Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Better attack surface filtering and subdomain discovery

The rapidly expanding attack surface often requires security teams to deep dive into their Internet-facing assets, such as root assets and associated subdomains. Conducting these reviews can be time-consuming for security experts, particularly if they have a large attack surface made up of hundreds – or even thousands! – of subdomains. We’ve now made it possible for users to filter their attack surface by a root asset.

Weekly Cyber Security News 08/07/2022

A selection of this week’s more interesting vulnerability disclosures and cyber security news. For a daily selection see our twitter feed at #ionCube24. Not restricted to NPM, Python for example has had many issues lately, but no matter which language you use that has an online code repository, careful selection is becoming critically important.

Ransomware as a Service: Behind the Scenes

During the recent Rootedcon conference in Spain, we delivered a talk about ransomware, and this blog post serves as a commentary of the insights presented about Ransomware as a Service (RaaS): how it really works; how the threat actors operate these attacks; and how organizations can analyze the attacks and take preemptive measures in the event of future attacks.

CMMC 2 0 Compliance Understanding the Requirements

The new updated CMMC 2.0 version was released to improve the security standard and address the growing cyber risks in the industry. The latest version is updated in a way that the CMMC compliance evaluates the cyber security practices and processes, and certifies a contractor based on their ability to protect the Controlled Unclassified Information (CUI) and Federal Contract Information (FCI) within the supply chain system. Explaining in detail the new additions and changes introduced in CMMC 2.0 Compliance, VISTA InfoSec conducted an informative webinar on “CMMC 2.0 Compliance Understanding the Requirements”.

5 Misconceptions about DAST for Mobile

Organizations that develop mobile apps need to be aware of the potential cyber security threats. These threats can lead to the loss of users' private data, which can have serious repercussions for industries like fintech, healthcare, ecommerce, etc. In order to prevent these malicious practices, Dynamic Application Security Testing (DAST), a security testing tool, has been introduced. It helps to weed out specific vulnerabilities in web applications whenever they run in the production phase.

Exploring CVE-2022-33980: the Apache Commons configuration RCE vulnerability

Before we dive into the details of this vulnerability, we want to make it clear that there’s no need for panic. Many systems permit the use of various types of code in configuration files, and there are legitimate use cases to include string and variable interpolation in the configuration of applications and systems. This is not Log4Shell all over again. This is simple configuration manipulation.

Unifying Security and Development

Most developers don’t learn about secure coding in the college IT programs. And once they join the workforce, they often don’t have the time to learn about secure coding. The responsibility of training developers in secure coding best practices usually falls on security practitioners. Security practitioners are notoriously overworked, often lacking the bandwidth to train developers. Organizations are thus turning to AppSec learning experiences built specifically for development teams.