Top 20 CVEs Exploited by People's Republic of China State-Sponsored Actors (AA22-279A)
CISA, the NSA and FBI issue a joint advisory detailing the top 20 vulnerabilities exploited by state-sponsored threat actors linked to the People’s Republic of China....
CVE-2022-40684: Critical Authentication Bypass in FortiOS and FortiProxy
Fortinet has patched a critical authentication bypass in its FortiOS and FortiProxy products that could lead to administrator access....
사이버 보안 스냅샷: 바로 지금 중요한 6가지 사항
Topics that are top of mind for the week ending Oct. 7 | CISA puts spotlight on asset inventory and vulnerability management | Think tank does deep dive on IoT security | What’s the current state of cybersecurity? Not great | New malware cracks monthly top 10 list | And much more!...
Public Network Access to Azure Resources Is Too Easy to Configure
For some types of Microsoft Azure resources and subnets, it’s extremely easy to configure what is essentially public network access. We describe here some examples and how to reduce such risks....
Tenable One - 위험 노출 관리 플랫폼 소개
발생 가능한 공격을 예상하고 선제적으로 노출을 줄이십시오. Communicate with your key stakeholders....
위험 노출 관리: 최신 공격 표면의 위험 감소
사이버 보안 조직은 파편화된 수많은 데이터를 생성하지만 인사이트는 거의 없는 사후대응적이고 사일로화된 보안 프로그램과 포인트 도구의 무분별한 확장으로 인해 어려움을 겪고 있습니다. Here we explain why they need an exposure management platform that provides comprehensive visibility and allows them to anticipate...
CVE-2022-41040 and CVE-2022-41082: ProxyShell Variant Exploited in the Wild
Microsoft has confirmed reports of two zero-day vulnerabilities in Microsoft Exchange Server that have been exploited in the wild. Patches are not yet available....
사이버 보안 스냅샷: 바로 지금 중요한 6가지 사항
Topics that are top of mind for the week ending Sept. 30 | Are you ready for the quantum threat? | Tips for protecting critical infrastructure from cyberattacks | How to prevent MFA fatigue attacks | “FiGHT” to secure 5G networks | And much more!...
Diving Deeply into IAM Policy Evaluation: Highlights from AWS re:Inforce IAM433
One of the most talked-about sessions at AWS re:Inforce was IAM433, which discussed AWS IAM’s internal evaluation mechanisms....
The shift to integrated cybersecurity platforms: a growing trend among CISOs
New ESG and ISSA study shows nearly half of organizations are shifting towards integrated cybersecurity platforms. Here’s why many CISOs are making the shift. Less complexity, more security. The shift to integrated cybersecurity platforms has become a growing trend among CISOs. With security t...
사이버 보안 스냅샷: 바로 지금 중요한 6가지 사항
Topics that are top of mind for the week ending Sept. 23 | A digital trust disconnect between theory and practice | Don’t ignore attack surface management | An SBOM 101 | Report finds hackers targeting small businesses | And much more!...
Five Lessons Every Cybersecurity Team Can Learn from the Uber Incident
Upon hearing of a cybersecurity incident, alleged or factual, the most productive thing to do is learn what you can from its main lessons....