An updated version of the commodity malware called Legion comes with expanded features to compromise SSH servers and Amazon Web Services (AWS) credentials associated with DynamoDB and CloudWatch.
“This recent update demonstrates a widening of scope, with new capabilities such the ability to compromise SSH servers and retrieve additional AWS-specific credentials from Laravel web applications,” Read More
Related Posts
LA County Health Services: Patients’ data exposed in phishing attack
LA County Health Services: Patients’ data exposed in phishing attack
The L.A. County’s Department of Health Services, the second-largest public health care system in the United States, disclosed a data breach after patients’ personal and health information was exposed in a data breach resulting from a recent phishing attack impacting over two dozen employees. […] Read More
BleepingComputer
Internal Communication Gaps Exposes Organizations to Cyber Attacks
Internal Communication Gaps Exposes Organizations to Cyber Attacks
[[{“value”:”
The alignment between security teams and executive management is crucial.
However, a significant communication gap within organizations is increasingly becoming vulnerable, exposing them to sophisticated cyber threats.
This issue is highlighted in the 2024 Global CISO Report by Dynatrace, which underscores the challenges and potential risks arising from these internal misalignments.
Document
Integrate ANY.RUN in Your Company for Effective Malware Analysis
Are you from SOC, Threat Research, or DFIR departments? If so, you can join an online community of 400,000 independent security researchers:
Real-time Detection
Interactive Malware Analysis
Easy to Learn by New Security Team members
Get detailed reports with maximum data
Set Up Virtual Machine in Linux & all Windows OS Versions
Interact with Malware Safely
If you want to test all these features now with completely free access to the sandbox:
The report reveals that 83% of Chief Information Security Officers (CISOs) believe their boards and CEOs need a better understanding of their security posture to effectively assess business risk and compliance requirements.
From bits and bytes to business risk
This lack of understanding can lead to inadequate preparedness against cyber threats, as strategic decisions may not fully consider the cybersecurity implications.
Communication Breakdown
One of the primary issues is the technical jargon often used by security teams, which can alienate non-technical senior executives.
On-Demand Webinar to Secure the Top 3 SME Attack Vectors: Watch for Free.
The Dynatrace report emphasizes the need for CISOs to translate cybersecurity challenges into business impacts to capture the C-suite’s attention and foster a culture of shared responsibility for security.
Cybersecurity risk and compliance posture
The Business Impact of Cyber Attacks
Cyber attacks can devastate organizations, from financial losses due to interrupted operations to severe reputational damage if customer data is compromised.
The most common costs and effects of these app security incidents
The report notes that 72% of organizations have experienced a security incident related to their applications in the past two years, highlighting the critical nature of robust cybersecurity measures.
Strategic Recommendations
To bridge the communication gap, the report suggests several strategies:
Enhanced Reporting: Security leaders should refine their reporting mechanisms to provide clear, actionable insights that resonate with the C-suite’s strategic goals.
Education and Engagement: Regular workshops and simulations can help demystify cybersecurity for non-technical executives, making them more engaged in decision-making.
Unified Security Framework: Adopting a comprehensive security framework that integrates various aspects of cybersecurity can help present a unified view of risks and defenses, making it easier for the board to understand and support necessary measures.
As cyber threats grow more sophisticated, the need for strategic alignment within organizations becomes more critical.
By closing the internal communication gaps, organizations can ensure a more robust defense against cyber threats, protecting their assets and reputation in the digital age.
Dynatrace report serves as a crucial wake-up call for organizations worldwide.
It highlights the urgent need for strategic alignment between security teams and executive management to enhance cybersecurity measures effectively.
As the digital landscape continues to evolve, so must the strategies we employ to protect our most valuable assets from cyber threats.
Is Your Network Under Attack? – Read CISO’s Guide to Avoiding the Next Breach – Download Free Guide
The post Internal Communication Gaps Exposes Organizations to Cyber Attacks appeared first on Cyber Security News.
“}]] Read More
Cyber Security News
Don Welch: Being a good leader. [CIO]
Don Welch: Being a good leader. [CIO]
Don Welch, Chief Information Officer from New York University sits down to share his exciting start into his cyber career. Much like many other people who started in this industry, Don went into the military, which is where it all started for him. He was told he needed to take two specialties, and so along with mechanical engineering, he decided to go into computer science as well. After taking his two crafts, he decided to leave the Army and go into the civilian world where he took a couple jobs in cyber. He landed a few jobs at different prestigious universities, including Penn State University, University of Michigan, and now New York University. He shares that being a good leader will take you far in life, saying “I will say that if you are a great leader, ultimately, you sit in your office and do nothing because you have developed your team and empowered them, and they’re making all the decisions, everything runs like clockwork and you have nothing to do.” We thank Don for sharing is story with us. Read More
The CyberWire