New Vivaldi version integrates Mastodon into the browser sidebar
<div>Vivaldi 5.6 was released today with a Mastodon client integrated directly into the browser's sidebar, seamlessly incorporating the rising social media platform in the browser's interface. [...]</div>
Elon Musk's Twitter followers targeted in fake crypto giveaway scam
<div>Twitter accounts giving Elon Musk a follow are being targeted in a crypto giveaway scam dubbed 'Freedom Giveaway.' [...]</div>
Microsoft: November updates break ODBC database connections
<div>Microsoft is working to address a new known issue affecting apps using ODBC database connections after installing the November 2022 Patch Tuesday Windows updates. [...]</div>
CryptosLabs ‘pig butchering’ ring stole up to $505 million since 2018
<div>A previously unknown investment scam group named 'CryptosLabs' has stolen up to €480 million ($505 million) from victims in France, Belgium, and Luxembourg, since the launch of its operation in 2018. [...]</div>
Google: State hackers still exploiting Internet Explorer zero-days
<div>Google's Threat Analysis Group (TAG) revealed today that a group of North Korean hackers tracked as APT37 exploited a previously unknown Internet Explorer vulnerability (known as a zero-day) to infect South Korean targets with malware. [...]</div>
Hackers use new Fantasy data wiper in coordinated supply chain attack
<div>The Iranian Agrius APT hacking group is using a new 'Fantasy' data wiper in supply-chain attacks impacting organizations in Israel, Hong Kong, and South Africa. [...]</div>
CloudSEK claims it was hacked by another cybersecurity firm
<div>Indian cybersecurity firm CloudSEK says a threat actor gained access to its Confluence server using stolen credentials for one of its employees' Jira accounts. [...]</div>
New Zerobot malware has 21 exploits for BIG-IP, Zyxel, D-Link devices
<div>A new Go-based malware named 'Zerobot' has been spotted in mid-November using exploits for almost two dozen vulnerabilities in a variety of devices that include F5 BIG-IP, Zyxel firewalls, Totolink and D-Link routers, and Hikvision cameras. [...]</div>
Apple rolls out end-to-end encryption for iCloud backups
<div>Apple introduced today Advanced Data Protection for iCloud, a new feature that uses end-to-end encryption to protect sensitive iCloud data, including backups, photos, notes, and more. [...]</div>
CVE-2022-4261: Rapid7 Nexpose Update Validation Issue (FIXED)
On November 14, 2022, Rapid7's product engineering team discovered that the mechanism in Nexpose used to validate the source of an update file was unreliable. This failure, which involved the internal cryptographic validation of received updates, was designated as CVE-2022-4261, and is an instance of CWE-494. Rapid7's estimate of the CVSSv3.1 base rating for this vulnerability for most environments is 4.4 (Medium). This issue has been resolved in the regular December 7, 2022 release.
About Anomalous Data Transfer detection in InsightIDR
By Shivangi PandeyShivangi is a Senior Product Manager for D&R at Rapid7.Data exfiltration is an unauthorized movement or transfer of data occurring on an organization’s network. This can occur when a malicious actor gains access to a corporation’s network with the intention of stealing or leaking data.Data exfiltration can also be carried out by inside actors moving data outside of the network accidentally, by uploading corporate files to their personal cloud – or deliberately to leak infor
Invicti improves discovery service and integrations
Invicti continues to improve and expand its flagship product. The latest updates to Invicti Enterprise include improvements to the discovery service, the ServiceNow Incident Management integration, and the Jira integration.
Discovering web assets on Amazon Web Services
We have expanded our discovery capabilities to allow organizations to discover web assets running within their AWS instances.
As more and more companies move their web assets and workloads to cloud platforms such as Amazo
Move Over Verbose Error Messages, GraphQL APIs are Here
It seems like developers working on REST APIs have finally come to terms with the dangers of verbose error messages, but GraphQL developers are still learning what happens when their API schema is left unprotected.
In March 2022, CVE-2021-4191 disclosed how GitLab’s API allowed “a remote, unauthenticated attacker to recover usernames, names, and sometimes email addresses”. This was possible since the User object type was exposed without any sort of authentication.
Of course, auth-related
HPR3744: Advent of code Day 1 - 4
Advent of code:
Here are some links to the recording of my puzzle-solving:
Manual vs. SSPM: Research on What Streamlines SaaS Security Detection and Remediation
Originally published by Adaptive Shield. Written by Zehava Musahanov, Adaptive Shield. When it comes to keeping SaaS stacks secure, IT and security teams need to be able to streamline detection and remediation of misconfigurations in order to best protect their SaaS stack from threats. However, while companies adopt more and more apps, their increase in SaaS security tools and staff has lagged behind, as found in the 2022 SaaS Security Survey Report. The survey report, done in collaboration ...
Zero Trust is Key to Supply Chain Security
Originally published by CXO REvolutionaries. Written by Jeff Lund, Global CISO - Global Information Security, Marsh McLennan. When former director of the U.S. Cybersecurity and Infrastructure Security Agency (CISA) Chris Krebs spoke at Black Hat 2022, he highlighted two factors that regularly undermine organizations’ security and increase their exposure to breaches: a convoluted tech stack and an overabundance of implicit trust. As someone who’s spearheaded my own zero trust transformation, I...
Security Program Management (SPM) and Governance, Risk and Compliance (GRC): What’s the Difference?
Originally published by Blue Lava. Written by Emily Shipman, Blue Lava. Compliant but not Secure: The Differences Between Governance, Risk and Compliance (GRC) and Security Program Management (SPM) and Why it Matters Security programs bear many responsibilities, but chief among them is the duty to protect and promote the wellbeing of the businesses, consumers, and shareholders they serve. For many years, the necessity to achieve compliance has been the driving force behind security programs. ...
Report: One in four UK businesses hiring overseas to tackle talent shortage
A quarter of UK businesses have turned to hiring global tech talent in a bid to overcome domestic skills shortages, according to new research.
Overall, 27% of UK businesses have already hired candidates from overseas, or are in the process of doing so, while 63% still focus primarily on UK-wide recruitment drives.
This compares to a larger figure of 36% amongst global decision-makers, indicating that despite the UK’s continued shortage of skilled workers, businesses continue to look inward for n
Apple and AMD will both be 'major customers' of TSMC's new Arizona fabs
Apple CEO Tim Cook has revealed the company will be among the first customers at TSMC’s new US-based fabrication facilities.
The Taiwan-based company announced plans yesterday to triple its investment in US operations from an initial $12bn to $40bn and build a second production facility in Arizona.
The move marks one of the largest foreign investments in US history and has been hailed as a major milestone in bolstering domestic chip-making capabilities.
TSMC chairman Mark Liu revealed that th
Unpatched Exchange servers could be behind Rackspace's ransomware attack, according to one researcher
Rackspace's recently confirmed ransomware attack allegedly may have been facilitated by hackers exploiting the company's out-of-date Exchange clusters, according to one researcher.
The cloud computing firm confirmed the attack on 6 December had affected its hosted Microsoft Exchange environment, the fallout from which is causing service disruptions for customers.
It was suggested by security researcher Kevin Beaumont that the cyber criminals were able to launch their attack after exploiting Exch