Researchers Hijack Hacker Backdoors Through Abandoned Infrastructure – CySecurity News – Latest Information Security and Hacking Incidents
Summary: Shadow IT poses significant risks for organizations, as forgotten systems can become entry points for data breaches. Recent research by watchTowr Labs reveals that hackers also leave behind vulnerabilities in abandoned infrastructure, which can be exploited. This study highlights the importance of vigilance in cybersecurity, as both attackers and defenders can make critical mistakes.…
Read More
1Password Acquires SaaS Access Management Provider Trelica
Summary: 1Password has acquired Trelica, a SaaS access management provider, marking its largest acquisition by revenue in 18 years. This move aims to enhance 1Password’s Extended Access Management platform, addressing challenges in managing and securing SaaS applications.

Threat Actor: N/A | N/A Victim: N/A | N/A

Key Point :

1Password’s acquisition of Trelica strengthens its offerings in access management and security.…
Read More
Product Review: How Reco Discovers Shadow AI in SaaS
Summary: The rise of shadow AI poses significant security risks as employees use unauthorized AI tools without IT oversight, potentially exposing sensitive company data. Reco offers a solution to detect and manage these shadow AI applications within organizations.

Threat Actor: Shadow AI Users | shadow AI users Victim: Organizations | organizations

Key Point :

Shadow AI refers to unauthorized use of AI tools within organizations, increasing data security risks.…
Read More

Summary: In 2024, cyber threats targeting SaaS platforms surged dramatically, with significant increases in password attacks and phishing attempts resulting in billions in losses. Security teams must prioritize risk assessments and adopt monitoring tools to defend against evolving threats from notable cybercriminals.

Threat Actor: ShinyHunters | ShinyHunters Victim: Snowflake | Snowflake

Key Point :

ShinyHunters exploited a misconfiguration to breach over 165 organizations, emphasizing the importance of proper security measures.…
Read More

Summary: Cyberhaven fell victim to a supply-chain attack where attackers compromised their Chrome extension, allowing them to exfiltrate sensitive data such as Facebook access tokens. The incident highlights the vulnerabilities in software supply chains and the need for better security measures regarding browser extensions.

Threat Actor: Unknown | unknown Victim: Cyberhaven | Cyberhaven

Key Point :

Attackers used social engineering to gain access rights to Cyberhaven’s Chrome extension.…
Read More

Short Summary:

In 2024, the manufacturing sector has become a primary target for cyber attacks, particularly ransomware, leading to significant financial and operational disruptions. Key threat actors include various ransomware groups and hacktivist organizations, with the United States being the most targeted country. Manufacturers must enhance their cybersecurity measures to protect against evolving threats.…

Read More

Summary: The content discusses the use of unsanctioned apps, including AI, by cybersecurity professionals and the risks associated with it.

Threat Actor: N/A Victim: N/A

Key Point :

73% of cybersecurity professionals have used unsanctioned apps, including AI, in the past year. Most professionals acknowledged data loss, lack of visibility and control, and data breaches as the top risks of using unauthorized tools.…
Read More

Summary: This article discusses a cybercrime incident where a terminated worker unlawfully accessed patient information at Geisinger, a healthcare organization.

Threat Actor: Former employee of Nuance Communications Inc. | Nuance Communications Inc. Victim: Geisinger | Geisinger

Key Point :

An ex-employee of Nuance Communications Inc. has been indicted for unlawfully accessing patient information at Geisinger, a healthcare organization.…
Read More

Summary: This content discusses the unpatchable vulnerabilities found in temperature monitors made by Proges Plus and used in hospitals.

Threat Actor: No specific threat actor mentioned. Victim: Hospitals using temperature monitors made by Proges Plus.

Key Point :

Researchers have discovered unpatchable vulnerabilities in temperature monitors made by Proges Plus and used in hospitals.…
Read More
Executive Summary

This post reviews strategies for identifying and mitigating potential attack vectors against virtual machine (VM) services in the cloud. Organizations can use this information to understand the potential risks associated with their VM services and strengthen their defense mechanisms. This research focuses on VM services offered by three major cloud service providers (CSPs): Amazon Web Services (AWS), Azure and Google Cloud Platform (GCP).…

Read More

Summary: This article discusses the importance of exposure management in cybersecurity and how organizations can prioritize their security efforts to protect their most vulnerable areas.

Threat Actor: N/A

Victim: N/A

Key Points:

Organizations need to implement asset identification and understand their assets’ security posture to effectively protect against cyber threats.…
Read More

Being a CISO is a balancing act: ensuring organizations are secure without compromising users’ productivity. This requires taking multiple elements into consideration, like cost, complexity, performance and user experience. CISOs around the globe use Cato SSE 360, as part of the Cato SASE Cloud platform to balance these factors without compromise.…

Read More

Mar 04, 2024The Hacker NewsSaaS Security / Vulnerability Assessment

A company’s lifecycle stage, size, and state have a significant impact on its security needs, policies, and priorities. This is particularly true for modern mid-market companies that are either experiencing or have experienced rapid growth. As requirements and tasks continue to accumulate and malicious actors remain active around the clock, budgets are often stagnant at best.…

Read More

If you thought the software supply chain security problem was difficult enough today, buckle up. The explosive growth in artificial intelligence (AI) use is about to make those supply chain issues exponentially harder to navigate in the years to come. 

Developers, application security pros, and DevSecOps professionals are called to fix the highest risk flaws that lurk in what seems like the endless combinations of open source and proprietary components that are woven into their applications and cloud infrastructure.…

Read More