featured image

Week overview

GTA 6 in development footage leaked
US video game publisher Rockstar Games has suffered an unfortunate data breach: someone has released online in-development images/videos for Grand Theft Auto (GTA) 6, the highly anticipated installment of the popular game.

Uber says Lapsus$ gang is behind recent breach
Uber has confirmed that the recent breach of its systems started with a compromised contractor account.

Python tarfile vulnerability affects 350,000 open source projects (CVE-2007-4559)
Trellix Advanced Research Center published its research on CVE-2007-4559, a vulnerability estimated to be present in more than 350,000 open source projects and common in closed source projects.

Revolut data breach: More than 50,000 users affected
Revolut, the fintech company behind the popular banking app of the same name, has suffered a data breach, followed by phishing attacks to exploit the situation.

US awards $1 billion to state, local and territorial governments to improve cyber resilience
The US government will award $1 billion in grants to help state, local and territorial (SLT) governments address cybersecurity risks, strengthen the cybersecurity of their critical infrastructure, and ensure cyber resilience against ongoing cyber threats.

The 25 most popular programming languages ​​and trends
CircleCI released the 2022 State of Software Delivery report, which examines two years of data from more than a quarter of a billion workflows and nearly 50,000 organizations worldwide, and helps technical teams understand how to better succeed.

Critical ManageEngine RCE Error is Exploited (CVE-2022-35405)
The US Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2022-35405, a critical remote code execution vulnerability in ManageEngine PAM360, Password Manager Pro, and Access Manager Plus, to its Known Exploited Vulnerabilities (KEV) catalog.

Securing the front of your Apple device with unified endpoint management
Apple has always touted the security and privacy capabilities of their devices. By being responsible for both the hardware and the accompanying operating system, Apple has developed a closed-loop approach to protecting users from a number of common attacks.

3 Free Linux Security Courses You Can Take Right Now
Learning how to navigate and interact with Linux effectively can be an important part of your cybersecurity learning journey.

Bring cybersecurity to the place where employees and data come together
Many data breaches occur from within the company, either explicitly by employees or by threats that have infiltrated the network.

What you need to know about Evil Colon attacks
While new attacks seem to be popping up faster than TikTok trends, some warrant action before they’ve even had a chance to surface.

Mitigating the cybersecurity crisis for the upcoming school year
As the students head back into the classroom, K-12 district leaders face the difficult task of preventing and mitigating cybersecurity threats against their districts.

Very serious vulnerabilities found in Harbor’s open-source artifact registry
Oxeye security researchers have discovered several new high-severity variants of the Insecure Director Object Reference (IDOR) vulnerabilities (CVE-2022-31671, CVE-2022-31666, CVE-2022-31670, CVE-2022-31669, CVE-2022 -31667 ) in the CNCF graduate project Harbor, VMware’s popular open-source artifact registry.

The impact of location-based fraud
In this Help Net Security video, André Ferraz, CEO of Incogna, talks about the impact of location-based fraud, which is more common than you might think, affecting different industries in many different ways.

The Rise of Critical Infrastructure Attacks
In this Help Net Security video, Fleming Shi, CTO at Barracuda Networks, talks about the rise of critical infrastructure attacks and how organizations are responding.

Use of open source software is declining for fear of vulnerabilities, exposures or risks
Anaconda has released its annual 2022 State of Data Science report, which reveals the widespread trends, opportunities and perceived barriers facing data science, machine learning (ML) and artificial intelligence (AI).

Is $15.6 Billion Enough to Protect Critical Infrastructure?
In this Help Net Security video, Jeffrey J. Engle, chairman and president of Conquest Cyber, explains why spending increases are necessary and whether it’s enough to protect critical infrastructure.

Agent-Based vs. Agentless Security: Pros and Cons
In this Help Net Security video, Mark Nunnikhoven, Distinguished Cloud Strategist at Lacework, discusses agent-based versus agentless approaches in security.

What do SOC analysts need to be successful?
Gurucul released the results of a Black Hat USA 2022 survey of security professionals in which respondents indicated that insider threats were the most difficult type of attack for SOC analysts to detect, and that behavioral analysis was the most common piece of technology they believed to be missing. she planned to add to the SOC in the near future.

The best ways to protect crypto assets
In this Help Net Security video, Nick Percoco, Chief Security Officer at Kraken, explains why it’s important for crypto holders to think of personal security as an ongoing, holistic process, and offers tips on how to protect crypto assets.

The explosion of data is beyond human capacity
Dynatrace released the results of an independent global survey of 1,303 CIOs and senior cloud and IT operations managers in large organizations, showing that as the transition to cloud-native architectures accelerates, the data generated by such environments will increase the power of outperform current solutions to produce meaningful analytics.

Email-based threats: a pain point for organizations
In this Help Net Security video, Igal Lytzki, Incident Response Analyst at Perception Point, discusses a recent Remcos RAT malware campaign and more generally the threat email threats and phishing pose to organizations.

How to keep public cloud data safe
In this Help Net Security video, Amit Shaked, CEO of Laminar, talks about public cloud data security blind spots and tips for organizations to increase their level of security.

4 key lessons from the webinar “XDR is the perfect solution for SMEs”
Cyber ​​attacks on large organizations dominate the headlines. So you might be surprised to learn that small and medium-sized enterprises (SMEs) are actually more likely to be the target of cyber-attacks. Many SMBs understand this risk firsthand.

New infosec products of the week: September 23, 2022
Here’s a look at the most interesting products from the past week, with releases from 42Crunch, Cloudflare, Code42, Commvault, and Onfido.