July Snapshot: New integrations & alert bulletins

July Snapshot: New integrations & alert bulletins

Annnd summer is officially under way. We all love the sunshine, I’m guessing, but vacation time means it’s easier to miss things at work. ?? On the off chance you've been paying more attention to the nice weather than work things, here's a quick refresh of what's been happening at Expel.

?? What you’ll find in this issue

Monthly blog roundup

  • MOVEit Transfer exploited vulnerability
  • Fortigate remote code execution vulnerability
  • Risk-based prioritization is the key to your vulnerability management challenges
  • Threat hunting complements MDR for a stronger defensive strategy

New Expel Workbench integrations help defend against identity threats

Embracing unconventional collaboration


No alt text provided for this image

Monthly blog roundup

We had a couple of notable alert bulletins in June. In both cases, we laid out the details around what happened and why it mattered, explained the steps we took, and provided relevant advice on customer next steps. If you missed these items, please read the posts right away.

  • MOVEit Transfer exploited vulnerability— "If an attacker successfully exploits this vulnerability, they could gain access to an organization’s network and begin exfiltrating data and deploying ransomware. Via a SQL injection vulnerability in the MOVEit Transfer web application, an un-authenticated attacker could gain unauthorized access to MOVEit Transfer’s database, allowing the attacker to modify or access database elements.”
  • Fortigate remote code execution vulnerability— "Recently, the United States federal government, Microsoft, and Mandiant warned that Chinese state actors have exploited Fortigate vulnerabilities. Firewalls can be harder to defend because they have to be exposed to the internet, and the organizations that use them can’t install endpoint detection and response (EDR) agents on them, limiting visibility for defenders.”
  • According to a 2021 Joint Cybersecurity Advisory cosponsored by (among others) the FBI, the NSA, and CISA, unpatched software is one of the top three access routes for hackers. Of course, more than 26,000 software security flaws were reported last year alone, and better than 11% of them have a critical score. You can't do them all, so how can you possibly know which to do first? Good question. The good answer:?risk-based prioritization is the key to your vulnerability management challenges.
  • We know threat hunting is great. We know MDR is great.?But do we know how well they work together??(Hint: yes we do.) The “Chrome 78” case illustrates. It’s even kinda fun.


No alt text provided for this image
This quarter’s integrations focus on upleveling your identity game.

New Expel Workbench integrations help defend against identity threats

Our latest Integrations with 1Password, Snowflake, Auth0, and Crowdstrike Falcon Identity Protection help protect against identity threats.

See what's new >>


No alt text provided for this image
Off Script with Expel Webcast Series

Embracing unconventional collaboration

Casey Ellis, Founder, Chairman, and CTO of Bugcrowd, joins us to walk through his journey from hacking to entrepreneurship, how he’s worked to win over the notoriously skeptical researcher community, and the difference between risk and security and why it matters.

Watch or listen here >>


Thanks for reading! Connect with us on LinkedIn and Twitter.

要查看或添加评论,请登录

Expel的更多文章

社区洞察

其他会员也浏览了