Aggregator
Build durable applications on Cloudflare Workers: you write the Workflows, we take care of the rest
Ransomware's Ripple Effect Felt Across ERs As Patient Care Suffers
How To Protect Your Cloud Environments and Prevent Data Breaches
As organizations create and store more data in the cloud, security teams must ensure the data is protected from cyberthreats. Learn more about what causes data breaches and about the best practices you can adopt to secure data stored in the cloud.
With the explosion of data being generated and stored in the cloud, hackers are creating new and innovative attack techniques to gain access to cloud environments and steal data. A review of recent major data breaches shows us that data thieves are using social engineering, hunting for exposed credentials, looking for unpatched vulnerabilities and misconfigurations and employing other sophisticated techniques to breach cloud environments.
A look at recent cloud data-breach trendsHere are some takeaways from major data breaches that have occurred this year:
- Managing the risk from your third-parties – partners, service providers, vendors – has always been critical. It’s even more so when these trusted organizations have access to your cloud environment and cloud data. You must make sure that your third-parties are using proper cloud-security protections to safeguard their access to your cloud data and to your cloud environment.
- Secure your identities. We’ve seen major data breaches this year tracked down to simple missteps like failing to protect highly-privileged admin accounts and services with multi-factor authentication (MFA).
- Adopt best practices to prevent ransomware attacks, and to mitigate them if you get hit by one. Ransomware gangs know that a surefire way to pressure victims into paying ransoms is to hijack their systems and threaten to expose their sensitive data.
- Implement a "zero trust" security framework that requires all users, whether inside or outside the organization, to be authenticated, authorized and continuously validated before being granted or maintaining access to data. This framework should allow only time-limited access and be based on the principle of least privilege, which limits access and usage to the minimum amount of data required to perform the job.
- Use a cloud data security posture management (DSPM) solution to enforce the security framework through continuous monitoring, automation, prioritization and visibility. DSPM solutions can help organizations identify and prioritize data security risks based on their severity, allowing them to focus their resources on the most critical issues.
- Regularly conduct risk assessments to detect and remediate security risks before they can be exploited by hackers. This can help prevent data breaches and minimize the impact of any security incidents that do occur.
- Train employees on security best practices, including how to create strong passwords, how to identify risks and how to report suspicious activity.
By following these recommendations, organizations can significantly reduce their risk of a data breach and improve handling sensitive data belonging to their organization. As more and more data moves to the cloud and hackers become more sophisticated, it's essential to prioritize security and take proactive measures to protect against data risks.
Learn more- Webinar: Know Your Exposure: Is Your Cloud Data Secure in the Age of AI?
- Data Sheet: Data Security Posture Management (DSPM) Integrated into Tenable Cloud Security
- Data Sheet: Securing AI Resources and Data in the Cloud with Tenable Cloud Security
- Infographic: When CNAPP Met DSPM
- Video: Demo Video: Data Security Posture Management and AI Security Posture Management
Fake IT Workers: How HYPR Stopped a Fraudulent Hire
Since 2022, the FBI and other agencies have been sounding the alarm about North Koreans posing as US or other non-North Korean based IT workers and infiltrating companies. In July, security firm KnowBe4 publicly revealed that they unknowingly hired a fake IT worker from North Korea. Fortunately they detected and blocked access as he attempted to load malware onto his system-connected laptop. Since then, similar stories have flooded in. Last week, reports surfaced that a fake North Korean IT worker hired by an unnamed company stole proprietary data and demanded a ransom payment in order to keep the hack secret.
The post Fake IT Workers: How HYPR Stopped a Fraudulent Hire appeared first on Security Boulevard.
AWS Cloud Development Kit Vulnerability Exposes Users to Potential Account Takeover Risks
Durable Objects aren't just durable, they're fast: a 10x speedup for Cloudflare Queues
Billions and billions (of logs): scaling AI Gateway with the Cloudflare Developer Platform
Strengthening Critical Infrastructure Defense: Shifting to an Exposure Management Mindset
A recent alert jointly issued by a myriad of governmental agencies including CISA, FBI, EPA, DOE, NSA and NCSC-UK has spotlighted activities by Russians targeting U.S. and European critical infrastructure.
The post Strengthening Critical Infrastructure Defense: Shifting to an Exposure Management Mindset appeared first on Security Boulevard.
SEC Fines Four Tech Firms for Downplaying SolarWinds Impacts
The SEC fined Unisys, Avaya, Check Point, and Mimecast millions of dollars for disclosures in the wake of the high-profile SolarWinds data breach that intentionally mislead investors and downplayed the impact the supply chain attack had on them.
The post SEC Fines Four Tech Firms for Downplaying SolarWinds Impacts appeared first on Security Boulevard.
Cisco Issues Urgent Fix for ASA and FTD Software Vulnerability Under Active Attack
Лидар-сканер помог найти затерянную цивилизацию в горах Узбекистана
Perplexity 正式发布 macOS 客户端|基于 AI 的对话式搜索引擎
FortiJump: Fortinet признала 0Day в критической инфраструктуре
Читать после слепоты: новый имплантат вернул зрение пациентам
Cisco Releases Security Bundle for Cisco ASA, FMC, and FTD Software
Cisco released its October 2024 Semiannual Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication to address vulnerabilities in Cisco ASA, FMC, and FTD. A cyber threat actor could exploit some of these vulnerabilities to take control of an affected system.
CISA encourages users and administrators to review the following advisory and apply the necessary updates:
CISA, US, and International Partners Release Joint Guidance to Assist Software Manufacturers with Safe Software Deployment Processes
Today, CISA—along with U.S. and international partners—released joint guidance, Safe Software Deployment: How Software Manufacturers Can Ensure Reliability for Customers. This guide aids software manufacturers in establishing secure software deployment processes to help ensure software is reliable and safe for customers. Additionally, it offers guidance on how to deploy in an efficient manner as part of the software development lifecycle (SDLC).
A well-designed software deployment process can help guarantee customers receive new features, security, and reliability while minimizing unplanned outages.
CISA encourages software and service manufacturers review this guide, evaluate their software deployment processes, and address them through a continuous improvement program.
To learn more about secure by design principles and practices, visit CISA’s Secure by Design webpage.
CISA Adds Two Known Exploited Vulnerabilities to Catalog
CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation.
- CVE-2024-20481 Cisco ASA and FTD Denial-of-Service Vulnerability
- CVE-2024-37383 RoundCube Webmail Cross-Site Scripting (XSS) Vulnerability
These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise.
Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the Known Exploited Vulnerabilities Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information.
Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the specified criteria.
CISA Releases Four Industrial Control Systems Advisories
CISA released four Industrial Control Systems (ICS) advisories on October 24, 2024. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS.
- ICSA-24-298-01 VIMESA VHF/FM Transmitter Blue Plus
- ICSA-24-298-02 iniNet Solutions SpiderControl SCADA PC HMI Editor
- ICSA-24-298-03 Deep Sea Electronics DSE855
- ICSA-24-268-06 OMNTEC Proteus Tank Monitoring (Update A)
CISA encourages users and administrators to review newly released ICS advisories for technical details and mitigations.