Aggregator
Monti
再获认可!360多领域入选《2024年中国数据安全企业全景图》
关键的 WordPress 插件漏洞导致超400万网站暴露
CVE-2024-52308:GitHub CLI 漏洞可能导致远程代码执行
Onapsis Secure RISE Accelerator streamlines security elements of modern SAP deployments
Onapsis announced the Onapsis Secure RISE Accelerator, helping organizations execute their RISE with SAP transformation with confidence. The new offering reduces security and compliance obstacles with a structured, bundled solution that simplifies and accelerates an organization’s project planning and execution with SAP-endorsed technology, threat insights and comprehensive SAP cybersecurity expertise and best practices. As companies increasingly choose the RISE with SAP program to move to the cloud and modernize their SAP environments, security and compliance … More →
The post Onapsis Secure RISE Accelerator streamlines security elements of modern SAP deployments appeared first on Help Net Security.
Rechercheurs van de marechaussee onderzoeken oorlogsmisdrijven in Oekraïne
科学家发现耐药菌的致命弱点
63 месяца за транснациональные преступления: основателю ANOM вынесли приговор
小心了,Solana:Starknet在3个月内达到4X TPS
cwe_checker:在二进制可执行文件中查找存在安全问题的模式
ReasonLabs launches Online Security platform for Android and iOS
ReasonLabs launched Online Security platform for Android and iOS, available for download on the Google Play Store and Apple App Store. This marks a significant milestone in ReasonLabs’ mission to deliver a comprehensive security platform that empowers over 25 million users with protection for their devices, identities, and privacy. ReasonLabs’ platform, already recognized for its identity and device protection delivered on desktops, now extends its availability to mobile devices. Americans lost more than $12.5 billion … More →
The post ReasonLabs launches Online Security platform for Android and iOS appeared first on Help Net Security.
美国饮用水系统存在300多个漏洞,影响1.1亿人
Palo Alto Networks 证实积极利用最近披露的零日漏洞
RansomHub
Enzoic Acquires VeriClouds
VeriClouds and Enzoic signed an agreement to bring our customers a more innovative service under the Enzoic brand.
The post Enzoic Acquires VeriClouds appeared first on Security Boulevard.
Volt Typhoon: What State and Local Government Officials Need to Know
Increased activity from the state-sponsored threat group Volt Typhoon raises concerns about the cybersecurity of U.S. critical infrastructure. Here’s how you can identify potential exposures and attack paths.
Recent activity from the state-sponsored group Volt Typhoon, from the People’s Republic of China (PRC), has prompted federal agencies — including the Cybersecurity and Infrastructure Security Agency (CISA) and international partners — to issue urgent warnings and advisories. This increase in activity from advanced persistent threat (APT) actors targeting U.S. critical infrastructure highlights the need for increased vigilance from state and local governments. Since U.S. critical infrastructure is owned and operated by both public sector and private sector organizations, the threat is a concern for government agencies as well as corporate enterprises.
Volt Typhoon is a sophisticated threat group, typically gaining initial access to targets by exploiting unpatched vulnerabilities, including zero-day flaws, as well as through phishing techniques. Once initial access is gained, Volt Typhoon stays persistent for as long as possible, blending in with normal traffic and operating systems. This is achieved through “living off the land” (LOTL) techniques, leveraging native operating system tools to evade detection and favoring manual operations over automated manual scripts, further enhancing their adaptability within the environment.
State and local governments (SLG) have real options though, thanks to the Tenable Security Response Team’s examination of Volt Typhoon’s tactics, techniques and procedures (TTP). Additionally, with the Fiscal Year 2024 State and Local Cybersecurity Grant Program (SLCGP) Notice of Funding Opportunity (NOFO) open for eligible applicants through December 3, SLG officials can apply for funding to strengthen the security of critical infrastructure against malicious threats and to bolster the resilience of the services that state and local governments provide to their communities.
Based on the Tenable Security Response Team’s findings, Tenable recommends state and local government officials consider the following measures to address, patch and mitigate the identified Volt Typhoon vulnerabilities. In addition to these recommendations, implementing cyber hygiene best practices is essential for effective defense.
Patching known vulnerabilities and identifying affected systemsState and local government agencies have the tools and capabilities to protect themselves against the vast majority of attacks, including those from APT actors. Too many entities, however, are failing to take even the minimum steps to protect themselves and their communities.
Let’s start with the basics: it’s critical to have holistic exposure management capabilities that concentrate on discovering and remediating publicly disclosed CVEs. Exposure management combines the people, processes and technologies needed to effectively reduce cyber risk. Technologies such as vulnerability management, web application security, cloud security, identity security, attack path analysis and attack surface management are used to help organizations understand the full breadth and depth of their exposures and take the actions needed to reduce them through remediation and incident response workflows. This proactive approach gives organizations the power to identify and patch known vulnerabilities before they can be exploited.
By implementing proactive exposure management measures, state and local officials can significantly strengthen their resilience against cyberattacks and better protect their communities.
Given the heightened activity by Volt Typhoon, advisories have been released by the respective vendors for specific patching and mitigation tactics for the CVEs commonly exploited; learn more here.
If you are unsure whether your systems have been affected by Volt Typhoon or another APT, Tenable offers several solutions to help identify potential exposures and attack paths, as well as identify systems vulnerable to the CVEs noted in the research linked above.
Implementing cyber hygiene best practicesBasic cyber hygiene practices, including asset management, vulnerability management and identity and access management are crucial in today's digital landscape. State and local governments need to ensure they have visibility across their entire attack surface, including their IT, internet of things (IoT) and operational technology (OT) assets to know where they are exposed. This is critical when a vulnerability is discovered, especially as state-sponsored groups like Volt Typhoon are continuing to target U.S. critical infrastructure.
Understanding Volt Typhoon's TTPs equips state and local governments with valuable insights to enhance their cybersecurity posture. By implementing proactive exposure management measures, state and local officials can significantly strengthen their resilience against cyberattacks and better protect their communities.
If you want to learn more about Volt Typhoon and the Tenable Security Response Team’s research, review the findings here.
Learn more- Read the blog Volt Typhoon: U.S. Critical Infrastructure Targeted by State-Sponsored Actors
- Read the joint cybersecurity advisory People's Republic of China State-Sponsored Cyber Actor Living off the Land to Evade Detection
- Get up to speed on the U. S. Department of Homeland Security (DHS) Notice of Funding Opportunity (NOFO) Fiscal Year 2024 State and Local Cybersecurity Grant Program
Ngioweb Botnet Fuels NSOCKS Residential Proxy Network Exploiting IoT Devices
Hornetsecurity DMARC Manager protects against fraud and phishing attacks
Hornetsecurity launched DMARC Manager, an advanced tool addresses the complex challenges organisations face in managing DMARC, DKIM, and SPF configurations, especially for those operating across multiple domains. As email threats such as fraud and impersonation attacks continue to rise, the need for robust email authentication practices has never been more critical. DMARC Manager is designed to empower administrators and CISOs by providing an intuitive solution for setting up and maintaining best practices in email authentication. … More →
The post Hornetsecurity DMARC Manager protects against fraud and phishing attacks appeared first on Help Net Security.
WordPress Plug-In Vulnerability Threatens 4 Million Sites
A widely deployed five-in-one security plug-in for WordPress websites contained a flaw that hackers could automate into a large-scale takeover campaign. The critical authentication bypass vulnerability takes advantage of a now-patched flaw in the Really Simple Security plug-in.