Critical Microsoft RPC runtime bug: No PoC exploit yet, but patch ASAP! (CVE-2022-26809)

Three days have passed since Microsoft’s latest Patch Tuesday, and CVE-2022-26809 has emerged as the vulnerability with the most exploitation potential. It’s easy to see why: it may be exploited by unauthenticated, remote attackers to breac… Continue reading Critical Microsoft RPC runtime bug: No PoC exploit yet, but patch ASAP! (CVE-2022-26809)

Cloudflare not fully backing out of Russia, company says, as tech firms are forced to weigh in

Cloudflare, a major web infrastructure firm that keeps websites online by protecting them from distributed denial-of-service  attacks, said Monday that it will continue to provide some services within Russia despite several calls to pull out, stating that “Russia needs more Internet access, not less.” The statement is just the latest example of internet infrastructure firms having to explain how they are approaching business in Russia as that country’s government continues its brutal assault on Ukraine, and the government of Ukraine seeks to isolate Russia from the internet by publicly calling out major tech and web firms with business interests there. In a statement, Cloudflare CEO Matthew Prince said the company has seen a “dramatic increase in requests from Russian networks to worldwide media, reflecting a desire by ordinary Russian citizens to see world news beyond that provided within Russia.” The statement detailed the various steps the company has taken to […]

The post Cloudflare not fully backing out of Russia, company says, as tech firms are forced to weigh in appeared first on CyberScoop.

Continue reading Cloudflare not fully backing out of Russia, company says, as tech firms are forced to weigh in

How do I select an API security solution for my business?

As the importance of Application Programming Interfaces (APIs) continues to grow and API traffic accelerates, there’s a growing need to make sure it completes its tasks securely. Traditional applications security controls are still needed, but ca… Continue reading How do I select an API security solution for my business?

Akamai acquires Linode to offer a single cloud-to-edge platform for businesses

Akamai Technologies announced it has entered into a definitive agreement to acquire Linode, an infrastructure-as-a-service (IaaS) platform provider. Modern digital experiences, including virtual environments like the metaverse, are created through the … Continue reading Akamai acquires Linode to offer a single cloud-to-edge platform for businesses

Piracy is alive and well, demand reaching 3.7 billion unlicensed streams and downloads

Akamai released a research detailing the persistence of online piracy. The evolving piracy landscape, according to the U.S. Chamber of Commerce’s Global Innovation Policy Center, costs the U.S. economy alone $29.2 billion in lost revenue each yea… Continue reading Piracy is alive and well, demand reaching 3.7 billion unlicensed streams and downloads

White House hosts open-source software security summit in light of expansive Log4j flaw

Tech giants and federal agencies will meet at the White House on Thursday to discuss open-source software security, a response to the widespread Log4j vulnerability that’s worrying industry and cyber leaders. Among the attendees are companies like Apple, Facebook and Google, as well as the Apache Software Foundation, which builds Log4j, a ubiquitous open-source logging framework for websites. “Building on the Log4j incident, the objective of this meeting is to facilitate an important discussion to improve the security of open source software — and to brainstorm how new collaboration could rapidly drive improvements,” a senior administration official said in advance of the meeting. The huddle convenes in light of a vulnerability discovered last month known as Log4Shell that could affect up to hundreds of millions of devices, and as federal officials, businesses and security researchers race to contain the potential fallout. It’s the latest of several Biden White House summits […]

The post White House hosts open-source software security summit in light of expansive Log4j flaw appeared first on CyberScoop.

Continue reading White House hosts open-source software security summit in light of expansive Log4j flaw

When done right, network segmentation brings rewards

96% of organizations claim to be implementing segmentation in their networks, yet only 2% of those organizations are segmenting all six mission-critical asset classes, including critical applications, public-facing applications, domain controllers, end… Continue reading When done right, network segmentation brings rewards

Guardicore strengthens existing ransomware protection capabilities

Guardicore announced new features that reduce the complexity of segmentation policy creation and enforcement to more effectively secure complex enterprise environments against ransomware attacks. According to Forrester’s New Tech: Microsegmentation, Q3… Continue reading Guardicore strengthens existing ransomware protection capabilities

API attacks are both underdetected and underreported

Akamai released a research into the evolving threat landscape for application programming interfaces (APIs), which according to Gartner will be the most frequent online attack vector by 2022. APIs are inherently designed to be fast and easy pipelines b… Continue reading API attacks are both underdetected and underreported