| LATEST SECURITY NEWS & COMMENTARY | New Log4j Attack Vector Discovered Meanwhile, Apache Foundation releases third update to logging tool in 10 days to address yet another flaw. 93% of Tested Networks Vulnerable to Breach, Pen Testers Find Data from dozens of penetration tests and security assessments suggest nearly every organization can be infiltrated by cyberattackers. Microsoft Customer Source Code Exposed via Azure App Service Bug Researchers found an insecure default behavior in Azure App Service exposing source code of some customer applications deployed using "Local Git." Why Log4j Mitigation Is Fraught With Challenges The Log4j flaw exists in a component that is not always easy to detect and is widely used beyond an organization's own networks and systems. Timely Questions for Log4j Response Now — And for the Future EXPERT INSIGHT: How to assess your exposure to the vulnerability with a combination of asset inventory, testing, solid information sources, and software bills of materials (SBOMs). CISA Issues Emergency Directive on Log4j The Cybersecurity Infrastructure and Security Agency orders federal agencies to take actions to mitigate vulnerabilities to the Apache Log4j flaw and attacks exploiting it. Log4j Reveals Cybersecurity's Dirty Little Secret Once the dust settles on Log4j, many IT teams will brush aside the need for the fundamental, not-exciting need for better asset and application management. Zero Trust Shouldn’t Mean Zero Trust in Employees Some think zero trust means you cannot or should not trust employees, an approach that misses the mark and sets up everyone for failure. Meta Acts Against 7 Entities Found Spying on 50,000 Users The parent company of Facebook and Instagram has warned some 50,000 account holders they are targets of surveillance. Dept. of Homeland Security Launches 'Hack DHS' Program A new bug bounty program aims to find potential security flaws within certain DHS systems and strengthen the department's security posture. MORE NEWS / MORE COMMENTARY | | | | | HOT TOPICS | Log4Shell: The Big Picture A look at why this is such a tricky vulnerability and why the industry response has been good, but not great. The Future of Ransomware Focusing on basic security controls and executing them well is the best way to harden your systems against an attack. MORE |
|
|
Dark Reading Weekly -- Published By Dark Reading Informa Tech 303 Second St., Suite 900 South Tower, San Francisco, CA 94107 | To update your profile, change your e-mail address, or unsubscribe, click here. | To opt-out of any future Dark Reading Weekly Newsletter emails, please respond here. | Thoughts about this newsletter? Give us feedback. |
Keep This Newsletter Out Of Your SPAM Folder Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list: | If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation. | We take your privacy very seriously. Please review our Privacy Statement. |
|
|