AI framework vulnerability is being used to compromise enterprise servers (CVE-2023-48022)

Attackers are leveraging a vulnerability (CVE-2023-48022) in Anyscale’s Ray AI software to compromise enterprise servers and saddle them with cryptominers and reverse shells. “To our knowledge, the attack started 7 months ago,” Avi Lu… Continue reading AI framework vulnerability is being used to compromise enterprise servers (CVE-2023-48022)

CloudFoxable: Open-source AWS penetration testing playground

CloudFoxable is a capture-the-flag (CTF) style learning platform you can deploy to your playground AWS account. It primarily targets current penetration testers seeking to learn exploitation of cloud-native attack paths, and cloud security experts aimi… Continue reading CloudFoxable: Open-source AWS penetration testing playground

Truebot Hackers Exploiting Netwrix Auditor Flaw: CISA, FBI Alert

Hackers linked to the Truebot malware are exploiting a year-old Netwrix Auditor flaw to break into organizations in the U.S. and Canada.
The post Truebot Hackers Exploiting Netwrix Auditor Flaw: CISA, FBI Alert appeared first on SecurityWeek.
Continue reading Truebot Hackers Exploiting Netwrix Auditor Flaw: CISA, FBI Alert

Red teaming can be the ground truth for CISOs and execs

This year, against the backdrop of attacks on everyone from healthcare institutions and schools to financial services organizations, as well as the introduction of legislation across the UK and EU to move security up the agenda, cybersecurity has undou… Continue reading Red teaming can be the ground truth for CISOs and execs

The most frequently reported vulnerability types and severities

Bishop Fox collected and analyzed publicly disclosed reports from January to July 2022 to better understand the most frequently reported vulnerability types, the highest-disclosed bounties, and more. In this Help Net Security video, Carlos Yanez, Secur… Continue reading The most frequently reported vulnerability types and severities

How micro-segmentation creates an uphill battle for intruders

The past few years have seen a major shift in security strategies from looking outward for external threats to detecting and defending against adversaries that have already breached the network. One of the biggest dangers is that, after having gained a… Continue reading How micro-segmentation creates an uphill battle for intruders

Electronic Medical Records Cracked Open by OpenClinic Bugs

Four security vulnerabilities in an open-source medical records management platform allow remote code execution, patient data theft and more. Continue reading Electronic Medical Records Cracked Open by OpenClinic Bugs

Red teaming: Why a forward offense is the best defense

Companies are under constant threat. Opportunistic attackers scan the internet for weak points, motivated attackers target specific organizations for susceptibility to a scam or digital exploit, and persistent attackers don’t give up until they get wha… Continue reading Red teaming: Why a forward offense is the best defense