"The Hidden Challenges of Contractor Identity Management"

"The Hidden Challenges of Contractor Identity Management"

Contractors present a significant Identity and Access Management (IAM) vulnerability. Although these third parties are necessary for business operations, they still pose a threat. As suggested by discussions with security leaders, contractors are often left unaccounted for in security strategies. Outsourcing to contractors has become a critical component of business growth, from offshore customer support to software development.

Submitted by grigby1 CPVI on

"UTSA Establishes New Hub to Improve Management of Digital Assets"

"UTSA Establishes New Hub to Improve Management of Digital Assets"

The National Science Foundation (NSF) has awarded the University of Texas at San Antonio (UTSA) a two-year grant to establish the National DigiFoundry (NDF). This consortium could redefine the management of digital assets such as cryptocurrencies. Current digital asset management systems present a number of cybersecurity challenges. They are vulnerable to decentralized notification attacks, multi-call transaction audits, and more. The NDF is building a robust framework capable of adapting to the fast-paced digital asset market.

Submitted by grigby1 CPVI on

"Backup Migration WordPress Plugin Flaw Impacts 90,000 Sites"

"Backup Migration WordPress Plugin Flaw Impacts 90,000 Sites"

Security researchers at Wordfence are warning users of a popular WordPress plugin that they need to patch urgently or risk their site being remotely hijacked.  The researchers revealed a new PHP code injection vulnerability with a CVSS score of 9.8, which could enable remote code execution (CVE-2023-6553).  The impacted plugin, Backup Migration, is said to have an estimated 90,000 installs.  The researchers noted that unauthenticated threat actors could exploit the bug to inject arbitrary PHP code, resulting in a full site compromise.

Submitted by Adam Ekwall on

"NSA Issues Recommendations to Protect Software Defined Networking Controllers"

"NSA Issues Recommendations to Protect Software Defined Networking Controllers"

The National Security Agency (NSA) has released a Cybersecurity Information Sheet (CSI) titled "Managing Risk from Software Defined Networking Controllers." The CSI makes recommendations to help National Security Systems (NSS), Department of Defense (DoD), and Defense Industrial Base (DIB) network administrators mitigate the risks related to software driven network management solutions such as Software Defined Networking Controllers (SDNCs). SDNCs enable organizations to configure networking and security policies, as well as control application access, from a centralized location.

Submitted by grigby1 CPVI on

"Ukraine’s Largest Telecom Operator Shut Down After Cyberattack"

"Ukraine’s Largest Telecom Operator Shut Down After Cyberattack"

Kyivstar, Ukraine's largest telecommunications operator, was recently targeted by a major cyberattack, leaving millions of people without cell service or Internet access. Following customer complaints about network and Internet outages, Kyivstar later reported on Facebook that it was the victim of a "powerful" cyberattack that resulted in a "large-scale technical failure." The attack on Kyivstar also impacted the operations of PrivatBank, Ukraine's largest state-owned bank.

Submitted by grigby1 CPVI on

"Researchers Grapple With Bringing Quantum Security to the Cloud"

"Researchers Grapple With Bringing Quantum Security to the Cloud"

Researchers in China have proposed and demonstrated a new protocol for cloud-computing-based information storage that combines quantum-level security with improved data-storage efficiency. According to the researchers, their work, which combines existing techniques known as Quantum Key Distribution (QKD) and Shamir's Secret Sharing (SSS), could protect sensitive data in the cloud, such as patients' genetic information. However, some independent experts are skeptical that it represents a real advancement in information security.

Submitted by grigby1 CPVI on

"Google Patches Chromecast Vulnerabilities Exploited at Hacking Contest"

"Google Patches Chromecast Vulnerabilities Exploited at Hacking Contest"

Google recently announced patches for several high and moderate-severity Chromecast vulnerabilities that were exploited earlier this year at a hacking competition. Google stated that the latest update for its streaming device addresses a total of three vulnerabilities affecting AMLogic chips, specifically the U-Boot subcomponent, and one issue in KeyChain, specifically in the System component. The vulnerabilities were presented in July at the HardPwn USA 2023 hardware hacking competition that took place alongside the Hardwear.io conference in California.

 

Submitted by Adam Ekwall on

"Apple Ships iOS 17.2 With Urgent Security Patches"

"Apple Ships iOS 17.2 With Urgent Security Patches"

Apple recently rolled out security-themed iOS and iPadOS refreshes to address multiple serious vulnerabilities that expose mobile users to malicious hacker attacks.  According to Apple, the newest iOS 17.2 and iPadOS 17.2 contains fixes for at least 11 documented security defects, some serious enough to lead to arbitrary code execution or app sandbox escapes.  In an advisory from Cupertino’s security response team, it was noted that the most serious issue is a memory corruption in ImageIO that may lead to arbitrary code execution when certain images are processed.

Submitted by Adam Ekwall on

"CISA Seeks Public Comment on Newly Developed Secure Configuration Baselines for Google Workspace"

"CISA Seeks Public Comment on Newly Developed Secure Configuration Baselines for Google Workspace"

The Cybersecurity and Infrastructure Security Agency (CISA) is releasing the Secure Cloud Business Applications (SCuBA) project's Google Workspace (GWS) secure configuration baselines and its new assessment tool, ScubaGoggles. These materials, developed in collaboration with Google, are designed to help federal agencies secure GWS environments and leverage native security capabilities to improve an organization's overall cyber posture.

Submitted by grigby1 CPVI on

"Sandman Cyberespionage Group Linked to China"

"Sandman Cyberespionage Group Linked to China"

According to a new study conducted by researchers at SentinelOne, Microsoft, and PwC, the recently outed advanced persistent threat (APT) actor Sandman appears linked to China.  Sandman mainly targets telecom providers in the Middle East, Europe, and South Asia, likely for cyberespionage purposes.  The researchers were able to draw links between the observed Sandman APT attacks and the activity of STORM-0866/Red Dev 40, a suspected China-based threat actor known to be using the KeyPlug backdoor.

Submitted by Adam Ekwall on
Subscribe to