Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

3 New GitHub Features to Reinforce Your Code, Repo, and Dependency Security

Developers love GitHub. It’s the biggest and most powerful collaboration platform that programmers, developers, and companies use to develop and maintain their software. It’s the biggest source code host with more than 200 million repositories. And it keeps growing. In 2021, more than 73 million developers used GitHub. It gained over 16 million new users in 2021 alone, and GitHub estimates that user numbers will increase to 100 million developers in the next five years.

Royal Flying Doctor Service Queensland Protects The Crown Jewels of Patient & Aviation Data

Royal Flying Doctors Service Queensland has protected business-critical data and ensured its life-saving operations are available 24/7 with Rubrik. As both a healthcare and aviation organisation, it needed to ensure sensitive patient data and key aviation data were protected from the increasing threat of ransomware targeting the healthcare sector.

CVE-2022-27511 - Critical Vulnerability in Citrix Application Delivery Management

On Tuesday, June 14, 2022, Citrix released patches for multiple vulnerabilities, including CVE-2022-27511, an unauthenticated remote privilege escalation vulnerability affecting Citrix Application Delivery Management (ADM). The vulnerability allows an unauthenticated user to remotely corrupt an affected system to reset the administrator password at the next device reboot. Successful exploitation allows a threat actor to gain initial access using the default credentials via SSH after a device reboot.

What is Two-Factor Authentication (2FA)? And How it Works

Two-factor authentication (2FA) is a type of multi-factor authentication (MFA) used to verify users’ identities and provide an additional layer of account security. Users must enter two factors before they are allowed access to their online accounts to ensure they are who they claim to be. 2FA offers a greater level of security than single-factor authentication (SFA), which only relies on one factor, such as a password or passcode.

Will Cybersecurity Jobs Be Automated?

The answer is yes and no. While cybersecurity automation is necessary in today’s vast threat landscape, its current functionality will not replace the role of cybersecurity professionals. The use of cybersecurity automation is undoubtedly on the rise. A 2021 global Statista survey found that 35.9% of global survey respondents reported using a high level of automation in security operations and event/alert processing.

Follina - CVE-2022-30190

Monday, May 30th, 2022, Microsoft issued CVE-2022-30190 for a Remote Code Execution vulnerability with the Microsoft Support Diagnostic Tool (MSDT) in Windows: “A remote code execution vulnerability exists when MSDT is called using the URL protocol from a calling application such as Word. An attacker who successfully exploits this vulnerability can run arbitrary code with the privileges of the calling application.

MDR for Vessels

Obrela Security Industries’ MDR for Vessels is a specialised cybersecurity tool for the maritime sector built specifically for seafaring information technology (IT) and operational technology (OT). With a centralised and self-contained passive network monitoring solution based on a virtual appliance, supporting log collection from vessel infrastructure, MDR for Vessels builds on Obrela’s tried and tested Enterprise-class MDR solution with dedicated processes for maritime and shipping environments systems both on land and sea.