3CX data exposed, third-party to blame

A third-party vendor of 3CX, a popular Voice over Internet Protocol (VoIP) comms provider, left an open server and exposed sensitive 3CX data. The issue went under the company’s radar, even though it was recently targeted by North Korean hackers.…

IT Security News Daily Summary 2023-06-20

Passwords out, passkeys in: are you ready to make the switch? Netskope Enables Secure Enterprise Use of ChatGPT and Generative AI Applications Cymulate Announces Security Analytics for Continuous Threat Exposure Management eSentire’s AI Investigator Chatbot Aids Human Response to Security…

New Tsunami botnet targets Linux SSH servers

Researchers warn of an ongoing Tsunami DDoS botnet campaign targeting inadequately protected Linux SSH servers. Researchers from AhnLab Security Emergency response Center (ASEC) have uncovered an ongoing hacking campaign, aimed at poorly protected Linux SSH servers, to install the Tsunami…

Modern Access Control Explained

There is a lot of confusion around modern authorization. In this post, I lay out the differences between authentication and authorization and review the evolving challenge of application authorization. I then describe the two approaches to cloud-native access control and…

Communicating Cyber Risk

CISOs struggle with the board amidst an economic downturn. By Tim Fleming, Strategic Advisor, Silverfort Cyber risk is now nailed firmly to the board table. A seemingly never-ending procession of […] The post Communicating Cyber Risk appeared first on Cyber…