This Week in Technology

This Week in Technology

By Eric Corcoran
Posted in Technology Week in Review
On January 31, 2025

Monday 1/27

The anatomy of a Toxic Combination of Risk (Wiz)

In cloud security, the key to proactively managing your attack surface is understanding how different risk factors combine to create attack paths that would lead to significant business impact. In this blog, we’ll explore how cloud security solutions can uncover these "toxic combinations" of risk and why certain tools are better equipped to do so.

https://www.wiz.io/blog/the-anatomy-of-a-toxic-combination-of-risk

Staying Ahead: Proactive Cybersecurity in the Era of Evolving Threats (Adlumin)

Over the past few years, we have seen a significant shift in threats with a rise in Advanced Persistent Threat (APT) groups. These groups have a specific goal and aim to infiltrate and maintain long-term access to systems and networks. Another growing threat in the cyber landscape is ransomware attacks.

https://adlumin.com/post/staying-ahead-proactive-cybersecurity-in-the-era-of-evolving-threats/

Tuesday 1/28

CIS Safeguard 2.6: Allowlist Authorized Libraries

https://www.gothamtg.com/blog/cis-safeguard-26-allowlist-authorized-libraries

How to manage and protect Non-human Identities (NHIs) (Delinea)

While human identities rely on predictable behaviors and access patterns, NHIs operate at high speed and scale, often with complex interdependencies that require specialized management. This distinction is critical, as traditional identity management frameworks designed for humans fall short in addressing the unique lifecycle and security needs of NHIs.

https://delinea.com/blog/how-to-manage-and-protect-non-human-identities-nhis

Wednesday 1/29

 

Proactive troubleshooting for high-performance block storage (NetApp)

The ability to detect and address anomalies in data infrastructure before they lead to incidents is invaluable. Early detection and resolution of anomalies prevent minor issues from becoming major problems, reducing downtime and ensuring smooth operations.

https://www.netapp.com/blog/anomaly-detection-block-storage/

Thursday 1/30

It’s time to upgrade your hypervisor to XenServer 8! (Citrix)

With 2025 officially underway, there is an important date to be aware of: Citrix Hypervisor 8.2 Cumulative Update 1 (CU1) will reach End of Life on June 25, 2025. This is a great opportunity to upgrade your hypervisor to XenServer 8.

https://www.citrix.com/blogs/2025/01/29/time-to-upgrade-your-hypervisor-to-xenserver-8/

HTTP Client Tools Exploitation for Account Takeover Attacks (ProofPoint)

Threat actors employed user enumeration methods to identify valid email addresses before executing other threat vectors, such as spear phishing and password spraying. This technique generated high volumes of login attempts, mostly aimed at nonexistent accounts.

https://www.proofpoint.com/us/blog/threat-insight/http-client-tools-exploitation-account-takeover-attacks

Friday 1/31

CrowdStrike Researchers Explore Contrastive Learning to Enhance Detection Against Emerging Malware Threats (CrowdStrike)

Applying self-supervised learning to Portable Executable files enhances the effectiveness of machine learning in cybersecurity, which is crucial to address the evolving threat landscape.

https://www.crowdstrike.com/en-us/blog/contrastive-learning-enhance-malware-threat-detection/

The Evolution of Fraud: How Deepfake Technology is Changing Cybercrime (CyberArk)

The evolution of this attack vector has been rapid due to the commercial availability of deepfake apps. Deepfake fraud is a global problem, with each country trying to find effective controls. In the U.S., the Federal Communications Commission (FCC) has released a consumer guide on this issue.

https://www.cyberark.com/resources/blog/the-evolution-of-fraud-how-deepfake-technology-is-changing-cybercrime