Skip to main content

Spring4Shell: Spring Flaws Lead to Confusion, Concerns of New Log4Shell-Like Threat

New Modem Wiper Malware May be Connected to Viasat Hack | Hackers Got User Data From Meta With Forged Request
  Your SecurityWeek Briefing Webcasts
RSS Feed
03.31.22


Thursday, March 31, 2022


Free Cloud Threat Hunting Assessment

Accelerate Threat Detection Across Your Cloud

Lacework will help you find all vulnerabilities across your cloud and container environments — instances that other vulnerability scanning tools miss.

Get Started



The Importance of Open Source to an XDR Architecture
XDR architecture must be broad and deep so that organizations can get the most value out of their existing best-of-breed security solutions, including their free, open-source tools.
Read the Full Column
by Marc Solomon


The Need for Resilient Zero Trust
Cyber resilience is the only way to guarantee true Zero Trust. When implemented properly, resilient Zero Trust becomes a preventive measure that counteracts human error, malicious actions, and decayed, insecure software.
Read the Full Column
by Torsten George


Six Ways to Expand Your Fraud Program
While attackers and fraudsters are continually adapting and evolving, there are some measures that businesses can take to improve their fraud programs
Read the Full Column
by Joshua Goldfarb





The Elusive Goal of Network Security
No matter how far you stray from having a perfect system — or how close you come to attaining one — the pursuit is always an essential and worthwhile investment of your time.
Read the Full Column
by Marie Hattar



Achieving Positive Outcomes With Multi-Domain Cyber and Open Source Intelligence
Many think open source intelligence is just another name for better googling. They are wrong. Good open source and threat intelligence are derived from three core capabilities.
Read the Full Column
by Landon Winkelvoss



A Sheep in Wolf's Clothing: Technology Alone is a Security Facade
Vendor agnostic technology, married with actionable, globally-sourced, and continually evolving intelligence, augmented by humans, is needed to defend our enterprises.
Read the Full Column
by Keith Ibarguen




Free Cloud Threat Hunting Assessment

Accelerate Threat Detection Across Your Cloud

Lacework will help you find all vulnerabilities across your cloud and container environments — instances that other vulnerability scanning tools miss.

Get Started




See All Recent Articles at SecurityWeek.Com

Free Cloud Threat Hunting Assessment

Spring4Shell: Spring Flaws Lead to Confusion, Concerns of New Log4Shell-Like Threat: The disclosure of several vulnerabilities affecting the widely used Spring Java framework has led to confusion and concerns that organizations may need to deal with a flaw similar to the notorious Log4Shell. Read More

New Modem Wiper Malware May be Connected to Viasat Hack: A malicious software command that immediately crippled tens of thousands of modems across Europe anchored the cyberattack on the Viasat satellite network used by Ukraine's government and military. Read More

Satellite Modems Nexus of Worst Cyberattack of Ukraine Wars: A malicious software command that immediately crippled tens of thousands of modems across Europe anchored the cyberattack on the Viasat satellite network used by Ukraine's government and military. Read More

Hackers Got User Data From Meta With Forged Request: Facebook gave user information to hackers who pretended to be law enforcement officials last year, a company source said, highlighting the risks of a measure used in urgent cases. Read More

Security Vendors Assessing Impact of OpenSSL Flaw: Cybersecurity, cloud, storage and other vendors are assessing the impact of a recent OpenSSL vulnerability on their products and services. Read More

IT Giant Globant Confirms Source Code Repository Breach: Globant confirmed that some of its source code repositories have been breached after Lapsus$ leaked code allegedly belonging to the company. Read More

Security Startup Wing Emerges From Stealth With $26M: A provider of end-to-end SaaS security, Wing has raised $26 million from GGV Capital, Harmony Partners, S-Capital, Silicon Valley CISO Investments Group, and various security leaders. Read More

FBI Warns of Phishing Attacks Targeting US Election Officials: US election officials in at least nine states have been targeted in credential-harvesting phishing campaigns. Read More

VIDEO: Fireside Chat With McDonald's CISO Shaun Marion: McDonald's CISO Shaun Marion joins SecurityWeek's Ryan Naraine to discuss the role of the modern CISO, the challenges of building a mature risk management program and more. Watch Instantly

Chrome Browser Gets Major Security Update: Google ships a security-themed Chrome browser makeover with patches 28 documented vulnerabilities, some serious enough to lead to code execution attacks. Read More

US Government Warns of Attacks Targeting UPS Devices: CISA says that removing internet access to the management interface of UPS devices prevents attacks. Read More

Cyera Emerges From Stealth Mode With $60M to Protect Cloud Data: Cloud data security startup Cyera emerged from stealth mode with $60 million in funding to help companies find and protect data stored in various cloud environments. Read More

Investors Bet on Cyberpion in Attack Surface Management Space: Attack surface management specialists Cyberpion has secured $27 million in early-stage funding to build technology that helps organizations manage exposure to risk. Read More

Remote 'Brokenwire' Hack Prevents Charging of Electric Vehicles: Researchers have identified a new attack method, dubbed Brokenwire, that can be used to remotely interrupt the charging of electric vehicles. Read More

Free Cloud Threat Hunting Assessment





To help make sure the SecurityWeek Briefing reaches you, please add news@securityweek.com to your address book.

© 2022 Wired Business Media



Comments

Popular posts from this blog

{White Paper} Legacy Codebase Risk - Addressing Open Source Tech Debt In Your Software Supply Chain

Tech Debt Best Practices: Minimizing opportunity cost & security risk - Get the White Paper You received this resource as part of your SecurityWeek subscription or because you have attended a Webcast or downloaded a White paper from SecurityWeek in the past. This email is strictly controlled and distributed by SecurityWeek and your email address has not been shared with any third party. Tech Debt Best Practices: Minimizing Opportunity Cost & Security Risk - Get the White Paper SecurityWeek Subscriber, Legacy codebases are one of today's biggest software supply chain risks. Nearly 80% of codebases are never updated, and 91% of organizations have faced supply chain attacks exploiting open source vulnerabilities. We're hoping you weren't one of them! The flexibility of developing with open source provides unmatched innovation, but with that has come the implicit cost of accumulating tech...

Chinese Hackers Have Been Probing DNS Networks Globally for Years: Report

Island Raises $175M as Enterprise Browser Startups Defy Tech Giants Tuesday, April 30 , 2024 LATEST CYBERSECURITY HEADLINES Island Secures $175M Investment as Enterprise Browser Startups Defy Tech Giants Why Using Microsoft Copilot Could Amplify Existing Data Quality and Privacy Issues Chinese Hackers Have Been Probing DNS Networks Globally for Years: Report Finnish Hacker Gets Prison for Accessing Thousands of Psychotherapy Records and Demanding Ransoms FCC Fines Wireless Carriers for Sharing User Locations Without Consent SafeBase Scores $33M Series B Investment Vulnerability in R Programming Language Could Fuel Supply Chain Attacks Docker Hub Users Targeted With Imageless, Malicious Repositories Critical Vulnerabilities in Judge0 Lead to Sandbox Escape, Host Takeover CISA Rolls Out New Guidelines to Mitigate AI Risks to US Critical Infrastructure Apptega Raises $15 Million for Cybersecurity ...

ICS Cybersecurity Conference: Save $600 and register by April 30th

Registration & CFP Now Open for ICSCC25 – Don't Miss the ICS Pioneer Rate! Registration and CFP are Open! Buy your ticket by 4/30 and Save $600 Greetings! We’re excited to announce that registration and the Call for Presentations (CFP) are officially open for SecurityWeek's 2025 ICS Cybersecurity Conference. We’re returning to the beautiful InterContinental Atlanta from  October 27–30, 2025 , for another unforgettable week of expert insights, hands-on learning, and valuable connections with peers and innovators in the industrial cybersecurity space. Purchase your ticket by April 30th to get the ICS Pioneer Rate of $1795 -- a savings of $600 on a full conference pass. (GOV rate of $1595) Are you ready to share your expertise, lessons learned, or groundbreaking research with the community? The Call for Presentations (CFP) is open and we’re accepting proposals fo...