Week in Review: The Secret of Application Security, New Issue of (IN)SECURE Magazine

Here’s a look at some of the most interesting news, articles and interviews from the past week:

Publication of issue 71 of (IN)SECURE magazine
(IN)SECURE Magazine is a free digital security publication covering some of the hottest topics in information security. Issue 71 came out today. It’s a free download, no registration required.

Financially Motivated Threat Actors Ready to Pursue Russian Targets
As Ukrainian organizations are hit by yet another data-erasing malware, financially motivated threat actors are choosing sides and some of them are expressing their willingness to target Russian targets.

Veeam fixes critical RCEs in the backup solution (CVE-2022-26500, CVE-2022-26501)
Veeam Software has patched two critical vulnerabilities (CVE-2022-26500, CVE-2022-26501) affecting its popular Veeam Backup & Replication solution, which could be exploited by unauthenticated attackers to remotely execute malicious code.

Trickbot uses compromised MikroTik routers as C2 communication proxies
MikroTik routers are compromised to act as communication proxies for Trickbot malware, to allow Trickbot-affected devices to communicate with their C2 server in a way that standard network defense systems won’t detect, researchers have found. from Microsoft.

Conti’s Initial Access Broker TTPs
Automation could be the way to go for many things, but a recent report from Google’s Threat Analytics Group (TAG) shows why targeted phishing campaigns run by human operators often succeed, and how the Conti ransomware gang excels at targeting organizations with the help of an early access broker.

Women in cybersecurity: where are they?
In this interview with Help Net Security, Bronwyn Boyle, CISO at Mambu, talks about women in cybersecurity, what hurdles they face in their careers, and how far the industry has come in terms of inclusion and diversity.

Attackers Use Default Credentials to Target Enterprises, Top Raspberry Pi and Linux Targets
Findings from a Bulletproof report highlight the problem of poor security hygiene, as automated attacks remain a high security threat to enterprises. Research collected throughout 2021 has shown that 70% of total web activity is currently bot traffic.

The massive impact of vulnerabilities in critical infrastructure
In this interview with Help Net Security, Safe Security Board Member Michael Johnson talks about the importance of critical infrastructure security, why critical infrastructure attacks are of particular concern, and what can be done to thwart these threats.

Main threats to the financial sector
According to a report by F-Secure, the potential financial, operational and reputational impact of ransomware makes it the number one threat facing financial services organizations.

Why a Modern Vulnerability Management Strategy Requires Cutting-Edge Solutions
In this interview with Help Net Security, Stephen Carter, CEO of Nucleus Security, explains the importance of having a vulnerability management strategy within an organization, what are the biggest challenges and what needs to be done to overcome them.

Malicious Web Application Requests Soar, Malicious Actors Stealthier Than Ever
Radware has published the findings of a report which highlights that 2021 will be the year of the attack on web applications. Between 2020 and 2021, the number of malicious web application requests increased by 88%, more than double the year-over-year growth rate of distributed denial-of-service (DDoS) attacks, which increased 37% compared to 2020.

How to contain a privileged access violation and ensure it doesn’t happen again
When attackers pull off a privileged access violation, they have a beachhead in your network. Whether it’s software or poorly protected users, threat actors have a consistent playbook: establish a foothold on a vulnerable system, elevate privileges, then compromise other privileged users to access or hold for ransom what has value.

How quickly can organizations react to a cybersecurity crisis?
Immersive Labs has launched an analysis of human cyber capabilities. The report analyzed cybersecurity knowledge, skills and judgment from more than half a million exercises and simulations conducted by more than 2,100 organizations over the past 18 months.

Build trust in a zero-trust environment
A recent study by MITER and DTEX found that despite years of industry efforts against insider threats, there is not enough data – or sufficiently advanced systems – to detect all malicious behavior.

The importance of integrating security during software development
Checkmarx has published the UK findings of its report which found that 45% of organizations suffered at least two security breaches as a direct result of a vulnerable application.

The simple secret to application security? Time
The problem with being a security consultant is that people are always looking to you for the “secret” to building a secure digital whole. And by “secret” they usually mean “shortcut”.

Medical Technology Cybersecurity Contract Language Model Released
Medical technology companies and healthcare delivery organizations have a new model for agreeing cybersecurity contractual terms to reduce the cost, complexity and time of the procurement process and improve security patients.

Are you ready to take a calculated risk? Quantify your cyber risk and predict future threats
We can all agree that cyberattacks are inevitable. The next step for cybersecurity professionals is to reach consensus on how best to prepare for the unknown threats looming on the horizon.

Poor data sanitization practices put public sector data at risk
Research launched by Blancco Technology Group reveals current practices and policies for sanitizing devices in the public sector.

Biden legitimizes cryptocurrency with regulatory exploration
For a time, cryptocurrency was seen as a fringe currency – a libertarian way of investing that challenged the traditional framework of brokers, dealing desks and advisers.

Top Automotive Technology Barriers: Cybersecurity, Software Quality and Functional Safety
Molex announced the results of a global survey that examines the pace of innovation accelerating the development of next-generation vehicle architectures and driving experiences.

How to build a security tool that sells
In my experience as a CISO in the industry, as well as my current role as CISO in Residence at YL Ventures, a cybersecurity-focused early-stage venture capital firm, I have been fortunate to provide founders with tips and ideas. in clients’ decision-making process and help them match unique solutions to real-world problems.

Will vacancies create security vacuums?
Automation can shorten the mean time to respond (MTTR) when it comes to detecting and responding to attacks, but there’s still no substitute for humans in the kill chain.

Top Data Governance Challenges and Strategies for High-Growth Startups
Hyper-growth startups face a unique set of challenges when it comes to secure data access. Their priority is to drive rapid innovation, expand their customer base and increase their revenue.

How to Plan for the Increased Security Risks Resulting from the Great Resignation
The Great Resignation is sweeping the world, and the causes and impacts are still being analyzed.

Why EDR is not enough to protect your organization
Endpoint detection and response (EDR) tools are the cornerstone of most cybersecurity defenses today. But while technology has an important role to play in threat investigations, too many organizations have made the mistake of relying on EDR as the first line of defense against security breaches.

70% of financial service providers implement API security
Financial service providers, such as banks and credit card companies, use a large amount of APIs, making them an attractive target for threat actors.

On-Demand Webinar: Demystifying Zero Trust to Protect Connected Assets in OT
Over the past few years, zero trust has become a commonly used phrase among security professionals. While we may understand that a zero-trust framework or architecture should be implemented as part of network or cybersecurity measures, what does this actually mean for operational technology?

Walk around on the client side: the importance of front-end JavaScript security assessments
As e-skimming, Magecart, and other types of front-end attacks increase in frequency and severity, organizations must find ways to protect web applications and front-end websites (i.e. side customer).

New infosec products of the week: March 18, 2022
Here’s a look at the hottest products from the past week, with releases from Actiphy, Ciphertex Data Security, Contrast Security, Deepfence, Ostrich Cyber-Risk, PKI Solutions, Progress and Swissbit.

About Donald J. Beadle

Check Also

New Profile Pic app: Does Russia collect personal data from Facebook users?

It’s a new internet craze that turns your Facebook profile picture into a painting or …