Here’s a summary of the most interesting news, articles, interviews and videos from the past week.
SCS 9001 2.0 reveals enhanced management of global supply chains
In this Help Net Security interview, Mike Regan, TIA’s Vice President of Business Performance, talks about the SCS 9001 release, a certification standard created to help organizations navigate NIST and other government guidelines and frameworks. 2.0 is explained.
Balance the benefits and risks of AI in your cybersecurity strategy
In this Help Net Security interview, Matt Holland, CEO of Field Effect, discusses how businesses can balance the benefits of using AI in their cybersecurity strategies with the risks posed by AI-enhanced cyber threats. I’ll talk about it.
Nemesis: An open source offensive data enrichment and analysis pipeline
Nemesis is a centralized data processing platform that ingests, enriches, and performs analysis on offensive security assessment data (data collected during penetration testing and red team efforts).
ThreatNG open source dataset aims to improve cybersecurity practices
The ThreatNG Governance and Compliance Dataset is an open source initiative designed to democratize access to critical data and foster transparency, collaboration, and improvement in cybersecurity practices around the world.
“Pool Party” process injection technology avoids EDR
SafeBreach researchers have discovered eight new process injection techniques that can be used to covertly execute malicious code on Windows systems.
Recruiters, beware of cyber fraudsters posing as job applicants!
Recruiters are being targeted by spear-phishing emails sent by cybercriminals impersonating job applicants, Proofpoint researchers warn.
December 2023 Patch Tuesday: 33 fixes to close out the year
Microsoft’s December 2023 Patch Tuesday is a light one, containing 33 patches, of which only four are considered important.
EOL Sophos Firewall gets hotfix for old but still exploited vulnerability (CVE-2022-3236)
More than a year after Sophos released a patch for the vulnerability affecting Sophos Firewalls (CVE-2022-3236) that was actively exploited by attackers, it now protects vulnerable EOL devices. We are pushing an additional patch to make this happen.
Attackers seek to exploit Apache Struts vulnerability (CVE-2023-50164)
Attackers are attempting to leverage publicly available proof-of-exploitation (PoC) exploit code for CVE-2023-50164, a recently patched path traversal vulnerability in Apache Struts 2.
Many popular websites still adhere to password creation policies from 1985.
Georgia Tech researchers found that a significant number of popular websites still allow users to choose weak or single-character passwords.
Lazarus exploits Log4Shell vulnerability to deliver new RAT malware
The North Korean-backed group Lazarus was discovered exploiting a Log4Shell vulnerability (CVE-2021-44228) and new malware written in DLang (memory-safe D programming language).
Attackers exploit OAuth apps to launch large-scale cryptomining and spam campaigns
Attackers are compromising highly privileged Microsoft accounts and abusing OAuth applications to launch a variety of financially-motivated attacks.
Russian hackers target unpatched JetBrains TeamCity servers
Russian state-sponsored hackers have been exploiting CVE-2023-42793 to target unpatched internet-facing JetBrains TeamCity servers in the US, UK, and Poland since September 2023, the report said. Cybersecurity and law enforcement officials have warned.
Why don’t IT professionals automate?
There are many use cases for certificate automation, and each organization has unique needs based on its infrastructure, knowledge, and certificate usage. However, there are actions you can take to plan for automation and as part of regular cybersecurity hygiene checks.
Explore LATMA, an open source lateral motion detection tool
In this Help Net Security video, Gal Sadeh, head of data and security research at Silverfort, explains LATMA, a free open source tool.
Cybercriminals continue to target open remote access products
According to WatchGuard, cybercriminals still prefer to target open remote access products or leverage legitimate remote access tools to hide their malicious activity.
eIDAS: EU internet reform undoes 10 years of progress in online security
The European Union’s attempts to reform electronic identification and trust services (a set of laws known as eIDAS 2.0) include laws that pose serious threats to online privacy and security.
Stay ahead in 2024 with the best cybersecurity predictions
What will the landscape of cybersecurity look like in 2024? In this Help Net Security video, Steve Cobb, CISO at SecurityScorecard, offers his thoughts on what professionals can expect in the coming year.
Security automation gains momentum, promoting a “shift anywhere” philosophy
According to Synopsys, the use of automated security technology is rapidly expanding, and as a result, more organizations are adopting a “shift everywhere” philosophy of performing security testing throughout the software development lifecycle.
Changes in data protection regulations show why companies need to put privacy at their core
Like it or not, data protection will be one of the biggest challenges facing organizations in 2024.
WhatsApp, Slack, Teams, and other messaging platforms always face security risks
According to SafeGuard Cyber, 42% of companies report that employees are using BYOD devices in business environments using tools like WhatsApp, leading to new security incidents.
Security predictions for digital operations and operations management in 2024
CISOs don’t need a crystal ball. CISOs already know that 2024 will be an even tougher year. Especially since he is interested in AI.I
Strengthening your cyber defenses: A proactive approach to ransomware resiliency
Ransomware has become a pervasive threat, compromising the security and functionality of critical systems across the United States.
Guide: Learn more about managing your application’s security posture
Distinguishing the real risks of business-critical applications is more difficult than ever. Siled, ad-hoc approaches to AppSec generate noisy false positives and overwhelm resource-starved security teams.
Photo: CyberMarketingCon 2023
Help Net Security sponsored and attended the Cybersecurity Marketing Association’s CyberMarketingCon 2023 in Austin, Texas.
New Information Security Products of the Week: December 15, 2023
Here are the most interesting products of the past week, with a focus on releases from Censys, confirm, Drata, Safe Security, and SpecterOps.