Organizations Warned of Exploited SolarWinds Web Help Desk Vulnerability

October 16, 2024 at 06:19AM SecurityWeek offers extensive coverage of cybersecurity topics, including threats, incidents, and strategies. It features webcasts, events, and resources related to various sectors like industrial cybersecurity and risk management. Users can subscribe to a daily briefing newsletter for updates or unsubscribe at their convenience. ### Meeting Takeaways 1. **Overview of SecurityWeek … Read more

FHE Consortium Pushes for Quantum-Resilient Cryptography Standards

October 15, 2024 at 06:23PM The FHE Technical Consortium for Hardware (FHETCH) was launched to enhance interoperability of fully homomorphic encryption (FHE) hardware and software. This alliance aims to accelerate FHE product development by focusing on practical standards, hardware acceleration, and API abstraction, ensuring secure data processing while maintaining privacy across various industries. ### Meeting … Read more

Microsoft says more ransomware stopped before reaching encryption

October 15, 2024 at 12:55PM Microsoft reports a 2.75 times increase in ransomware attacks, yet defenses are improving, halving successful encryption attempts. Common methods include social engineering and exploiting unmanaged devices. Ransomware tactics like double extortion are prevalent, with Akira leading attacks. Microsoft advises implementing multi-factor authentication and reviewing account privileges to mitigate risks. ### … Read more

Fighting Crime With Technology: Safety First

October 14, 2024 at 11:42AM Jerrid Powell’s shooting spree in Beverly Hills led to his swift capture, aided by Flock Safety’s crime-solving technology. The company has become a key player in public safety, solving 10% of U.S. crimes. Flock Safety is enhancing security by integrating identity management solutions from Okta and Permiso to better manage … Read more

Why Your Identity Is the Key to Modernizing Cybersecurity

October 14, 2024 at 10:05AM In today’s digital landscape, sophisticated threats from criminal organizations and nation-states challenge security. The traditional moat-and-castle framework is outdated, giving way to a zero-trust model emphasizing identity verification. With AI’s rise, a robust identity-centric approach is crucial for securing data and facilitating seamless, secure collaboration across organizations. **Meeting Takeaways:** 1. … Read more

Chinese State Hackers Main Suspect in Recent Ivanti CSA Zero-Day Attacks

October 14, 2024 at 09:15AM The Zero Trust Strategies Summit sessions are now available on demand. SecurityWeek offers a wide range of cybersecurity topics and resources including news, webcasts, and events. Stay updated with their Daily Briefing Newsletter for insights on threats, incident response, and more. Unsubscribe anytime. ### Meeting Takeaways: 1. **Event Highlight:** – … Read more

GitLab warns of critical arbitrary branch pipeline execution flaw

October 10, 2024 at 11:19AM GitLab has issued security updates for vulnerabilities in Community and Enterprise Editions, notably a critical flaw (CVE-2024-9164) that allows unauthorized pipeline execution. Patches are available in versions 17.4.2, 17.3.5, and 17.2.9. Users are urged to upgrade promptly; dedicated customers need not take action. **Meeting Takeaways:** 1. **Security Update Release**: GitLab … Read more

Cloud, AI Talent Gaps Plague Cybersecurity Teams

October 9, 2024 at 02:11PM A significant skills gap in AI and cloud security exists, with 39% of security teams needing expertise in cloud computing and 34% lacking AI skills. Continuous upskilling is essential to tackle evolving cyber threats. Training, certifications, and experience can enhance competencies, while initiatives like MITRE’s AI Incident Sharing aim to … Read more

Navigating the Complexities & Security Risks of Multicloud Management

October 3, 2024 at 10:02AM Improper cloud security has resulted in costly breaches for organizations such as Toyota and Accenture, highlighting the significant impact of cloud security failures. As multicloud strategies become more prevalent, the complexities of managing multiple cloud environments pose challenges in governance, security, and compatibility, necessitating robust cloud security practices and strategic … Read more

China-Linked CeranaKeeper Targeting Southeast Asia with Data Exfiltration

October 2, 2024 at 12:15PM CeranaKeeper, a new threat actor, has been conducting data exfiltration attacks in Southeast Asia, targeting countries like Thailand, Myanmar, the Philippines, Japan, and Taiwan. Utilizing backdoors through legitimate cloud and file-sharing services, the group demonstrates a relentless and creative approach, with an extensive custom toolset for massive data siphoning. ESET … Read more