-
4 Top Security Automation Use Casesby Rajaguru TWith Gartner recently declaring that SOAR (security orchestration, automation, and response) is being phased out in favor of generative AI-based solutions, this article will explore in detail four key security automation use cases. 1. Enriching Indicators of Compromise (IoCs) Indicators of compromise (IoCs), such as suspicious IP addresses, domains, and file hashes, are vital… Read more: <span class="bsf-rt-reading-time"><span class="bsf-rt-display-label" prefix="⏰"></span> <span class="bsf-rt-display-time" reading_time="6"></span> <span class="bsf-rt-display-postfix" postfix="mins read"></span></span><!– .bsf-rt-reading-time –>4 Top Security Automation Use Cases
-
LiteSpeed Cache bug exposes 6 million WordPress sites to takeover attacksby Rajaguru TYet, another critical severity vulnerability has been discovered in LiteSpeed Cache, a caching plugin speeding up user browsing on over 6 million WordPress sites. The flaw, tracked as CVE-2024-44000 and categorized as an unauthenticated account takeover issue, was discovered by Patchstack’s Rafie Muhammad on August 22, 2024. A fix was made available with the release… Read more: <span class="bsf-rt-reading-time"><span class="bsf-rt-display-label" prefix="⏰"></span> <span class="bsf-rt-display-time" reading_time="2"></span> <span class="bsf-rt-display-postfix" postfix="mins read"></span></span><!– .bsf-rt-reading-time –>LiteSpeed Cache bug exposes 6 million WordPress sites to takeover attacks
-
Google tags a tenth Chrome zero-day as exploited this yearby Rajaguru TToday, Google revealed that it patched the tenth zero-day exploited in the wild in 2024 by attackers or security researchers during hacking contests. Tracked as CVE-2024-7965 and reported by a security researcher known only as TheDog, the now-patched high-severity vulnerability is caused by a bug in the compiler backend when selecting the instructions to generate for just-in-time… Read more: <span class="bsf-rt-reading-time"><span class="bsf-rt-display-label" prefix="⏰"></span> <span class="bsf-rt-display-time" reading_time="3"></span> <span class="bsf-rt-display-postfix" postfix="mins read"></span></span><!– .bsf-rt-reading-time –>Google tags a tenth Chrome zero-day as exploited this year
-
Ransomware gang deploys new malware to kill security softwareby Rajaguru TRansomHub ransomware operators are now deploying new malware to disable Endpoint Detection and Response (EDR) security software in Bring Your Own Vulnerable Driver (BYOVD) attacks. Named EDRKillShifter by Sophos security researchers who discovered it during a May 2024 ransomware investigation, the malware deploys a legitimate, vulnerable driver on targeted devices to escalate… Read more: <span class="bsf-rt-reading-time"><span class="bsf-rt-display-label" prefix="⏰"></span> <span class="bsf-rt-display-time" reading_time="3"></span> <span class="bsf-rt-display-postfix" postfix="mins read"></span></span><!– .bsf-rt-reading-time –>Ransomware gang deploys new malware to kill security software
-
Kicking cyber security down the road can come back to bite youby AkcharaThe consequences of a successful cyber attack can be disastrous. They can lead to untold operational disruption from substantial financial loss to significant reputational damage. Yet despite the clear and present danger, some businesses continue to deprioritize cyber security, with a concerning 15% failing to invest in cyber security measures. Whether this is a… Read more: <span class="bsf-rt-reading-time"><span class="bsf-rt-display-label" prefix="⏰"></span> <span class="bsf-rt-display-time" reading_time="4"></span> <span class="bsf-rt-display-postfix" postfix="mins read"></span></span><!– .bsf-rt-reading-time –>Kicking cyber security down the road can come back to bite you