NCSC Says Newer Threats Need Network Defense Strategy

April 19, 2024 at 12:36PM The NCSC warns that network defense strategies must adapt to newer threats, as attackers exploit vulnerabilities in network perimeter products like firewalls and VPNs. They suggest demanding security evidence from vendors, avoiding unverified products, reducing risk in self-hosted solutions, ensuring developer accountability, and adopting a cloud-first approach to security, emphasizing … Read more

Cisco’s Complex Road to Deliver on its Hypershield Promise

April 19, 2024 at 08:04AM Cisco is set to launch Hypershield, an AI-powered security platform aimed at protecting cloud workloads and AI systems from cyber threats. The platform utilizes AI-augmented agents to push security to the edge, automatically patch environments, and detect anomalous behavior. It also aims to simplify network security through distributed exploit protection … Read more

How Attackers Can Own a Business Without Touching the Endpoint

April 19, 2024 at 07:48AM Attackers are increasingly targeting cloud apps and identities without requiring access to traditional networks. With the shift to SaaS adoption, interconnectedness and complexity of digital identities are vulnerable. Security controls for cloud identities are limited, leading to a rise in attacks. Techniques like AiTM phishing, IM phishing, SAMLjacking, Oktajacking, and … Read more

OpenMetadata Vulnerabilities Exploited to Abuse Kubernetes Clusters for Cryptomining  

April 19, 2024 at 05:57AM Cybercriminals are exploiting critical OpenMetadata vulnerabilities to access Kubernetes environments and deploy cryptocurrency mining malware, Microsoft warned. Five vulnerabilities, including an authentication bypass and high-severity issues, have been identified. Threat actors target internet-exposed Kubernetes workloads of OpenMetadata, achieve code execution, and download cryptomining-related malware. Microsoft advises updating OpenMetadata to version … Read more

SAP Applications Increasingly in Attacker Crosshairs, Report Shows

April 18, 2024 at 12:40PM Hackers are increasingly targeting SAP applications and data in organizations, driven by migration to the cloud and improved ability to exploit security gaps. Ransomware attacks on SAP systems have risen by 400%, with pricing for SAP exploits following suit. Threat actors, including APT10 and FIN7, are exploiting vulnerabilities in various … Read more

Open-Source Tool Looks for Signals in Noisy AWS Cloud Logs

April 18, 2024 at 08:35AM Researcher Daniel Bohannon discusses the challenges of dealing with extensive logging in Amazon Web Services, which creates a large volume of events that make it difficult to identify user actions. He plans to launch an open-source tool at Black Hat Asia to help consolidate the cloud log events, with future … Read more

Why a Native-First Approach Is Key to Cloud Security

April 17, 2024 at 09:00AM The increasing adoption of public cloud platforms prompts companies to shift their security toolsets. While the best-of-breed model involves using multiple third-party security solutions, it creates gaps and inefficiencies. Alternatively, the native-first cloud security approach, utilizing integrated first-party solutions, offers greater cost efficiency and improved security resilience, reducing attack surface, … Read more

Critical Atlassian Flaw Exploited to Deploy Linux Variant of Cerber Ransomware

April 17, 2024 at 07:12AM Threat actors exploit an unpatched Atlassian server vulnerability (CVE-2023-22518) to deploy Linux Cerber ransomware. This creates a critical security risk, leading to loss of system control. Ransomware payloads are executed using a web shell, encrypting files and dropping ransom notes. The use of C++ payloads is noted, and new ransomware … Read more

BeyondTrust Acquires Entitle, Strengthening Privileged Identity Security Platform

April 16, 2024 at 04:50PM BeyondTrust has entered into a definitive agreement to acquire Entitle, a privilege management solution focusing on just-in-time access and modern identity governance across the cloud estate. This acquisition enhances BeyondTrust’s ability to provision user access to sensitive data and cloud resources, expanding its privilege identity security platform. For more information, … Read more

Cloud Users Warned of Data Exposure Risk From Command-Line Tools

April 16, 2024 at 11:00AM Cloud security firm Orca warned about how certain command-line tools from major cloud service providers expose sensitive information in the form of environment variables, posing security risks. Microsoft Azure, AWS, and Google Cloud confirmed the issue and provided guidance on safeguarding sensitive data. Orca discovered this issue impacting not just … Read more