Remove Libraries Remove Risk Remove Systems administration Remove Tools
article thumbnail

MY TAKE: Log4j’s big lesson – legacy tools, new tech are both needed to secure modern networks

The Last Watchdog

What’s more, it will likely take a blend of legacy security technologies – in advanced iterations – combined with a new class of smart security tools to cut through the complexities of defending contemporary business networks. Log4j, for instance, is a ubiquitous logging library. Legacy tech’s role.

Security 223
article thumbnail

RSAC insights: Software tampering escalates as bad actors take advantage of ‘dependency confusion’

The Last Watchdog

The perpetrators of the Solar Winds breach , for instance, tampered with a build system of the widely-used Orion network management tool. Log4J, aka Log4Shell, refers to a gaping vulnerability that exists in an open-source logging library that’s deeply embedded within servers and applications all across the public Internet.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MY TAKE: Memory hacking arises as a go-to tactic to carry out deep, persistent incursions

The Last Watchdog

For instance, major vulnerability was discovered lurking in the GNU C Library, or GLIBC, an open source component that runs deep inside of Linux operating systems used widely in enterprise settings. Because PowerShell executes in memory, it works out beautifully as a ready-made attack tool. Instead, memory attacks are transient.

article thumbnail

3 Reasons Your Security Testing Tool Needs To Do Regression Testing

ForAllSecure

That's why incorporating regression testing into your security testing strategy is a best practice for minimizing risk. Regression Testing and Security You can use regression testing to manage many types of risks, not just security risks. Yet, regression testing is a technique that security teams should also embrace.

article thumbnail

Will Autonomous Security Kill CVEs?

ForAllSecure

That manual process is holding automated tools back. When your organization builds and deploys an app, you're also inheriting the risk from each and every one of those code components. The risks don’t stop there. For example: Software Component Analysis tools (e.g., Software is Assembled. Container Scanners (e.g.,

article thumbnail

Will Autonomous Security Kill CVEs?

ForAllSecure

That manual process is holding automated tools back. When your organization builds and deploys an app, you're also inheriting the risk from each and every one of those code components. The risks don’t stop there. For example: Software Component Analysis tools (e.g., Software is Assembled. Container Scanners (e.g.,

article thumbnail

WILL AUTONOMOUS SECURITY KILL CVES?

ForAllSecure

That manual process is holding automated tools back. When your organization builds and deploys an app, you're also inheriting the risk from each and every one of those code components. The risks don’t stop there. For example: Software Component Analysis tools (e.g., Software is Assembled. Container Scanners (e.g.,