Microsoft patched a record number of 147 new CVEs this month, though only three are rated "Critical."
| LATEST SECURITY NEWS & COMMENTARY | Microsoft Patch Tuesday Tsunami: No Zero-Days, but an Asterisk Microsoft patched a record number of 147 new CVEs this month, though only three are rated "Critical." Round 2: Change Healthcare Targeted in Second Ransomware Attack RansomHub, which is speculated to have some connection to ALPHV, has stolen 4TB of sensitive data from the beleaguered healthcare company. XZ Utils Scare Exposes Hard Truths About Software Security Much of the open source code embedded in enterprise software stacks comes from small, under-resourced, volunteer-run projects. Home Depot Hammered by Supply Chain Data Breach SaaS vendor to blame for exposing employee data that was ultimately leaked on Dark Web forum, according to the home improvement retailer. Critical Bugs Put Hugging Face AI Platform in a 'Pickle' One issue would have allowed cross-tenant attacks, and another enabled access to a shared registry for container images; exploitation via an insecure Pickle file showcases emerging risks for AI-as-a-service more broadly. Top MITRE ATT&CK Techniques and How to Defend Against Them A cheat sheet for all of the most common techniques hackers use, and general principles for stopping them. Critical Security Flaw Exposes 1 Million WordPress Sites to SQL Injection A researcher received a $5,500 bug bounty for discovering a vulnerability (CVE-2024-2879) in LayerSlider, a plug-in with more than a million active installations. NSA Updates Zero-Trust Advice to Reduce Attack Surfaces Agency encourages broader use of encryption, data-loss prevention, as well as data rights management to safeguard data, networks, and users. Medusa Gang Strikes Again, Hits Nearly 300 Fort Worth Property Owners Though a municipal agency assures the public that few are affected, hundreds have their data held ransom for $100,000 by the ransomware gang. Attack on Consumer Electronics Manufacturer boAt Leaks Data on 7.5M Customers In a cyberattack more reminiscent of the 2010s, a seemingly lone hacker fleeced a major corporation for millions of open customer records. How CISOs Can Make Cybersecurity a Long-Term Priority for Boards Cybersecurity is far more than a check-the-box exercise. To create companywide buy-in, CISOs need to secure board support, up their communication game, and offer awareness-training programs to fight social engineering and help employees apply what they've learned. The Fight for Cybersecurity Awareness Investing in cybersecurity skills creates a safer digital world for everyone. How Nation-State DDoS Attacks Impact Us All Global organizations and geopolitical entities must adopt new strategies to combat the growing sophistication in attacks that parallel the complexities of our new geopolitical reality. MORE NEWS / MORE COMMENTARY | | | PRODUCTS & RELEASES | National Security Agency Announces Dave Luber As Director of Cybersecurity Wiz Acquires Gem Security to Expand Cloud Detection and Response Offering MedSec Launches Cybersecurity Program For Resource-Constrained Hospitals ESET Launches a New Solution for Small Office/Home Office Businesses Action1 Unveils 'School Defense' Program To Help Small Educational Institutions Thwart Cyberattacks Wyden Releases Draft Legislation to End Federal Dependence on Insecure, Proprietary Software MORE PRODUCTS & RELEASES |
|
Dark Reading Weekly -- Published By Dark Reading Informa Tech Holdings LLC | Registered in the United States with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
| To opt-out of any future Dark Reading Weekly Newsletter emails, please respond here. | Thoughts about this newsletter? Give us feedback. |
Keep This Newsletter Out Of Your SPAM Folder Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list: | If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation. | We take your privacy very seriously. Please review our Privacy Statement. |
|
|