Security News > 2022 > February

The U.S. Cybersecurity & Infrastructure Security Agency has added to the catalog of vulnerabilities another 15 security issues actively used in cyberattacks.CISA's warning about these vulnerabilities serves as a wake-up call to all system administrators that they need to prioritize installing security updates to protect the organization's network.

What appears to be stolen data belonging to customers of accounting conglomerate Optionis Group has surfaced on the dark web weeks after the firm confirmed intruders had broken into its systems. The Vice Society ransomware gang dumped what appears to be thousands of files onto their dark web blog as downloadable links, as seen by The Register.

The HSE did not have a Chief Information Security Officer or a "single responsible owner for cybersecurity at either senior executive or management level to provide leadership and direction. Under-resourced Information Security Managers were not performing their business as usual role but were working on evaluating security controls for the COVID-19 vaccination system.

Another month, another zero-day exploited in the wild that has been fixed by Apple. Apple fixed it in iOS 15.3.1 and iPadOS 15.3.1, macOS Monterey 12.2.1, and Safari 15.3.

Attackers have been trying to exploit the vulnerability to compromise systems around the world to deliver cryptominers and ransomware or to establish persistent access for a future attack. According to Rotem Iram, co-founder and CEO of cyber managing general agent At-Bay, the Log4j exploitation risk isn't as high as first thought.

We talked to Shawn Rosemarin, global vice president for emerging technology solution sales at Pure Storage, about how the company can help customers protect themselves. It's the amount of time and the amount of data that needs to be restored that is a direct driver of how long and complex it will be for you to get to that point of restoration.

Democratic Senators Ron Wyden and Martin Heinrich, of Oregon and New Mexico respectively, on Thursday announced that in April 2021 they sent a co-signed letter [PDF] to director of national intelligence Avril Haines and CIA director William Burns, seeking expedited declassification of the Privacy and Civil Liberties Oversight Board's review of two CIA counterterrorism programs - named "Deep Dive I" and "Deep Dive II". The Deep Dives were made possible by Executive Order 12333 - a Reagan-era order that allows widespread data collection, and data-sharing with the CIA, in the name of national security. The senators wanted a review of the documents' status because they felt the CIA had conducted a bulk information collection effort that harvested data on US citizens - probably illegally.

Democratic Senators Ron Wyden and Martin Heinrich, of Oregon and New Mexico respectively, on Thursday announced that in April 2021 they sent a co-signed letter [PDF] to director of national intelligence Avril Haines and CIA director William Burns, seeking expedited declassification of the Privacy and Civil Liberties Oversight Board's review of two CIA counterterrorism programs - named "Deep Dive I" and "Deep Dive II". The Deep Dives were made possible by Executive Order 12333 - a Reagan-era order that allows widespread data collection, and data-sharing with the CIA, in the name of national security. The Senators wanted a review of the documents' status because they felt the CIA had conducted a bulk information collection effort that harvested data on US citizens - probably illegally.

According to the Statista Cloud Market Share publication, Amazon Web Services, Microsoft Azure, and Google Cloud Platform are the three largest cloud service providers, having captured over 60% of the market between them. The cloud is no cyber security panacea, and data breaches involving the cloud show no sign of abating.

In this interview with Help Net Security, Miles Hutchinson, CISO of Jumio, talks about the pain points of identity and access management and the importance of strenghtening identity strategies. The usual identity-related security issues and challenges organizations face are typically caused by outdated identity and access management solutions or a disjointed approach to identity verification, which can leave cracks and vulnerabilities in an organization's attack surface.