ProxyShell flaws being actively exploited
According to the Cybersecurity and Infrastructure Security Agency (CISA), malicious cyber actors are actively exploiting the following ProxyShell vulnerabilities: CVE-2021-3447, CVE-2021-3452, and CVE-2021-3120. An attacker exploiting these vulnerabilities could execute arbitrary code on a vulnerable machine.
Hackers targeting outdated versions of Linux in the cloud
New research Linux Threat Report 2021 1H from Trend Micro found Linux operating systems are being targeted – with nearly 13 million detections from the first half of 2021 – as organizations increase their digital footprint in the cloud and the pervasive threats that make up the Linux threat landscape.
80% of global businesses expect a breach of customer records in the next year
According to a new survey, 80% of global organizations report they will experience a data breach that impacts customer data in the next 12 months.
Average time to fix severe vulnerabilities is 256 days
In this month’s AppSec Stats Flash, the “Management of Companies and Enterprises” sector continued its run to become the most vulnerable sector.
5 minutes with Doug Dooley – Full-stack application attacks
Doug Dooley, Chief Operating Officer at Data Theorem, discusses full-stack application attacks and why organizations are vulnerable to these types of security breaches.
5 minutes with Nick McKenzie – The state of cybersecurity in financial services
Bugcrowd’s Chief Information & Security Officer Nick McKenzie discusses the top cybersecurity challenges facing financial institutions.
17.2m request-per-second DDoS attack successfully thwarted
Recently, Cloudflare detected and mitigated a 17.2 million request-per-second (rps) DDoS attack, an attack almost three times larger than previously ever reported.
Zero-day vulnerability affects Cisco small business routers
A vulnerability in the Universal Plug-and-Play (UPnP) service of Cisco Small Business Routers could allow an unauthenticated, remote attacker to execute arbitrary code or cause an affected device to restart unexpectedly, resulting in a denial of service (DoS) condition.
Why traditional SIEM is dead
Does traditional security information and event management (SIEM) still offer the robust protection it did back in the ’00s? Despite its reputation as a data security essential, traditional SIEM dashboards are leaving companies across the globe unknowingly vulnerable.
Attackers help victims pay their ransoms, even offer tips to prevent future attack
Every organization must prepare for a ransomware attack. The question is how best to do it. Surprisingly, we can turn to an unlikely source for advice on avoiding a ransomware attack – the criminals themselves.