What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
bleepingcomputer.webp 2021-08-19 05:24:44 (Déjà vu) Liquid cryptocurency exchange loses over $90 million following hack (lien direct) Japan-based cryptocurrency exchange Liquid has suspended deposits and withdrawals after attackers have compromised its warm wallets. [...] Hack
bleepingcomputer.webp 2021-08-19 05:24:44 Liquid cryptocurrency exchange loses $94 million following hack (lien direct) Japan-based cryptocurrency exchange Liquid has suspended deposits and withdrawals after attackers have compromised its warm wallets. [...] Hack
Anomali.webp 2021-08-17 17:56:00 Anomali Cyber Watch: Anomali Cyber Watch: Aggah Using Compromised Websites to Target Businesses Across Asia, eCh0raix Targets Both QNAP and NAS, LockBit 2.0 Targeted Accenture, and More (lien direct) The various threat intelligence stories in this iteration of the Anomali Cyber Watch discuss the following topics: China, Critical Infrastructure, Data Storage, LockBit, Morse Code, Ransomware, and Vulnerabilities. . The IOCs related to these stories are attached to Anomali Cyber Watch and can be used to check your logs for potential malicious activity. Figure 1 - IOC Summary Charts. These charts summarize the IOCs attached to this magazine and provide a glimpse of the threats discussed. Trending Cyber News and Threat Intelligence Colonial Pipeline Reports Data Breach After May Ransomware Attack (published: August 16, 2021) Colonial Pipeline, the largest fuel pipeline in the United States, is sending notification letters to 5,810 individuals affected by the data breach resulting from the DarkSide ransomware attack. During the incident, which occurred during May this year, DarkSide also stole roughly 100GB of files in about two hours. Right after the attack Colonial Pipeline took certain systems offline, temporarily halted all pipeline operations, and paid $4.4 million worth of cryptocurrency for a decryptor, most of it later recovered by the FBI. The DarkSide ransomware gang abruptly shut down their operation due to increased level of attention from governments, but later resurfaced under new name BlackMatter. Emsisoft CTO Fabian Wosar confirmed that both BlackMatter RSA and Salsa20 implementation including their usage of a custom matrix comes from DarkSide. Analyst Comment: BlackMatter (ex DarkSide) group added "Oil and Gas industry (pipelines, oil refineries)" to their non-target list, but ransomware remains a significant threat given profitability and the growing number of ransomware threat actors with various levels of recklessness. Double-extortion schemes are adding data exposure to a company's risks. Stopping ransomware affiliates requires defense in depth including: patch management, enhancing your Endpoint Detection and Response (EDR) tools with ThreatStream, the threat intelligence platform (TIP), and utilizing data loss prevention systems (DLP). MITRE ATT&CK: [MITRE ATT&CK] Data Encrypted for Impact - T1486 Tags: Darkside, BlackMatter, Colonial Pipeline, Oil and Gas, Ransomware, Salsa20, Data Breach, USA Indra — Hackers Behind Recent Attacks on Iran (published: August 14, 2021) Check Point Research discovered that a July 2021 cyber attack against Iranian railway system was committed by Indra, a non-government group. The attackers had access to the targeted networks for a month and then deployed a previously unseen file wiper called Meteor effectively disrupting train service throughout the country. Previous versions of the Indra wiper named Stardust and Comet were seen in Syria, where Indra was attacking oil, airline, and financial sectors at least since 2019. Analyst Comment: It is concerning that even non-government threat actors can damage a critical infrastructure in a large country. Similar to ransomware protection, with regards to wiper attacks organizations should improve their intrusion detection methods and have a resilient backup system. MITRE ATT&CK: [MITRE ATT&CK] Data Destruction - T1485 | [MITRE ATT&CK] File Deletion - T1107 | Ransomware Data Breach Malware Hack Tool Vulnerability Threat Guideline APT 27 APT 27
SecurityAffairs.webp 2021-08-17 16:55:17 Kalay cloud platform flaw exposes millions of IoT devices to hack (lien direct) FireEye Mandiant researchers have discovered a critical vulnerability in the Kalay cloud platform that exposes millions of IoT devices to attacks. Researchers at FireEye's Mandiant have discovered a critical vulnerability, tracked as CVE-2021-28372, in a core component of the Kalay cloud platform which is used by millions of IoT devices from many vendors. The flaw […] Hack Vulnerability
Kaspersky.webp 2021-08-12 20:30:58 Black Hat: Novel DNS Hack Spills Confidential Corp Data (lien direct) Threatpost interviews Wiz CTO about a vulnerability recently patched by Amazon Route53's DNS service and Google Cloud DNS. Hack Vulnerability
SecurityAffairs.webp 2021-08-12 06:31:10 Threat actors behind the Poly Network hack are returning stolen funds (lien direct) The threat actor who hacked Poly Network cross-chain protocol stealing $611 million worth of cryptocurrency assets returns the stolen funds. The threat actor behind the hack of the Poly Network cross-chain protocol is now returning the stolen funds. The hackers have stolen $611 million worth of cryptocurrency assets, $273 million worth of Ethereum tokens, $253 million […] Hack Threat
SecurityAffairs.webp 2021-08-11 19:23:35 Accenture has been hit by a LockBit 2.0 ransomware attack (lien direct) Global consulting giant Accenture has allegedly been hit by a ransomware attack carried out by LockBit 2.0 ransomware operators. IT and consulting giant Accenture was hit by a ransomware attack carried out by LockBit 2.0 ransomware operators, the group announced the hack on its leak site, “These people are beyond privacy and security. I really hope […] Ransomware Hack
Kaspersky.webp 2021-08-11 15:12:47 Crypto Hack Earned Crooks $600 Million (lien direct) In one of the largest cryptocurrency hacks to date, cyberattackers reportedly stole millions from the decentralized finance (DeFi) platform Poly Network. Hack
bleepingcomputer.webp 2021-08-11 12:22:06 Accenture confirms hack after LockBit ransomware data leak threats (lien direct) Accenture, a global IT consultancy giant has likely been hit by a ransomware cyberattack. The ransomware group LockBit is threatening to publish data on its leak site within hours, as seen by BleepingComputer. [...] Ransomware Hack
Kaspersky.webp 2021-08-10 21:21:44 Connected Farms Easy Pickings for Global Food Supply-Chain Hack (lien direct) John Deere security bugs could allow cyberattackers to damage crops, surrounding property or even people; impact harvests; or destroy farmland for years. Hack
SecurityAffairs.webp 2021-08-10 20:56:34 $611 million stolen in Poly Network cross-chain hack (lien direct) The cross-chain protocol Poly Network has been hacked, threat actors stole $611 million making this hack the largest DeFi hack to date. $611 million has reportedly been stolen in one of the largest cryptocurrency hacks. The cross-chain protocol Poly Network disclose a security breach, threat actors have stolen over $611 million in cryptocurrencies. The attackers have […] Hack Threat
bleepingcomputer.webp 2021-08-10 12:19:15 Over $600 million reportedly stolen in cryptocurrency hack (lien direct) Over $611 million have reportedly been stolen in one of the largest cryptocurrency hacks. Decentralized cross-chain protocol and network, Poly Network announced today that it was attacked with cryptocurrency assets having successfully been transferred into the attackers' wallets. [...] Hack
InfoSecurityMag.webp 2021-08-07 21:01:00 #DEFCON: Hacking RFID Attendance Systems with a Time Turner (lien direct) Student researcher reveals how it could be possible to hack an attendance system remotely and also change the responses that other students provide Hack
SecurityWeek.webp 2021-08-05 02:10:42 Oregon Examines Spyware Investment Amid Controversy (lien direct) The future ownership of an Israeli spyware company whose product has been used to hack into the cellphones of journalists, human rights workers and possibly even heads of state is up in the air. Hack
Blog.webp 2021-08-04 07:05:55 Black Hat insights: WAFs are getting much more dynamic making them well-suited to protect SMBs (lien direct) A cornucopia of cybersecurity solutions went on public display today as Black Hat USA 2021 convened once more as a live event in Las Vegas. Related: Kaseya hack raises more supply chain worries For small- and mid-sized businesses (SMBs) cutting … (more…) Hack
Chercheur.webp 2021-08-03 11:44:47 Paragon: Yet Another Cyberweapons Arms Manufacturer (lien direct) Forbes has the story: Paragon’s product will also likely get spyware critics and surveillance experts alike rubbernecking: It claims to give police the power to remotely break into encrypted instant messaging communications, whether that’s WhatsApp, Signal, Facebook Messenger or Gmail, the industry sources said. One other spyware industry executive said it also promises to get longer-lasting access to a device, even when it’s rebooted. […] Two industry sources said they believed Paragon was trying to set itself apart further by promising to get access to the instant messaging applications on a device, rather than taking complete control of everything on a phone. One of the sources said they understood that Paragon’s spyware exploits the protocols of end-to-end encrypted apps, meaning it would hack into messages via vulnerabilities in the core ways in which the software operates... Hack
Blog.webp 2021-07-30 17:30:41 Encore Podcast: Chris Valasek on Hacking The Jeep Cherokee (lien direct) With Black Hat and DEFCON upon us, we revisit a 2015 interview with Chris Valasek about his wireless, software based hack of a Chrysler Jeep Cherokee. Hack
Chercheur.webp 2021-07-29 16:20:54 The Life Cycle of a Breached Database (lien direct) Every time there is another data breach, we are asked to change our password at the breached entity. But the reality is that in most cases by the time the victim organization discloses an incident publicly the information has already been harvested many times over by profit-seeking cybercriminals. Here's a closer look at what typically transpires in the weeks or months before an organization notifies its users about a breached database. Our continued reliance on passwords for authentication has contributed to one toxic data spill or hack after another. One might even say passwords are the fossil fuels powering most IT modernization: They're ubiquitous because they are cheap and easy to use, but that means they also come with significant trade-offs -- such as polluting the Internet with weaponized data when they're leaked or stolen en masse. Hack
Anomali.webp 2021-07-29 14:55:00 The COVID-19 Pandemic Changed Everything, Can You Detect the New Normal? (lien direct) COVID-19 changed our personal and business lives in ways we never imagined, especially on the technology front. Consumers started using online services at monumental rates, as evidenced by explosive growth across Amazon, Netflix, and on-demand delivery apps. Businesses accelerated the pace of digital transformation with never-before seen speeds, reflected in the meteoric rise of video conferencing, remote work, and cloud growth. Governments increased their use of websites and social media to keep citizens updated on the latest developments in the pandemic and to assist with scheduling appointments for tests and vaccines. Cyber adversaries certainly didn’t overlook the pandemic as an opportunity. This isn’t just speculation. Since March 2020, Anomali Threat Research has tracked pandemic-related malicious cyber activities, which to date include thousands of indicators of compromise (IOCs), numerous distinct campaigns associated with multiple threat actors, dozens of different malware families, and many various MITRE ATT&CK techniques in use. Some parts of the world are starting to rebound from the pandemic’s impact, but while there is still uncertainty around when we will fully recover, it’s a sure-fire bet that a more cloud-dependent future will be part of our new “normal.” Public and private sector organizations that want to succeed not only have to innovate to fulfill consumer and business demands for digital products and services, but also how to defend them against adversaries that are increasingly sophisticated and stealthy. Much of the development problem has been solved, with providers like Amazon, Microsoft, and Google providing the foundation for cloud applications and services such as Amazon Web Services (AWS), Azure, and Google Cloud. Global organizations have even, in many cases, built their own private cloud platforms that can easily and rapidly deploy innovations to any connected endpoint. Unfortunately, cybersecurity hasn’t kept pace. It’s no wonder we are experiencing ransomware attacks like the one that hit the Colonial Pipeline, and breaches as unprecedented as SolarWinds. Recently, we worked with The Harris Poll to ask more than 2,000 American and 1,000 British adults over 18 how they feel about the possibility of using COVID-19 digital vaccine cards, should they become required for participating in activities like traveling, attending sporting events, in-person school participation, entering a store or government building, etc. Our initial goal was to understand more deeply what both groups’ hopes and fears are when it comes to using smartphone applications to get on with normal life. While we learned a lot about individuals’ attitudes, we also gleaned a few insights that organizations attempting to understand the new digital normal should consider. The Exploding Attack Surface The survey revealed that almost all adults in the US (93%) and the UK (89%) have smartphones capable of supporting digital vaccination cards, ranging across almost all popular operating systems. While this is great news for anyone who supports the use of digital health verification solutions, it also serves as a warning. With almost all adults in these populations so interconnected, the likely overlap of their private and business digital lives presents threat actors with a large attack surface for compromising both users and their employers. Organizations that want to leverage the digital future should be happy to hear about how easy it is to reach consumers and connect employees. They also need to prepare to mitigate the associated increased threat this presents. Nearly Everyone Has a Smartphone Capable os Supporting Digital Vaccination Cards No Shortage of Fakes The number of Americans and Brits willing to adopt digital vaccine cards if they become a requiremen Ransomware Malware Hack Threat
grahamcluley.webp 2021-07-26 10:20:28 Vikings hack Instagram account of SBS News in Australia (lien direct) The Instagram account of SBS Australia - a group of free-to-air TV and radio stations down under - has been hacked by someone who clearly loves "Vikings". Hack
NakedSecurity.webp 2021-07-23 16:40:24 US court gets UK Twitter hack suspect arrested in Spain (lien direct) O, what a tangled web we weave/When first we practise to deceive! Hack
grahamcluley.webp 2021-07-22 14:46:54 British man arrested in connection with Twitter mega-hack that posted cryptocurrency scam from celebrity accounts (lien direct) Police in Spain have arrested a British man in connection with what many consider the worst hack in Twitter's history. Read more in my article on the Tripwire State of Security blog. Hack
SecurityWeek.webp 2021-07-22 11:01:02 UK Man Arrested in Spain, Charged in US With Twitter Hack (lien direct) A British man has been charged in the United States in connection with a Twitter hack last summer that compromised the accounts of prominent politicians, celebrities and technology moguls, the Justice Department said Wednesday. Hack ★★★
The_Hackers_News.webp 2021-07-22 00:34:29 Another Hacker Arrested for 2020 Twitter Hack and Massive Bitcoin Scam (lien direct) A U.K. citizen has been arrested in the Spanish town of Estepona over his alleged involvement in the July 2020 hack of Twitter, resulting in the compromise of 130 high-profile accounts. Joseph O'Connor, 22, has been charged with intentionally accessing a computer without authorization and obtaining information from a protected computer, as well as for making extortive communications. The Spanish Hack
bleepingcomputer.webp 2021-07-21 17:17:53 TikTok, Snapchat account hijacker arrested for role in Twitter hack (lien direct) A fourth suspect has been arrested today for his role in the Twitter hack last year that gave attackers access to the company's internal network exposing high-profile accounts to hijacking. [...] Hack
SecurityWeek.webp 2021-07-20 12:58:24 China Says Washington Hack Claims \'Fabricated\', Condemns US Allies (lien direct) China on Tuesday said the US had "fabricated" allegations it carried out a massive Microsoft hack, countering that Washington was the "world champion" of cyber attacks while raging at American allies for signing up to a rare joint statement of condemnation. Hack
TechRepublic.webp 2021-07-19 18:36:49 US and allies finger China in Microsoft Exchange hack (lien direct) The US has also blamed hackers working with China for ransomware attacks, extortion, crypto-jacking and other cybercrimes. Ransomware Hack
ZDNet.webp 2021-07-19 14:47:00 (Déjà vu) UK and White House blame China for Microsoft Exchange Server hack (lien direct) Updated: The UK government says the country is responsible for "systematic cyber sabotage." Hack ★★
ZDNet.webp 2021-07-19 11:18:49 UK blames China for Microsoft Exchange Server hack (lien direct) The government says the country is responsible for "systematic cyber sabotage." Hack
The_Hackers_News.webp 2021-07-19 03:38:11 Turns Out That Low-Risk iOS Wi-Fi Naming Bug Can Hack iPhones Remotely (lien direct) The Wi-Fi network name bug that was found to completely disable an iPhone's networking functionality had remote code execution capabilities and was silently fixed by Apple earlier this year, according to new research. The denial-of-service vulnerability, which came to light last month, stemmed from the way iOS handled string formats associated with the SSID input, triggering a crash on any Hack
The_Hackers_News.webp 2021-07-16 04:13:36 Israeli Firm Helped Governments Target Journalists, Activists with 0-Days and Spyware (lien direct) Two of the zero-day Windows flaws patched by Microsoft as part of its Patch Tuesday update earlier this week were weaponized by an Israel-based company called Candiru in a series of "precision attacks" to hack more than 100 journalists, academics, activists, and political dissidents globally. The spyware vendor was also formally identified as the commercial surveillance company that Google's Hack
SecurityWeek.webp 2021-07-15 12:22:43 Tulsa Says Network Hack Gained Some Social Security Numbers (lien direct) Hackers gained access to the Social Security numbers of more than two dozen people during a ransomware attack that forced the city of Tulsa to shut down parts of its computer network for months, officials said. Hack
SecurityWeek.webp 2021-07-13 11:10:03 Critical Vulnerability Can Be Exploited to Hack Schneider Electric\'s Modicon PLCs (lien direct) A vulnerability affecting some of Schneider Electric's Modicon programmable logic controllers (PLCs) can be exploited to bypass authentication mechanisms, allowing attackers to take complete control of the targeted device. Hack Vulnerability
ComputerWeekly.webp 2021-07-13 05:45:00 Dutch prosecutor ordered to give evidence on EncroChat hack (lien direct) Pas de details / No more details Hack
bleepingcomputer.webp 2021-07-10 12:10:15 (Déjà vu) Microsoft removes Windows 11 hack to enable Windows 10 Start Menu (lien direct)  Microsoft removed a registry hack in the latest preview build that allowed Windows 11 users to revert to the "Classic" Windows 10 Start Menu. [...] Hack
bleepingcomputer.webp 2021-07-10 12:10:15 Microsoft removes Window 11 hack to enable Windows 10 Start Menu (lien direct)  Microsoft removed a registry hack in the latest preview build that allowed Windows 11 users to revert to the "Classic" Windows 10 Start Menu. [...] Hack
SecurityWeek.webp 2021-07-09 03:53:15 Morgan Stanley Hit by Accellion Hack Through Third-Party Vendor (lien direct) Investment banking firm Morgan Stanley has informed the New Hampshire Attorney General that personal information of some customers was compromised through a third-party vendor that was using the Accellion FTA service. Hack
SecurityAffairs.webp 2021-07-08 22:58:05 Multiple Sage X3 vulnerabilities expose systems to hack (lien direct) Rapid7 researchers discovered security vulnerabilities in the Sage X3 ERP product that could allow to take control of vulnerable systems. Researchers from Rapid7 discovered a total of four security vulnerabilities in the Sage X3 enterprise resource planning (ERP) solution. Chaining two of the vulnerabilities discovered by the expert, an attacker could execute malicious commands and take control of vulnerable […] Hack
SecurityAffairs.webp 2021-07-08 19:30:40 Morgan Stanley discloses data breach after the hack of a third-party vendor (lien direct) The American multinational investment bank and financial services firm Morgan Stanley discloses a data breach caused by the hack of an Accellion FTA server of a third-party vendor. Investment banking firm Morgan Stanley has disclosed a data breach after threat actors have compromised the Accellion FTA server of the third-party vendor Guidehouse. The company has offices in more than […] Data Breach Hack Threat
Blog.webp 2021-07-08 11:20:37 ROUNDTABLE: Kaseya hack exacerbates worrisome supply-chain, ransomware exposures (lien direct) It was bound to happen: a supply-chain compromise, ala SolarWinds, has been combined with a ransomware assault, akin to Colonial Pipeline, with devasting implications. Related: The targeting of supply chains Last Friday, July 2, in a matter of a few … (more…) Ransomware Hack
bleepingcomputer.webp 2021-07-08 09:19:53 Morgan Stanley reports data breach after vendor Accellion hack (lien direct) Investment banking firm Morgan Stanley has reported a data breach after attackers stole personal information belonging to its customers by hacking into the Accellion FTA server of a third party vendor. [...] Data Breach Hack
SecurityWeek.webp 2021-07-07 11:24:04 Researchers Reproduce Exploit Used in Kaseya Hack (lien direct) Kaseya CEO Downplays Impact of Cyberattack Researchers have successfully reproduced the exploit used in the recent cyberattack targeting IT management software maker Kaseya and its customers. Hack
CyberSkills.webp 2021-07-01 00:00:00 Cyber ​​Security Academy
Cyber Security Academy
(lien direct)
Empowering the Younger Generation against Cyber Crime In June 2021, Cyber Skills and Cyber Ireland collaborated, to bring 97 secondary school students from across Ireland together to participate in an online Cyber Security Academy. The academy, which ran over 4 days, was a mixture of theory, practice, challenges, and prizes that gave the 16-18 year old\'s an opportunity to demonstrate their new skills in a fun way. As part of the academy students learnt Linux, networking, security, cryptography, and ethical hacking skills.   The academy also featured high profile guest speakers from the Garda National Crime Bureau, Security Professionals, and Industry sponsors such as Huawei.  In preparation for the academy, each student was sent out a \'cyber pack\' including a Hack5 Rubber Ducky USB device, providing the learners with real world ethical hacking skills as part of the program of activities. On the final day of the academy, learners participated in a Capture-the-Flag (CTF) event organised by Zero Days, to further encourage young people to pursue a career in cyber-security. The students divided into teams, displaying the skills they learnt as part of the academy and highlighting how a real world hack can be prevented by what they now know. The prizes for the CTF were sponsored by CMS Distribution, comprising of 4 escooters, 4 microphones and 4 Lenovo earbuds.  Cyber security has been at the forefront of many people\'s minds given the recent and high-profile attack on the HSE. Recent research carried out by Cyber Ireland has also shown that there is a skills shortage in the cyber security sector, with many organisations struggling to fill roles. There is a need to attract students to the industry as they consider their career choices.  Emer O\'Neill Director Security Response Center, VMware said that “Living in aninterconnected world it is critically important that we build skills to tackle cybercrime and strengthen the security of our digital lives”. The Cyber Security Academy is a collaborative project funded by SFI Discover programme and jointly led by Ireland\'s National Cyber Security Cluster, Cyber Ireland, and the Higher Education Authority (HEA) funded initiative, Cyber Skills. Industry sponsors, CMS Distribution, Fidelity Investments, Qualcomm, VMWare, Zurich, and Huawei also supported the academy.  We\'re already preparing for next year\'s Cyber Academy as the Science Foundation Ireland Programme Call deadline is the 1st of July for 2022 projects. We plan to build on this year\'s programme (and the learnings) to expand it to other regions, partners and target groups (girls, neuro-diverse people and disadvantaged schools). We\'ll be in touch next week with further information and an ask for a letter of support if you are interested in contributing to the Cyber Academy in 2022.  
Empowering the Younger Generation against Cyber Crime In June 2021, Cyber Skills and Cyber Ireland collaborated, to bring 97 secondary school students from across Ireland together to participate in an online Cyber Security Academy. The academy, which ran over 4 days, was a mixture of theory, practice, challenges, and prizes that gave the 16-18 year old\'s an opportunity to demonstrate their new skills in a fun way. As part of the academy students learnt Linux, networking, security, cryptography, and ethical hacking skills.   The academy also featured high profile guest speakers from the Garda National Crime Bureau, Security Professionals, and Industry sponsors such as Huawei.  In preparation for the academy, each student was sent out a \'cyber pack\' including a Hack5 Rubber Ducky USB device, providing the learners with real world ethical hacking skills as part of the program of activities. On the final day of the academy, learners participated in a Capture-the-Flag (CTF) event organised by Zero Days, to further encourage young people to pursue a career in cyber-security. The students divided
Hack ★★★
Blog.webp 2021-06-30 11:40:04 GUEST ESSAY: Why online supply chains remain at risk - and what companies can do about it (lien direct) The Solarwinds hack has brought vendor supply chain attacks — and the lack of readiness from enterprises to tackle such attacks — to the forefront. Related: Equipping Security Operations Centers (SOCs) for the long haul Enterprises have long operated in … (more…) Hack
Veracode.webp 2021-06-29 11:30:29 Speed or Security? Don\'t Compromise (lien direct) “Speed is the new currency of business.” Chairman and CEO of Salesforce Marc R. Benioff's words are especially potent today as many organizations small and large look for ways to speed up production during their shifts to digital.     In software development, speed is a critical factor. Everything from shifting priorities to manual processes and siloed teams can seriously impede deployment schedules. One of the biggest obstacles, however, is a lack of security throughout every step of the production process to ensure that coding mistakes and flaws are found and fixed before they turn into project-derailing problems.  A lack of an efficient and flexible AppSec program becomes an issue when you look at the data: Cyberattacks occur every 39 seconds. 60 percent of developers are releasing code 2x faster than before. 76 percent of applications have least at least one security flaw on first scan. 85 percent of orgs admit to releasing vulnerable code to production because of time restraints. A mere 15 percent of orgs say that all of their development teams participate in formal security training. But there's good news, too. We know from our annual State of Software Security report that frequent scanning with the right tools in the right parts of your software development lifecycle can help your team close security findings much faster. For example, scanning via API alone cuts remediation time for 50 percent of flaws by six days, slamming that window of opportunity shut for cyberattackers. ​ The Veracode Static Analysis family helps you do just that. It plugs into critical parts of your software development lifecycle (SDLC), providing automated feedback right in your IDE and pipeline so that your developers can improve the quality of their code while they work. You can also run a full policy scan before deployment to understand what your developers need to focus on and to prove compliance. Together, these scans throughout My Code, Our Code, and Production Code boost quality and security to reduce the risk of an expensive and time-consuming breach down the road. Automation and developer education In addition to having the right scans in the right places, there are supporting steps you can take to ensure the quality of your code without sacrificing speed. Automation through integrations is an important piece of the puzzle because it speeds everything up and boosts efficiency. The automated feedback from Veracode Static Analysis means your team of developers has clear insight into existing flaws so they can begin prioritization to eliminate the biggest risks first. Automation also sets the standard for consistency which, as you go, improves speed. Developer education also helps close gaps in information and communication with security counterparts so that they can work towards a common goal. It goes both ways – if the security leaders at your organization can walk the walk and talk the talk of the developer, everyone will have an easier time communicating goals and solving security problems. One way to close those gaps is through hands-on developer education with a tool like Veracode Security Labs. The platform utilizes real applications in contained environments that developers can hack or patch in real-time so that they learn to think like an attacker and stay one step ahead. Like Static Analysis, Security Labs helps meet compliance needs too, with customized education in the languages your developers use most. The prioritization conundrum Security debt can feel like a horror movie villain as it lingers in the background. But it isn't always teeming with high-risk flaws that should be tackled first, and so it's important to carefully consider how to approach prioritization. A recent analyst report, Building an Enterprise DevSecOps Program, found that everything can feel like a priority: “During our research many security pros told us that all vulnerabilities started looking like high priorities, and it was incredibly difficult to differentiate a vulnerability with impact on the organization from one which Hack Tool Vulnerability Guideline
Blog.webp 2021-06-28 18:10:20 SHARED INTEL: Microsoft discloses how the Nobelium hacking ring engages in routine phishing (lien direct) Microsoft has blunted the ongoing activities of the Nobelium hacking collective, giving us yet another glimpse of the unceasing barrage of hack attempts business networks must withstand on a daily basis. Related: Reaction to Biden ‘s cybersecurity executive order Nobelium … (more…) Malware Hack Threat ★★★★★
SecurityAffairs.webp 2021-06-27 11:25:36 Security Affairs newsletter Round 320 (lien direct) A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for you in your email box. If you want to also receive for free the international press subscribe here. Norway blames China-linked APT31 for 2018 government hack Poland: The leader of the PiS party blames Russia for […] Hack Guideline APT 31
TroyHunt.webp 2021-06-25 19:52:13 (Déjà vu) NFC flaws let researchers hack an ATM by waving a phone (lien direct) Flaws in card-reader technology can wreak havoc with point-of-sale systems and more. Hack
SecurityAffairs.webp 2021-06-25 12:55:40 Flaws in FortiWeb WAF expose Fortinet devices to remote hack (lien direct) Fortinet has recently fixed a high-severity vulnerability affecting its FortiWeb web application firewall (WAF) that can be exploited by remote attackers to execute arbitrary commands. Fortinet has recently addressed a high-severity vulnerability (CVE-2021-22123) affecting its FortiWeb web application firewall (WAF), a remote, authenticated attacker can exploit it to execute arbitrary commands via the SAML server […] Hack Vulnerability
WiredThreatLevel.webp 2021-06-24 18:32:09 NFC Flaws Let Researchers Hack ATMs by Waving a Phone (lien direct) Flaws in card reader technology let a security firm consultant wreak havoc with point-of-sale systems and more. Hack
Last update at: 2024-06-26 09:07:38
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter