Week in Review: Cisco Hacked, Kali Linux 2022.3 Released, Black Hat USA 2022

Here’s a look at some of the most interesting news, articles, interviews and videos from the past week:

Black Hat USA 2022 Cover
Check out our microsite for related news, photos, product launches and more.

Understanding your attack surface is key to recognizing what you are defending
In this interview with Help Net Security, Marc Castejon, CEO of Silent Breach, discusses what organizations should be concerned about right now and which technologies they should be focusing on in the near future.

The Challenges of Managing the Modern External Attack Surface
In this interview for Help Net Security, Kunal Modasiya, VP of Product Management at Qualys, explains how the new component, integrated into CyberSecurity Asset Management 2.0, adds the external attacker’s view to identify Internet assets up to then unknown for a complete and accurate picture. enterprise attack surface.

Microsoft patches exploited zero-day in Windows Support Diagnostic Tool (CVE-2022-34713)
The August 2022 Patch Tuesday has arrived, with fixes for a surprisingly large number of vulnerabilities in various Microsoft products, including two zero days: one actively exploited (CVE-2022-34713) and one not yet (CVE-2022-30134). ).

Twilio confirms data breach after its employees were phished
Cloud communications company Twilio said some of its employees were phished and attackers used the stolen credentials to access some internal company systems and customer data.

Kali Linux 2022.3 Released: Test Lab Packages, New Tools, and a Community Discord Server
Offensive Security has released Kali Linux 2022.3, the latest version of its popular penetration testing and digital forensics platform.

Cisco was hacked by a ransomware gang
US networking giant Cisco Systems has been hacked, the company confirmed on Wednesday, after ransomware operators Yanluowang claimed responsibility for the attack on their leak site.

Identity is the context that kills: 4 ways to stay in control
In an age where people work in cafes, sheds, bedrooms, and anywhere else they can get some peace and an internet connection, identity is often hailed as the new perimeter. In fact, it is context that represents today’s perimeter, with identity providing the killer context.

Three ransomware gangs consecutively attacked the same network
Hive, LockBit and BlackCat, three prominent ransomware gangs, attacked the same network consecutively, according to Sophos.

Why SAP systems need to be brought into the cybersecurity fold
SAP systems are very attractive targets for threat actors because they store very valuable information such as personal data, financial data, and business-critical intellectual properties.

What Black Hat USA 2022 attendees are concerned about
Black Hat has released its survey of supply chain and cloud security risks. The report highlights important findings from more than 180 senior cybersecurity professionals who raised concerns about attacks on cloud services, ransomware, and growing risks to the global supply chain.

Could criminalizing ransomware payments put an end to the current crime wave?
In this Help Net Security video, Charl van der Walt, Head of Security Research at Orange Cyberdefense, discusses whether criminalizing ransomware payments could stifle the current crime wave by cutting off the flow of funds that motivates cybercriminals.

What malware delivery techniques are currently favored by attackers?
A wave of cybercriminals spreading families of malware – including QakBot, IceID, Emotet and RedLine Stealer – are turning to shortcut files (LNK) for delivering malware via email.

AWSGoat: Easy-to-deploy vulnerable AWS infrastructure for pentesters
In this Help Net Security video, Jeswin Mathai, Lead Architect, Lab Platform at INE, introduces AWSGoat, a vulnerable-by-design framework outlining the top 10 OWASP web application security risks and other misconfigurations based on services such as IAM, S3, API Gateway, Lambda, EC2 and ECS.

Dissecting Google’s Titan M Chip: The Challenges of Vulnerability Research
In this Help Net Security video, Damiano Melotti, Security Researcher at Quarkslab, talks about the vulnerability research challenges encountered while exploring Google’s Titan M chip.

Data privacy regulations are one of the top three challenges for IoT adopters
Security fears have become less of a concern for organizations adopting IoT solutions than they were five years ago, according to a recent study by Wi-SUN Alliance, a global association made up of members from leading companies. that drive the adoption of interoperable wireless solutions for use in smart cities, smart utilities, IoT and industrial IoT (IIoT) applications.

Responding to Real-World Threats: What Are Organizations Doing Wrong?
In this video interview with Help Net Security, Stephanie Aceves, Senior Director of Threat Response, Product Management at Tanium, explains what companies are doing wrong when it comes to threat response.

36% of organizations expose insecure FTP to the Internet, and some still use Telnet
A significant percentage of organizations expose insecure or highly sensitive protocols, including SMB, SSH and Telnet, to the public internet, the ExtraHop Benchmarking Cyber ​​Risk and Readiness report showed.

Implement zero trust for a secure hybrid work enterprise
In this Help Net Security video, Kevin Peterson, Cybersecurity Strategist at Xalient, provides an overview of the early days of zero trust, illustrates where we are today, and offers tips for implementing zero trust for a security business. secure hybrid work.

LogoKit Update: Phishing Kit Exploiting Open Redirect Vulnerabilities
Resecurity identified threat actors by exploiting open redirect vulnerabilities in online services and applications to bypass spam filters to ultimately deliver phishing content.

How Bad Actors Use Interplanetary File Systems (IPFS)
In this Help Net Security video, Karl Sigler, Senior Security Research Manager at Trustwave, explains how IPFS’ decentralized P2P network makes it the perfect breeding ground for hackers to transfer and store data, even if the server or network is stopped, the data remains accessible.

Malicious PyPI packages remove fileless ransomware and malware
In this Help Net Security video, Ax Sharma, Senior Security Researcher at Sonatype, discusses recently found PyPI packages that contain ransomware, and another package that appears to be safe but silently removes fileless malware to mine crypto -currency (Monero) on the infected system – all while evading detection.

5 Key Things We Learned From the Small Business CISO Survey
As business begins to return to normal (as “normal” as it may seem), CISOs of small and medium-sized businesses (500-10,000 employees) were asked to share their cybersecurity challenges and priorities , and their responses were compared to the results with those of a similar survey from 2021.

New infosec products of the week: August 12, 2022
Here’s a look at some of the hottest products from the past week, with releases from Concentric, Cymulate, Deepfence, Halo Security, NetRise, SimSpace, and Traceable AI.

Comments are closed.