Wednesday, June 3, 2020

Cisco servers breached via SaltStack flaws; Plus, cloud attacks increase by 630%

 
Security Digest
Information security news and advice from TechTarget's network |June 03, 2020
TechTarget
FEATURED STORY
Cisco servers breached through SaltStack vulnerabilities

by Alexander Culafi, News Writer

Threat actors exploited critical SaltStack flaws, which were disclosed and patched last month, in a Cisco product to breach several of the networking company's salt-master servers.

Advertisement
NEWS
 
StrandHogg 2.0 allows attackers to imitate most Android apps

A new elevation-of-privilege vulnerability on Android, dubbed StrandHogg 2.0, enables threat actors to gain access to most apps, according to Norwegian mobile security firm Promon.

 
McAfee: Attacks on cloud accounts up 630% during COVID-19
Between January and April amid the COVID-19 pandemic, McAfee found usage of cloud collaboration apps and attacks seeking to steal account credentials both skyrocketed.
 
Supply chain attack hits 26 open source projects on GitHub

Threat actors conducted an unprecedented supply chain attack by using malware known as Octopus Scanner to create backdoors in open source projects, which were uploaded to GitHub.

 
VMware vulnerability leaves private clouds open to takeover
Ethical hackers from Citadelo uncovered a vulnerability in VMware Cloud Director that left private cloud owners open to takeover.
EXPERT ADVICE
 
Actionable threat intelligence needs machine learning, staff

Even advanced threat intelligence tools can't do it all alone. Learn what it takes to parse actionable insights from the information that threat intelligence feeds gather.

 
Top 6 cloud security analytics use cases
Security analytics use cases vary from fraud detection to threat intelligence analysis. Learn how deploying this technology in the cloud can improve enterprise infosec programs.
 
Ensure IAM compliance by wielding key controls and resources
IAM compliance is a top priority for CIOs. Read up on IAM standards and regulations, and learn how to implement IAM controls to best stay compliant.
 
Uncover and overcome cloud threat hunting obstacles

You can be an effective cyberthreat hunter even if your organization's assets are in the cloud. Know the likely obstacles you'll face, then learn how to surmount them.

 
AI threat intelligence is the future, and the future is now
Threat intelligence services and tools get a boost from advanced technology like AI and, specifically, machine learning. Learn how that works.
 
Top 3 advantages of smart cards -- and potential disadvantages
As smart card adoption increases, it is prudent to learn how this technology can improve data security. Here, read more about the benefits of smart cards.
About This E-Newsletter
The Security Digest is published by TechTarget, Inc., 275 Grove Street, Newton, Massachusetts, 02466 US.

Click to: Unsubscribe.

You are receiving this email because you are a member of TechTarget. When you access content from this email, your information may be shared with the sponsors or future sponsors of that content and with our Partners, see up-to-date Partners List, as described in our Privacy Policy. For additional information, please contact: webmaster@techtarget.com.

© 2020 TechTarget, Inc. all rights reserved. Designated trademarks, brands, logos, and service marks are the property of their respective owners.

Privacy Policy | Partners List
TechTarget

No comments: