Source
DARKReading
With a recession potentially coming, some companies are cutting security teams. But moving more infrastructure to the cloud and reducing the number of vendors through consolidation may be the best ways to prepare.
A successful attacker could use the SSRF vulnerability to collect metadata from WordPress sites hosted on an AWS server, and potentially log in to a cloud instance to run commands.
Our growing interconnectedness poses almost as many challenges as it does benefits.
New technical chatbot capabilities raise the promise that their help in threat modeling could free humans for more interesting work.
Threat actors continue to evolve the malicious botnet, which has also added a list of new vulnerabilities it can use to target devices.
Security leaders must maintain an effective cybersecurity strategy to help filter some of the noise on new vulnerabilities.
The Play ransomware group was spotted exploiting another little-known SSRF bug to trigger RCE on affected Exchange servers.
Organizations can start by integrating functions like detection, prioritization, and remediation on to a single platform.