Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

A strategic guide to implementing attack surface monitoring

As cyber threats evolve, the importance of attack surface monitoring has never been clearer. In today’s interconnected world, businesses face an unprecedented level of exposure. From web applications and cloud infrastructure to employee credentials and third-party SaaS integrations, your digital footprint offers numerous entry points for potential attackers.

Emerging Security Issue: HashiCorp Vault SSH CVE-2024-7594

CVE-2024-7594 is a severe unrestricted authentication issue affecting HashiCorp’s Vault’s SSH secrets engine. The National Institute of Standards and Technology (NIST) has not yet evaluated this vulnerability’s CVSS score but HashiCorp assigned it a base score of 7.5 (high). An outside security researcher, Jörn Heissler, discovered an issue with the valid_principals field in Vault’s SSH secrets engine.

Think your attack surface is covered? Let's look at the math.

When it comes to security, organizations often consider themselves well-covered. But in today’s landscape, where cybersecurity threats evolve at breakneck speed, even the most well-prepared teams cannot afford to have testing gaps. The reality is that if your primary strategy for removing security testing gaps is tightening scanning policies or expanding penetration test scope, you are trying to patch a dam with bubble gum. Is your attack surface covered?

Emerging Security Issue: SolarWinds Web Help Desk CVE-2024-28987

CVE-2024-28987 is a critical (CVSS v3 score: 9.1) hardcoded credential vulnerability in the SolarWinds Web Help Desk (WHD) software. If exploited, this Java deserialization remote code execution (RCE) vulnerability allows attackers remote unauthenticated access to create, read, update and delete data on specific WHD endpoints.

Critical Linux CUPS Flaws Could Lead to Remote Command Execution

CUPS is a suite of programs and daemons that provide local and network printing capabilities on Unix-like systems such as Linux and macOS. Versions before and including 2.0.1 are vulnerable to CVE-2024-47076 (libcupsfilters), CVE-2024-47175 (libppd), CVE-2024-47176 (cups-browsed) and CVE-2024-47177 (cups-filters), all of which can be chained together to allow remote unauthenticated code execution. At this time there is no updated version available.

Emerging Security Issue: Progress Software WhatsUp Gold (CVE-2024-6670)

CVE-2024-6670 is a critical (CVSS v3 score: 9.8) SQL injection vulnerability. Threat researcher Sina Kheirkhah (@SinSinology) of Summoning Team (@SummoningTeam) discovered that, if the application is configured with only one user, unauthenticated attackers can leverage this vulnerability to retrieve users’ encrypted passwords.

Complexity of Attack Surface Management in Cloud Environments

Legacy attack surfaces were small and simple. There were fewer servers and endpoints to protect. The tooling required to secure it was basic – perimeter firewalls, antivirus software, and server/network/application monitoring tools. When organizations migrate to the cloud, things change and become complex. For starters, on-premise infrastructure and applications can’t be left out in favor of the cloud. Most organizations run hybrid setups.

The most effective attack surface management tools and techniques

The ability to manage and monitor your attack surface is no longer a luxury—it’s a necessity. The rapid expansion of networks, coupled with the shift to cloud computing and remote work, has created a vast and ever-changing attack surface that requires constant vigilance. This article delves into the most effective attack surface management tools and techniques, offering insights into how they can bolster your cyber security posture and safeguard your organisation against evolving threats.

Top 10 EASM Solutions for 2024

The expansion of your attack surface is inevitable. As your business grows, so does the need to leverage API integrations and third-party tooling to ensure your product remains competitive. But what about ensuring that your product remains secure? The proportion of breaches involving supply chain interconnection increased by 68% between 2023 and 2024. Attackers are not just interested in your data – they are after the weak links in your interconnected systems.