- livestream and podcast
Duration: Weekly, 90 minutes
Title: Cybersecurity Growth #2 - Practical uses of the Secure Controls Framework
Welcome to Cybersecurity Growth. A show for aspiring and existing cybersecurity leaders. I’m your host Shawn Valle, Exec Director and CISO of Cybersecurity Growth
Former Chief Security Officer of Rapid7 and former CISO of Tricentis
Musician here on Twitch and elsewhere, MusicBySV (more on that later)
New emergent threat response: "CVE-2022-47966: Rapid7 Observed Exploitation of Critical ManageEngine Vulnerability."
Glenn Thorpe of Rapid7 “This has kept us busy over the past 24+ hours. If you’re running ManageEngine software you should:
1. Patch it always no questions asked just do it.
2a. Keep it as segmented as possible from the public internet regardless of its function.
2b. Migrate away from it.”
Dozens of products impacted.
Access Manager Plus*
Active Directory 360**
Application Control Plus*
Browser Security Plus*
Device Control Plus*
Endpoint Central MSP*
Key Manager Plus*
Password Manager Pro*
Patch Manager Plus*
Remote Access Plus*
Remote Monitoring and Management (RMM)*
ServiceDesk Plus MSP**
Vulnerability Manager Plus*
By Tim Ferrill CSO Online
XDR is a relatively new class of security tool that combines and builds on the strongest elements of security incident and event management (SIEM), endpoint detection and response (EDR), and even security orchestration and response (SOAR).
Palo Alto Networks Cortex XDR,
Crowdstrike Falcon Insight XDR,
Bitdefender GravityZone Business Security Enterprise,
SentinelOne Singularity XDR,
VMware Carbon Black XDR,
Elastic Security for XDR,
Trellix XDR Platform,
Cynet 360 AutoXDR
Fortinet disclosed that a critical vulnerability in its FortiOS operating system was being exploited by attackers in the wild. This week, after additional analysis, the company released more details…
…the original zero-day attack was highly targeted to government-related entities…
… CVE-2022-42475, is in the SSL-VPN functionality of FortiOS and can be exploited by remote attackers without authentication. Successful exploitation can result in the execution of arbitrary code and commands.
Patch your Fortinet gear.
- Practical uses of the Secure Controls Framework
- Talk about music