ποΈ Vast majority of ethical hackers keen to spend more time bug bounty hunting β report ποΈ
π Read
via "The Daily Swig".
Bounties and greater independence are prime motives for hackers hoping to do more freelance bug huntingπ Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
Vast majority of ethical hackers keen to spend more time bug bounty hunting β report
Bounties and greater independence are prime motives for hackers hoping to do more freelance bug hunting
β Attackers Use Public Exploits to Throttle Atlassian Confluence Flaw β
π Read
via "Threat Post".
The vulnerability remains unpatched on many versions of the collaboration tool and has potential to create a SolarWinds-type scenario.π Read
via "Threat Post".
Threat Post
Attackers Use Public Exploits to Throttle Atlassian Confluence Flaw
The vulnerability remains unpatched on many versions of the collaboration tool and has potential to create a SolarWinds-type scenario.
π΄ Snowflake Debuts Cybersecurity Workload to Aid Visibility, Automation π΄
π Read
via "Dark Reading".
The tool underpins cybersecurity capabilities including SIEM, SOAR, compliance automation, and vulnerability management.π Read
via "Dark Reading".
Dark Reading
Snowflake Debuts Cybersecurity Workload to Aid Visibility, Automation
The tool underpins cybersecurity capabilities including SIEM, SOAR, compliance automation, and vulnerability management.
β Conducting Modern Insider Risk Investigations β
π Read
via "Threat Post".
Insider Risk Management requires a different approach than to those from external threats. IRM is unique from other domains of security in that the data sources which serve as inputs are as often people as they are tools. Shifting the analystβs mindset when handling risks presented by insiders requires us to move through the stages of inquiry, investigation, and determining outcomes.π Read
via "Threat Post".
Threat Post
Conducting Modern Insider Risk Investigations
Modern Insider Risk investigation requires a different approach for internal users versus external threats.
β Follina Exploited by State-Sponsored Hackers β
π Read
via "Threat Post".
A government-aligned attacker tried using a Microsoft vulnerability to attack U.S. and E.U. government targets.π Read
via "Threat Post".
Threat Post
Follina Exploited by State-Sponsored Hackers
A government-aligned attacker tried using a Microsoft vulnerability to attack U.S. and E.U. government targets.
π΄ CISA Challenges Partners and Public to Push for 'More Than a Password' in New Social Media Campaign π΄
π Read
via "Dark Reading".
Nationβs cyber defense agency urges America to enable multifactor authentication.π Read
via "Dark Reading".
Dark Reading
CISA Challenges Partners and Public to Push for 'More Than a Password' in New Social Media Campaign
Nationβs cyber defense agency urges America to enable multifactor authentication.
π΄ Cybersecurity Industry Leaders Launch Campaign to Close the Cybersecurity Talent Gap π΄
π Read
via "Dark Reading".
A coalition of over 25 industry leaders, led by NightDragon and non-profit NextGen Cyber Talent, partner to raise $1 million for collegiate cybersecurity educationπ Read
via "Dark Reading".
Dark Reading
Cybersecurity Industry Leaders Launch Campaign to Close the Cybersecurity Talent Gap
A coalition of over 25 industry leaders, led by NightDragon and non-profit NextGen Cyber Talent, partner to raise $1 million for collegiate cybersecurity education
π΄ CyberRatings.org Announces Test on Cloud Network Firewall π΄
π Read
via "Dark Reading".
Fortinet FortiGate-VM receives AAA rating across all five categories in CyberRating's assessment.π Read
via "Dark Reading".
Dark Reading
CyberRatings.org Announces Test on Cloud Network Firewall
Fortinet FortiGate-VM receives AAA rating across all five categories in CyberRating's assessment.
π΄ Forescout Announces Intent to Acquire Cysiv to Deliver Data-Powered Threat Detection and Response π΄
π Read
via "Dark Reading".
Acquisition will leverage Forescoutβs automated cybersecurity with Cysiv's cloud-native platform to deliver data-powered analytics for 24/7 threat detection and response.π Read
via "Dark Reading".
Dark Reading
Forescout Announces Intent to Acquire Cysiv to Deliver Data-Powered Threat Detection and Response
Acquisition will leverage Forescoutβs automated cybersecurity with Cysiv's cloud-native platform to deliver data-powered analytics for 24/7 threat detection and response.
β Cyber Risk Retainers: Not Another Insurance Policy β
π Read
via "Threat Post".
The costs associated with a cyberattack can be significant, especially if a company does not have an Incident Response plan that addresses risk.π Read
via "Threat Post".
Threat Post
Cyber Risk Retainers: Not Another Insurance Policy
The costs associated with a cyberattack can be significant, especially if a company does not have an Incident Response plan that addresses risk.
ποΈ HTTP/3 evolves into RFC 9114 β a security advantage, but not without challenges ποΈ
π Read
via "The Daily Swig".
The backbone of the internet has received a major upgradeπ Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
HTTP/3 evolves into RFC 9114 β a security advantage, but not without challenges
The backbone of the web has received a major upgrade
π1
π΄ 7 NFT Scams That Could Be Targeting Your Brand π΄
π Read
via "Dark Reading".
Brands should be vigilant to ensure sites and listings promoting NFTs for sale are legitimate and not being used as an instrument by fraudsters to swindle customers.π Read
via "Dark Reading".
Dark Reading
7 NFT Scams That Could Be Targeting Your Brand
Brands should be vigilant to ensure sites and listings promoting NFTs for sale are legitimate and not being used as an instrument by fraudsters to swindle customers.
π΄ Akamai Launches New Malware Protection for Uploaded Files π΄
π Read
via "Dark Reading".
Edge-based solution detects and blocks malicious files uploaded to Web apps and APIs.π Read
via "Dark Reading".
Dark Reading
Akamai Launches New Malware Protection for Uploaded Files
Edge-based solution detects and blocks malicious files uploaded to Web apps and APIs.
π΄ Harnessing AI to Proactively Thwart Threats π΄
π Read
via "Dark Reading".
By using artificial intelligence to predict how an attacker would carry out their attack, we can deploy defenses and preemptively shut down vulnerable entry points.π Read
via "Dark Reading".
Dark Reading
Harnessing AI to Proactively Thwart Threats
By using artificial intelligence to predict how an attacker would carry out their attack, we can deploy defenses and preemptively shut down vulnerable entry points.
βΌ CVE-2022-1991 βΌ
π Read
via "National Vulnerability Database".
A vulnerability classified as problematic has been found in Fast Food Ordering System 1.0. Affected is the file Master.php of the Master List. The manipulation of the argument Description with the input foo "><img src="" onerror="alert(document.cookie)"> leads to cross site scripting. It is possible to launch the attack remotely but it requires authentication. Exploit details have been disclosed to the public.π Read
via "National Vulnerability Database".
βοΈ KrebsOnSecurity in New Netflix Series on Cybercrime βοΈ
π Read
via "Krebs on Security".
Netflix has a new documentary series airing next week -- "Web of Make Believe: Death, Lies & the Internet" -- in which Yours Truly apparently has a decent amount of screen time. The debut episode explores the far-too-common harassment tactic of "swatting" -- wherein fake bomb threats or hostage situations are phoned in to police as part of a scheme to trick them into visiting potentially deadly force on a targetβs address.π Read
via "Krebs on Security".
Krebs on Security
KrebsOnSecurity in New Netflix Series on Cybercrime
Netflix has a new documentary series airing next week -- "Web of Make Believe: Death, Lies & the Internet" -- in which Yours Truly apparently has a decent amount of screen time. The debut episode explores the far-too-common harassment tacticβ¦
ποΈ Google showers top cloud security researchers with kudos and cash ποΈ
π Read
via "The Daily Swig".
More than $300,000 was handed out in GCP prize money during 2021π Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
Google showers top cloud security researchers with kudos and cash
More than $300,000 was handed out in GCP prize money during 2021
π΄ Enterprise Security Around the Dinner Table π΄
π Read
via "Dark Reading".
Enterprise cybersecurity awareness training has evolved to include informal lessons for employeesβ family members, and it has many benefits.π Read
via "Dark Reading".
Dark Reading
Enterprise Security Around the Dinner Table
Enterprise cybersecurity awareness training has evolved to include informal lessons for employees' family members, and it has many benefits.
β Know your enemy! Learn how cybercrime adversaries get inβ¦ β
π Read
via "Naked Security".
Here's how 144 recent attacks actually went down in real life. Don't let this happen to you!π Read
via "Naked Security".
Naked Security
Know your enemy! Learn how cybercrime adversaries get inβ¦
Hereβs how 144 recent attacks actually went down in real life. Donβt let this happen to you!
βΌ CVE-2022-31025 βΌ
π Read
via "National Vulnerability Database".
Discourse is an open source platform for community discussion. Prior to version 2.8.4 on the `stable` branch and 2.9.0beta5 on the `beta` and `tests-passed` branches, inviting users on sites that use single sign-on could bypass the `must_approve_users` check and invites by staff are always approved automatically. The issue is patched in Discourse version 2.8.4 on the `stable` branch and version `2.9.0.beta5` on the `beta` and `tests-passed` branches. As a workaround, disable invites or increase `min_trust_level_to_allow_invite` to reduce the attack surface to more trusted users.π Read
via "National Vulnerability Database".
βΌ CVE-2022-29564 βΌ
π Read
via "National Vulnerability Database".
Jamf Private Access before 2022-05-16 has Incorrect Access Control, in which an unauthorized user can reach a system in the internal infrastructure, aka WND-44801.π Read
via "National Vulnerability Database".