Cybersecurity ???And Much More Newsletter ?? Vol. 3 Num. 17
Greetings, friends. ??
???Welcome to my newsletter, if you are not yet subscribed, please do ??. It might include books??, articles ??, tech ??, tips??, and cool stuff about cybersecurity ??.
Enjoy!
What’s Happening
???Another Week, another Critical Flaw
CISA has recently identified four new vulnerabilities in its Known Exploited Vulnerabilities (KEV) catalog:
The mitigation deadlines for these vulnerabilities are in early May, and FCEB agencies should take prompt action to address them.
???Apache Superset Misconfiguration
Apache Superset, a data visualization and exploration tool, has a potentially exploitable and insecure default configuration in versions released before April 5, 2023. An attacker might use this flaw to gain access to the admin panel, steal passwords, compromise data, and even remotely execute code. Apache Superset 2.0.1 and earlier versions are affected. It is strongly recommended that users upgrade to version 2.1 or later of Apache Superset.
???Google is Taking Down CryptBot
Google said that it got a brief court order in the U.S. to stop the spread of a Windows-based malware called CryptBot that steals information and "slows down" its growth.
Mike Trinh and Pierre-Marc Bureau, who work for the tech giant, said that the efforts are part of what the company is doing to "not only hold criminal operators of malware accountable but also those who profit from its distribution."
CryptBot is thought to have infected more than 670,000 computers in 2022. Its goal was to steal private information from Google Chrome users, such as login information for social media accounts and Bitcoin wallets.
???NGOs are Getting Malware with their Software Updates
An advanced persistent threat (APT) threat actor with connections to China has been using legal software update channels to spread malware within an international NGO. When executing automated updates, an authorized part of a program obtained MgBot backdoor installations from trusted sources, as found by researchers at ESET. Researchers have hypothesized that a man-in-the middle attack on the supply chain was responsible for the outbreak.
??Microsoft confirms that Papercut Servers are Delivering Ransomware
Microsoft has confirmed that attacks that aim to spread the Cl0p and LockBit ransomware families are linked to the ongoing abuse of PaperCut servers.
The tech giant's threat intelligence team thinks that a group of hackers called Lace Tempest (formerly DEV-0950) is behind some of the attacks. This group works with other hacking groups like FIN11, TA505, and Evil Corp.
Microsoft said in a series of tweets that "in observed attacks, Lace Tempest ran multiple PowerShell commands to send a TrueBot DLL, which connected to a C2 server, tried to steal LSASS credentials, and injected the TrueBot payload into the conhost.exe service."
???Google Authenticator Syncs to the Cloud but is not E2EE
Users can now easily sync their authentication codes across many devices and Google Accounts with the help of Google Authenticator. If a user's device is lost or stolen, they won't have to worry about getting locked out of their accounts. Someone with access to your Google Account might view all 2FA secrets since the synchronized sign-in codes are not encrypted using end-to-end encryption (E2EE). In the future, Google Authenticator will support E2EE.
Security Tips
???RSA Conference Summary: The Good and The Bad
The Good! Companies to Watch and Announcements
Google Cloud adds ChromeOS data controls and security integrations
To further safeguard company information, Google Cloud has introduced new data controls and security integrations for ChromeOS. CrowdStrike and Palo Alto Networks are integrated for security analytics and monitoring, while Netskope is integrated for IAM purposes.
BlackBerry upgrades Cylance cybersecurity portfolio
BlackBerry's Cylance cybersecurity suite has been expanded to include endpoint, event management, SaaS app connection, threat intelligence, and eSIM visibility features. In addition, the organization has expanded its collaboration with MSSP Solutions Granted.
Akamai launches Prolexic Network Cloud Firewall
Akamai has introduced the Prolexic Network Cloud Firewall, a new feature that lets customers to design and administer their own ACLs, allowing for greater flexibility in network edge security.
Accenture and Google Cloud expand their partnership
Accenture and Google Cloud have extended their collaboration. Accenture is expanding its adaptive detection and response offering, as well as its MxDR service, by incorporating Google capabilities and technologies, such as those for security operations, threat intelligence, generative AI, and managed crisis and incident response.
SentinelOne launches security data platform
SentinelOne has announced Singularity Security DataLake, a security data platform meant to deliver real-time insights to spot patterns, detect abnormalities, and respond to attacks.
Thales launches new USB tokens
Thales has introduced the SafeNet eToken Fusion series, which consists of USB tokens that combine Fast IDentity Online 2.0 (FIDO2) and PKI/CBA in a single authenticator. The new tokens are intended to safeguard Microsoft Azure Active Directory users against account compromise and to provide enhanced security for cloud and web application access.
The Bad! The Most Dangerous Attack Techniques
SANS Institute researchers have identified adversarial AI, ChatGPT-powered social engineering, and sponsored advertising attacks as three of the most concerning new types of cyberattack.
领英推荐
Adversarial AI Attacks
SEO and Paid Ads Attacks
Innovation and Diversification in Attack Techniques
ChatGPT Powered Social Engineering Attacks
Third-Party Developer Attacks
????? The Value of Soft Skills in the Technology Industry
When we consider working in the technology industry, we frequently consider technical talents such as coding, data analysis, and problem-solving. Soft skills, on the other hand, are equally vital for success in this sector.
Soft skills are non-technical abilities that allow people to engage effectively with others. Communication, teamwork, leadership, adaptability, and time management are a few examples. While these abilities may appear to be less significant than technical talents, they are critical for success in the tech business for a number of reasons.
Successful Communication
Effective communication is critical to success in any industry. It is especially crucial in the technology business, where projects are frequently complicated and require collaboration among various stakeholders. Misunderstandings can develop without appropriate communication skills, leading to errors, delays, and, eventually, project failure.
Collaboration
Projects in the technology business are rarely completed by a single individual. Instead, they necessitate the collaboration of several people with diverse abilities and backgrounds. Teamwork and other soft skills are essential for success in this atmosphere. Individuals must listen to others, respect their perspectives, and collaborate to reach a common goal.
Management
Leadership abilities are valuable in any industry, but they are extremely valuable in the technology industry. As projects get increasingly complex, individuals who can take command, motivate others, and make difficult decisions are required. Projects can become disorderly and unsuccessful if strong leadership qualities are not present.
Flexibility
The technology industry is continually evolving, with new technologies and trends developing on a regular basis. Adaptability and other soft skills are essential for success in this setting. Adaptable people can learn new skills rapidly, adapt to new technologies, and respond to changing conditions.
Time Administration
Projects in the technology industry frequently have tight deadlines and require workers to manage their time wisely. Time management and other soft skills are essential for success in this setting. Individuals who can efficiently manage their time can prioritize work, fulfill deadlines, and complete projects on schedule and within budget.
Conclusion
To summarize, while technical abilities are necessary for success in the tech business, they are not sufficient. Communication, teamwork, leadership, adaptability, and time management are all crucial soft skills. Individuals with these talents are more likely to succeed in this fast-paced, ever-changing industry.
My Favorites
???Books I Recommend Reading ??
Read ?? - Top 3 Books to Become a Better Listener
Just Listen: Discover the Secret to Getting Through to Absolutely Anyone by Mark Goulston
The Art of Listening by Lesley-Ann Brown
The Lost Art of Listening: How Learning to Listen Can Improve Relationships by Michael P. Nichols
Podcast ?? - Jack is Back!
Sam Bent, a.k.a. DoingFedTime, brings us a story of what it was like to be a darknet market vendor.
Quote of the Week
"When you want something, all the universe conspires in helping you to achieve it." - Paulo Coelho
If you’re interested in starting a career in cybersecurity, watch this one, and don’t forget to ???***Subscribe to my Youtube Channel*** and leave a comment if there are any topics you’re interested in seeing in my next video.
Check out my other stuff here.
??????Apparently, most of you are not interested in subscribing to my youtube channel, so please let me know why and I will make it valuable to you, I promise ??.
Cybersecurity Professional (SOC Analyst and Pentester)
1 年thank you so much