Cyber Story Time: The Boy Who Cried “Secure!”

November 21, 2024 at 07:15AM Automated Security Validation (ASV) tools provide continuous real-time assessments of cybersecurity defenses. Unlike vulnerability scanners, ASVs validate fixes against threats, preventing false negatives. This article underscores the importance of ASVs in identifying security gaps through real-time testing, illustrated by the fable of “The Boy Who Cried Wolf.” ### Meeting Takeaways: … Read more

Symbiotic Security Launches Scanning Tool to Help Fix Flaws in Code

November 7, 2024 at 08:38AM Symbiotic Security has launched a software-as-a-service platform that integrates security tools into developers’ environments, enabling real-time vulnerability detection and remediation. By providing contextual feedback and training, it aims to address the challenges of shift-left security and improve secure coding practices. The company raised $3 million in seed funding. ### Meeting … Read more

EDRSilencer red team tool used in attacks to bypass security

October 15, 2024 at 02:48PM EDRSilencer, an open-source tool, is being used by attackers to mute alerts from Endpoint Detection and Response (EDR) tools, enabling cyber threats to go undetected. Trend Micro reports it can block multiple EDR products, urging the adoption of multi-layered security measures to counteract this tool’s capabilities. **Meeting Takeaways: EDRSilencer and … Read more

Infostealer malware bypasses Chrome’s new cookie-theft defenses

September 24, 2024 at 01:35PM Infostealer malware developers claimed to bypass Google Chrome’s App-Bound Encryption feature, aiming to protect sensitive data like cookies. While the model prevents infostealer malware from stealing secrets stored in Chrome, security researchers observed multiple developers boasting about implementing a working bypass. Latest tests confirmed some malware variants can bypass the … Read more

Why Identity Teams Need to Start Reporting to the CISO

August 30, 2024 at 10:09AM CISOs face growing pressure as data breaches dominate headlines. The SEC’s new disclosure requirements put more accountability on them, recognizing identity management as crucial. IAM should report to CISOs and separate from IT to ensure effective governance. Implementing identity protection and micro-segmentation can mitigate breaches. CISOs need more organizational power … Read more

Europol Announces Crackdown on Cobalt Strike Servers Used by Cybercriminals

July 3, 2024 at 03:30PM Europol coordinated a global crackdown targeting cybercriminals’ use of legitimate security tools, resulting in the takedown of nearly 600 Cobalt Strike servers linked to criminal activity. The agency worked with private sector companies to flag and disable unlicensed versions of the tool across 27 countries as part of Operation Morpheus, … Read more

(Cyber) Risk = Probability of Occurrence x Damage

May 15, 2024 at 08:12AM The new Common Vulnerability Scoring System (CVSS) v4.0 aims to enhance vulnerability assessment by introducing additional metrics and emphasizing the consideration of environmental and threat factors. It is used to evaluate the risk associated with vulnerabilities, especially in network products, and is considered an internationally recognized standard. Integration with security … Read more

Nespresso Domain Serves Up Steamy Cup of Phish, No Cream or Sugar

April 22, 2024 at 03:44PM A phishing campaign targeted Nespresso’s website, exploiting a bug and evading detection by adding malicious links. It starts with a deceptive Bank of America email, tricking targets into a compromised Nespresso URL. The attackers utilize an open redirect vulnerability, bypassing security tools. The campaign consistently uses infected Nespresso URLs and … Read more

Countering Voice Fraud in the Age of AI

April 18, 2024 at 08:50AM Caller ID spoofing and AI voice deepfakes are fueling phone scams, but tools are available to safeguard against this threat, providing protection for both organizations and individuals. Based on the meeting notes, it seems the main takeaways are: 1. Caller ID spoofing and AI voice deepfakes are contributing to an … Read more

Critical Infrastructure Security: Observations From the Front Lines

April 12, 2024 at 10:08AM Organizations are facing increased attacks on critical infrastructure, but they have the necessary knowledge and tools to defend against these threats. Based on the meeting notes, the key takeaway is that while attacks on critical infrastructure are increasing, organizations have the necessary knowledge and tools to effectively defend against them. … Read more