Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Dell's API Security Failure: How 49 Million Records Were Exposed #dell #DataBreach #dataleaks

In this video, we examine two significant API security failures, each with devastating consequences. The first breach used a simple trial-and-error method, exploiting broken access control to impact 10 million users. In the Dell example, API abuse exploited a lack of validation and rate limiting, allowing an attacker, posing as a partner, to scrape 49 million records over several weeks. These cases highlight the importance of robust API security practices, especially for business processes and access control. Watch to learn key takeaways on protecting APIs from similar attacks.

Office Hours with Dr. Jack Freund With special guest, Or Amir, Product Manager at Kovrr

* Explore some of the top use cases for which our on-demand CRQ platform is utilized, walking through the specific features and how to leverage them for each of the use cases. These use cases include high-level communication and board reporting, insurance optimization, budgeting, and additional resource justification.

Navigating the SEC Cyber Regulations and 8K reporting for smaller entities

On June 15, 2024, half a year after the SEC's cybersecurity regulations were enacted, smaller organizations—those with a public float under $250 million or annual revenue under $100 million—were finally subject to report material cyber events on Form 8-K, Line 1.05. However, as the larger entities have already demonstrated, determining materiality can be complex, requiring stakeholders to consider financial loss, compromised data records, operational impacts, and more.

Exploitation Walkthrough: ESC15/EKUwu with Justin Bollinger from TrustedSec

Justin Bollinger, Principal Security Consultant at TrustedSec, discussed his research and mitigation guidance on ADCS ESC15 (CVE-2024-49019), also known as EKUwu, a vulnerability in Microsoft's Active Directory Certificate Services.