Technology can help you orchestrate a strong and defensible data breach response process CISOMAG These days, it’s not a matter of if, but when an organization experiences some kind...
Month: October 2021
thehackernews – Experts Warn of Unprotected Prometheus Endpoints Exposing Sensitive Information
The Hacjer News A large-scale unauthenticated scraping of publicly available and non-secured endpoints from older versions of Prometheus event monitoring and alerting solution could be leveraged...
cisomag – Web Application Risks You Are Likely to Face
CISOMAG Web application risks can increase the chances of cyberattacks if ignored. Learn of the common web app risks to improve your organization’s web app security...
nakedsecurity – Cybersecurity awareness month: Fight the phish!
NAKED SECURITY It’s the second week of Cybersecurity Awareness Month 2021, and this week’s theme is an alliterative reminder: Fight the Phish! Unfortunately, anti-phishing advice often seems to...
threatpost – Mandating a Zero-Trust Approach for Software Supply Chains
THREATPOST Sounil Yu, CISO at JupiterOne, discusses software bills of materials (SBOMs) and the need for a shift in thinking about securing software supply chains. In...
securityaffairs – Prometheus endpoint unprotected installs could expose sensitive data
Security Affairs Experts discovered several unprotected installs of open source event monitoring solution Prometheus that may expose sensitive data. JFrog researchers have discovered multiple unprotected instances...
cisomag – Market Trends Report: Cloud Forensics in Today’s World
CISOMAG The EC-Council Cyber Research report inferred that there are many challenges associated with multi-tenancy, unknown data location, and hybrid cloud deployment plague cloud forensics as...
thehackernews – CISA Issues Warning On Cyber Threats Targeting Water and Wastewater Systems
The Hacker News The U.S. Cybersecurity Infrastructure and Security Agency (CISA) on Thursday warned of continued ransomware attacks aimed at disrupting water and wastewater facilities (WWS),...
theregister – Microsoft says Azure fended off what might just be the world’s biggest-ever DDoS attack
Much of the 2.4Tbit/sec came from across Asia and targeted a single Euro-customer The Register Microsoft claims its Azure cloud has fended off the largest DDOS...
thehackernews – Windows 10, Linux, iOS, Chrome and Many Others at Hacked Tianfu Cup 2021
Windows 10, iOS 15, Google Chrome, Apple Safari, Microsoft Exchange Server, and Ubuntu 20 were successfully broken into using original, never-before-seen exploits at the Tianfu Cup...
theregister – Ad-blocking browser extension actually adds ads, say Imperva researchers
Oi, Google: how did this get past your review process? And Imperva: why does your web page offer to install software? Security vendor Imperva’s research labs...
cisomag – OpenSea NFT Marketplace Bug Allows Hackers to Steal Crypto Wallets
Critical security vulnerabilities on OpenSea’s platform allows hackers to hijack user accounts and steal entire crypto wallets by sending malicious NFTs. Over the past few weeks,...
nakedsecurity – LANtenna hack spies on your data from across the room! (Sort of)
If you’re a Naked Security Podcast listener (and if you aren’t, please give it a try and subscribe if you like it!), you may remember a humorous remark about ‘sideband’ attacks and...
theregister – WhatsApp’s got your back(ups) with encryption for stored messages
Global messaging giant extends security and privacy to Google Drive and Apple iCloud Facebook’s WhatsApp on Thursday began a global rollout of end-to-end (E2E) encryption for...
CISO2CISO NOTEPAD SERIES – PCI DSS V3 MIND MAP FOR CISOs
PCI DSS v3 AMANHANDIKAR.COM URLs PCI DSS Standard https://www.pcisecuritystandards.org/documents/PCI_DSS_v3.pdf PCI Council https://www.pcisecuritystandards.org/ PCI Compliance Guide http://www.pcicomplianceguide.org/ Focus on PCI http://www.focusonpci.com/ Practical Threat Analysis http://www.ptatechnologies.com PCI DSS...
CISO2CISO NOTEPAD SERIES – PENTESTING MIND MAP FOR CISOs
PENETRATION TESTING MIND MAP by amanhardikar.com Following table gives the URLs of all the vulnerable web applications, operating system installations, old software and war games [hacking]...