Aggregator
Lynx
9 months 3 weeks ago
cohenido
《存量线上系统安全漏洞管理:从渗透测试到全面收敛》|总第286周
9 months 3 weeks ago
本期周报简介:对于存量线上系统,每年采用外部渗透测试,但漏洞问题依旧频发。为降低漏洞风险,如何在下次采购时要求服务商建立标准渗透步骤并助力我们构建自动化渗透工具?怎样确保新发现高危漏洞是由于应用版本升级导致,而非服务商有意分批释放漏洞?
《存量线上系统安全漏洞管理:从渗透测试到全面收敛》|总第286周
9 months 3 weeks ago
本期周报简介:对于存量线上系统,每年采用外部渗透测试,但漏洞问题依旧频发。为降低漏洞风险,如何在下次采购时要求服务商建立标准渗透步骤并助力我们构建自动化渗透工具?怎样确保新发现高危漏洞是由于应用版本升级导致,而非服务商有意分批释放漏洞?
Threat Attack Daily - 24th of April 2025
9 months 3 weeks ago
Threat Attack Daily - 24th of April 2025
Dark Web Informer - Cyber Threat Intelligence
Ransomware Attack Update for the 24th of April 2025
9 months 3 weeks ago
Ransomware Attack Update for the 24th of April 2025
Dark Web Informer - Cyber Threat Intelligence
Interlock
9 months 3 weeks ago
cohenido
[Virtual Event] Anatomy of a Data Breach: And what to do if it happens to you
9 months 3 weeks ago
SDL 61/100问:如何在隔离环境中修复大量的Java漏洞?
9 months 3 weeks ago
由于环境有限制,可以尝试从四方面入手:
1、梳理漏洞修复范围:自研代码的漏洞,还是Java项目中使用到的开源组件的漏洞?前者在代码中直接修复即可,后者需要依赖第三方;
2、明确漏洞修复标准:根据要求明确必须修复的漏洞类型,比如按照风险等级、对外有传播poc的漏洞等区分,可根据实际情况分级修复;
3、漏洞修复常见方法:使用或搭建内部的Maven等仓库,将最新或安全的版本下载到本地仓库,Java项目通过内部第三方仓库进行修复;
4、内部搭建仓库的建议:这是长期的解决之道,亦是从源头管控的方法。不过入库前需进行安检,并常态化做预警及体检。
更多内容,可以访问:
1、SDL 100问
SDL100问:我与SDL的故事
SAST误报太高,如何解决?
SDL需要哪些人参与?
SDL是否适合互联网公司?
如何计算安全评审的覆盖率?
研发安全管理用哪些工具?
ATT&CK与SDL能否混搭使用?
SDL 60/100问:软件安全领域有哪些成熟度模型?
2、SDL创新实践
首发!“ 研发安全运营 ” 架构研究与实践
DevSecOps实施关键:研发安全团队
DevSecOps实施关键:研发安全流程
DevSecOps实施关键:研发安全规范
从安全视角,看研发安全
数字化转型下的研发安全痛点
3、SDL最初实践
【SDL最初实践】开篇
【SDL最初实践】安全培训
【SDL最初实践】安全需求
【SDL最初实践】安全设计
【SDL最初实践】安全开发
【SDL最初实践】安全测试
【SDL最初实践】安全审核
【SDL最初实践】安全响应
4、软件供应链安全
软件供应商面临的攻防实战风险
软件供应商实战对抗十大安全举措
软件供应商攻防常规战之SDL
软件供应链投毒事件应急响应
浅谈企业级供应链投毒应急安全能力建设
5、安全运营实践
基于实践的安全事件简述
安全事件运营SOP:钓鱼邮件
安全事件运营SOP:网络攻击
安全事件运营SOP:蜜罐告警
安全事件运营SOP:webshell事件
安全事件运营SOP:接收漏洞事件
应急响应:redis挖矿(防御篇)
应急响应:redis挖矿(攻击篇)
应急响应:redis挖矿(完结篇)
应急能力提升:实战应急困境与突破
应急能力提升:挖矿权限维持攻击模拟
应急能力提升:内网横向移动攻击模拟
应急能力提升:实战应急响应经验
SDL 61/100问:如何在隔离环境中修复大量的Java漏洞?
9 months 3 weeks ago
由于环境有限制,可以尝试从四方面入手:
1、梳理漏洞修复范围:自研代码的漏洞,还是Java项目中使用到的开源组件的漏洞?前者在代码中直接修复即可,后者需要依赖第三方;
2、明确漏洞修复标准:根据要求明确必须修复的漏洞类型,比如按照风险等级、对外有传播poc的漏洞等区分,可根据实际情况分级修复;
3、漏洞修复常见方法:使用或搭建内部的Maven等仓库,将最新或安全的版本下载到本地仓库,Java项目通过内部第三方仓库进行修复;
4、内部搭建仓库的建议:这是长期的解决之道,亦是从源头管控的方法。不过入库前需进行安检,并常态化做预警及体检。
更多内容,可以访问:
1、SDL 100问
SDL100问:我与SDL的故事
SAST误报太高,如何解决?
SDL需要哪些人参与?
SDL是否适合互联网公司?
如何计算安全评审的覆盖率?
研发安全管理用哪些工具?
ATT&CK与SDL能否混搭使用?
SDL 60/100问:软件安全领域有哪些成熟度模型?
2、SDL创新实践
首发!“ 研发安全运营 ” 架构研究与实践
DevSecOps实施关键:研发安全团队
DevSecOps实施关键:研发安全流程
DevSecOps实施关键:研发安全规范
从安全视角,看研发安全
数字化转型下的研发安全痛点
3、SDL最初实践
【SDL最初实践】开篇
【SDL最初实践】安全培训
【SDL最初实践】安全需求
【SDL最初实践】安全设计
【SDL最初实践】安全开发
【SDL最初实践】安全测试
【SDL最初实践】安全审核
【SDL最初实践】安全响应
4、软件供应链安全
软件供应商面临的攻防实战风险
软件供应商实战对抗十大安全举措
软件供应商攻防常规战之SDL
软件供应链投毒事件应急响应
浅谈企业级供应链投毒应急安全能力建设
5、安全运营实践
基于实践的安全事件简述
安全事件运营SOP:钓鱼邮件
安全事件运营SOP:网络攻击
安全事件运营SOP:蜜罐告警
安全事件运营SOP:webshell事件
安全事件运营SOP:接收漏洞事件
应急响应:redis挖矿(防御篇)
应急响应:redis挖矿(攻击篇)
应急响应:redis挖矿(完结篇)
应急能力提升:实战应急困境与突破
应急能力提升:挖矿权限维持攻击模拟
应急能力提升:内网横向移动攻击模拟
应急能力提升:实战应急响应经验
OnDemand | Cryptographic Control in a Zero Trust World: Mastering Machine-to-Machine Trust
9 months 3 weeks ago
Yale New Haven Health Notifying 5.5 Million of March Hack
9 months 3 weeks ago
Incident Is Largest Health Data Breach Reported So Far to Feds in 2025
Yale New Haven Health System is notifying more than 5.5 million patients that their information was potentially among data stolen in a March hack. The incident, which is among several other recent major hacks, ranks is the largest health data breach reported to federal regulator so far this year.
Yale New Haven Health System is notifying more than 5.5 million patients that their information was potentially among data stolen in a March hack. The incident, which is among several other recent major hacks, ranks is the largest health data breach reported to federal regulator so far this year.
North Korean Hackers Use Russian IP Infrastructure
9 months 3 weeks ago
Void Dokkaebi Campaigns Using Russia for Cryptocurrency Theft
North Korean hackers look north toward Russia for the internet infrastructure behind the many online scams that Pyongyang has built to funnel stolen cash into the rouge nation. Void Dokkaebi hackers participate in the North Korean scam of social engineering IT job seekers.
North Korean hackers look north toward Russia for the internet infrastructure behind the many online scams that Pyongyang has built to funnel stolen cash into the rouge nation. Void Dokkaebi hackers participate in the North Korean scam of social engineering IT job seekers.
Hacks Targeting Cloud Single Sign-On Rose in 2024
9 months 3 weeks ago
Hackers Deploying Infostealers for Data and Credential Theft
Hacks targeting cloud infrastructure rose significantly last year, with attackers exploiting misconfiguration and single sign-on features to deploy infostealers for data and credential theft. Hackers target centralized cloud assets secured with single sign-ons.
Hacks targeting cloud infrastructure rose significantly last year, with attackers exploiting misconfiguration and single sign-on features to deploy infostealers for data and credential theft. Hackers target centralized cloud assets secured with single sign-ons.
Trump Wants AI in Classrooms. Where Are the Safeguards?
9 months 3 weeks ago
Experts Say White House AI Plan May Spur Innovation But Leave School Data at Risk
The White House issued an executive order Wednesday to expand the use of new artificial intelligence tools in U.S. K–12 schools, drawing expert warnings over the lack of cybersecurity safeguards to prevent data leaks or misuse by AI firms for model training.
The White House issued an executive order Wednesday to expand the use of new artificial intelligence tools in U.S. K–12 schools, drawing expert warnings over the lack of cybersecurity safeguards to prevent data leaks or misuse by AI firms for model training.
Life in the Swimlane with Nikko Warford, Regional Sales Director
9 months 3 weeks ago
The post Life in the Swimlane with Nikko Warford, Regional Sales Director appeared first on AI Security Automation.
The post Life in the Swimlane with Nikko Warford, Regional Sales Director appeared first on Security Boulevard.
Maycie Belmore
'SessionShark' ToolKit Evades Microsoft Office 365 MFA
9 months 3 weeks ago
The creators of the toolkit are advertising it as an educational and ethical resource, but what it promises to provide users if purchased indicates it's anything but.
Kristina Beek, Associate Editor, Dark Reading
'Digital Twins' Bring Simulated Security to the Real World
9 months 3 weeks ago
By simulating business environments or running software while incorporating real-time data from production systems, companies can model the impact of software updates, exploits, or disruptions.
Robert Lemos, Contributing Writer
CVE-2025-21204
9 months 3 weeks ago
Currently trending CVE - Hype Score: 1 - Improper link resolution before file access ('link following') in Windows Update Stack allows an authorized attacker to elevate privileges locally.
Max-Severity Commvault Bug Alarms Researchers
9 months 3 weeks ago
Though already patched, the vulnerability is especially problematic because of the highly privileged access it offers to business-critical systems, sensitive data, and backups for attackers.
Jai Vijayan, Contributing Writer