This Week in Technology

This Week in Technology

By Eric Corcoran
Posted in Technology Week in Review
On December 16, 2022

Monday 12/12

 

Client-Side Defense: The Missing Piece in Your Holiday Security Armor (F5)

Without visibility into the code that runs in your environment, companies cannot detect when code has changed or been compromised. These scripts provide threat actors a wide attack surface to exploit, allowing security incidents to occur directly in the customer’s browser without the user or merchant realizing it.

https://bit.ly/3iWkbBa

Pure Storage CEO: ‘The Days Of The Hard Disk In The Data Center Are Over’ (Pure Storage)

Combined with Pure Storage’s own intellectual property for dealing with low-cost QLC NAND, the company’s QLC-based flash storage systems are now competitive with hybrid disk-based systems on a price-per-bit level years ahead of the commodity crossover point.

https://bit.ly/3Buu3IR

Tuesday 12/13

Work From Home: Compliance Risks, Collaboration and Security (Proofpoint)

Many organizations, including those in the financial services industry, remain concerned about the readiness, comfort level, and compliance issues they might face if they enable a remote workforce for the long term.

https://bit.ly/3UTg2LA

November 2022’s Most Wanted Malware: A Month of Comebacks for Trojans as Emotet and Qbot Make an Impact (Check Point)

Check Point Research reports that Emotet has returned after a quiet summer, now the second most prevalent malware globally. Qbot has also made it back into the index for the first time since 2021, while the Education sector remains under attack.

https://bit.ly/3VVOC97

Wednesday 12/14

Improving Security Posture at Home: The Other Cyber Battleground (Arctic Wolf)

Bad actors can strike at all hours and utilize any and every vulnerability to gain access to valuable networks and assets — no matter where the device may be or what the user may be using it for.

https://bit.ly/3URGkxT

2023 Trends: Artificial Intelligence Will Play an Increasingly Important Role on Both Sides of the Cyberwar Battlefield (Cybersixgill)

AI creates new opportunities for cyber attacks and alliances among threat groups. As a result, organizations increasingly face more significant challenges in taking proactive cybersecurity measures.

https://bit.ly/3WzhtAf

Thursday 12/15

Critical security update now available for Citrix ADC, Citrix Gateway (Citrix)

Customers who are using an affected build with a SAML SP or IdP configuration are urged to install the recommended builds immediately as this vulnerability has been identified as critical (CTX474995). No workarounds are available for this vulnerability.

https://bit.ly/3G4IRAJ

Unveiling CrowdStrike Falcon Surface: The Industry’s Most Complete Adversary-Driven External Attack Surface Management (EASM) Technology (CrowdStrike)

Gartner identified attack surface expansion as the number one trend in its most recent Top Security and Risk Management Trends for 2022, turning EASM into a critical tool in the cybersecurity arsenal.

https://bit.ly/3W1X4Us

Friday 12/16

Find and Fix Your Unknown Risk With Active Attack Surface Management (Palo Alto Networks)

Attackers are using automation to actively find the path of least resistance while security teams are still struggling to inventory all their internet-facing assets, and identify potential security risks across on-prem and cloud.

https://bit.ly/3uYX4st

Readout of Second Joint Ransomware Task Force Meeting (CISA)

In today’s meeting, the JRTF reviewed efforts and actions aimed at reducing the prevalence and impact of ransomware incidents.

https://bit.ly/3veYYp7