Week in review: RCE bug patched in GitLab, PyPI user phishing, Escanor malware in MS Office documentation


Thoma Bravo: Securing digital identities is very important
In this interview with Help Net Security, Andrew Almeida, a partner in Thoma Bravo’s flagship team, talks about the company’s recent acquisition of SailPoint and innovations in the area of ​​corporate identity.

Critical RCE bug patched in GitLab, update as soon as possible! (CVE-2022-2884)
GitLab has fixed a remote code execution vulnerability (CVE-2022-2884) affecting the community and Enterprise Edition of its DevOps platform and has urged admins to update their GitLab instances immediately.

Fake DDoS Protection Pages Deliver Malware!
Malware dealers are exploiting users’ familiarity with and inherent trust in DDoS protection sites to trick them into downloading and running malware on their computers, Sucuri researchers warn.

How attackers use and abuse Microsoft MFA
Microsoft has been pushing the use of multi-factor authentication (MFA) to thwart attackers for many years.

PyPI user phishing: Attackers compromise legitimate projects to spread malware
PyPI, the official third-party software repository for Python packages, warns of a phishing campaign targeting its users.

7 Open Source Malware Analysis Tools You Should Try
Performing a static analysis of a malicious binary means focusing on analyzing its code without executing it. This type of analysis can reveal to malware analysts not only what the malware does, but also the future intentions of its developer (e.g. currently unfinished functionalities).

How CISOs can ensure security in CI/CD environments
With the serious consequences of data breaches, security is a product pillar these days. Organizations need to combine security with agile DevOps releases.

Escanor malware delivered in armed Microsoft Office documents
Resecurity, a Los Angeles-based cybersecurity firm protecting Fortune 500 worldwide, has identified a new RAT (Remote Administration Tool) called Escanor being promoted on the Dark Web and Telegram.

Disk erasing malware knows no borders
Fortinet announced the latest semi-annual FortiGuard Labs Global Threat Landscape Report, which revealed that the ransomware threat continues to adapt with more variants enabled by ransomware-as-a-service (RaaS).

What kind of scams can attackers do for a living?
In this video from Help Net Security, David Senecal, VP of Architecture and Research at Arkose Labs, discusses the economics of online fraud attacks and illustrates the types of fraud attackers can use to make a living.

DDoS Attacks Up 203%, Patriotic Hacktivism Rises
Radware released a report showing that the number of malicious DDoS attacks increased by 203% compared to the first six months of 2021.

DDoS stories from the SOC
In this Help Net Security video, Bryant Rump, Principal Security Architect at Neustar Security Services, discusses the challenges of mitigating massive DDoS attacks.

How Vulnerable Supply Chains Threaten Cloud Security
According to a Proofpoint study published in partnership with The Cloud Security Alliance (CSA), organizations are struggling to adequately secure new cloud environments deployed during the pandemic while maintaining and attempting to maintain older devices adapt overall security strategy to the evolving landscape.

A closer look at identity crimes against individuals
In this Help Net Security video, James E. Lee, Chief Operating Officer of the Identity Theft Resource Center, discusses the 2021 Trends in Identity Report, which examines identity trends based on information provided by victims who contact the ITRC.

Organizations change their cyber strategy in response to nation-state attacks
66% of organizations have changed their cybersecurity strategy in direct response to the conflict between Russia and Ukraine, while 64% suspect their organization was either directly attacked or affected by a nation-state cyberattack, according to Venafi.

What organizations can do to anticipate and contain ransomware threats
In this video from Help Net Security, Kevin Holvoet, Cyber ​​Threat Intelligence Instructor, SANS Institute, discusses ransomware and ransomware as a service (RAAS) attacks and shows the importance of being prepared with an appropriate top-down response for the Business continuity in the event of an attack is an attack.

API security incidents occur at least once a month
Postman released the results of its 2022 State of the API Report, which surveyed more than 37,000 developers and API professionals on a range of topics, including their organizations’ priorities, how they get their work done, and where they see the industry.

CISOs see little need for a point solution to cover ransomware risk
In this Help Net Security video, YL Ventures’ Sara Behar discusses how CISOs see little need for a point solution to cover ransomware risks, instead believing in using a full security stack for a multi-layered approach that addresses many security concerns simultaneously.

Ransomware dominates the threat landscape
Acronis researchers have concluded that ransomware remains the top threat facing large and medium-sized businesses, including government organizations.

New social engineering tactics discovered in the wild
In this Help Net Security video, Otavio Freire, President and CTO at SafeGuard Cyber, offers insights into new social engineering tactics discovered in the wild and illustrates how phishing attacks are changing, including how they evolved via e- mail out.

How to navigate payment regulations without impacting the customer experience
In this Help Net Security video, Chris Federspiel, CEO of Blackthorn, discusses how to provide customers with a secure experience and how companies can drive compliance in the payments ecosystem despite the regulatory environment.

We need to look at ransomware differently
In this Help Net Security video, David Mahdi, Chief Strategy Officer & CISO Advisory at Sectigo, talks about how ransomware isn’t just a malware problem, attackers want access to your data, so it really is a data security and access issue .

How complicated access management protocols have impacted cloud security
In this Help Net Security video, strongDM CEO Tim Prendergast talks about how technical professionals constantly have to jump through hurdles that can lead to risky workarounds and project delays.

Lean Security 101: 3 tips to build your framework
Cobalt, Lazarus, MageCart, Evil, Revil – Cybercrime syndicates are emerging so fast it’s hard to keep track of them. Until they infiltrate your system. But do you know what’s even more overwhelming than rampant cybercrime?

Infosec New Product of the Week: August 26, 2022
Here’s a look at the hottest products from the past week, including releases from Drata, Ntrinsec, PlainID, Privitar, and ReasonLabs.


About Author

Comments are closed.