Live Breaking News & Updates on Security bloggers network

Stay informed with the latest breaking news from Security bloggers network on our comprehensive webpage. Get up-to-the-minute updates on local events, politics, business, entertainment, and more. Our dedicated team of journalists delivers timely and reliable news, ensuring you're always in the know. Discover firsthand accounts, expert analysis, and exclusive interviews, all in one convenient destination. Don't miss a beat — visit our webpage for real-time breaking news in Security bloggers network and stay connected to the pulse of your community

RSAC 2024 Innovation Sandbox | Bedrock Security: A Seamless and Efficient Data Security Solution

The RSA Conference 2024 is set to kick off on May 6. Known as the “Oscars of Cybersecurity”, RSAC Innovation Sandbox has become a benchmark for innovation in the cybersecurity industry. Let’s focus on the new hotspots in cybersecurity and understand the new trends in security development. Today, let’s get to know the company Bedrock The post RSAC 2024 Innovation Sandbox | Bedrock Security: A Seamless and Efficient Data Security Solution appeared first on NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyber attacks..

Palo-alto-networks , Bedrock-trust-boundary , Vmware , Amazon-web-services , Nsfocus-inc , Security-bloggers-network , Bedrock-trust-boundaries , Organization-perspective , Security-team-perspective , Frictionless-security-team-collaboration , Bedrock-security

RSAC 2024 Innovation Sandbox | Antimatter: A Comprehensive Data Security Management Tool

The RSA Conference 2024 will kick off on May 6. Known as the “Oscars of Cybersecurity,” the RSAC Innovation Sandbox has become a benchmark for innovation in the cybersecurity industry. Today let’s focus on new hotspots in network security and gain insights into new trends in security development by delving into Antimatter. Introduction of Antimatter The post RSAC 2024 Innovation Sandbox | Antimatter: A Comprehensive Data Security Management Tool appeared first on NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyber attacks..

San-francisco , California , United-states , Andrew-krioukov , Web-services , Siemens , Security-bloggers-network , Enterprise-associates , Nsfocus-inc , Michael-andersen , Beau-trincia , New-enterprise-associates

Salt Security Addresses Critical OAuth Vulnerabilities Enhancing API Security with OAuth Protection Package

OAuth is an important part of modern authorization frameworks, granting access to resources across different applications easily. However, vulnerabilities in OAuth implementations can create significant security risks. Following research released by Salt labs that uncovered critical vulnerabilities in the world's most popular authorization mechanism, Salt has released a multi-layered protection package to detect attempts to exploit OAuth and proactively fix the vulnerabilities. Salt Security is enhancing its API protection platform with a comprehensive suite of new OAuth threat detections and posture rules to address this growing challenge. These innovations empower organizations to identify and mitigate malicious attempts to exploit OAuth flows, ultimately safeguarding sensitive data and user accounts.The OAuth Attack LandscapeLet's take a closer look at the types of OAuth attacks these new capabilities will address:Access Token and Authorization Code Theft: Vulnerabilities in OAuth systems can leave access tokens or authorization codes susceptible to theft. Attackers can leverage those stolen elements to impersonate legitimate users and gain unauthorized access to sensitive resources and applications.Increasing OAuth Attacks: OAuth has been in widespread use for over a decade but we have seen attacks on the rise.  This is caused by organizations' increased usage of APIs and microservices making OAuth even more popular while increasing the complexity of securing it. Attackers have taken advantage of this by crafting specific OAuth-based attacks with continuing attempts to find additional OAuth vulnerabilities to exploit.Real-World Consequences: Lessons from ChatGPT Salt Security's recent investigation exposed several critical security flaws within the OAuth implementations of popular ChatGPT plug-ins highlighted in a blog post by Salt Labs.The blog above provides specific details of these security flaws. Firstly, ChatGPT's plugin installation process was vulnerable. An attacker could exploit this to inject malicious plugins, potentially accessing any messages sent within ChatGPT.Secondly, the plugin development framework, PluginLab, needed proper authentication. This allowed attackers to masquerade as victims and take over their plugin accounts. This vulnerability could have been exploited in plugins like "AskTheCode" to compromise connected GitHub accounts with 0-click attacks.Finally, several plugins had OAuth redirection vulnerabilities. Attackers could exploit this by sending malicious links to victims and stealing their plugin credentials, enabling account takeovers.Beyond this most recent example of OAuth threats with ChatGPT, the Salt Labs team has found several other OAuth-specific exploitable vulnerabilities, indicating the critical need for tools to help find and mitigate these types of risks before attackers can take advantage.  The Salt Labs team found these vulnerabilities that used a variety of OAuth attack methodologies with Booking.com, Grammarly, Vidio.com, and Expo/CodeCademy.These real-world examples underscore the importance of robust security measures to thwart sophisticated OAuth attack tactics before they can inflict significant damage. By implementing strong OAuth security controls, organizations can safeguard their users' data, prevent unauthorized access to critical resources, and maintain user trust.Salt Security's Solution: Multi-Layered OAuth DefenseSalt Security's upcoming enhancements offer a comprehensive approach to OAuth security:New OAuth Threat Detections: Enhancing Salt’s industry-leading behavior threat analysis system, we will carefully examine specific parameters and configurations used in API requests and responses related to OAuth. Utilizing AI/ML techniques will create a standard pattern for "normal" requests. Alerts will be generated for requests that deviate from established patterns, indicating possible OAuth attacks or other exploits. We are introducing new attack type detections in this release including OAuth hijacking attacks, OAuth CSRF attacks, and OAuth leaked secrets. This advanced behavioral analysis enables the identification of sophisticated OAuth attacks which threat actors are using in the wild today.OAuth Posture Rules: To enhance the capabilities of Salt’s API Posture Governance engine, there will be customized OAuth posture rules which will enable organizations to define and enforce their own specific security standards for OAuth implementations. This will guarantee that APIs adhere to the best practices in security and greatly reduce the risk of vulnerabilities that attackers could exploit. To illustrate, organizations can use pre-defined rules to help prevent leaked client secrets and prevent authorization code injection attacks. This level of control allows businesses to customize their OAuth security posture according to their specific risk tolerance and compliance requirements.The Business Case for Enhanced OAuth ProtectionThis enhanced functionality from Salt Security provides robust OAuth defenses that help organizations achieve several critical security objectives. Firstly, it proactively shields customer accounts, intellectual property, and authorization tokens from malicious actors who continuously seek to exploit vulnerabilities in OAuth implementations. Secondly, organizations that demonstrate a commitment to robust security practices foster user confidence and enhance brand reputation, leading to stronger customer relationships and a competitive edge in the marketplace. Thirdly, the potential for severe financial and reputational damage stemming from a successful OAuth attack is significantly reduced. OAuth exploits can cause data breaches that are incredibly costly, and reputational damage can take years to repair. Finally, Salt Security's unwavering commitment to research and development ensures that its solutions remain effective against emerging OAuth attack techniques. Salt’s proactive approach keeps businesses a step ahead of evolving threats, allowing them to operate with greater confidence and agility.See the OAuth Posture Rules in Action.

Eric-schwake , Security-bloggers-network , Authorization-code-theft , World-consequences , Salt-labs , Threat-detections , Enhancing-salt , Posture-rules , Business-case , Salt-security ,

How to find Palo Alto Network firewalls running PAN-OS 11.1, 11.0, and 10.2

Palo Alto Networks disclosed that versions of their PAN-OS software have a vulnerability allowing for remote command injection. Here's how to find potentially impacted assets.

Blain-smith , Palo-alto-networks , Security-bloggers-network , Network-globalprotect-gateways , Latest-palo-alto-networks , Alto-networks , Threat-prevention , Asset-inventory , Zero-blog ,

D3 Security Releases "In the Wild 2024" Report with Analysis and Incident Response Playbooks for the 10 Most Prevalent Cyber Attack Techniques

D3 Security Releases "In the Wild 2024" Report with Analysis and Incident Response Playbooks for the 10 Most Prevalent Cyber Attack Techniques
securityboulevard.com - get the latest breaking news, showbiz & celebrity photos, sport news & rumours, viral videos and top stories from securityboulevard.com Daily Mail and Mail on Sunday newspapers.

Vancouver , British-columbia , Canada , Walker-banerd , Brute-force , Adrianna-chen , Security-bloggers-network , Research-methodology , Scripting-interpreter , Valid-accounts , Account-manipulation , Adversaries-rely

Millions Impacted in Mass Passcode Reset of AT&T Accounts

AT&T has initiated a mass reset of millions of customer account passcodes following a reported data breach. The post Millions Impacted in Mass Passcode Reset of AT&T Accounts appeared first on Enzoic.

Security-bloggers-network , Social-security , Millions-impacted , Mass-passcode-reset ,

Optimizing Data Lakes: Streamlining Storage with Effective Object Management

Data lakes are a popular solution for data storage, and for good reason. Data lakes are flexible and cost effective, as they allow multiple query engines and many object formats without the need to manage resources like disks, CPUs, and memory. In a data lake, data is simply stored in an object store, and you The post Optimizing Data Lakes: Streamlining Storage with Effective Object Management appeared first on Blog.

Security-bloggers-network , Monitor-query-engine , Apache-spark , Optimizing-data-lakes , Streamlining-storage , Effective-object-management ,

The State of Software Supply Chain Security 2024: Key takeaways

Software supply chain attacks are now mainstream events — a change in tactics by cyber-attackers that you can measure in headlines, which in recent years have delivered news about attacks on popular software tools including MOVEIt, 3CX, and CircleCI. 

Carolynn-van-arsdale , Security-bloggers-network , Microsoft , Reversinglab-state-of-software-supply-chain-security , Progressive-software-moveit , Google , Software-supply-chain-security , Lab-state , Python-package-index , Operation-brainleeches , Hugging-face , Progressive-software

Most Popular Cybersecurity Blogs from 2023

Most Popular Cybersecurity Blogs from 2023
govtech.com - get the latest breaking news, showbiz & celebrity photos, sport news & rumours, viral videos and top stories from govtech.com Daily Mail and Mail on Sunday newspapers.

West-virginia , United-states , White-house , District-of-columbia , Russia , Americans , Danielle-cox , June-cyber , National-cybersecurity-strategy-implementation-plan , Government-technology , Security-bloggers-network , Google

What is Data Protection By Design?

Organisations are legally and ethically obligated to protect the data of their users. Negligent handling of user data opens up the organisation to fines or lawsuits from its users. In Europe and the UK, users own their data, giving them the right to revoke access or alter it when the organisation stores it. This risk to the user's data and the organisation arises because user data holds value for both. The post What is Data Protection By Design? appeared first on Sencode.

United-kingdom , Software-assurance-maturity-model , Security-bloggers-network , Protecting-user , Protection-by-design , Data-protection-by-design , Information-security-policy , Data-protection-officer , Security-design-principles , Assurance-maturity-model , Cyber-awareness-training