The Cloud Security Alliance has released its list of top cloud threats for 2024. Plus, CISA and the FBI published a guide for determining if a software product was built "secure by design." Meanwhile, find out how AI can transform offensive security. And get the latest on the Royal ransomware gang, the CIS Benchmarks and TikTok’s legal troubles!
Dive into six things that are top of mind for the week ending August 9.
Misconfigurations. Identity weaknesses. Insecure APIs. Incomplete security strategies.
Those are the top four dangers impacting cloud environments today, according to the Cloud Security Alliance’s “Top Threats to Cloud Computing 2024” report, based on a survey of 500-plus cloud security experts.
“By bringing attention to those threats, vulnerabilities, and risks that are top-of-mind across the industry, organizations can better focus their resources,” Sean Heide, Technical Research Director at the CSA, said in a statement.
The report lists a total of 11 major cloud-computing threats, describes and analyzes them, identifies their business impacts, offers key takeaways, provides real-world examples and more.
Here’s the full list:
The report also outlines four critical trends that will make cloud security more challenging in the future:
So, what can security teams do? Recommendations include:
To get more details, check out:
For more information about cloud security, check out these Tenable resources:
During your organization’s software-procurement process, a critical evaluation criteria should be whether the products under consideration are secure by design. But how do you make that assessment?
Check out new guidance to help organizations make sure that they buy secure-by-design software, which is software whose security was prioritized by its manufacturer throughout the product’s development process.
“Ensuring that the products they use and procure are secure by design is essential for organizations to be resilient against ransomware and other forms of malicious cyber activity,” reads the guidance, titled “Secure by Demand Guide: How Software Customers Can Drive a Secure Technology Ecosystem.”
Published this week by the U.S. Cybersecurity and Infrastructure Security Agency (CISA) and the FBI, the guidance includes:
Among the topics covered are:
Ultimately, a key goal is to empower organizations to leverage their purchasing power to procure secure software products, turning the “secure by design” principle into “secure by demand,” CISA Director Jen Easterly said in a statement.
To get more details:
Although challenges remain, AI holds great promise for offensive-security teams, especially those involved with vulnerability assessments, penetration testing and red teaming.
That’s the conclusion from the Cloud Security Alliance’s “Using AI for Offensive Security” study, published this week.
Offensive-security teams, tasked with identifying their organizations’ cybersecurity weak spots, are already benefiting from AI in general, and from large language models (LLMs) and LLM-powered AI agents in particular. Specifically, these teams are seeing increased speed, automation, data analysis, scalability and productivity.
“This improvement boosts efficiency, allows for more sophisticated and extensive assessments, and enables security teams to focus on process improvement and strategic work,” the 29-page study reads.
An added bonus: AI helps understaffed cybersecurity teams because it lowers the barriers to entry to offensive-security teams and democratizes security testing, according to the CSA. In fact, the cybersecurity skills shortage is one of the challenges the study highlights.
The study explores how AI can help teams across the five phases of offensive-security testing:
How AI can augment or automate an existing offensive-security testing process
(Source: Cloud Security Alliance’s “Using AI for Offensive Security” report, August 2024)
Recommendations include:
To get more details, check out:
To learn more about some of the ways in which AI and cybersecurity intersect, check out these Tenable blogs:
The Royal ransomware group has changed its name to BlackSuit and revamped its tactics, techniques and procedures (TTPs) to sharpen its attacks, CISA and the FBI announced this week in an updated advisory about this cybercrime posse.
The joint advisory, first published in March 2023, is now titled “#StopRansomware: BlackSuit (Royal) Ransomware” and also includes new indicators of compromise (IOCs), as well as new detection methods. The advisory’s most recent data was obtained as recently as July 2024.
Here’s a sampling of new and updated information:
Mitigation recommendations include:
To get more details, check out:
The U.S. government has sued TikTok and its parent company ByteDance for allegedly violating the Children’s Online Privacy Protection Act (COPPA).
In a civil lawsuit filed last week in district court, the U.S. government alleges that TikTok has knowingly allowed children under 13 to create regular accounts and use the social media service to create and share videos, and to exchange messages with adults.
The complaint, filed in U.S. District Court for the Central District of California by the Department of Justice and the Federal Trade Commission, further alleges that TikTok and ByteDance:
TikTok and ByteDance have been under a court order barring them from violating COPPA since 2019, when TikTok’s predecessor Musical.ly settled a lawsuit with the U.S. government. This new lawsuit seeks civil penalties and injunctive relief.
“With this action, the Department seeks to ensure that TikTok honors its obligation to protect children’s privacy rights and parents’ efforts to protect their children,” Acting Associate Attorney General Benjamin C. Mizer said in a statement.
In comments to the media, TikTok disputed the U.S. government’s claims. “We disagree with these allegations, many of which relate to past events and practices that are factually inaccurate or have been addressed,” TikTok spokesperson Michael Hughes said in a statement sent to CNN.com.
President Biden signed a bill into law that requires ByteDance to sell its U.S. TikTok operations by January 19, 2025. If it doesn’t, TikTok would be banned in the U.S. ByteDance is challenging the law in a U.S. appeals court.
For more information about privacy and security concerns around TikTok:
VIDEOS
DOJ suing TikTok (ABC News)
The data security concerns surrounding social media app TikTok (The Financial Times)
The Center for Internet Security issued new and updated CIS Benchmarks for various products, including Microsoft Office Enterprise, Google Kubernetes Engine (GKE) Autopilot and Mozilla Firefox Extended Support Release (ESR) Group Policy (GPO).
Here’s the full list of updated and new CIS Benchmarks for July.
Updated
New
Organizations use the CIS Benchmarks’ secure-configuration guidelines to harden products against attacks. Currently, CIS offers 100-plus Benchmarks for 25-plus vendor product families. Categories of products include cloud platforms; desktop and server software; mobile devices; operating systems; and more.
To get more details, read the CIS blog “CIS Benchmarks August 2024 Update.” For more information about the CIS Benchmarks list, check out its home page, as well as:
VIDEO
CIS Benchmarks (CIS)
###
Juan has been writing about IT since the mid-1990s, first as a reporter and editor, and now as a content marketer. He spent the bulk of his journalism career at International Data Group’s IDG News Service, a tech news wire service where he held various positions over the years, including Senior Editor and News Editor. His content marketing journey began at Qualys, with stops at Moogsoft and JFrog. As a content marketer, he's helped plan, write and edit the whole gamut of content assets, including blog posts, case studies, e-books, product briefs and white papers, while supporting a wide variety of teams, including product marketing, demand generation, corporate communications, and events.