Unmanaged Cloud Credentials Pose Risk to Half of Orgs

October 21, 2024 at 05:23PM Nearly half of organizations have long-lived credentials in cloud services, increasing risks of data breaches. Datadog’s 2024 report indicates many credentials are outdated or unused, often leaking in source code. To enhance security, experts recommend avoiding long-lived credentials and adopting short-lived ones along with modern authentication methods. ### Meeting Takeaways: … Read more

Attackers Target Exposed Docker Remote API Servers With perfctl Malware

October 21, 2024 at 11:30AM Attacks on exposed Docker Remote API servers deploy the perfctl malware through probing and payload execution. Attackers create containers, execute Base64 encoded payloads, and use evasion tactics to avoid detection. Recommendations to enhance security include strong access controls, regular monitoring, and adherence to container security best practices. ### Meeting Takeaways … Read more

Severe flaws in E2EE cloud storage platforms used by millions

October 20, 2024 at 12:10PM Research from ETH Zurich highlights vulnerabilities in five end-to-end encrypted cloud storage platforms: Sync, pCloud, Icedrive, Seafile, and Tresorit, affecting over 22 million users. Issues include unauthorized data access and manipulation. Sync acted quickly to address concerns, while other providers have been slower to respond or decline to comment. ### … Read more

Gartner 2024 CNAPP Market Guide Insights for Leaders

October 18, 2024 at 12:50PM Trend Micro discusses the importance of fortifying against cloud security threats, as indicated in Gartner’s 2024 Market Guide. The guide highlights the expanding attack surface of cloud-native applications. Comprehensive security solutions, particularly Cloud-Native Application Protection Platforms (CNAPPs), can enhance visibility and streamline risk management for organizations. **Meeting Takeaways:** 1. **Emerging … Read more

North Korean APT Exploited IE Zero-Day in Supply Chain Attack

October 18, 2024 at 07:25AM SecurityWeek provides extensive coverage of cybersecurity topics, including malware, cyberwarfare, data breaches, and various security domains like IoT and cloud security. It also offers events, webcasts, and newsletters for staying updated on the latest threats and expert insights, along with resources like the ICS Cybersecurity Conference and CISO forums. **Meeting … Read more

Top 5 Cloud Security Automations for SecOps Teams

October 17, 2024 at 10:39AM Blink Ops automates security operations, transforming tedious tasks into efficient workflows. By integrating with platforms like AWS and Wiz, it allows users to monitor vulnerabilities, detect incidents, and enforce S3 encryption easily. This automation helps security teams save time and minimize human error while focusing on critical security initiatives. ### … Read more

Iranian Hackers Use Brute Force in Critical Infrastructure Attacks

October 17, 2024 at 07:39AM SecurityWeek Network offers comprehensive cybersecurity news, resources, and events, including webcasts and the ICS Cybersecurity Conference. Topics covered range from malware and ransomware to data protection and risk management. Subscribe for daily updates on threats and industry insights or opt-out anytime. ### Meeting Takeaways 1. **Cybersecurity News**: SecurityWeek offers the … Read more

Anonymous Sudan isn’t any more: two alleged operators named, charged

October 17, 2024 at 03:33AM The US Attorney’s Office indicted Sudanese nationals Ahmed Salah Yousif Omer and Alaa Salah Yusuuf Omer, alleged operators of the hacktivist group Anonymous Sudan. They face charges related to numerous DDoS attacks on US critical infrastructure. Authorities claim to have degraded the group’s capabilities and seized its attack tools. ### … Read more

Critical Kubernetes Image Builder Vulnerability Exposes Nodes to Root Access Risk

October 17, 2024 at 02:48AM A critical security flaw (CVE-2024-9486) in Kubernetes Image Builder could allow root access due to default credentials during image builds. Addressed in version 0.1.38, users are advised to disable affected accounts and rebuild images. Additionally, related vulnerabilities in Microsoft and Apache Solr were also disclosed and patched. ### Meeting Takeaways … Read more

Fake LockBit, Real Damage: Ransomware Samples Abuse AWS S3 to Steal Data

October 16, 2024 at 07:39AM The analyzed Golang ransomware exploits Amazon S3 Transfer Acceleration to exfiltrate files to attacker-controlled buckets, utilizing hard-coded AWS credentials. It mimics LockBit ransomware to manipulate victims. AWS confirmed these actions violated its policies and suspended the implicated account. Monitoring AWS credentials can serve as potential Indicators of Compromise (IOCs). ### … Read more