CyRC Vulnerability Advisory: CVE-2023-7060 Missing Security Control in Zephyr OS IP Packet Handling

CyRC Vulnerability Advisory: CVE-2023-7060 Missing Security Control in Zephyr OS IP Packet Handling

IP address spoofing involves creating Internet Protocol (IP) packets with a fake source IP address. This is typically done with the intention of deceiving the recipient into believing that the packet is coming from a legitimate source. When the recipient sends a response back to the source IP address, it is sent to the fake source IP address instead. Zephyr OS network stack implementation does not drop IP packets arriving from an external interface with a source address equal to the localhost or the destination address, which is a violation of ...

Podcasts

Business News ↓

Tenable Comment: CVE-2022-38028: GooseEgg EoP Exploit

The Russia-based threat actor, known as APT28 or Forest Blizzard, has recently been exploiting a vulnerability known as CVE-2022-38028 within the Windows Print Spooler service using a malware called GooseEgg. CVE-2022-38028 represents an elevation of privilege vulnerability which could enable attackers to install additional malware like a backdoor or they could use these elevated privileges to perform lateral...

The Conversations Boards Should Have About Cybersecurity

Phishing attacks, malware, social engineering, spear phishing, and credential stuffing are all cyber threats that have one alarming trait in common. They are now more rampant than ever, leaving Australian organisations at the mercy of their relentless and sophisticated tactics. This is why board members need to be more than just decision-makers; they need to be informed participants in cybersecurity discussions....

Artificial Intelligence in Academia

AI - An Overview Artificial Intelligence (AI) is a technology that creates intelligent systems to perform tasks which typically require human intelligence. While the use of this technology may replace some jobs, it offers new and emerging careers with Australia needing up to 161,000 additional specialist AI workers in the next 15 years^. Increasingly AI is being used across numerous industries such as healthcare,...

The Glimpse at the Future of Software Academia

Software is key to a computers’ functionality and in fact, a system can’t operate without it. As we continually become more reliant on computers, the demand for software and application developers will increase - by 27 per cent from 2021 to 2026.1 From the late 1940s through the 1970s, the concept of software development has its’ origins in simplistic terms - via code written on manual punch cards and then fed into...

Prioritise Foundational Cloud Security Before Leveraging Generative AI

Hybrid and multi-cloud management serve as the bedrock of modern business operations, leading the charge in harnessing the full potential of cloud technologies. Yet, according to a commissioned study conducted in 2023 by Forrester Consulting on behalf of Tenable, the vast majority of Australian cybersecurity and IT leaders (68%) view cloud infrastructure as the greatest source of cyber risk in their organisation....

The Real “People Problem” In Cybersecurity Is Not What You Think It Is

The idea that cybersecurity is a people problem is so often repeated that it has become a truism for the sector. A casual search of “Cybersecurity people problem” returns 341 million results and, unsurprisingly, a wide range of answers to the question: ‘Which people are the problem?’ Bosses, cybersecurity teams, users, employees, hackers: if a party exists to whom blame could be apportioned, it’s been done. But the...

CISOs in 2024: Embracing a Strategic Security Vision

In recent years, the role of the Chief Information Security Officer (CISO) has undergone a significant evolution. Once solely focused on technical components such as firewalls and network security, CISOs today are strategic leaders shaping cybersecurity across their entire organisation. This evolution reflects the ever-increasing complexity of the cyberthreat landscape, where sophisticated attacks target not just...

Five Steps For New Zealand Businesses To Effectively Manage Incident Response

With over 2000 incidents reported to CERT NZ each quarter, New Zealand is facing an increasing number of cybersecurity attacks. Every organisation, from the smallest business to the largest government department or organisation must now have a plan for how it will respond to a cybersecurity incident. In the last year, data breaches and other attacks have cost New Zealand around $20 million. The degree of incident...

Growing Sustainability Through Colocation Services

The Playing Field Over the past several years sustainability has become a growing priority for most, if not all, organisations. Forward-thinking businesses, consumers and governments alike are increasingly looking at how to increase their sustainability efforts, while many decisions are increasingly being made with enhancing sustainability as an important driver. One key trend is for businesses is moving to hybrid...

5 Steps for Securing Your Software Supply Chain

Most modern applications are assembled from open-source components with developers typically writing less than 15% of the code for their application. As the demand for open-source software grows, there's also an increase in the number of available open-source software. However not all open-source components are created equally or maintained properly. As a result, we are seeing an increase in software supply chain...

Fish In a Barrel – Australia’s At-risk Cleared Personnel

Background on Security Clearances in Australia Security Clearance Levels Under the Australian Government Protective Security Policy Framework, individuals who need access to security classified  resources must hold a security clearance. This includes classified information, systems that hold classified information, and classified assets. An individual may also be required to hold a security clearance if they occupy...

AI Skills Could Boost Australia Workers’ Salaries By More Than 29% And Accelerate Career Growth As AI Adoption Ramps Up, Finds New Research

Amazon Web Services (AWS), an Amazon.com company, today released new research showing that when artificial intelligence (AI) is fully harnessed, Australian workers with AI skills and expertise could see salary hikes of over 29%, with workers in IT (37%), and business operations (35%) enjoying the highest pay bumps. To better understand emerging AI usage trends and skilling needs in Australian workplaces, AWS...

Protecting The Digital Realm Knows No Gender

Identity management and security are crucial aspects of the modern digital landscape, responsible for protecting the information and access points that link us globally. Thankfully, these areas, filled with complexities and chances for growth, are becoming more appealing to women, many of whom are making significant contributions to development. It’s more than conquering challenges; it’s about showcasing the...

Reputational Risk, Ransomware and the ‘Operational Resilience’ Imperative

An Overview Whether it’s on international headlines or in local Australian news, headlines of data related business outages, and associated credibility damage are on the rise. From the DP World hack that stranded tens of thousands of shipping containers, to increasingly audacious ransomware attacks on all levels of public and private organisations – data management has become a mainstream topic and highly...

AI-generated Code: The Fourth Component of Software

There is enormous attention on generative AI (GenAI) and its potential to change software development. While the full impact of GenAI is yet to be known, organisations are eagerly vetting the technology and separating the hype from the real, pragmatic benefits. In parallel, software security professionals are closely watching the practical impact of GenAI and how application security testing (AST) must adapt as...

Using Annual Loss Expectancy (ALE) for Cybersecurity Tech Investment Planning and Building a Business Case

Ensuring and maintaining a robust defense-in-depth strategy requires new technology investments, especially as many standard detection and response technologies can’t stop ransomware and the evasive and sophisticated techniques attackers are commonly using.   As a cybersecurity leader, you operate in a reality where resources and budgets are always constrained. You may find that now, you’re not only having to...
Episode 148: Lena Smart

Episode 148: Lena Smart

Lena joined MongoDB in March 2019, with more than 20 years of cybersecurity experience. Before joining MongoDB, she was ...
No results found.
Episode 138: Nicholas Boyle

Episode 138: Nicholas Boyle

Nick Boyle is a partner in the IP & Technology team at DLA Piper, and is based in Sydney. He advises clients on data ...
Episode 96: Jason Yakencheck

Episode 96: Jason Yakencheck

Jason is a Associate Partner at IBM with a strong background in project management, cybersecurity, cloud, and strategic ...

Markets & Trading

YOUR SECURITY NEWSFEED

The KBI Dossier

The Cybersecurity news feed delivered straight to your Inbox.

Technology News ↓

Tenable Comment: CVE-2022-38028: GooseEgg EoP Exploit

The Russia-based threat actor, known as APT28 or Forest Blizzard, has recently been exploiting a vulnerability known as CVE-2022-38028 within the Windows Print Spooler service using a malware called GooseEgg. CVE-2022-38028 represents an elevation of privilege vulnerability which could enable attackers to install additional malware like a backdoor or they could use these elevated privileges to perform lateral...

Artificial Intelligence in Academia

AI - An Overview Artificial Intelligence (AI) is a technology that creates intelligent systems to perform tasks which typically require human intelligence. While the use of this technology may replace some jobs, it offers new and emerging careers with Australia needing up to 161,000 additional specialist AI workers in the next 15 years^. Increasingly AI is being used across numerous industries such as healthcare,...

‘Captivity Clouds’ – A Trap For Modern Day Security Leaders

Today, many organisations are trapped in what's known as a 'captivity cloud,' where they are locked-in with a single product or service but face substantial challenges when attempting to integrate or transition to other solutions and providers across the broader cloud ecosystem. Captivity clouds have left organisations within the confines of heavily restricted ecosystems. Many are finding their tool sets severely...

Prioritise Foundational Cloud Security Before Leveraging Generative AI

Hybrid and multi-cloud management serve as the bedrock of modern business operations, leading the charge in harnessing the full potential of cloud technologies. Yet, according to a commissioned study conducted in 2023 by Forrester Consulting on behalf of Tenable, the vast majority of Australian cybersecurity and IT leaders (68%) view cloud infrastructure as the greatest source of cyber risk in their organisation....
No results found.