Summary: U.S. officials have imposed sanctions on the Chinese cybersecurity firm Sichuan Silence and its employee Guan Tianfeng for exploiting a zero-day vulnerability to compromise thousands of firewalls globally, including those protecting critical infrastructure in the U.S. The Justice Department has indicted Guan and offered a reward for information on the company and its activities.…
Tag: CISO
### #IdentityManagement #AccessControl #SecurityAdvisory
Summary: A critical vulnerability (CVE-2024-10905) in SailPoint’s IdentityIQ IAM software allows unauthorized access to protected content, with a maximum severity CVSS score of 10.0. SailPoint has released e-fixes for affected versions to mitigate this risk.
Threat Actor: Unknown | unknown Victim: SailPoint | SailPoint
Key Point :
The vulnerability allows HTTP access to static content that should be protected within IdentityIQ.…### #RansomwareTrends #RansomHub #VPNExploits
Summary: The Corvus Insurance Q3 2024 Cyber Threat Report reveals that five ransomware groups, including RansomHub and LockBit 3.0, accounted for 40% of cyber-attacks, with VPN vulnerabilities being a significant entry point for attackers. The report highlights the evolving ransomware landscape and the need for enhanced security measures.…
Our goal is to help make your world a safer place showcasing the latest in security news, products and services. An online global portal we offer a simple translation feature in 45 languages, informing thousands of security professionals and keeping them up to speed on the latest advances in the industry.…
Acunetix is a Web Vulnerability Scanner, that automates web application security testing and audits your web applications by checking for exploitable hacking vulnerabilities. Keep up with articles, tips and general news on web security.
URL: https://www.acunetix.com/blog/feed/ 📝
📡 Adam Levin RSS feedAdamLevin.com…
Summary: Lumifi has announced its acquisition of Critical Insight, marking its third acquisition in 13 months, which enhances its incident response capabilities and strengthens its position in the healthcare and critical infrastructure cybersecurity sectors. This strategic move aims to meet the growing demand for advanced cybersecurity solutions as cyber attacks in the healthcare sector increase.…
Summary: The rise of deepfakes and generative AI attacks is prompting organizations to enhance their defenses, as evidenced by a recent incident involving a deepfake job candidate at Exabeam. OWASP has released guidance to help companies prepare for AI-based threats and improve their security measures against such attacks.…
Summary: Detectify, a Swedish application security vendor, has received a majority stake investment from Insight Partners to enhance its focus on application security and attack surface management. The funding will allow Detectify to refine its specialized testing methodologies and target small-to-midsize enterprises in key markets.
Threat Actor: Insight Partners | Insight Partners Victim: Detectify | Detectify
Key Point :
Detectify aims to merge application security with attack surface management to create a more robust product for its users.…Summary: Sophos has conducted extensive operations over the past five years to counteract sophisticated cyber espionage campaigns from Chinese nation-state adversaries targeting critical infrastructure and perimeter devices. The report highlights the persistent threat posed by these adversaries and emphasizes the importance of patching vulnerabilities in internet-facing devices.…
Summary: Concentric AI, a data security startup, has raised $45 million in Series B funding to enhance its capabilities in identity governance, risk monitoring, and breach investigations using large language models. The company aims to expand its market reach and establish itself as a leader in the data security sector by leveraging innovative technologies and strengthening partnerships.…
Summary: Russian threat actors have launched a series of DDoS attacks against various Japanese websites in response to upcoming military exercises between Japan and the U.S. The attacks targeted political parties, major manufacturers, and local government sites, disrupting services significantly.
Threat Actor: NoName057(16) | NoName057(16) Victim: Japan | Japan
Key Point :
Russian actors executed DDoS attacks on a dozen Japanese websites, including the Liberal Democratic Party and various business groups.…Summary: A recent report indicates that over 80% of Chief Information Security Officers (CISOs) believe their roles should be divided into two distinct positions due to increasing regulatory and financial responsibilities. The report highlights the growing legal risks and pressures faced by CISOs in the current regulatory landscape.…
Summary: The Federal Communications Commission (FCC) has reached a significant settlement with T-Mobile over multiple data breaches from 2021 to 2023, requiring the company to pay $15.75 million and invest an equal amount in cybersecurity improvements. The agreement aims to enhance T-Mobile’s internal technology and governance reforms to better protect customer data and address national security concerns.…
Summary: BlackCloak, a startup focused on digital executive protection, has raised $17 million in Series B funding to enhance its offerings against rising cyberthreats, particularly for high-profile individuals. The company aims to develop deepfake protection, threat intelligence, and incident response capabilities tailored to executives’ personal and professional security needs.…
Summary: The U.K. government has officially designated data centers as critical national infrastructure to enhance their security against cyber threats, particularly in light of increasing reliance on cloud computing and AI technologies. This move aims to protect sensitive user data during potential cyberattacks and involves the establishment of a dedicated team to monitor and respond to threats.…
Summary: The global cybersecurity workforce has stagnated, growing only 0.1% year-over-year to approximately 5.5 million, while the demand for cybersecurity professionals has increased significantly, leading to a widening gap of 4.8 million unfilled positions. The ISC2 report highlights troubling trends, including layoffs, budget cuts, and a decline in new job postings, exacerbating the skills shortage in the industry.…
Summary: The second quarter of 2024 saw a surge in ransomware attacks led by new groups, with significant increases in demands and payouts. The evolution of tactics, including double-extortion schemes, has made it crucial for organizations to adopt multi-layered security strategies to mitigate risks.
Threat Actor: RansomHub, PLAY, Medusa, INC Ransom, BlackSuit | RansomHub, PLAY, Medusa, INC Ransom, BlackSuit Victim: Various industries | various industries
Key Point :
New ransomware groups have led to a 16% increase in attacks compared to Q1 2024.…Summary: The CrowdStrike event in July highlighted the risks associated with granting software vendors extensive access to network infrastructure and raised concerns about the concentration of digital services among a few companies. To mitigate potential failures, organizations should diversify their network infrastructure and prepare for catastrophic events through proactive planning and practice.…
Summary: Organizations of all sizes face significant cybersecurity threats, necessitating proactive defenses and effective management of cyber-risks. The C-suite’s involvement is crucial for fostering a culture of cybersecurity and ensuring that organizations are prepared to handle potential attacks.
Threat Actor: Various | threat actors Victim: Multiple organizations | organizations affected by cybersecurity threats
Key Point :
Four in ten US organizations rely on their executive management to assess cyber-risk, yet only 20% report high involvement from the C-suite.…