Remove Accountability Remove Architecture Remove Malware Remove System Administration
article thumbnail

Top 10 web application vulnerabilities in 2021–2023

SecureList

More than a third (39%) used the microservice architecture. Server-Side Request Forgery (SSRF) The popularity of the cloud and microservice architectures is on the rise. An XSS attack against the application’s clients can be used for obtaining user authentication information, such as cookies, phishing or spreading malware.

Passwords 106
article thumbnail

CSPM vs CWPP vs CIEM vs CNAPP: What’s the Difference?

eSecurity Planet

Identity discrepancies in account entitlements led to the rise of Cloud Infrastructure Entitlement Management (CIEM) a few years later, and in the last two years Cloud Native Application Protection Platforms (CNAPP) have emerged to tie together CWPP, CSPM and CIEM into a comprehensive cloud security platform.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Russian-speaking cybercrime evolution: What changed from 2016 to 2021

SecureList

We also review what pushed cybercriminals to transform their operations into the now well-known malware-as-a-service model — the use of cloud servers, the decreasing relevance of custom malware and the subsequent emergence of small, agile teams. Applications have become more complex, their architecture better.

article thumbnail

How to Improve SD-WAN Security

eSecurity Planet

SD-WAN is a virtual architecture for managing a wide-area network covering distributed, hybrid IT environments typical for today’s enterprise organizations. This cloud-centric model offers administrators granular network management opportunities while leveraging the bandwidth and reducing the cost of service delivery.

article thumbnail

IT threat evolution Q2 2021

SecureList

We discovered the malware as part of an attack against a high-profile organization in Vietnam. We found the loader for this file so interesting that we decided to base one of the tracks of our Targeted Malware Reverse Engineering course on it. The exploit-chain attempts to install malware in the system through a dropper.

article thumbnail

Group-IB uncovers PerSwaysion – sophisticated phishing campaign targeting executives worldwide

Security Affairs

The PerSwaysion campaign proliferates with alarming rates by leveraging compromised accounts’ email data to select further targets who hold important roles in their companies and share business relations with the victims. New round of phishing attempts leveraging current victim’s account usually takes less than 24 hours.

article thumbnail

A guide to OWASP’s secure coding

CyberSecurity Insiders

Furthermore, whether developing software for portable gadgets, desktop systems, or servers, secure coding is critical for modern software development. According to the Software Engineering Institute, software architecture or coding flaws are responsible for up to 90% of security problems. Implement password hashing on a trusted system.