I would think most would agree that it wouldn’t be too much of a stretch to draw the parallel between security tools and medicines and threats as diseases which brings us to the tried but true analogy of “the medicine is worth the cure”.
I would think most would agree that it wouldn’t be too much of a stretch to draw the parallel between security tools and medicines and threats as diseases which brings us to the tried but true analogy of “the medicine is worth the cure”.
Security Brief Asia is reporting on new research showing more than 40 billion records were exposed by data breaches in 2021. According to the research from Tenable's Security Response Teams, they found a considerable increase in breach incidents, with 1,825 breach data incidents publicly disclosed between November 2020 and October 2021, compared with the same period in 2020, which saw 730 publicly disclosed events with just over 22 billion records exposed.
Back in September of 2021 we wrote that the OWASP working group had a draft of latest Top 10 Web Application Security Risks, their first update since the 2017 revision. The working group finalized their list and published a final version a month later in October of 2021. With the list out for a few months now, let's take a quick look at what's changed with the new OWASP Top 10.
Now that 2021 has ended, we can see the final tally of vulnerabilities recorded for 2021. The year ended with a total of 20,061 vulnerabilities recorded, 9.3% over the prior year and the most ever recorded of any year since the database began.
Nearly every organization can be infiltrated by cyber attackers, based on data from dozens of penetration tests and security assessments. The vast majority of businesses can be compromised within a month by a motivated attacker using common techniques, such as compromising credential, exploiting known vulnerabilities in software and Web applications, or taking advantage of configuration flaws.
The Log4J vulnerability has been given a CVSS Score of 10, making it the most serious of discovered flaws. VentureBeat is reporting that Log4J attacks have been attempted on 44% of corporate networks. Find out how to protect against Log4J attacks.
We recently wrote about the newly discovered vulnerability in LOG4J2 (also referred to as LOG4SHELL). Since we wrote our blog article, the LOG4SHELL vulnerability has been covered by major news outlets and is poised to pass both the Struts and Heartbleed vulnerabilities in terms of security and financial impact on organizations.
A recently discovered vulnerability in LOG4J2 (also referred to as LOG4SHELL) is being widely reported as one of the most dangerous vulnerabilities in application software to date. There is already news that it is being exploited in the wild, putting widely used applications and cloud services at risk. Runtime Application Security (RASP) solutions are the only solutions that prevent exploitation of this vulnerability in real-time without the need for patching.
While Interactive Application Security Testing (IAST) is still a relatively new technology from the perspective of adoption, it has been around for over 10 years and some of the aspects and capabilities around IAST are well understood, such as improved vulnerability detection, achieved by “looking” inside the application at runtime. But there are features your IAST should be able to give you. Check out our list here.
On December 8, 2021 we just hit another milestone with the number of vulnerabilities recorded in the US CERT Vulnerability Database (so far in 2021) exceeding the total count in 2020, marking a fifth record year of vulnerabilities discovered in production code.