Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

New Vulnerabilities Similar to CVE-2023-34362 Identified in MOVEit Transfer and MOVEit Cloud

On June 9, 2023, Progress released a security advisory detailing newly discovered SQL injection vulnerabilities impacting the MOVEit Transfer web application and Cloud. The vulnerabilities are distinct from CVE-2023-34362, which was actively exploited by Clop Ransomware to exfiltrate data and extort compromised organizations. Although distinct, the vulnerabilities result in nearly identical unauthorized access where threat actors could modify or disclose MOVEit database content.

Transitioning to Tines cases for automation tasks

Here at Tines, we’re laser-focused on listening to our customers and being the solution they need. It’s why Tines was created in the first place — to be the solution our founders needed but couldn’t find, so they built it themselves. In the same vein, we heard from our customers that they wanted a place to collaborate and track incidents, analyze them, and use the data to build even better automated workflows. Enter cases. Cases offer a space for your team to collaborate.

Snyk integrates with AWS Security Hub to automate security remediation workflows

AWS Security Hub is a cloud security posture management platform (CSPM) that automates security best practice checks, aggregates security alerts, and understands your overall security posture across different AWS accounts. AWS Security Hub ingests security findings from other security services like Amazon GuardDuty, Amazon Inspector, Amazon Macie, AWS IAM, and AWS Firewall Manager — as well as findings from partners like Snyk.

Snyk integrates with Amazon EventBridge to enable secure AppDev at scale

In today’s highly dynamic application ecosystem, the number and scope of security issues that developers need to address have increased dramatically, making it imperative for modern development teams to have an automated system to handle security events across every application component.

Hundreds of Companies Using the MOVEit File Service Lose Confidential Data to a Ransomware Attack

MOVEit, a massive global fire-sharing service provider, recently suffered a data breach that could impact 100's of corporations in the United States, Europe, and many other areas of the world. The file-transfer service provider is supposed to offer a secure transfer solution, and it appears that it may not be as secure as so many hoped. This breach is the result of a ransomware attack, and that attack could result in substantial losses for so many involved.

Top tools and technologies for Privileged Access Management

Privileged Access Management (PAM) plays a vital role in organizational security by enabling control and monitoring of privileged accounts and resources. These accounts possess elevated access privileges, making them attractive targets for attackers seeking unauthorized entry into sensitive systems and data. By implementing PAM, organizations can mitigate the risk of security breaches and data loss by enforcing strict access limitations on privileged accounts.