much more is discussed in the latest edition of the   show more ...

"Smashing Security" podcast by cybersecurity veterans Graham Cluley and Carole Theriault, joined this week by John Hawes.

 Data loss

The East Central University (ECU) of Ada, Oklahoma, has revealed that a ransomware gang launched an attack against its systems that left some computers and servers encrypted and may have also seen sensitive information stolen. Read more in my article on the Hot for Security blog.

 Data loss

Learn more about the DragonForce ransomware - how it came to prominence, and some of the unusual tactics used by the hackers who extort money from companies with it. Read more in my article on the Tripwire State of Security blog.

 Cyber Security News

Source: www.infosecurity-magazine.com – Author: 1 The threat actor TA547 has been observed targeting German organizations with the known stealer Rhadamanthys. According to a recent report from Proofpoint, this is the first time this threat actor has been associated with such activity.  What’s particularly   show more ...

intriguing according to the researchers is the actor’s apparent employment of a […] La entrada Rhadamanthys Malware Deployed By TA547 Against German Targets – Source: www.infosecurity-magazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.infosecurity-magazine.com – Author: 1 New vulnerabilities were discovered in LG TVs that would allow unauthorized access to the devices’ root systems, potentially exposing thousands of devices worldwide.  The discovery, made as part of Bitdefender’s ongoing audit of popular Internet of Things   show more ...

(IoT) hardware, focuses on vulnerabilities within WebOS versions 4 through 7 utilized in LG […] La entrada LG TV Vulnerabilities Expose 91,000 Devices – Source: www.infosecurity-magazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.infosecurity-magazine.com – Author: 1 A new report has found workplace experiences of women are dramatically worse than that of their male counterparts including in areas of respect and exclusion. These findings came from the first annual State of Inclusion Benchmark in Cybersecurity assessment,   show more ...

which has been published by Women in Cybersecurity (WiCyS) in partnership […] La entrada Women Experience Exclusion Twice as Often as Men in Cybersecurity – Source: www.infosecurity-magazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.infosecurity-magazine.com – Author: 1 A critical vulnerability in the Rust standard library could be exploited to target Windows systems and perform command injection attacks. The flaw was discovered by a security engineer from Flatt Security known as RyotaK. They named it BatBadBut, reported it to   show more ...

the CERT Coordination Center (CERT/CC) and published an analysis […] La entrada Windows: New ‘BatBadBut’ Rust Vulnerability Given Highest Severity Score – Source: www.infosecurity-magazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 claims

Source: www.infosecurity-magazine.com – Author: 1 A US initiative designed to crack down on COVID fraud has resulted in the seizure of $1.4bn and thousands of criminal charges in the past three years, the Department of Justice (DoJ) has revealed. The COVID-19 Fraud Enforcement Task Force (CFETF) was set up in   show more ...

2021 to tackle what is […] La entrada US Claims to Have Recovered $1.4bn in COVID Fraud – Source: www.infosecurity-magazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.infosecurity-magazine.com – Author: 1 This month’s Patch Tuesday security update round from Microsoft was a busy one, with 150 CVEs fixed including two zero-days actively exploited in attacks. The two zero-days are CVE-2024-29988 and CVE-2024-26234. “Microsoft fixed a SmartScreen Prompt   show more ...

security feature bypass vulnerability this month with CVE-2024-29988, which is credited to some of the […] La entrada Microsoft Patches 150 Flaws Including Two Zero-Days – Source: www.infosecurity-magazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Businesses

Source: www.infosecurity-magazine.com – Author: 1 Half of UK businesses have reported a cyber incident or data breach in the past 12 months, according to the UK Government’s Cyber Security Breaches Survey 2024. Around a third (32%) of charities also experienced a cybersecurity breach or attack over this   show more ...

period. This represents an increase compared to last year’s survey, […] La entrada Half of UK Businesses Hit by Cyber-Incident in Past Year, UK Government Finds – Source: www.infosecurity-magazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 AT&T

Source: securityaffairs.com – Author: Pierluigi Paganini AT&T states that the data breach impacted 51 million former and current customers AT&T confirmed that the data breach impacted 51 million former and current customers and is notifying them. AT&T revealed that the recently disclosed data   show more ...

breach impacts more than 51 million former and current customers and is […] La entrada AT&T states that the data breach impacted 51 million former and current customers – Source: securityaffairs.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Breaking News

Source: securityaffairs.com – Author: Pierluigi Paganini Fortinet fixed a critical remote code execution bug in FortiClientLinux Fortinet addressed multiple issues in FortiOS and other products, including a critical remote code execution flaw in FortiClientLinux. Fortinet fixed a dozen vulnerabilities in   show more ...

multiple products, including a critical-severity remote code execution (RCE) issue, tracked as CVE-2023-45590 (CVSS score […] La entrada Fortinet fixed a critical remote code execution bug in FortiClientLinux – Source: securityaffairs.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Breaking News

Source: securityaffairs.com – Author: Pierluigi Paganini Microsoft Patches Tuesday security updates for April 2024 fixed hundreds of issues Microsoft Patches Tuesday security updates for April 2024 addressed three Critical vulnerabilities, none actively exploited in the wild. Microsoft Patches Tuesday security   show more ...

updates for April 2024 addressed 147 vulnerabilities in multiple products. This is the highest number […] La entrada Microsoft Patches Tuesday security updates for April 2024 fixed hundreds of issues – Source: securityaffairs.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 AI

Source: grahamcluley.com – Author: Graham Cluley MPs aren’t just getting excited about an upcoming election, but also the fruity WhatsApp messages they’re receiving, can we trust AI with our health, and who on earth is pretending to be a producer for the Drew Barrymore TV show? All this and much much more   show more ...

is discussed in […] La entrada Smashing Security podcast #367: WhatsApp at Westminster, unhealthy AI, and Drew Barrymore – Source: grahamcluley.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: securityboulevard.com – Author: Ahona Rudra Reading Time: 6 min There is an old saying- prevention is better than cure. This is exactly the aim of threat detection and response or TDR. It’s the process of uncovering threats and fixing or neutralizing them before a cyber actor exploits them to their   show more ...

advantage. This is practiced […] La entrada Your Guide to Threat Detection and Response – Source: securityboulevard.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Blog Posts

Source: securityboulevard.com – Author: CISO Global April 10, 2024 By Samuel Lewis, Senior Security Consultant   The National Institute of Standards and Technology (NIST) released version 2.0 of the Cybersecurity Framework (CSF) on February 26, 2024. The original version was released in 2014, one year after   show more ...

Executive Order 13636 was signed on February 12, 2013. This […] La entrada NIST CSF: A “Fellowship” for Your Cybersecurity Journey to 2.0  – Source: securityboulevard.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Blog

Source: securityboulevard.com – Author: claude.mandy There is no denying that businesses are under increasing pressure to fortify their defenses and better protect sensitive information. Ransomware payments in 2023 surpassed the $1 billion mark, and don’t show any sign of slowing down. Since December 2022,   show more ...

Microsoft observed a “doubling of potential data exfiltration instances after threat […] La entrada The Irrefutable Case for Customer-Native (In-Your-Cloud) DSPM – Source: securityboulevard.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: securityboulevard.com – Author: AJ Starita Published in 2023, the OWASP Top 10 for LLM Applications is a monumental effort made possible by a large number of experts in the fields of AI, cybersecurity, cloud technology, and beyond. OWASP contributors came up with over 40 distinct threats and then voted   show more ...

and refined their list down […] La entrada OWASP Top 10 for LLM Applications: A Quick Guide – Source: securityboulevard.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Blog

Source: securityboulevard.com – Author: Kevin Smith As cyber threats continue to grow in volume and sophistication, businesses are determined to keep their networks and data safe and secure.  But which is the best way to do that: standalone apps that target specific areas and are purchased from different   show more ...

vendors, or a comprehensive platform from a […] La entrada Why a Cybersecurity Platform Beats Standalone Applications – Source: securityboulevard.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: securityboulevard.com – Author: Marc Handelman Authors/Presenters: *Ruoyu Song, Muslum Ozgur Ozmen, Hyungsub Kim, Raymond Muller, Z. Berkay Celik, Antonio Bianchi *** This is a Security Bloggers Network syndicated blog from Infosecurity.US authored by Marc Handelman. Read the original post at:   show more ...

https://www.infosecurity.us/blog/2024/4/8/usenix-security-23-discovering-adversarial-driving-maneuvers-against-autonomous-vehicles Original Post URL: https://securityboulevard.com/2024/04/usenix-security-23-discovering-adversarial-driving-maneuvers-against-autonomous-vehicles/ Category & Tags: Security Bloggers Network,Security Conferences,USENIX Secuirty ’23 […] La entrada USENIX Security ’23 – Discovering Adversarial Driving Maneuvers against Autonomous Vehicles – Source: securityboulevard.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cloud Security

Source: securityboulevard.com – Author: Jeffrey Burt Raspberry Robin, the highly adaptable and evasive worm and malware loader that first appeared on the cyberthreat scene in 2021, is now using a new method for spreading its malicious code. According to a report this week by threat researchers with HP Wolf   show more ...

Security, a new campaign detected last […] La entrada Raspberry Robin Malware Now Using Windows Script Files to Spread – Source: securityboulevard.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: securityboulevard.com – Author: Chris Garland Imagine you had 1,000 expert security researchers working continuously to analyze all the new binaries in your environment to find threats, vulnerabilities, and misconfigurations. That would provide some protection against the rising tide of   show more ...

below-the-surface attacks targeting our digital supply chain. Join this webinar to learn about Eclypsium Automata. […] La entrada Automata An Expert Researcher Never Sleeps – Source: securityboulevard.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: securityboulevard.com – Author: Marc Handelman via the comic artistry and dry wit of Randall Munroe, creator of XKCD Permalink *** This is a Security Bloggers Network syndicated blog from Infosecurity.US authored by Marc Handelman. Read the original post at: https://xkcd.com/2912/ Original Post URL:   show more ...

https://securityboulevard.com/2024/04/randall-munroes-xkcd-cursive-letters/ Category & Tags: Humor,Security Bloggers Network,Randall Munroe,Sarcasm,satire,XKCD – Humor,Security Bloggers […] La entrada Randall Munroe’s XKCD ‘Cursive Letters’ – Source: securityboulevard.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.darkreading.com – Author: Robert Lemos, Contributing Writer Source: Viacheslav Lopatin via Shutterstock The US, Japan, and the Philippines reportedly will join forces in cybersecurity defense with a strategic cyber threat-sharing arrangement in the wake of rising attacks by China, North Korea, and   show more ...

Russia. The initiative will launch during high-level trilateral talks between US President […] La entrada Japan, Philippines, & US Forge Cyber Threat Intel-Sharing Alliance – Source: www.darkreading.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.darkreading.com – Author: Jai Vijayan, Contributing Writer Source: Juliana_haris via Shutterstock The recent discovery of a backdoor in the XZ Utils data compression utility — present in nearly all major Linux distributions — is a stark reminder that organizations who consume open source   show more ...

components ultimately own responsibility for securing the software. XZ Utils, like […] La entrada XZ Utils Scare Exposes Hard Truths About Software Security – Source: www.darkreading.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 0CISO2CISO

Source: www.darkreading.com – Author: PRESS RELEASE FORT MEADE, Md. – Dave Luber began as the National Security Agency’s (NSA) new Director of Cybersecurity on April 1. As the new Cybersecurity Director, he oversees NSA’s Cybersecurity Directorate (CSD), whose critical mission is to prevent and eradicate   show more ...

cyber threats to the Department of Defense, National Security Systems, […] La entrada National Security Agency Announces Dave Luber As Director of Cybersecurity – Source: www.darkreading.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 0 - CT - CISO Strategics - Cybersecurity

The NIST Cybersecurity Framework (CSF) 2.0 introduces desired outcomes to address cybersecurity risks alongside other business risks. These outcomes are sector-specific, technology-neutral, and can be mapped to security controls to mitigate risks effectively. The framework comprises the CSF Core, Organizational   show more ...

Profiles, and Tiers to characterize risk management practices. Significant updates in the final version of […] La entrada NIST CSF 2.0: What has changed? se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 0 - CT - CISO Strategics - CISO Strategi

Advances in computing and networking have added new capabilities to physical systems that could not be feasibly added before. This has led to the emergence of engineered systems called cyber-physical systems (CPS): systems where the events in the physical world are managed with the help of modern advances in   show more ...

computation and control. Complex machines such […] La entrada Industrial Control Systems: Engineering Foundations and Cyber-Physical Attack Lifecycle se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 0 - CT - CISO Strategics - Cybersecurity

The IBM X-Force Threat Intelligence Index 2024 report highlights various cybersecurity trends and threats. It points out the risks associated with web application misconfigurations, such as weakening multi-factor authentication through multiple user sessions. The report also emphasizes the increasing use of valid   show more ...

credentials by cybercriminals as a common entry point for attacks, while noting a […] La entrada X-Force Threat Intelligence Index 2024 se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 BLEEPINGCOMPUTER

Source: www.bleepingcomputer.com – Author: Ionut Ilascu Google has announced a new version of its browser for organizations, Chrome Enterprise Premium, which comes with extended security controls for a monthly fee per user. The product is a step up from Chrome Enterprise, now demoted to Chrome Enterprise Core,   show more ...

and provides threat and data protection, increased control […] La entrada Chrome Enterprise gets Premium security but you have to pay for it – Source: www.bleepingcomputer.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 BLEEPINGCOMPUTER

Source: www.bleepingcomputer.com – Author: Bill Toulas Google is rolling out a new Workspace feature that requires multiple admins to approve high-risk setting changes to prevent unauthorized or accidental modifications that could reduce security. Google Workspace (formerly G Suite) is a comprehensive suite of   show more ...

cloud-based productivity and collaboration tools, integrating services such as Gmail, Google Drive, […] La entrada Google Workspace rolls out multi-admin approval feature for risky changes – Source: www.bleepingcomputer.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 BLEEPINGCOMPUTER

Source: www.bleepingcomputer.com – Author: Bill Toulas Researchers have demonstrated the “first native Spectre v2 exploit” for a new speculative execution side-channel flaw that impacts Linux systems running on many modern Intel processors. Spectre V2 is a new variant of the original Spectre attack   show more ...

discovered by a team of researchers at the VUSec group from VU […] La entrada New Spectre v2 attack impacts Linux systems on Intel CPUs – Source: www.bleepingcomputer.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: heimdalsecurity.com – Author: Livia Gyongyoși Researchers warn zero-day vulnerability exposes End-Of-Life (EOL) D-Link network attached storage devices (NAS) to remote code execution. CVE-2024-3273 enables hackers to backdoor the equipment and compromise sensitive data. The D-Link NAS vulnerability   show more ...

explained There are two security issues in the EOL D-Link NAS models: a backdoor due to hardcoded […] La entrada 92,000 D-Link NAS Devices Vulnerable to Remote Code Execution – Source: heimdalsecurity.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: heimdalsecurity.com – Author: Livia Gyongyoși Rust standard library flaw dubbed BatBadBut lets hackers target Windows systems in command injection attacks. The vulnerability impacts all Rust versions before 1.77.2 on Windows, but only in case code or dependencies execute batch files with untrusted   show more ...

arguments. Rust Security urged users to upgrade to the latest version, 1.77.2. […] La entrada Warning! Rust Standard Library Flaw Enables Windows Command Injection Attacks – Source: heimdalsecurity.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Access Management

Source: heimdalsecurity.com – Author: Madalina Popovici COPENHAGEN, Denmark, April 9, 2024 – Heimdal®, the world’s widest cybersecurity platform with 13 products, is thrilled to announce the launch of its latest innovation, the Privileged Account and Session Management (PASM) solution.  Designed to   show more ...

elevate the security of privileged accounts, Heimdal’s PASM grants organizations the ability to meticulously […] La entrada Heimdal® Adds PASM to the World’s Widest Cybersecurity Platform – Source: heimdalsecurity.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: heimdalsecurity.com – Author: Cristian Neagu A new phishing campaign targets Visa. The company is alerting users about an increase in JsOutProx malware detections, which is aimed at financial institutions and their clients. As per BleepingComputer, in the security alert released by their Payment Fraud   show more ...

Disruption unit, Visa says they became aware of the campaign […] La entrada Visa Warns: New Phishing Campaign Targets Financial Organizations – Source: heimdalsecurity.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

2024-04
MON
TUE
WED
THU
FRI
SAT
SUN
AprilMayJune