Here's a summary of the most interesting news, articles, interviews and videos from the past week.
How CISOs manage policies and access across the enterprise
In this Help Net Security interview, Marco Eggerling, global CISO at Check Point, discusses the challenges of balancing data protection with disparate policies, devices, and access controls in a distributed enterprise.
Enhanced Adversary Simulation: Learn the Business to Attack the Business
In this Help Net Security interview, DVULN founder Jamison O'Reilly talks about adversary simulation, highlighting challenges rooted in human behavior, decision-making, and responding to evolving cyber threats.
Choosing the right partner when outsourcing cybersecurity
In this Help Net Security interview, Anya Shpilman, Senior Executive of Cyber Security Services at WDigital, discusses the benefits and potential risks of outsourcing cybersecurity services.
Key strategies for implementing ISO 27001 compliance
In this Help Net Security interview, Kiowa Security founder Robin Long shares his insights on the best way to approach implementing the ISO/IEC 27001 information security standard.
Latio Application Security Tester: Scan your code using AI
Latio Application Security Tester is an open-source tool that uses OpenAI to scan your code for security and health issues from the CLI.
Prowler: Open source security tool for AWS, Google Cloud Platform, and Azure
Prowler is an open source security tool designed to assess, audit, and harden the security of AWS, GCP, and Azure.
SOAPHound: Open source tool to collect Active Directory data via ADWS
SOAPHound is an open source data collection tool that allows you to enumerate your Active Directory environment through the Active Directory Web Services (ADWS) protocol.
AnyDesk hacked, users forced to change passwords
AnyDesk Software GmbH, the German company behind the widely used (and abused) remote desktop application of the same name, has admitted that it has been hacked and its operational systems have been compromised.
Deepfaked video conference call leads to employee transferring $25 million to scammers
More than $25 million was stolen from a multinational company through a combination of deepfake video conferencing and social engineering tricks, the South China Morning Post reported.
Lazy Mastodon admins urged to patch account takeover critical flaw (CVE-2024-23832)
Five days after Mastodon developers published a fix for a remotely exploitable account takeover vulnerability (CVE-2024-23832), over 66% of Mastodon servers in the world have been upgraded to close the hole.
Ivanti Connect Secure flaw exploited at scale by attackers (CVE-2024-21893)
CVE-2024-21893 is a server-side request forgery (SSRF) vulnerability affecting Ivanti Connect Secure VPN gateways and Policy Secure, a network access control solution, that has been exploited by attackers.
The fight against commercial spyware abuse intensifies
Although there are organizations investigating how commercial spyware is being used to target journalists, human rights activists, and political dissidents, there are many concerns about the development and sale of this type of software and the exploits used to deploy it. The related growth market remains shrouded in mystery. .
Akira, LockBit is actively searching for vulnerable Cisco ASA devices
Akira and Lockbit ransomware groups are exploiting several old vulnerabilities to infiltrate Cisco ASA SSL VPN devices, warns security researcher Kevin Beaumont.
LassPass is not LastPass: Rogue apps in the Apple App Store
A fraudulent app named “LassPass Password Manager” that mimics the legitimate LastPass mobile app has now been discovered in Apple's App Store, the password manager maker is warning.
Spoutible API exposes encrypted password reset token, user's 2FA secret
Social media platform Spoutible's API has been exposed, potentially allowing attackers to collect information that can be used to hijack user accounts.
Common cloud security mistakes and how to avoid them
Recent research shows that 98% of organizations store financial, business, customer, and employee information in the cloud, but at the same time, 95% of cloud security professionals believe that their organization is secure and their team is secure. I'm not sure I can manage it. Respond to security threats and incidents impacting your cloud infrastructure.
Authentication bypass vulnerability in on-premises JetBrains TeamCity server (CVE-2024-23917)
JetBrains has patched a critical authentication bypass vulnerability (CVE-2024-23917) affecting TeamCity On-Premises Continuous Integration and Deployment Server.
Chinese hackers infiltrate the Dutch Ministry of Defense
Chinese state-sponsored hackers infiltrated the Dutch Ministry of Defense (MOD) last year and introduced new remote access Trojan (RAT) malware that acts as a backdoor.
Why do we fall for fake news? How can we change it?
Have you ever been swept away by a tempting headline and never bothered to look deeper into the news?
Migration to the Cloud: Overview of Process and Strategy
Over the next few years, the number of organizations moving to the cloud to achieve their business goals is expected to increase exponentially
Exploring the NIST Cybersecurity Framework 2.0
In this Help Net Security video, Dan Erel, VP of Security at SeeMetrics, explains the NIST Cybersecurity Framework (CSF) 2.0.
10 must-read cybersecurity books in 2024
Our cybersecurity book list has been carefully selected to guide your professional growth in 2024.
3 ways to achieve crypto agility in a post-quantum world
Cryptographic agility is the foundation of digital trust. As many companies accelerate app development and build networks (often in the cloud) that connect many functions, they are using cryptographic keys and digital It relies on certificates.
Demystifying SOC-as-a-Service (SOCaaS)
In this Help Net Security video, Cyber Guards CEO Erik Holmes explains what SOCaaS is, how it works, and how to use it.
Researchers discover exposed API secrets that impact key technology tokens
Escape's security research team scanned 189.5 million URLs and discovered over 18,000 exposed API secrets.
10 tips for creating a security hackathon playbook
Hackathon events bring together product and security experts for the sole purpose of discovering security vulnerabilities within products.
How threat actors exploit OAuth apps
In this Help Net Security video, Tal Skverer, research team leader at Astrix Security, shares insights on how threat actors can easily and unobservedly infiltrate OAuth apps into corporate environments.
Ransom payments are becoming a cost of doing business for many
According to Cohesity, today's pervasive cyberattacks are forcing the majority of companies to pay ransoms and abandon their “don't pay” policies, and flaws in data recovery are exacerbating the problem.
February 2024 Patch Tuesday Prediction: Zero-days are back and new servers are here too
January 2024 Patch Tuesday is over. It was a relatively light release from Microsoft, addressing 39 of his CVEs on Windows 10 and 35 on Windows 11, and surprisingly there were no zero-day vulnerabilities from Microsoft at the beginning of the new year.
How companies misjudge their data privacy preparedness
In this Help Net Security video, Karen Schuler, Global Privacy and Data Protection Chair at BDO, discusses overconfidence in data privacy and data protection practices.
Companies banning or restricting the use of GenAI due to privacy risks
New Cisco findings highlight growing privacy concerns around GenAI, the trust challenges organizations face when it comes to using AI, and the compelling returns from investing in privacy.
Whitepaper: Why Microsoft password protection isn't enough
Microsoft's Azure AD Password Protection (now rebranded to Microsoft Entra ID) helps users create password policies to protect their systems from account takeover and other identity and access management issues. Masu.
New Information Security Products of the Week: February 9, 2024
Here are the most interesting products of the past week, with a focus on releases from Cisco, Metomic, OPSWAT, Qualys, and Varonis.