Organizations reporting cyber resilience are hardly resilient: Study

Read Time:34 Second

While most organizations have a cyber resilience program in place, more than half of them lack a comprehensive approach to assessing resilience, according to a study by Immersive Labs.

The study aimed at understanding business preparedness amidst growing incidents found a strong intent to strengthen cybersecurity capabilities driven by external threats.

“Rules of engagement for cyberthreat actors are constantly innovating to cause catastrophic and unavoidable situations,” said Michael Sampson, analyst at Osterman Research and author of the survey whitepaper. “Hence while cyber resilience is a hope for most organizations, the practices of building, testing, and improving cyber resilience are still immature at most organizations.”

To read this article in full, please click here

Read More

vim-9.0.1562-1.fc37

Read Time:9 Second

FEDORA-2023-99d2eaac80

Packages in this update:

vim-9.0.1562-1.fc37

Update description:

The newest upstream commit

Security fixes for CVE-2023-2426, CVE-2023-2609, CVE-2023-2610

Read More

Aviatrix is transforming cloud network security with distributed firewalling

Read Time:37 Second

Cloud networking solutions provider Aviatrix has launched a distributed cloud firewall offering in a bid to strengthen network security for application traffic on multicloud environments.

The offering is targeted at distributing both inspection and policy enforcement into the original path of application traffic, eliminating the need to redirect traffic to centralized firewalls or other network security services.

“Aviatrix is the first to deliver a distributed cloud firewall,” said Rod Stuhlmuller, vice president of solutions marketing at Aviatrix. “Customers are no longer constrained by last-generation firewall architectures in the cloud. This changes the game and allows enterprises to both reduce cloud infrastructure costs and improve security immediately across all their public cloud environments.”

To read this article in full, please click here

Read More

Russian national indicted for ransomware attacks against the US

Read Time:35 Second

Russian national, Mikhail Pavlovich Matveev, has been charged and indicted for launching ransomware attacks against thousands of victims in the country and across the world, the US Department of Justice (DoJ) said in a press release.

The Department of State has also announced an award of up to $10 million for information that leads to the arrest and/or conviction of the Russian national.

“According to the indictment obtained in the District of New Jersey, from at least as early as 2020, Mikhail Pavlovich Matveev, aka Wazawaka, aka m1x, aka Boriselcin, aka Uhodiransomwar, allegedly participated in conspiracies to deploy three ransomware variants,” DOJ said in a statement.

To read this article in full, please click here

Read More

CVE-2022-45450

Read Time:10 Second

Sensitive information disclosure and manipulation due to improper authorization. The following products are affected: Acronis Agent (Linux, macOS, Windows) before build 28610, Acronis Cyber Protect 15 (Linux, macOS, Windows) before build 30984.

Read More

CVE-2022-4418

Read Time:7 Second

Local privilege escalation due to unrestricted loading of unsigned libraries. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 40208.

Read More

USN-6088-1: runC vulnerabilities

Read Time:26 Second

It was discovered that runC incorrectly made /sys/fs/cgroup
writable when in rootless mode. An attacker could possibly
use this issue to escalate privileges. (CVE-2023-25809)

It was discovered that runC incorrectly performed access control when
mounting /proc to non-directories. An attacker could possibly use
this issue to escalate privileges. (CVE-2023-27561)

It was discovered that runC incorrectly handled /proc and
/sys mounts inside a container. An attacker could possibly
use this issue to bypass AppArmor, and potentially SELinux.
(CVE-2023-28642)

Read More

USN-6087-1: Ruby vulnerabilities

Read Time:18 Second

It was discovered that Ruby incorrectly handled certain regular expressions.
An attacker could possibly use this issue to cause a denial of service.
(CVE-2023-28755)

It was discovered that Ruby incorrectly handled certain regular expressions.
An attacker could possily use this issue to cause a denial of service.
This issue only affected Ubuntu 16.04 ESM. (CVE-2023-28756)

Read More