FreshRSS

πŸ”’
❌ Secure Planet Training Courses Updated For 2019 - Click Here
There are new available articles, click to refresh the page.
☐ β˜† βœ‡ The Hacker News

DevOps Dilemma: How Can CISOs Regain Control in the Age of Speed?

By: The Hacker News β€” May 24th 2024 at 10:35
Introduction The infamous Colonial pipeline ransomware attack (2021) and SolarWinds supply chain attack (2020) were more than data leaks; they were seismic shifts in cybersecurity. These attacks exposed a critical challenge for Chief Information Security Officers (CISOs): holding their ground while maintaining control over cloud security in the accelerating world of DevOps.
☐ β˜† βœ‡ The Hacker News

(Cyber) Risk = Probability of Occurrence x Damage

By: The Hacker News β€” May 15th 2024 at 11:38
Here’s How to Enhance Your Cyber Resilience with CVSS In late 2023, the Common Vulnerability Scoring System (CVSS) v4.0 was unveiled, succeeding the eight-year-old CVSS v3.0, with the aim to enhance vulnerability assessment for both industry and the public. This latest version introduces additional metrics like safety and automation to address criticism of lacking granularity while
☐ β˜† βœ‡ The Hacker News

Researchers Uncover 'LLMjacking' Scheme Targeting Cloud-Hosted AI Models

By: Newsroom β€” May 10th 2024 at 07:41
Cybersecurity researchers have discovered a novel attack that employs stolen cloud credentials to target cloud-hosted large language model (LLM) services with the goal of selling access to other threat actors. The attack technique has been codenamed LLMjacking by the Sysdig Threat Research Team. "Once initial access was obtained, they exfiltrated cloud credentials and gained
☐ β˜† βœ‡ The Hacker News

Iranian MuddyWater Hackers Adopt New C2 Tool 'DarkBeatC2' in Latest Campaign

By: Newsroom β€” April 12th 2024 at 09:49
The Iranian threat actor known as MuddyWater has been attributed to a new command-and-control (C2) infrastructure called DarkBeatC2, becoming the latest such tool in its arsenal after SimpleHarm, MuddyC3, PhonyC2, and MuddyC2Go. "While occasionally switching to a new remote administration tool or changing their C2 framework, MuddyWater’s methods remain constant," Deep
☐ β˜† βœ‡ The Hacker News

8,000+ Domains of Trusted Brands Hijacked for Massive Spam Operation

By: Newsroom β€” February 26th 2024 at 14:10
More than 8,000 domains and 13,000 subdomains belonging to legitimate brands and institutions have been hijacked as part of a sophisticated distribution architecture for spam proliferation and click monetization. Guardio Labs is tracking the coordinated malicious activity, which has been ongoing since at least September 2022, under the name SubdoMailing. The emails range from "counterfeit
☐ β˜† βœ‡ The Hacker News

SaaS Compliance through the NIST Cybersecurity Framework

By: The Hacker News β€” February 20th 2024 at 10:53
The US National Institute of Standards and Technology (NIST) cybersecurity framework is one of the world's most important guidelines for securing networks. It can be applied to any number of applications, including SaaS.  One of the challenges facing those tasked with securing SaaS applications is the different settings found in each application. It makes it difficult to develop a
☐ β˜† βœ‡ The Hacker News

Agent Racoon Backdoor Targets Organizations in Middle East, Africa, and U.S.

By: Newsroom β€” December 2nd 2023 at 08:29
Organizations in the Middle East, Africa, and the U.S. have been targeted by an unknown threat actor to distribute a new backdoor called Agent Racoon. "This malware family is written using the .NET framework and leverages the domain name service (DNS) protocol to create a covert channel and provide different backdoor functionalities," Palo Alto Networks Unit 42 researcher Chema Garcia 
☐ β˜† βœ‡ The Hacker News

MuddyC2Go: New C2 Framework Iranian Hackers Using Against Israel

By: Newsroom β€” November 9th 2023 at 10:50
Iranian nation-state actors have been observed using a previously undocumented command-and-control (C2) framework calledΒ MuddyC2GoΒ as part ofΒ attacks targeting Israel. "The framework's web component is written in the Go programming language," Deep Instinct security researcher Simon KeninΒ saidΒ in a technical report published Wednesday. The tool has been attributed toΒ MuddyWater, anΒ IranianΒ 
☐ β˜† βœ‡ The Hacker News

How to Interpret the 2023 MITRE ATT&CK Evaluation Results

By: The Hacker News β€” September 22nd 2023 at 10:50
Thorough, independent tests are a vital resource for analyzing provider’s capabilities to guard against increasingly sophisticated threats to their organization. And perhaps no assessment is more widely trusted than the annualΒ MITRE Engenuity ATT&CK Evaluation.Β  This testing is critical for evaluating vendors because it’s virtually impossible to evaluate cybersecurity vendors based on their own
☐ β˜† βœ‡ The Hacker News

Identity Threat Detection and Response: Rips in Your Identity Fabric

By: The Hacker News β€” August 14th 2023 at 11:13
Why SaaS Security Is a Challenge In today's digital landscape, organizations are increasingly relying on Software-as-a-Service (SaaS) applications to drive their operations. However, this widespread adoption has also opened the doors to new security risks and vulnerabilities. The SaaS security attack surface continues to widen. It started with managing misconfigurations and now requires a
☐ β˜† βœ‡ The Hacker News

How to Apply MITRE ATT&CK to Your Organization

By: The Hacker News β€” July 11th 2023 at 11:15
Discover all the ways MITRE ATT&CK can help you defend your organization. Build your security strategy and policies by making the most of this important framework. What is the MITRE ATT&CK Framework? MITRE ATT&CK (Adversarial Tactics, Techniques, and Common Knowledge) is a widely adopted framework and knowledge base that outlines and categorizes theΒ tactics, techniques, and procedures (TTPs)
☐ β˜† βœ‡ The Hacker News

3 Challenges in Building a Continuous Threat Exposure Management (CTEM) Program and How to Beat Them

By: The Hacker News β€” May 29th 2023 at 11:47
If you're a cybersecurity professional, you're likely familiar with the sea of acronyms our industry is obsessed with. From CNAPP, to CWPP, to CIEM and all of the myriad others, there seems to be a new initialism born each day. In this article, we'll look at another trending acronym – CTEM, which stands for Continuous Threat Exposure Management – and the often-surprising challenges that come
❌