|
By Fara Hain
CUPS is a suite of programs and daemons that provide local and network printing capabilities on Unix-like systems such as Linux and macOS. Versions before and including 2.0.1 are vulnerable to CVE-2024-47076 (libcupsfilters), CVE-2024-47175 (libppd), CVE-2024-47176 (cups-browsed) and CVE-2024-47177 (cups-filters), all of which can be chained together to allow remote unauthenticated code execution. At this time there is no updated version available.
|
By Amit Sheps
Legacy attack surfaces were small and simple. There were fewer servers and endpoints to protect. The tooling required to secure it was basic – perimeter firewalls, antivirus software, and server/network/application monitoring tools. When organizations migrate to the cloud, things change and become complex. For starters, on-premise infrastructure and applications can’t be left out in favor of the cloud. Most organizations run hybrid setups.
|
By Amit Sheps
Vulnerability management is a major component of any cybersecurity strategy, simply because every vulnerability represents another potential vector through which an organization can be attacked.
|
By Nadav Levy
When managing an organization’s attack surface, the focus often falls on broad categories like firewalls, endpoints, or software vulnerabilities. Yet, one obvious blind spot is login pages. Login pages are not just entry points for users but potential gateways for attackers. From an EASM point of view, login pages pose important security concerns because of their exposure to the Internet.
|
By Amit Sheps
Penetration testing, dynamic application security testing (DAST), and attack surface management (ASM) are all strategies designed to manage an organization’s digital attack surface. However, while each aids in identifying and closing vulnerabilities, they have significant differences and play complementary roles within a corporate cybersecurity strategy. Let’s take a quick look at the definition of each of these strategies.
|
By Fara Hain
In June 2024, the digital world was rocked by a significant supply chain attack involving Polyfill.io, a JavaScript library that had been a staple in web development for over a decade. Originally designed to ensure compatibility between older browsers and modern web APIs, Polyfill.io became a silent vulnerability when a Chinese company named “Fun Null” acquired the domain in February 2024.
|
By Nethanel Gelernter
This post is based on ongoing security research – the post will continue to be updated as we get additional information… A critical vulnerability has just been announced in Ivanti’s Virtual Traffic Manager (vTM) that allows unauthenticated remote attackers to create administrator users.
|
By Amit Sheps
Non-human identities (NHIs) dominate the era of cloud services and SaaS applications. They are the identities that authenticate between different servers, APIs and third party integrations to provide programmatic access to data and services. Non-human identities utilize different protocols, such as OAuth, REST and SSH.
|
By Marc Gaffan
TLDR: The ways that organizations find and fix security exposures have been flawed for years. Traditional vulnerability management (VM) programs have failed to address the core issues. What’s worse, the relatively new category of External Attack Surface Management (EASM) has not solved the problems it aimed to solve. But hope, in the form of Exposure Management, is on the way.
|
By Fara Hain
Securing a network against cyber threats requires a thorough understanding of its vulnerabilities. A vulnerability assessment is a detailed process aimed at identifying, evaluating, and ranking potential weaknesses within a network setup. From examining configurations to assessing access controls, this assessment dives deep into every aspect of the network to uncover areas of vulnerability.
|
By IONIX
How to Expose Critical Threats and Proactively Prevent Breaches In today's cyber landscape, identifying and mitigating threats from an attacker's perspective is not just an option – it's a necessity. Watch this insightful fireside chat with Forrester Senior Analyst Erik Nost and IONIX CEO Marc Gaffan, as they dive into the world of Threat Exposure Management (TEM) and its pivotal role in safeguarding your business.
|
By IONIX
Growing digital connectivity has led to the rise of digital supply-chain attacks. This session will explain, demonstrate, and provide statistics about the complexity of the problem and about attacks that arose due to dependencies on external infrastructures. While there is no simple solution to the problem, we will present a strategy to reduce exposure and create processes to avoid such vulnerabilities.
|
By IONIX
Senior principal analyst and ESG fellow John Oltsik discusses Improving the Effectiveness of Attack Surface Management Programs.
|
By IONIX
In a world where organizations cannot fix everything, security and IT teams need a practical way to identify and act on critical exposures. IONIX Threat Exposure Radar exposes critical risks so you can effectively reduce risk and improve your security posture.
|
By IONIX
Gain control of your external attack surface and digital supply chain with Cyberpion and Azure Sentinel Nethanel Gelernter, Cyberpion
|
By IONIX
The Apache Log4j vulnerability will likely continue to create challenges for security teams for months to come, and we want you to be prepared.
|
By IONIX
We are kicking off December and Talking Cloud with the Co-Founder and CBO at Cyberpion. If you're like me, you're wondering how to pronounce the name of the company, let alone exactly what they do in the cloud. You'll not only learn how to properly pronounce the name of the company but also learn where the name came from and the unique solution they have built to address the hyper-connected world we all live in today. Hear my fun and informative discussion with Ran Nahamis.
|
By IONIX
Cyberpion's Ecosystem Security platform enables security teams to identify and neutralize the rising threats stemming from vulnerabilities within the online assets throughout an enterprise's far-reaching, hyperconnected ecosystem.
|
By IONIX
Download this complimentary report and learn why Omdia sees Cyberpion as well placed to carve out a share of the expanding EASM market, given the breadth of its current offering and its plans for where it needs to take its technology next.
|
By IONIX
The move to the cloud has exponentially increased this phenomenon: The IT team is no longer required for provisioning storage, running an application, or configuring a server. Along with the growth in Shadow IT, the security risk has grown as well. Potential backdoors have been created and internal data has moved online, violating compliance requirements and compromising the organization's security posture.
|
By IONIX
Full external attack surface visibility is just the first step to safeguarding your organization. Cyberpion goes beyond visibility to combine an attack surface vulnerability assessment for each connected asset, whether your own (first party) or from a third party. Moreover, the platform actively responds to major vulnerabilities, like dangling DNS records, by taking temporary ownership of the relevant IP address or subdomain to prevent it from falling into the wrong hands.
|
By IONIX
Cybersecurity teams need to develop and maintain a set of practices around their online attack surface. These practices must include attack surface visibility and mapping of third-party connections as well as constant assessment of the risks of these connections. Controls must include the ability to detect and alert on risky or broken connections, coupled with automated remediation when feasible.
- September 2024 (6)
- August 2024 (3)
- July 2024 (5)
- June 2024 (5)
- May 2024 (6)
- April 2024 (8)
- March 2024 (5)
- February 2024 (2)
- January 2024 (5)
- December 2023 (2)
- November 2023 (4)
- October 2023 (2)
- September 2023 (1)
- August 2023 (1)
- July 2023 (3)
- June 2023 (4)
- May 2023 (2)
- April 2023 (4)
- March 2023 (5)
- February 2023 (1)
- January 2023 (4)
- December 2022 (1)
- November 2022 (7)
- October 2022 (4)
- April 2022 (3)
- March 2022 (1)
- January 2022 (1)
- December 2021 (2)
- November 2021 (1)
- December 2020 (1)
IONIX is the only EASM solution that discovers the full extent of your online risk exposure and actively protects your hyper-connected external attack surface.
With growing reliance on SaaS, Cloud, APIs, and 3rd party services, hyper-connectivity presents the fastest-growing and most serious risk to enterprises like yours. Mostly invisible, unmanaged, and everchanging, exposed hyper-connected assets, whether yours or your business partners, are easy entry points for attackers to exploit.
Operate Confidently Online with IONIX:
- Attack Surface Discovery: Identify the internet-facing assets you own and their extended connections with unmatched coverage and precision.
- Risk Assessment: Evaluate each discovered asset, its connectivity, and related kill chains for exploitable vulnerabilities and risks.
- Comprehensive Reporting: Identify assets and connections that are no longer in use so you reduce your attack surface and exposure to risk.
- Active Protection: Support your security team with Active Protection, so you prevent exploitation of your most vulnerable assets.
- Risk Prioritization: Accelerate mitigation with a prioritized list of action items to help your security team effectively focus their efforts.
- Workflow Integration: Integrate your current security tools including Microsoft Azure Sentinel, ServiceNow, Atlassian Jira, Splunk, and Cortex XSOAR.
Discover and Protect Your Attack Surface.