"Organizations Patch CISA KEV List Bugs 3.5 Times Faster Than Others, Researchers Find"

"Organizations Patch CISA KEV List Bugs 3.5 Times Faster Than Others, Researchers Find"

Researchers at the cybersecurity scanning company Bitsight found that the US Cybersecurity and Infrastructure Security Agency's (CISA) Known Exploited Vulnerabilities (KEV) catalog benefits organizations inside and outside the federal government. For nearly three years, CISA has maintained its KEV catalog, which has become the go-to repository for bugs actively being exploited by hackers. Bitsight experts asked if organizations fix KEVs faster than non-KEV catalog vulnerabilities. The median time to patch KEV catalog vulnerabilities is 3.5 times faster than non-KEV bugs.

Submitted by Gregory Rigby on

"93% of Security Leaders Have Increased SaaS Security Budgets"

"93% of Security Leaders Have Increased SaaS Security Budgets"

According to Valence Security's "2024 State of SaaS Security Report," 58 percent of organizations have had a Software-as-a-Service (SaaS) security incident in the last 18 months. Therefore, 96 percent of security leaders now prioritize SaaS security, and 93 percent have increased SaaS security budgets in 2024. Eighty-four percent expressed confidence in current SaaS security programs or processes. The recent Microsoft "Midnight Blizzard" breach and Cloudflare breach, following the Okta attack campaign, show that SaaS is now a top target for malicious actors.

Submitted by Gregory Rigby on

"Three-Quarters of CISOs Admit App Security Incidents"

"Three-Quarters of CISOs Admit App Security Incidents"

According to security researchers at Dynatrace, three-quarters (72%) of global CISOs have experienced an application security incident in the past two years, causing lost revenue and market share. The researchers polled 1300 CISOs and a handful of CEOs and CFOs to compile their latest report, "The State of Application Security in 2024." The researchers found that app security incidents, in many cases, led to lost revenue (47%), regulatory fines (36%), and lost market share (28%).

Submitted by Adam Ekwall on

Pub Crawl - May 2024

Pub Crawl - May 2024

Selections by dgoff

Pub Crawl summarizes sets of publications that have been peer-reviewed and presented at Science of Security (SoS) conferences or referenced in current work. The topics are chosen for their usefulness for current researchers. Select the topic name to view the corresponding list of publications. Submissions and suggestions are welcome.

Submitted by Gregory Rigby on

"CISA Urges Software Devs to Weed out Path Traversal Vulnerabilities"

"CISA Urges Software Devs to Weed out Path Traversal Vulnerabilities"

The US Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) call on software companies to review for and fix path traversal security vulnerabilities before shipping. Path traversal vulnerabilities allow attackers to create or overwrite critical files used to execute code or evade authentication. Threat actors can use such security flaws to access sensitive data like credentials to brute-force accounts and breach targeted systems.

Submitted by Gregory Rigby on

"Police Shuts Down 12 Fraud Call Centers, Arrests 21 Suspects"

"Police Shuts Down 12 Fraud Call Centers, Arrests 21 Suspects"

Law enforcement recently shut down 12 phone fraud call centers in Albania, Bosnia and Herzegovina, Kosovo, and Lebanon, behind thousands of scam calls daily. Dozens of German law enforcement officers, aided by hundreds of counterparts from other countries (i.e., Albania, Bosnia and Herzegovina, Kosovo, and Lebanon), carried out numerous raids on April 18, identifying 39 suspects and arresting 21 individuals. Law enforcement said it also confiscated evidence, including data carriers, documents, cash, and other assets, valued at roughly €1 million.

Submitted by Adam Ekwall on

"NSA Highlights Mitigations against North Korean Actor Email Policy Exploitation"

"NSA Highlights Mitigations against North Korean Actor Email Policy Exploitation"

The National Security Agency (NSA), together with the Federal Bureau of Investigation (FBI) and the US Department of State, released a Cybersecurity Advisory (CSA) titled "North Korean Actors Exploit Weak DMARC Security Policies to Mask Spearphishing Efforts" to help protect against Democratic People's Republic of Korea (DPRK, also known as North Korea) techniques that enable emails to appear to be from legitimate journalists, academics, or other East Asian affairs experts.

Submitted by Gregory Rigby on

"Android Flaw Affected Apps With 4 Billion Installs"

"Android Flaw Affected Apps With 4 Billion Installs"

Microsoft researchers found a vulnerability pattern dubbed "Dirty Stream" in popular Android apps, putting billions of users at risk. The vulnerability pattern, linked to path traversal, allows a malicious app to manipulate files in the vulnerable app's home directory. This vulnerability affects several Google Play Store apps with over four billion installations. Microsoft has emphasized the importance of industry collaboration in addressing evolving threats and urged developers to check their apps for similar vulnerabilities.

Submitted by Gregory Rigby on

"New 'Goldoon' Botnet Targets D-Link Routers With Decade-Old Flaw"

"New 'Goldoon' Botnet Targets D-Link Routers With Decade-Old Flaw"

A new botnet called "Goldoon" targets D-Link routers by exploiting a nearly decade-old critical security flaw to launch more attacks. The vulnerability, tracked as CVE-2015-2051 with a CVSS score of 9.8, impacts D-Link DIR-645 routers and enables remote attackers to execute arbitrary commands via specially crafted HTTP requests. According to Fortinet FortiGuard Labs researchers, attackers can gain complete control of a compromised device, extract system information, communicate with a Command-and-Control (C2) server, and more.

Submitted by Gregory Rigby on

"Microsoft Graph API Emerges as a Top Attacker Tool to Plot Data Theft"

"Microsoft Graph API Emerges as a Top Attacker Tool to Plot Data Theft"

There has been a rise in the use of native Microsoft services by nation-state espionage actors for their Command-and-Control (C2) needs. In recent years, several unrelated groups have realized that using Microsoft's services against their targets is cheaper and more effective than building and maintaining their own infrastructure. Besides saving money and hassle by not having to build and maintain their own infrastructure, using legitimate services lets attackers blend in with legitimate network traffic.

Submitted by Gregory Rigby on
Subscribe to