Page 13 - Threat Intelligence 8-21-2019
P. 13

Web / Internet Threats

















              How dodgy browser plugins, web scripts can silently rewrite that URL you were about to hit –
              and throw you into an internet wormhole - Analysis Clickjacking, which came to the attention of
              security types more than a decade ago, continues to thrive, despite defenses deployed since then
              by browser makers.Boffins from Microsoft and universities in China, South Korea and the US
              recently looked at the Alexa top 250K websites and identified three different clickjacking
              techniques currently being used to intercept clicks.

                     Source: https://www.theregister.co.uk/2019/08/15/hijacked_clicks_research/



              Why 2-factor authentication isn't foolproof - I've worked with two-factor authentication (2FA) for
              years, primarily using VPN connections and access to highly secure systems. It works via a
              something-you-have-plus-something-you-know mechanism whereby users enter a pin/password
              followed by the numbers displayed on a secure token device. The goal is to make it impossible for
              attackers to access secured systems and accounts, but it's not perfect. I spoke about 2FA
              vulnerabilities and prevention tips with two security solutions providers: Stephen Cox, vice
              president and chief security architect at SecureAuth; and Bojan Simic, co-founder and CTO, HYPR.
                     Source: https://www.techrepublic.com/article/why-2-factor-authentication-isnt-foolproof/



              8 New HTTP/2 Implementation Flaws Expose Websites to DoS Attacks - Various implementations
              of HTTP/2, the latest version of the HTTP network protocol, have been found vulnerable to multiple
              security vulnerabilities affecting the most popular web server software, including Apache,
              Microsoft's IIS, and NGINX. Launched in May 2015, HTTP/2 has been designed for better security
              and improved online experience by speeding up page loads. Today, over hundreds of millions of
              websites, or some 40 percent of all the sites on the Internet, are running using HTTP/2 protocol.
                     Source: https://thehackernews.com/2019/08/http2-dos-vulnerability.html



              Organizations that scan applications in production have a reduced risk of being breached - Setu
              Kulkarni, WhiteHat’s VP of Strategy and Business Development, said, “It is more critical than ever
              that digital transformation initiatives must include a robust application security program." The 2019
              STATS report builds on the DevSecOps framework we had outlined last year and advances it with
              supporting metrics, to help our customers build consensus for securing applications and reducing
              risks, costs and complexity.

                     Source: https://www.helpnetsecurity.com/2019/08/15/scan-applications-in-production/







                                                    www.accumepartners.com
                                                                                                                    13
   8   9   10   11   12   13   14   15   16   17   18