• Alibaba Cloud Zero Trust Practice: Identity and Network Micro-Isolation in Production Networks Alibaba Cloud Zero Trust Practice: Identity and Network Micro-Isolation in Production Networks
  • Apache Struts2 framework remote code execution vulnerability Apache Struts2 framework remote code execution vulnerability

Topic introduction Chief Security Officer - Your think tank of security experts How to become a chief security officer

  • Windows Local Privilege Escalation (LPE) Zero-Day Vulnerability Sold on the Dark Web

    The dark web is selling a Windows Local Privilege Escalation (LPE) zero-day vulnerability that reportedly affects multiple versions of the Windows operating system, including the latest version. This alarming development has been disclosed via an underground marketplace where threat actors have provided detailed specifications and capabilities of the vulnerability.

    June 1, 2024
  • [CVE-2024-32002] Git Code Version Control Software Remote Code Execution Vulnerability with POC/Exploit

    CVE-2024-32002 is a vulnerability in Git that enables RCE git clone during operation.By crafting repositories with submodules in a specific way, an attacker can execute malicious hooks by writing files to the directory .git/ using case-insensitive symbolic link handling on the file system.

    May 28, 2024
  • GitHub Enterprise Server Exposed to Serious High-Risk Authentication Bypass Vulnerability

    An authentication bypass vulnerability in GitHub Enterprise Server (GHES) when using SAML single sign-on with optional cryptographic assertions can be exploited by an attacker to spoof a SAML response to configure and gain site administrator privileges. This allows an attacker to gain unauthorized access to an instance without prior authentication.

    May 22, 2024
  • UK Government's Artificial Intelligence (AI) Safety Institute launches new AI safety assessment platform

    Artificial Intelligence Security Research released Inspect, an open-source testing platform designed to assess the safety and performance of AI models.Inspect detects the core knowledge, reasoning and autonomy of AI models, fostering the development of the global AI community, and Inspect becomes a cornerstone of AI security research.

    May 17, 2024
  • Google Cloud mistakenly deletes user accounts leading to data loss and prolonged business downtime

    According to The Guardian, Google Cloud Services recently suffered a major, never-before-seen misconfiguration incident that resulted in the deletion of a cloud subscription account for Australia's UniSuper fund and a week-long disruption in service.
    UniSuper is a not-for-profit pension fund that manages a massive $125 billion with over half a million investors.
    Although UniSuper made data backups in two cloud regions of Google Cloud, this major incident was caused by account deletions, resulting in the loss of both backups at the same time, which did not provide protection.
    It was good that UniSuper had data backed up with other storage providers as well, which minimized the damage caused by this incident and accelerated the process of UniSuper's recovery of data on Google Cloud.

    May 13, 2024
  • Palo Alto Networks Firewall Exposed to Zero-Day Vulnerability, Hacker Groups Use Implanted Backdoor Programs to Steal Data

    A critical zero-day vulnerability (CVE-2024-3400) in Palo Alto Networks PAN-OS software has been actively exploited by the hacker group UTA0218 in an attack campaign codenamed "Operation Midnight Eclipse". The vulnerability allows attackers to plant a Python backdoor program, gain system privileges, and perform lateral movement and data theft on the victim's network. Affected devices include PAN-OS 10.2, PAN-OS 11.0, and PAN-OS 11.1 firewalls with the GlobalProtect gateway and device telemetry enabled.Palo Alto Networks has issued a security advisory with a remediation patch, and recommends users update as soon as possible.

    May 7, 2024
  • How to Spot Attackers in the Early Stages of the Cyber Kill Chain

    How to detect and stop suspicious activity before it evolves into a more serious threat. For example, by using OSINT (Open Source Intelligence) technology and network traffic monitoring, organizations can stay one step ahead of attackers and protect their networks and sensitive data from devastating cyberattacks.

    April 24, 2024
  • Open Source Software Grafana Platform SQL Injection High Risk Vulnerability

    An injection vulnerability exists in the open source software grafana, where an attacker can use a post request to the /api/ds/query api, and then they can modify the "rawSql" file to execute a malicious sql string, resulting in a blind time-based sql injection vulnerability that poses the threat of a database compromise.

    April 23, 2024
  • Data Finance: Valuation Assessment of the Potential Scale of Data Assetization

    The development of China's data factor market is on the road from resourceization to assetization, and the typical feature of data assetization is that data can play its role as a factor of production through circulation in a wider range outside the generating subject.
    In terms of specific data asset valuation methods, the main ones elaborated in the existing literature are the cost method, the market method, the income method and the valuation technique method. For the cost method, although it has the characteristics of simple operation and easy landing, it also has the disadvantages of easy underestimation of value and difficult to accurately measure. For the market approach, although it can be more objective, truly reflect the value of data assets, and easy to be accepted by the market, but because of the need to have an open and active trading market, so it is difficult to practice on a wide scale in the short term. For the income approach, although it can better highlight the intrinsic value of the data, but due to the difficulty of reliable measurement of the future earnings of data assets, it is also difficult to land in the operation. For the valuation technique method, although it combines the advantages of fully reflecting the true value of data, not requiring an active market, and not having to accurately measure the future earnings of data assets, it is still in the exploratory stage because it requires a large amount of data on the value of data assets to be obtained in advance to train the model.

    March 18, 2024
  • Speed and "Hidden Dangers": The Hidden Crisis Behind the Instant Delivery Industry

    State of the Industry Currently, residents' consumption is showing an online trend, and along with the change in the main force of consumption, the demand for instant delivery services is further growing. Data shows that nearly 25% of consumers use instant delivery service more than 10 times a month, and the consumers who use the service monthly...

    March 11, 2024
Load more posts