Skip to main content

Apple Pay Hack | Facebook Open-Sources 'Mariana Trench' Tool

Optimizing Monitoring Services For Intelligence Teams | CISA Tool Assesses Insider Threat Risks
  Your SecurityWeek Briefing Webcasts
RSS Feed
09.30.21


Thursday, September 30, 2021

Hacker-Powered Security for AWS Applications
Hacker-Powered Security for AWS Applications

The latest HackerOne eBook to help protect your cloud environment.

Download Now



Optimizing Monitoring Services For Intelligence Teams
In addition to evaluating the core capabilities and range of intelligence monitoring, organizations must consider data source integrity, and perhaps most importantly, the level of expert analysis included with each service.
Read the Full Column
by Landon Winkelvoss



How to Spot an Ineffective Security Practitioner
By rooting out ineffective security practitioners, you can keep your security teams protected and engaged in a productive manner.
Read the Full Column
by Joshua Goldfarb





Working Securely From Anywhere With Zero Trust
Organizations considering ZTNA should look for these three essential components as a minimum when evaluating any solution.
Read the Full Column
by John Maddison





Providing Developers Value-Focused Feedback in Security Software Development
Far too many engineers in the trenches don't take the time to lift their heads to see context, so when good (and bad) things happen, this is a great management opportunity that you should take full advantage of.
Read the Full Column
by Keith Ibarguen



How Threat Response is Evolving
Enterprises can't rely on Endpoint Protection Platforms (EPP) or Endpoint Detection and Response (EDR) tools to detect suspicious activity on a user's system to quarantine the system or even to reimage.
Read the Full Column
by Marc Solomon



The Ongoing Reciprocal Relationship Between APTs and Cybercriminals
Despite having different infrastructure, goals and methods, threat actors do not work in a vacuum. They feed off of each other.
Read the Full Column
by Idan Aharoni




Understanding the Cryptocurrency-Ransomware Connection
How can organizations fight ransomware? The best solution is always prevention. Here are three tactics toward that goal.
Read the Full Column
by Derek Manky




Hacking the Hire: Three Ways to Recruit and Retain Cyber Talent
When it comes to ensuring cyber talent retention, establishing the right working environment is critical to keeping people engaged and motivated to stay.
Read the Full Column
by Tim Bandos




Three Ways to Keep Cloud Data Safe From Attackers
Current cloud deployments pose significant risks that could be mitigated with minor changes to infrastructure procurement and access.
Read the Full Column
by Gordon Lawson





The Impact of the Pandemic on Today's Approach to Cybersecurity
As it has become clear that remote/hybrid work is here to stay, IT security practitioners must figure out how to enable a secure and resilient anywhere workforce to minimize their future risk exposure.
Read the Full Column
by Torsten George



Measuring Cybersecurity Training Effectiveness
It's important to show the effectiveness of training initiatives. Managers want to make sure that they're getting a return on their investment and justify future training budgets requests..
Read the Full Column
by Jeff Orloff




Security for a Hybrid Workforce
We have had to accelerate into remote and now hybrid working models over the last year and a half. Now that we are getting back to work, there is still much to do as everything moves fast.
Read the Full Column
by Laurence Pitt



Hacker-Powered Security for AWS Applications
Hacker-Powered Security for AWS Applications

The latest HackerOne eBook to help protect your cloud environment.

Download Now




See All Recent Articles at SecurityWeek.Com

Security Congress 2021

Contactless Payment Card Hack Affects Apple Pay, Visa: Researchers have demonstrated how fraudsters could steal money from iPhone owners who use Apple Pay and Visa via a contactless hack. Read More

Hackers Can Exploit Apple AirTag Vulnerability to Lure Users to Malicious Sites: Hackers can exploit a stored XSS vulnerability in Apple AirTag to lure unsuspecting users to phishing and other malicious websites. Read More

Facebook Open-Sources 'Mariana Trench' Tool: Mariana Trench is an open-source tool that Facebook's security team has used internally to identify vulnerabilities in Android and Java applications. Read More

Xage Lands DOE Contract to Bring Zero Trust Principles to Emergency Responders: The Department of Energy has contracted with Xage, a zero-trust access provider, to expand its existing Xage Fabric application to provide secure and controlled access to emergency responders. Read More

Telemetry Report Shows Patch Status of High-Profile Vulnerabilities: Security researchers selected a range of high profile vulnerabilities, and used Shodan to detect instances of the vulnerabilities still extant on the internet. The results are not encouraging. Read More

GriftHorse Android Trojan Infects Over 10 Million Devices Worldwide: Running since November 2020, the mobile premium services campaign hid behind innocent-looking malicious applications. Read More

New CISA Tool Helps Organizations Assess Insider Threat Risks: By responding to a series of questions, organizations can check whether they are vulnerable to insider threats. Read More

Turkish National Charged for DDoS Attack on U.S. Company: The man, Izzet Mert Ozek, allegedly used the WireX botnet to target the hospitality company's website and prevent access to it. Read More

ImmuniWeb Launches Free Tool for Identifying Unprotected Cloud Storage: ImmuniWeb has launched a free online tool that organizations can use to identify unprotected cloud storage. Read More

Behavioral Analytics Provider ForMotiv Raises $6 Million: Real-time user behavior analysis platform ForMotiv this week announced it has raised $6 million in a third seed funding round. Read More

Akamai to Acquire Guardicore in $600M Zero Trust Tech Deal: Akamai adds new capabilities to help customers thwart ransomware attacks by blocking the spread of malware within an already-compromised enterprise. Read More

Cyberespionage Implant Delivered via Targeted Government DNS Hijacking: The newly discovered Tomiris backdoor contains technical artifacts that suggest the possibility of common authorship or shared development practices with the group that executed the SolarWinds supply chain compromise. Read More

China Intensified Attacks on Major Afghan Telecom Firm as U.S. Finalized Withdrawal: Four China-linked cyberespionage groups targeted a major Afghan telecom firm as the U.S. was finalizing its withdrawal from the country. Read More

COVID-19's Healthcare Feeding Frenzy for Cybercriminals: The vast increase in staff from all industries working from home, outside of their corporate network defenses and often on poorly protected home computers, has been a treasure trove for hackers. Read More

Google Announces Rewards for Tsunami Security Scanner Plugins: The search giant seeks to quickly extend the network scanner's vulnerability detection and web application fingerprinting capabilities. Read Feature

CISA Warns of Hikvision Camera Flaw as U.S. Aims to Rid Chinese Gear From Networks: CISA is telling organizations to patch their Hikvision cameras, just as the FCC announced taking steps toward removing Chinese equipment from U.S. networks. Read Feature

Russia Detains Head of Cybersecurity Group on Treason Charges: A Moscow court ordered the co-founder of Group-IB, one of Russia's leading cybersecurity firms, to be detained on charges of treason. Read Feature

Microsoft Details FoggyWeb Backdoor Used by SolarWinds Hackers: Microsoft has detailed FoggyWeb, a post-exploitation backdoor that the hackers behind the SolarWinds attack have used to remotely exfiltrate data from AD FS servers. Read Feature

Colossus Ransomware Hits Automotive Company in the U.S.: The cybercriminals are demanding $400,000 to be paid in exchange for the decryption key. Read Feature

FinSpy Surveillance Spyware Fitted With UEFI Bootkitk: Security researchers at Kaspersky have spotted signs of the notorious FinSpy surveillance spyware hijacking -- and replacing -- the Windows UEFI bootloader to perform stealthy infections on target machines. Read Feature

Tokenization vs. Encryption for Data Protection Compliance: Cloud-based vaultless tokenization offers many advantages over current methods of protecting data and ensuring data compliance conformance. But it is in its infancy. It offers the potential for many new possibilities in the coming years. Read Feature

QNAP Patches Critical Vulnerabilities in QVR Software: Affecting only certain QNAP EOL devices running QVR, the security flaws can be exploited remotely to run arbitrary commands. Read More

Enterprises Warned About Zix-Themed Credential Phishing Attacks: Enterprise users have been warned that cybercriminals may be trying to phish their credentials using emails that spoof security company Zix. Read More

Trend Micro Patches Critical Vulnerability in Server Protection Solution: Tracked as CVE-2021-36745 (CVSS score of 9.8), the security hole exists because input during authentication isn't properly validated. Read More

Security Congress 2021





To help make sure the SecurityWeek Briefing reaches you, please add news@securityweek.com to your address book.

© 2021 Wired Business Media



Comments

Popular posts from this blog

{White Paper} Legacy Codebase Risk - Addressing Open Source Tech Debt In Your Software Supply Chain

Tech Debt Best Practices: Minimizing opportunity cost & security risk - Get the White Paper You received this resource as part of your SecurityWeek subscription or because you have attended a Webcast or downloaded a White paper from SecurityWeek in the past. This email is strictly controlled and distributed by SecurityWeek and your email address has not been shared with any third party. Tech Debt Best Practices: Minimizing Opportunity Cost & Security Risk - Get the White Paper SecurityWeek Subscriber, Legacy codebases are one of today's biggest software supply chain risks. Nearly 80% of codebases are never updated, and 91% of organizations have faced supply chain attacks exploiting open source vulnerabilities. We're hoping you weren't one of them! The flexibility of developing with open source provides unmatched innovation, but with that has come the implicit cost of accumulating tech...

Chinese Hackers Have Been Probing DNS Networks Globally for Years: Report

Island Raises $175M as Enterprise Browser Startups Defy Tech Giants Tuesday, April 30 , 2024 LATEST CYBERSECURITY HEADLINES Island Secures $175M Investment as Enterprise Browser Startups Defy Tech Giants Why Using Microsoft Copilot Could Amplify Existing Data Quality and Privacy Issues Chinese Hackers Have Been Probing DNS Networks Globally for Years: Report Finnish Hacker Gets Prison for Accessing Thousands of Psychotherapy Records and Demanding Ransoms FCC Fines Wireless Carriers for Sharing User Locations Without Consent SafeBase Scores $33M Series B Investment Vulnerability in R Programming Language Could Fuel Supply Chain Attacks Docker Hub Users Targeted With Imageless, Malicious Repositories Critical Vulnerabilities in Judge0 Lead to Sandbox Escape, Host Takeover CISA Rolls Out New Guidelines to Mitigate AI Risks to US Critical Infrastructure Apptega Raises $15 Million for Cybersecurity ...

ICS Cybersecurity Conference: Save $600 and register by April 30th

Registration & CFP Now Open for ICSCC25 – Don't Miss the ICS Pioneer Rate! Registration and CFP are Open! Buy your ticket by 4/30 and Save $600 Greetings! We’re excited to announce that registration and the Call for Presentations (CFP) are officially open for SecurityWeek's 2025 ICS Cybersecurity Conference. We’re returning to the beautiful InterContinental Atlanta from  October 27–30, 2025 , for another unforgettable week of expert insights, hands-on learning, and valuable connections with peers and innovators in the industrial cybersecurity space. Purchase your ticket by April 30th to get the ICS Pioneer Rate of $1795 -- a savings of $600 on a full conference pass. (GOV rate of $1595) Are you ready to share your expertise, lessons learned, or groundbreaking research with the community? The Call for Presentations (CFP) is open and we’re accepting proposals fo...