Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

UK Cybersecurity Org Offers Advice for Thwarting BEC Attacks

The UK’s National Cyber Security Centre (NCSC) has issued guidance to help medium-sized organizations defend themselves against business email compromise (BEC) attacks, especially those targeting senior staff members. The NCSC says employees should be cautious about the type of personal information they post on the internet, since criminals can use this knowledge to make their attacks more convincing.

CVE-2024-29849: Critical Authentication Bypass in Veeam Backup Enterprise Manager

On May 21, 2024, Veeam disclosed a critical vulnerability in Veeam Backup Enterprise Manager, identified as CVE-2024-29849. This vulnerability allows an unauthenticated threat actor to log into the web interface as any user, posing a significant risk with a Common Vulnerability Scoring System (CVSS) score of 9.8. The affected application is an optional add-on application used to manage Veeam Backup & Replication via a web console in Veeam environments.

Multiple Critical SQL Injection Vulnerabilities in Ivanti Endpoint Manager

On May 21, 2024, Ivanti disclosed six critical-severity SQL Injection vulnerabilities affecting Ivanti Endpoint Manager, specifically versions 2022 SU5 and earlier. These six vulnerabilities, identified as CVE-2024-29822 through CVE-2024-29827, each carry a Common Vulnerability Scoring System (CVSS) score of 9.6. They allow unauthenticated attackers within the same network to execute arbitrary code on the Core server. This disclosure was made simultaneously with the release of a security hot patch.

DFPM and DSPM: Two Steps Towards Modernizing Data Security

Data security is evolving. This evolution is making the need to understand what is going on with your data more critical. Teams need to be able to answer questions like, where is data being stored? Which vendor or team is using it? When is sensitive data being used? Where is data being sent?

A Practical Approach to Streamline M&A

Mergers and acquisitions often sound amazing to the Board, but they can become an operational nightmare for the infrastructure, networking, and security teams. In recent years, I’ve worked with a fair few highly acquisitive organisations and so I have seen firsthand that the practical steps to onboard new users can become hugely challenging–especially when the two organisations are running different technologies.

Digital Legacies: Securing Data in the Afterlife

The content of this post is solely the responsibility of the author. LevelBlue does not adopt or endorse any of the views, positions, or information provided by the author in this article. As the world becomes increasingly digital, our online lives have become an extension of our physical selves. We share our thoughts and experiences through social media, communicate through messaging apps, keep our money online, and store precious memories and documents in the cloud.

What is Defensive AI and Why is it Essential in Bot Protection?

The definition of Artificial Intelligence (AI) has been thrown around whilst it has risen to the top of the tech agenda over the past couple of years. Security professionals have determined AI to be a risk to businesses, and also an opportunity. But could it also be a way to better defend your network against attacks? For many years, AI and Machine Learning have gone hand in hand; with AI used to better determine defensive decisions and cut down on the human element in more basic functions.

Email Security Must Remain a Priority in the Wake of the LabHost Takedown and BEC Operator's Conviction

Two positive steps were taken last month to limit the damage caused by phishing and Business Email Compromise (BEC) attacks when a joint action by UK and EU law enforcement agencies compromised the infrastructure of the phishing-as-a-service operation LabHost and a major BEC operator was convicted in US Federal Court. While law enforcement operations are integral to defeating cybercrime, disrupting one or two adversary groups does not minimize the threat.