Kremlin coercion and sanctions could impact Western customers
Daily Archives: March 30, 2022
4 ways attackers target humans to gain network access
Every day, I see the failure in our technology. I’m sure you see it as well. Since the day we started receiving email, we have failed at protecting recipients from scams, phishes and other email messages that they don’t want. I remember the infamous email-based computer worm, the “ILOVEYOU virus,” that infected fellow IT friends back in 2000.
Those victims should have known better than to click on an email that said ILOVEYOU, but they did and had to clean up afterwards. We hope that our antivirus or endpoint protection software alerts us to problems. In reality, it often does not. When technology fails, it’s likely because the attacker made an end run around it by targeting humans. Here are four ways they do it.
Why authentication is still the CISO’s biggest headache
Authentication remains one of the most painstaking challenges faced by CISOs in organizations large and small. This longstanding, fundamental element of security continues to cause headaches for security leaders seeking to identify and authorize users and devices often spread across different states, borders, and time zones. Meanwhile, persistent risks associated with ineffective authentication strategies and processes threaten businesses as they become more agile and remote, requiring security teams to rethink approaches to authentication in the modern landscape.
Authentication a significant obstacle for modern CISOs
Authentication continues to test CISOs for several reasons, with its modern definition being the first to address, Netskope CISO Lamont Orange tells CSO. “We use lots of terminology to describe what is meant to address the authentication and authorization methods required for devices, applications and systems, in addition to supporting security policies that govern this interaction. In the past, we have implemented authentication in very basic construct: If I need access, I must pass credential tests (login/password) for each user/service request without the use of MFA in most cases,” he says.
Why metrics are crucial to proving cybersecurity programs’ value
As solutions to managing cybersecurity threats increase, surprisingly few metrics are available on how well these methods work to secure organizational assets. The National Institute of Standards and Technology (NIST) has pioneered information security performance measurement models that can produce metrics. (Note: NIST’s work in this area is now being updated.)
Aside from government agencies’ requirements to produce information security performance measures, the measurement models NIST recommends can also be used for internal overall IT improvement efforts. Either way, NIST recommends considering four factors while developing and implementing an information security measurement program:
bijiben-stable-3520211209084351.3 darktable-stable-3520211006132303.5 evolution-stable-3520211208122809.2 firefox-stable-3520220222133031.2 geary-stable-3520211209084524.2 gimp-stable-3520211027082858.3 gnome-maps-stable-3520211208123101.2 hydrapaper-stable-3520211015150021.2 inkscape-stable-3520211112074856.3 libreoffice-stable-3520220111091453.3 quearcode-stable-3520211015120106.2 ricochet-stable-3520211015121522.2 thunderbird-stable-3520211109101458.2
FEDORA-FLATPAK-2022-79fb2d1d63
Packages in this update:
bijiben-stable-3520211209084351.3
darktable-stable-3520211006132303.5
evolution-stable-3520211208122809.2
firefox-stable-3520220222133031.2
geary-stable-3520211209084524.2
gimp-stable-3520211027082858.3
gnome-maps-stable-3520211208123101.2
hydrapaper-stable-3520211015150021.2
inkscape-stable-3520211112074856.3
libreoffice-stable-3520220111091453.3
quearcode-stable-3520211015120106.2
ricochet-stable-3520211015121522.2
thunderbird-stable-3520211109101458.2
Update description:
Fedora Flatpaks update that is fixing the current security issues.
Log4Shell Used in a Third of Malware Infections
Attackers Steal $618m From Crypto Firm
USN-5354-1: Twisted vulnerabilities
It was discovered that Twisted incorrectly filtered HTTP headers when clients
are being redirected to another origin. A remote attacker could use this issue
to obtain sensitive information. (CVE-2022-21712)
It was discovered that Twisted incorrectly processed SSH handshake data on
connection establishments. A remote attacker could use this issue to cause
Twisted to crash, resulting in a denial of service. (CVE-2022-21716)
Post Title
Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution. Google Chrome is a web browser used to access the Internet. Successful exploitation of the most severe of these vulnerabilities could allow an attacker to execute arbitrary code in the context of the browser. Depending on the privileges associated with the application, an attacker could view, change, or delete data. If this application has been configured to have fewer user rights on the system, exploitation of the most severe of these vulnerabilities could have less impact than if it was configured with administrative rights.
CVE-2020-24771
Incorrect access control in NexusPHP 1.5.beta5.20120707 allows unauthorized attackers to access published content.