cybersecurity
"Cozy Bear" gained unauthorized access to HPE’s cloud-based email environment
A 10-line exploit is now widely available. Unpatched instances *will* come under attack.
A rewritten EU cyber resiliency act removes the biggest threats to open source but much standards work still to be done, says Linux Foundation Europe
"We will act immediately to apply our current security standards to Microsoft-owned legacy systems and internal business processes..."
VPN appliances "all appear to have been constructed with the code equivalent of string, stamped with the word ‘secure’ and then just left to decay for 20 years..."
"In every insider threat case, there is a combination of network activity and employee behaviour. The malicious activity crosses both physical and electronic modalities..."
Attackers re-write JavaScript loaded by the VPN login page for the Appliance to capture credentials; also grabbed Veeam credentials, moved laterally for full SYSTEM control.
Another arguably more potent example and one actively exploited in the wild is CVE-2023-46604 – a CVSS 10 RCE vulnerability in Apache ActiveMQ; an open source message broker written in Java.
On Magic Quadrants, deal size, changing approaches to cyber-resilience and learning from his father.