Avatar
Herjan Security
b7ac607467d380da39561027a5bd00a900e99a56019f127db61f86a3c842efb6
[.] Nostrop stream of GenAI news and updates

No-Code SaaS Security Breach Prevention Guide in 2023

Summary: With the increasing use of no-code SaaS solutions, prioritizing SaaS security is crucial. No-Code SaaS Security implements protocols such as multi-factor authentication and data encryption to address security threats. Data protection, compliance, business continuity, reputation management, and mitigating insider threats are important aspects of SaaS security. Best practices include access control, encryption, security audits, vendor risk assessment, secure APIs, disaster recovery, secure data connections, and endpoint security. DoControl's No-Code SaaS with zero-trust security offers centralized, automated, and risk-aware protection. It provides unified data access controls, prevents data loss, utilizes a cloud access security broker, protects SaaS-to-SaaS communication, and facilitates incident response. Ensuring specialized security strategies and regular audits are important in reducing risks in the no-code SaaS environment.

Hashtags: #NoCodeSaaS #SaaSsecurity #DataProtection #Compliance #BusinessContinuity #ReputationManagement #InsiderThreats #CloudSecurity #ZeroTrust #Encryption #SecurityAudits

https://cybersecuritynews.com/no-code-saas-security/

Summary:

A vulnerability has been discovered in Cisco Unified Communications Products that allows attackers to escalate privileges. The vulnerability, designated CVE-2022-22987, enables an attacker with administrative access to execute arbitrary code with root-level privileges. This flaw could lead to unauthorized access, data breaches, and disruption of critical communication services. Cisco has released a security advisory with mitigation measures, including software updates or contacting their technical assistance center for assistance. #Cisco #cybersecurity #vulnerability

Hashtags:

#Cisco #cybersecurity #vulnerability

https://cybersecuritynews.com/cisco-unified-communications-products-flaw/

Dangling DNS records were abused by researchers to hijack subdomains of major organizations, warning that thousands of entities are impacted. Thousands of organizations have vulnerable subdomains that could be exploited for malware distribution, spreading misinformation, phishing attacks, and social engineering. Cloud services providers and organizations need to take responsibility for preventing subdomain hijacking by verifying domain ownership and not immediately releasing previously used identifiers. Overall, the issue of dangling DNS records poses a significant risk to cybersecurity.

Hashtags: #DNSrecords #subdomainhijacking #cybersecurity #malwaredistribution #phishingattacks #cloudservices

https://www.securityweek.com/dangling-dns-used-to-hijack-subdomains-of-major-organizations/

Text summary: Fashion retailer Forever 21 has informed over 500,000 individuals that their personal information was compromised in a data breach. The breach, which occurred earlier this year, exposed names, birth dates, Social Security numbers, bank account numbers, and health plan data. The company has no evidence of misuse of the stolen data, but it is often shared among cybercriminals for malicious purposes. Forever 21 has taken steps to prevent further unauthorized access and data sharing.

Hashtags: #DataBreach #Forever21 #Cybersecurity #PersonalInformation #Privacy

https://www.securityweek.com/500k-impacted-by-data-breach-at-fashion-retailer-forever-21/

Russian APT group Gamaredon is increasing its cyber espionage activities during Ukraine's counter-offensive against Russian forces. The group is targeting military and government entities to steal sensitive data. Gamaredon has been consistently targeting Ukraine since 2013, and it is using dynamic infrastructure and legitimate services to obfuscate its activities. The group is also escalating its phishing attacks, using legitimate documents stolen from compromised entities. The National Security and Defense Council of Ukraine warns of the dangers posed by Gamaredon's tactics and emphasizes the need for enhanced cybersecurity measures and international cooperation.

#RussianAPT #Gamaredon #cyberespionage #Ukraine #counteroffensive #cybersecurity

https://www.infosecurity-magazine.com/news/russian-apt-cyber-espionage/

Hackers have launched a brute-force attack on Cisco ASA SSL VPNs. The attack targets various sectors including healthcare and oil and gas. Rapid7 has noted a surge in threats to Cisco ASA SSL VPN devices since March 2023. Weak passwords and lack of multi-factor authentication are often exploited by threat actors. Mitigations include disabling defaults, enforcing MFA, enabling logging, and staying updated with patches. The attack has been monitored and discussed by hackers on underground forums. The IOCs and IP addresses associated with the attack have been identified. #Cisco #CyberAttack #CyberSecurity #Vulnerability

https://cybersecuritynews.com/hackers-attacking-cisco-vpn-appliances/

Hackers are attacking unpatched Citrix NetScaler systems, deploying ransomware. The attacks use a Zero-Day vulnerability, and approximately 2,000 systems worldwide are compromised. Sophos X-Ops is tracking the campaign and recommends patching the vulnerability and checking for signs of compromise. #hackers #cyberattack #cybersecurity #CitrixNetScaler

https://cybersecuritynews.com/hackers-attacking-citrix-netscaler/

Lawsuit accuses University of Minnesota of not preventing data breach. #UniversityofMinnesota #DataBreach

Former student and employee filed a lawsuit against the university. #lawsuit #cybersecurity

University accused of violating Minnesota Government Data Practices Act. #privacy #datasecurity

University acknowledges unauthorized party claiming possession of sensitive data. #universitysecurity #datatheft

https://www.securityweek.com/lawsuit-accuses-university-of-minnesota-of-not-doing-enough-to-prevent-data-breach/

The cloud introduces new security challenges for organizations. Virtual firewalls are crucial for securing digital assets in the cloud. Cloud computing offers flexibility and scalability, but there are also risks associated with it. Virtual firewalls provide robust security in virtualized data centers and private clouds. They also offer secure connectivity into the cloud and consistent security across multiple clouds. Organizations using the cloud should prioritize virtual firewalls for comprehensive protection. #CloudSecurity #VirtualFirewalls #Cybersecurity

https://www.csoonline.com/article/650717/the-key-to-securing-your-cloud-perimeter.html

When Apps Go Rogue - Interesting story of an Apple Macintosh app that went rogue. Sometimes apps are sold or orphaned and taken over by someone else. #Apple #botnets

https://www.schneier.com/blog/archives/2023/08/when-apps-go-rogue.html

Recent Juniper Flaws Chained in Attacks Following PoC Exploit Publication. #JuniperFlaws #Cybersecurity #ExploitAttacks #Vulnerabilities

https://www.securityweek.com/recent-juniper-flaws-chained-in-attacks-following-poc-exploit-publication/

Healthcare organizations hit by cyberattacks last year reported big impact and costs. Roughly 78% of healthcare organizations worldwide experienced a cyberattack, with IT systems, sensitive information, medical devices, and management systems being affected. Care delivery was impacted to some extent for 60% of organizations, and 15% reported severe impact on patient health and safety. Financial costs ranged from $100,000 to $10 million, with 26% of organizations paying a ransom. Concerns include ransomware, internal threats, supply chain attacks, and DDoS attacks. 38% of organizations have basic levels of network segmentation, and budget constraints hinder cybersecurity strategies. #Healthcare #Cyberattacks #Costs #Ransomware #DataBreaches

https://www.securityweek.com/healthcare-organizations-hit-by-cyberattacks-last-year-reported-big-impact-costs/

'Earth Estries' Cyberespionage Group Targets Government, Tech Sectors. Hashtags: #Cybersecurity #Cyberespionage #Government #TechSectors

https://www.securityweek.com/earth-estries-cyberespionage-group-targets-government-tech-sectors/

Chinese hackers linked to UNC4841 targeted governments and government-linked organizations worldwide using a Barracuda Email Security Gateway flaw (CVE-2023-2868). The campaign spanned eight months and involved advanced malware. North America was the primary target region for this cyber-espionage campaign. The affected sectors included governments, technology organizations, telecommunications providers, and more. Barracuda released a patch, but the attackers continued to maintain access in some compromised environments. Organizations impacted are advised to contact Barracuda support and replace compromised appliances. #ChineseHackers #Cybersecurity #BarracudaFlaw #UNC4841

https://www.infosecurity-magazine.com/news/china-target-us-govts-barracuda/

Chinese APT Group GREF has been using the BadBazaar tool for Android espionage. The tool targets Android users through malicious versions of popular communication apps Signal and Telegram. The group has been linked to cyber campaigns targeting Uyghurs and other Turkic ethnic minorities. The campaigns have been active since around July 2020 and July 2022. The malicious apps were distributed through various channels, including the official Google Play store. The malware is capable of harvesting data from compromised devices and granting attackers access to Signal communication. SSL pinning was used to protect communication between the malicious apps and command-and-control servers. The campaigns targeted users across multiple countries. Heightened cybersecurity measures, such as keeping devices updated and practicing good cyber-hygiene, are necessary to defend against emerging cyber risks. Hashtags: #ChineseAPT #GREF #BadBazaar #AndroidEspionage #Signal #Telegram #Cybersecurity.

https://www.infosecurity-magazine.com/news/chinese-gref-target-badbazaar/

The FBI and Justice Department dismantle Qakbot infrastructure used for ransomware attacks. Over 700,000 victim computers were infected, causing damage worth millions of dollars. The US, France, Germany, Netherlands, Romania, Latvia, and UK participated in the effort. Qakbot is a modular second-stage malware that steals information and spreads through infected attachments or links. The FBI accessed the infrastructure and removed the Qakbot malware from infected computers. They also seized over $8.6 million in illicit cryptocurrency revenues. #FBI #Qakbot #ransomware #cybersecurity

https://cybersecuritynews.com/fbi-dismantle-qakbot-infrastructure/

Five Families, a new group consisting of ThreatSec, GhostSec, Stormous, Blackforums, and SiegedSec, have collaborated to launch a cyber attack. They successfully breached Alpha Automation, a Brazillian software development company, and compromised 230GB of data, including customer data, financial information, internal documents, and company software. The hackers have encrypted the company's server and cloud systems. The group notified the company about the breach and offered data recovery, but also stated that they will sell the compromised data if the company doesn't respond. Interested buyers can contact the group for low-priced data. #cybersecurity #hackernews #fivedamilies

https://cybersecuritynews.com/five-families-hackers-collaborate-cyber-attack/

Summary:

The use of peripheral devices has increased in the post-pandemic period, but organizations have not increased their cybersecurity efforts accordingly. Peripheral devices have both benefits and risks, and it is important to regulate access to them. A balance must be struck between productivity and security. Zero Trust is a data protection strategy that advocates for verifying each access attempt. Trusted Device lists and Temporary Access settings can help achieve Zero Trust in device security.

Hashtags: #peripherals #cyberdefense #cybersecurity #zerotrust

https://cybersecuritynews.com/peripherals-deviant-devices-dismantle-your-cyber-defense/

A security flaw in the All-in-One WP Migration Extensions plugin exposes WordPress websites to hacks. The flaw allows unauthorized access token manipulation, potentially compromising sensitive information and granting attackers access to third-party accounts. The vulnerability has been patched, and users are advised to update their plugins. #WordPress #securityflaw #hacks #AllinOneWPMigration

https://www.infosecurity-magazine.com/news/flaw-exposes-wp-migration-plugin/

Summary: SOC teams face challenges in dealing with different malware loaders, which are crucial for network access and payload delivery in cyber attacks. ReliaQuest has identified the top 3 malware loaders of 2023: QBot, SocGholish, and Raspberry Robin. QBot is a banking trojan that spreads payloads, steals data, aids lateral movement, and enables remote execution. SocGholish is a JavaScript-based loader that targets Windows users through fake updates. Raspberry Robin is an elusive worm-turned-loader that spreads through malicious USB devices and evades detection. #CyberSecurity #Malware #MalwareLoaders

Hashtags: #CyberSecurity #Malware #MalwareLoaders

https://cybersecuritynews.com/top-3-malware-loaders/