Threat Actors and APTs Target Australia, Stealing Over 50 Million Credentials

Threat Actors and APTs Target Australia, Stealing Over 50 Million Credentials

2022 has been an auspicious year for threat actors and Advanced Persistent Threat (APT) groups targeting Australia, with adversaries stealing over 50 million credentials and personal information—a 99 percent increase compared to 2021. The post <strong>Threat Actors and APTs Target Australia, Stealing Over 50 Million Credentials</strong> appeared first on Flashpoint ... Read More
What You Need to Know About the Cyber Threat Landscape in 2023

What You Need to Know About the Cyber Threat Landscape in 2023

Our new report dives into the perpetual cycles of cybercrime and shows organizations how consolidated intelligence empowers them to fight back The post What You Need to Know About the Cyber Threat Landscape in 2023 appeared first on Flashpoint ... Read More
What You Need to Know About the Apache Commons Text Flaw (CVE-2022-42889)

What You Need to Know About the Apache Commons Text Flaw (CVE-2022-42889)

Vulnerability researchers and media sources are paying a lot of attention to CVE-2022-42889, a vulnerability affecting the open source library Apache Commons Text, which could potentially allow a malicious actor to execute arbitrary code. The post What You Need to Know About the Apache Commons Text Flaw (CVE-2022-42889) appeared first ... Read More
Why Vulnerability Management Programs Need Visibility Into Over 300,000 Vulnerabilities

Why Vulnerability Management Programs Need Visibility Into Over 300,000 Vulnerabilities

Flashpoint has been identifying and collecting vulnerabilities as they become available—with VulnDB now covering over 300,000 vulnerabilities affecting all manners of IT, IoT, and third-party libraries and dependencies. The post Why Vulnerability Management Programs Need Visibility Into Over 300,000 Vulnerabilities appeared first on Flashpoint ... Read More
How to Comply With the DoD’s Newer and Stricter Software Requirements

How to Comply With the DoD’s Newer and Stricter Software Requirements

We break down H.R. 7900, a well-intentioned but perhaps unrealistic bill that requires companies working with the DoD to provide a software bill of materials (SBOM) and patch all known vulnerabilities. The post How to Comply With the DoD’s Newer and Stricter Software Requirements appeared first on Flashpoint ... Read More
How to Comply With the US Government’s Strict Software Requirements

How to Comply With the US Government’s Strict Software Requirements

We break down H.R. 7900, a well-intentioned but perhaps unrealistic bill that requires companies working with the DoD to provide a software bill of materials (SBOM) and patch all known vulnerabilities. The post How to Comply With the US Government’s Strict Software Requirements appeared first on Flashpoint ... Read More
SBOM, CycloneDX and Dependency-Track, with Steve Springett | The Right Security

What Is an SBOM? The Importance of a Software Bill of Materials

Cyber attacks like Log4Shell have led the Biden administration to work closely with security experts, as well as the Cybersecurity and Infrastructure Security Agency (CISA) to produce government resources and legislation intended to improve the United States’ security posture. The post What Is an SBOM? The Importance of a Software ... Read More
SBOM, CycloneDX and Dependency-Track, with Steve Springett | The Right Security

What Is an SBOM? The Importance of a Software Bill of Materials

Cyber attacks like Log4Shell have led the Biden administration to work closely with security experts, as well as the Cybersecurity and Infrastructure Security Agency (CISA) to produce government resources and legislation intended to improve the United States’ security posture. The post What Is an SBOM? The Importance of a Software ... Read More
1,980 Data Breaches Were Reported in 2022 H1 and 60% Were the Result of Hacking

1,980 Data Breaches Were Reported in 2022 H1 and 60% Were the Result of Hacking

Today, Flashpoint releases the State of Data Breach Intelligence: 2022 Midyear Edition, which covers publicly disclosed compromise events first reported between January 1, 2022 and June 30, 2022. The post 1,980 Data Breaches Were Reported in 2022 H1 and 60% Were the Result of Hacking appeared first on Flashpoint ... Read More
Organizations Deploying NetModule Router Software May Be Vulnerable to Exploitation

Organizations Deploying NetModule Router Software May Be Vulnerable to Exploitation

Flashpoint discovered two new critical vulnerabilities affecting NetModule Router Software (NRSW), which could allow remote attackers to bypass authentication and access certain administrative functionality. The post Organizations Deploying NetModule Router Software May Be Vulnerable to Exploitation appeared first on Flashpoint ... Read More
Loading...