Tenable Cloud Security의 조사에 의하면 설문 조사에 응답한 조직의 무려 95%에서 지난 18개월 동안 클라우드 관련 침해를 겪음
Tenable 2024년 클라우드 보안 전망 조사에서 발견한 사항은 능동적이고 견고한 클라우드 보안이 필요하다는 분명한 신호가 됩니다. Read on to learn more about the study’s findings, including the main challenges cloud security teams face, their strategies for better protecting their cloud infrastruc...
패러다임의 전환: 사이버 보험 산업이 예방적 보안에 집중해야 하는 이유
As claims and losses climb, it’s clear that preventive security should be prioritized more when designing a cyber insurance policy. Here’s why preventive security investments are cost effective and can lead to lower premiums. ...
사이버 보안 스냅샷: New Guide Explains How To Assess if Software Is Secure by Design, While NIST Publishes GenAI Risk Framework
Is the software your company wants to buy securely designed? A new guide outlines how you can find out. Meanwhile, a new NIST framework can help you assess your GenAI systems’ risks. Plus, a survey shows a big disconnect between AI usage (high) and AI governance (low). And MITRE’s breach post-mortem...
CVE-2024-21793, CVE-2024-26026: F5 BIG-IP Next Central Manager 취약성에 대한 개념 증명 사용 가능
Researchers disclose multiple vulnerabilities in F5 BIG-IP Next Central Manager and provide proof-of-concept exploit code, which could lead to exposure of hashed passwords....
사이버 보안 스냅샷: Attackers Pounce on Unpatched Vulns, DBIR Says, as Critical Infrastructure Orgs Benefit from CISA’s Alert Program
Verizon’s DBIR found that hackers are having a field day exploiting vulnerabilities to gain initial access. Plus, a CISA program is helping critical infrastructure organizations prevent ransomware attacks. In addition, check out what Tenable’s got planned for RSA Conference 2024. And get the latest ...
As Pro-Russia Hacktivists Target OT Systems, Here’s What You Need To Know
U.S. and international cybersecurity and law enforcement agencies this week issued a joint fact sheet to highlight and safeguard against the continued malicious cyber activity conducted by pro-Russia hacktivists against operational technology (OT) devices in North America and Europe. Read on to get ...
AI Security Solutions: Do You Really Need Another Security Product?
Cybersecurity leaders face a conundrum — more tools and alerts with less available talent to manage them — that is only intensifying with the proliferation of GenAI. Here’s what you need to know....
Tenable Bolsters Its Cloud Security Arsenal with Malware Detection
Tenable Cloud Security is enhancing its capabilities with malware detection. Combined with its cutting-edge, agentless vulnerability-scanning technology, including its ability to detect anomalous behavior, this new capability makes Tenable Cloud Security a much more complete and effective solution. ...
사이버 보안 스냅샷: 최신 MITRE ATT&CK 업데이트에서는 GenAI, ID, Cloud 및 CI/CD의 보안에 대한 통찰을 제공
Check out what’s new in Version 15 of the MITRE ATT&CK knowledge base of adversary tactics, techniques and procedures. Plus, learn the latest details about the Change Healthcare breach, including the massive scope of the data exfiltration. In addition, why AI cyberthreats aren’t impacting CISOs’ bud...
CVE-2024-20353, CVE-2024-20359: ArcaneDoor에 대해 자주 묻는 질문
Frequently asked questions about CVE-2024-20353 and CVE-2024-20359, two vulnerabilities associated with “ArcaneDoor,” the espionage-related campaign targeting Cisco Adaptive Security Appliances....
CVE-2024-4040: CrushFTP VFS(가상 파일 시스템 Sandbox Escape 취약성 악용
A zero-day vulnerability in CrushFTP was exploited in the wild against multiple U.S. entities prior to fixed versions becoming available as the vendor recommends customers upgrade as soon as possible....
국방성에 운영 기술: 보안과 효율성이 높은 전력망 보장
In an evolving threat landscape, the DoD must make sure that its mission-critical operations don’t experience power outages....