Search This Blog

Powered by Blogger.

Blog Archive

Labels

About Me

Showing posts with label IT Security. Show all posts

New Malicious Python Package Found Stealing Cloud Credentials

 


A dangerous piece of malware has been discovered hidden inside a Python software package, raising serious concerns about the security of open-source tools often used by developers.

Security experts at JFrog recently found a harmful package uploaded to the Python Package Index (PyPI) – a popular online repository where developers share and download software components. This specific package, named chimera-sandbox-extensions, was designed to secretly collect sensitive information from developers, especially those working with cloud infrastructure.

The package was uploaded by a user going by the name chimerai and appears to target users of the Chimera sandbox— a platform used by developers for testing. Once installed, the package launches a chain of events that unfolds in multiple stages.

It starts with a function called check_update() which tries to contact a list of web domains generated using a special algorithm. Out of these, only one domain was found to be active at the time of analysis. This connection allows the malware to download a hidden tool that fetches an authentication token, which is then used to download a second, more harmful tool written in Python.

This second stage of the malware focuses on stealing valuable information. It attempts to gather data such as Git settings, CI/CD pipeline details, AWS access tokens, configuration files from tools like Zscaler and JAMF, and other system-level information. All of this stolen data is bundled into a structured file and sent back to a remote server controlled by the attackers.

According to JFrog’s research, the malware was likely designed to go even further, possibly launching a third phase of attack. However, researchers did not find evidence of this additional step in the version they analyzed.

After JFrog alerted the maintainers of PyPI, the malicious package was removed from the platform. However, the incident serves as a reminder of the growing complexity and danger of software supply chain attacks. Unlike basic infostealers, this malware showed signs of being deliberately crafted to infiltrate professional development environments.

Cybersecurity experts are urging development and IT security teams to stay alert. They recommend using multiple layers of protection, regularly reviewing third-party packages, and staying updated on new threats to avoid falling victim to such sophisticated attacks.

As open-source tools continue to be essential in software development, such incidents highlight the need for stronger checks and awareness across the development community.

Data Breach at Cartier Highlights Growing Cyber Risks in Luxury Sector


 

In the latest incident involving a high-profile Parisian luxury jeweller, Cartier has been hacked, further heightening the concerns of those who are targeted by digital threats in the fashion and retail industries. In a statement released by the company, an unauthorised party admitted to gaining access to internal systems, resulting in the disclosure of customer information, including names, email addresses, and country of residence. 

A breach affecting approximately 12,000 individuals was first revealed through official notifications sent to those affected, but details surfacing on social media have since attracted a larger amount of attention. Even though Cartier has declined to disclose the exact scope of the incident - which included the number of impacted customers and the precise timing of the intrusion - the company emphasizes that no personal data, such as credit card numbers, bank account numbers, or login credentials, has been compromised as a result of the incident. 

There have been no direct financial harms associated with the leak of personally identifiable information (PII), however, cybersecurity analysts warn that there is still a significant risk of the leak occurring. As a result of the affluent clientele associated with luxury brands, there are many opportunities for phishing attacks, social engineering attacks, and identity theft schemes to exploit the exposed data. 

Currently, the luxury sector is facing numerous cybersecurity challenges, which are aggravated by the fact that sophisticated cybercriminals are increasingly targeting it. In a time in which digital transformation is accelerating within the high-end retail industry, the Cartier breach serves as a wake-up call to the industry to reevaluate its data protection measures and strengthen its commitment to customer safety and trust. 

Even though the breach at Cartier did not result in the compromise of financial or highly sensitive account information, cybersecurity experts have emphasised that even the exposure of seemingly basic personal information-such as names, email addresses, and countries of residence-can still have severe consequences. These types of information are incredibly valuable to attackers, and they can be used in high-volume phishing schemes, social engineering schemes, and more comprehensive identity theft campaigns. 

To address the incident, Cartier has notified the appropriate law enforcement authorities and has enlisted the assistance of an external cybersecurity firm to conduct a comprehensive investigation into the incident as well as strengthen its internal security measures. As of right now, the company has stayed tightly closed regarding key details, including the number of customers affected as well as a timeline for when the breach occurred. 

Since Cartier has such a high-value clientele and such a significant presence in the fashion industry, privacy advocates and industry observers have expressed concerns regarding this lack of transparency. Cartier's breach is no exception; it is part of an escalating pattern of cyberattacks against luxury and fashion brands. Dior, the French fashion house, reported to the press in May that hackers had gained access to customer information and information about purchases. 

Adidas also confirmed an incident of cybercrime involving one of its third-party service providers around the same period, which led to unauthorised access to customer contact information; however, as with Cartier, no payment information was compromised. Victoria's Secret has recently had to temporarily close down its website and some of its in-store services following a significant breach of security. All these incidents reflect a disturbing upward trend and have prompted affected companies to engage specialised cybersecurity teams to contain the damage and prevent future breaches. 

Retail industry cybersecurity experts continue to raise concerns as to the industry's vulnerability to cyber threats, pointing to the fact that it relies heavily on vast repositories of consumer data, which are seen as a major source of vulnerability. As a result, according to James Hadley, the founder of Immersive, retail firms are overflowing with customer information, making them prime targets for cybercriminals seeking both financial gain and strategic advantage. 

Often, retailers collect a wide variety of personal data about their customers, including names, emails, shopping histories, and contact information. These types of attacks can be carried out over a long period of time and with layers of attacks, as well as isolated breaches. 

In his article, Hadley emphasised the fact that misuse of stolen data often extends beyond its immediate damage. Threat actors often use compromised information to impersonate trusted brands, thereby extracting more sensitive personal data from unsuspecting consumers by phishing or social engineering techniques. In his view, this type of manipulation can persist undetected for extended periods of time, compounding the dangers for individuals as well as organisations alike. 

As a result of these rapidly evolving threats, industry experts argue that the way businesses should respond to incidents must be shifted from a reactive incident response to a proactive cyber defence. Rather than only reacting after a breach has taken place, companies should act before an incident occurs. However, in order to combat these threats, advanced threat intelligence systems, robust encryption protocols, and dynamic security frameworks are urgently needed so that they can be spotted and neutralised before they become a problem. 

It is equally important for consumers to be educated continuously about the dangers of password reuse, suspicious links, and unauthorised communication, as they can take an active role in maintaining the safety of their data more responsibly. There is an increasing likelihood that traditional retailers will fail to protect themselves adequately against the growing use of artificial intelligence-powered attack tools and automated hacking techniques, as the traditional security measures that they employed are proving insufficient to keep out the threats. 

Luxury brands, such as Cartier and The North Face, have recently experienced breaches that underscore the fact that even the most established names in the fashion and accessory industry are not immune to the constantly evolving cyber threat landscape. As a result of the breach, Cartier has issued a warning to all of its customers that they need to remain vigilant against potential cyber threats. 

The organisation advised individuals to stay vigilant for unsolicited communications, such as suspicious emails, unexpected messages, or unusual login activity on their online accounts, including unsolicited communications from people they don't recognise. It is strongly recommended by the company that users enable multi-factor authentication (MFA) wherever possible, avoid using unsecured networks, avoid clicking on links or downloading attachments from unknown sources as well and avoid using unsecured networks to mitigate further risks.

In addition to providing immediate consumer protection, Cartier's response also emphasised the need for stronger security measures throughout the industry at large. There is no doubt that organisations, particularly those in the luxury and retail sectors, must implement comprehensive, proactive cybersecurity strategies if they are to survive. Performing regular internal and external security audits, strengthening anti-phishing training programs for all levels of employees, and closely assessing the cybersecurity resilience of third-party vendors that are often integral to a brand's digital infrastructure are some of the things companies should do. 

As the company's advisory emphasises in its statement, cybersecurity is not just a technical challenge, but is also a strategic priority within the organisation that requires continuous investments, oversight, and awareness. A growing number of threats and persistent attackers need consumers and corporations to share the responsibility of fostering a safer and more secure digital environment, as threats become more sophisticated and attackers become more persistent. 

There has been a growing number of high-profile breaches in retail in recent months, and the Cartier cyberattack is just one example of these, with other major brands including Victoria's Secret, Harrods, M&S, and The Co-op all being victims of similar events. A number of security experts have reported that sophisticated threat groups, including the hacking collective known as Scattered Spider, are targeting retailers with systematic malicious intent in recent years. 

There have been several recent attacks claimed by the group, including the attack on M&S and The Co-op, prompting an increase in industry-wide vigilance. Analysts believe that Scattered Spider and similar groups are often able to exploit structural weaknesses and operational vulnerabilities in a specific industry by focusing their efforts on a particular industry for a prolonged period of time. 

Retailers are a particularly attractive target due to their vast repository of consumer data and longstanding underinvestment in cybersecurity infrastructure, making them a great target for cyber criminals. It is also important to note that many retailers are heavily dependent on third-party vendors with security practices that do not meet modern standards, thereby further exposing an already vulnerable ecosystem to security risks. 

A cybersecurity firm called Immersive Labs' founder, James Hadley, noted that retail companies, overwhelmed by customer information, have become increasingly attractive targets for cybercriminals, as a result. According to him, the recent string of successful breaches may further embolden attackers, which reinforces the perception that retail companies are soft targets that can pay off well. 

According to Jake Moore, a Global Cybersecurity Advisor at ESET, similar concerns are echoed, and he warned that these incidents will continue to occur in an increasingly frequent and severe manner. In his view, ransom demands can reach into the millions of dollars, but even when the ransom is not paid, the cost of recovery, disruptions to operations, and reputational damage can still be immense, even if the ransom is not paid. 

In many cases, Moore noted, the cost of remediation far exceeds the ransom itself, placing companies in a precarious position during and after an attack. Although Moore identified a potential silver lining in the rising threat landscape, he also mentioned that there has been an increased awareness of cybersecurity threats and a renewed emphasis on cybersecurity readiness. He said that despite the fact that many companies have been narrowly spared such attacks, the ripple effect has prompted many businesses to strengthen their digital defences, develop robust incident response plans, and prepare themselves for the inevitable occurrence of cyber attacks in the future. 

It is clear, however, that the Cartier breach is a stark reminder that in today's hyperconnected world, reputation and luxury branding do not mean user are immune to digital attacks. Because cyber threats are growing faster, larger, and more sophisticated every day, organisations must shift from reactive containment to proactive cyber resilience to keep themselves safe. There is a need to invest not only in the next generation of security technologies, but also in building a culture of cybersecurity at all levels of an organisation - from executive leadership to frontline staff. 

There is no doubt that aligning IT security, risk management, and customer trust is now a priority in boardrooms. To reduce systemic risk, the industry will need to collaborate, for example, by sharing threat intelligence and setting benchmarks for incident response and establishing higher standards for vendor accountability, among other things. It is clear that safeguarding data in today's digital economy is no longer an operational checkbox, but now it has become a key business imperative that directly impacts consumer confidence, brand value, and long-term viability.

AI Agents Raise Cybersecurity Concerns Amid Rapid Enterprise Adoption

 

A growing number of organizations are adopting autonomous AI agents despite widespread concerns about the cybersecurity risks they pose. According to a new global report released by identity security firm SailPoint, this accelerated deployment is happening in a largely unregulated environment. The findings are based on a survey of more than 350 IT professionals, revealing that 84% of respondents said their organizations already use AI agents internally. 

However, only 44% confirmed the presence of any formal policies to regulate the agents’ actions. AI agents differ from traditional chatbots in that they are designed to independently plan and execute tasks without constant human direction. Since the emergence of generative AI tools like ChatGPT in late 2022, major tech companies have been racing to launch their own agents. Many smaller businesses have followed suit, motivated by the desire for operational efficiency and the pressure to adopt what is widely viewed as a transformative technology.  

Despite this enthusiasm, 96% of survey participants acknowledged that these autonomous systems pose security risks, while 98% stated their organizations plan to expand AI agent usage within the next year. The report warns that these agents often have extensive access to sensitive systems and information, making them a new and significant attack surface for cyber threats. Chandra Gnanasambandam, SailPoint’s Executive Vice President of Product and Chief Technology Officer, emphasized the risks associated with such broad access. He explained that these systems are transforming workflows but typically operate with minimal oversight, which introduces serious vulnerabilities. 

Further compounding the issue is the inconsistent implementation of governance controls. Although 92% of those surveyed agree that AI agents should be governed similarly to human employees, 80% reported incidents where agents performed unauthorized actions or accessed restricted data. These incidents underscore the dangers of deploying autonomous systems without robust monitoring or access controls. 

Gnanasambandam suggests adopting an identity-first approach to agent management. He recommends applying the same security protocols used for human users, including real-time access permissions, least privilege principles, and comprehensive activity tracking. Without such measures, organizations risk exposing themselves to breaches or data misuse due to the very tools designed to streamline operations. 

As AI agents become more deeply embedded in business processes, experts caution that failing to implement adequate oversight could create long-term vulnerabilities. The report serves as a timely reminder that innovation must be accompanied by strong governance to ensure cybersecurity is not compromised in the pursuit of automation.

Cisco Fixes Critical CVE-2024-20418 Vulnerability in Industrial Wireless Access Points

 

Cisco recently disclosed a critical security vulnerability, tracked as CVE-2024-20418, that affects specific Ultra-Reliable Wireless Backhaul (URWB) access points used in industrial settings. These URWB access points are essential for maintaining robust wireless networks in environments like manufacturing plants, transportation systems, and other infrastructure-intensive industries. The vulnerability allows remote, unauthenticated attackers to perform command injection attacks with root privileges by exploiting the device’s web-based management interface. 

This vulnerability results from inadequate validation of input data within Cisco’s Unified Industrial Wireless Software, specifically affecting the web management interface of URWB access points. By sending specially crafted HTTP requests, attackers could exploit this flaw to execute arbitrary commands with root-level access, potentially leading to unauthorized control over the device. This level of access could compromise critical network infrastructure, posing serious risks to businesses relying on URWB technology for uninterrupted connectivity. The vulnerability specifically impacts Cisco Catalyst models IW9165D, IW9165E, and IW9167E when URWB mode is enabled. 

For users concerned about their device’s security, Cisco advises checking vulnerability status by using the “show mpls-config” command in the command-line interface (CLI). If the command confirms URWB mode is active, the device may be vulnerable to potential attacks. Cisco’s Product Security Incident Response Team (PSIRT) has stated that it is not aware of any instances of this vulnerability being actively exploited in real-world scenarios. However, given the nature of this vulnerability, Cisco urges users to update their devices promptly to mitigate the risk. Currently, Cisco has not issued workarounds for this issue. 

As a result, companies relying on these models are advised to stay alert for firmware updates or patches that Cisco may release to resolve the vulnerability. The lack of a temporary fix underlines the importance of applying any future updates immediately, especially as remote exploitation could have significant consequences for the affected systems. For organizations using these Cisco models, securing network access and strengthening device-level defenses can be critical in mitigating potential risks. Limiting access to the web-based management interface, monitoring device activity, and conducting frequent security audits are some proactive steps administrators can take. These actions may help limit exposure while waiting for Cisco’s permanent fix. This incident serves as a reminder of the evolving threat landscape in industrial and operational technology environments. 

As organizations adopt more wireless technologies to improve operational efficiencies, the need for robust cybersecurity practices is crucial. Regularly updating network devices and addressing vulnerabilities promptly are fundamental to protecting systems from cyber threats. Cisco’s disclosure of CVE-2024-20418 underscores the vulnerabilities that even the most reliable industrial-grade devices can exhibit. It also highlights the critical importance of proactive device management and security measures in preventing unauthorized access. Industrial environments should consider this a timely reminder to prioritize cybersecurity protocols across all network-connected devices.

Energy Sector Faces Heightened Supply Chain Risks Amid Growing Dependence on IT and Software Vendors

 

The energy industry is experiencing a sharp increase in supply chain risks, largely driven by its growing reliance on external vendors. According to a recent report, two-thirds of security breaches in this sector now originate from software and IT vendors.

The study, conducted by SecurityScorecard and KPMG, titled "A Quantitative Analysis of Cyber Risks in the U.S. Energy Supply Chain," draws attention to frequent threats, including ransomware attacks targeting traditional IT systems.

Researchers have emphasized that as the transition to cleaner energy picks up pace, and as the grid becomes more interconnected and software-reliant, vulnerabilities in the energy sector are expected to increase.

Ryan Sherstobitoff, senior vice president of threat research and intelligence at SecurityScorecard, stated, “The energy sector's rising dependence on third-party vendors exposes a significant vulnerability—its security is only as robust as its weakest link."

He added that this growing reliance on external vendors introduces considerable risks, urging the industry to strengthen cybersecurity defenses before a breach escalates into a national crisis.

The report highlighted that third-party risks account for nearly half of all breaches in the energy sector—significantly higher than the global average of 29%. Over 90% of organizations that experienced multiple breaches were attacked through third-party vendors.

Additionally, the report found that software and IT vendors were responsible for 67% of third-party breaches, while only a small number were linked to other energy companies. A notable portion of these incidents stemmed from the MOVEit file transfer software vulnerability, which was exploited by the Clop ransomware group last year.

The report also pointed out application security, DNS health, and network security as some of the most significant weaknesses in the sector.

The findings come at a time when the U.S. Department of Energy is convening with energy sector leaders to promote the Supply Chain Cybersecurity Principles, urging companies to focus on reducing risks posed by software and IT vendors, which represent the highest third-party threats.

As part of this effort, energy operators are encouraged to ensure new technology purchases are secure by incorporating initiatives like CISA’s "Secure by Design" and following the Department of Energy’s Supply Chain Cybersecurity Principles. The industry must also bolster security programs to defend against supply chain risks and geopolitical threats, especially from nation-state actors, and analyze ransomware attacks affecting foreign counterparts to improve resilience.

“The energy sector is a complex system undergoing a significant generational shift, heavily reliant on a stable supply chain," said Prasanna Govindankutty, KPMG's principal and cybersecurity leader for the U.S. sector.

He further explained that with rising geopolitical and technology-based threats, the industry is facing a level of risk exposure that could negatively impact both businesses and citizens. Organizations that can quantify these risks and implement mitigation strategies will be better equipped to navigate the energy transition.

Lessons from the CrowdStrike Falcon Sensor Defect: Enhancing Ransomware Recovery and Business Continuity

 


In recent times, a significant IT disruption was caused by a defect in a content update for CrowdStrike’s Falcon sensor, affecting approximately 8.5 million PCs across diverse sectors. This issue, which disrupted organizations ranging from small businesses and global conglomerates to government agencies and hospitals, highlighted severe vulnerabilities in how entities handle large-scale IT failures. The impact was widespread, leading to delayed flights, transaction failures at gas stations and grocery stores, and significant delays in emergency services such as police and fire departments. 

The scale of this disruption serves as a critical reminder of the importance of robust ransomware recovery and business continuity plans (BCPs). Although the immediate cause of the disruption was not a ransomware attack, the parallels between handling this IT issue and responding to ransomware are striking. This event underscores the need for organizations to evaluate and improve their preparedness for various types of cyber threats. One of the key lessons from this incident is the importance of efficient detection. The mean time to detect (MTTD) is a crucial metric that measures how swiftly an organization can identify a security breach. 

The quick identification of the Falcon sensor defect was vital in managing its effects and preventing further damage. Organizations should focus on strengthening their detection systems to ensure they can quickly identify and respond to potential threats. This includes implementing advanced monitoring tools and refining alert mechanisms to reduce response times during a real cyber incident. Recovery and restoration processes are equally critical. After the Falcon sensor issue, organizations had to mobilize their BCPs to recover systems and restore normal operations from backups. This situation emphasizes the need for well-documented, regularly updated, and thoroughly tested recovery plans. 

Businesses must ensure their backup strategies are reliable and that they can quickly restore operations with minimal disruption. Effective recovery plans should include clear procedures for data restoration, system repairs, and communication with stakeholders during a crisis. The incident also highlights the importance of continuous assessment and improvement of an organization’s cybersecurity posture. By analyzing their response to the Falcon sensor defect, organizations can identify gaps in their strategies and address any weaknesses. This involves reviewing incident response plans, updating communication protocols, and enhancing overall resilience to cyber threats. 

Furthermore, the disruption reinforces the need for comprehensive risk management strategies. Organizations should regularly evaluate their exposure to various types of cyber threats, including ransomware, and implement measures to mitigate these risks. This includes investing in cybersecurity training for employees, conducting regular security audits, and staying informed about the latest threat intelligence. 

In conclusion, the CrowdStrike Falcon sensor defect offers valuable lessons for enhancing ransomware recovery and business continuity planning. By learning from this event, organizations can improve their ability to respond to and recover from cyberattacks, ensuring they are better prepared for future threats. Regular updates to BCPs, enhanced detection capabilities, and robust recovery processes are essential for safeguarding against disruptions and maintaining operational resilience in today’s increasingly complex digital landscape.

Cyble Research Reveals Near-Daily Surge in Supply Chain Attacks

 

The prevalence of software supply chain attacks is on the rise, posing significant threats due to the extensive impact and severity of such incidents, according to threat intelligence researchers at Cyble.

Within a six-month span from February to mid-August, Cyble identified 90 claims of supply chain breaches made by cybercriminals on the dark web. This averages nearly one breach every other day. Supply chain attacks are notably more costly and damaging than other types of cyber breaches, making even a small number of these attacks particularly detrimental.

Cyble’s blog highlights that while infiltrations of an IT supplier’s codebase—similar to the SolarWinds incident in 2020 and Kaseya in 2021—are relatively uncommon, the software supply chain’s various components, including code, dependencies, and applications, remain a continuous source of vulnerabilities. These persistent risks leave all organizations exposed to potential cyberattacks.

Even when supply chain breaches do not compromise codebases, they can still result in the exposure of sensitive data, which attackers can exploit to breach other environments through methods such as phishing, spoofing, and credential theft. The interconnected nature of the physical and digital supply chain means that any manufacturer or supplier involved in downstream distribution could be considered a potential cyber risk, according to the researchers.

In their 2024 analysis, Cyble researchers examined the frequency and characteristics of supply chain attacks and explored defenses that can mitigate these risks.

Increasing Frequency of Supply Chain Attacks

Cyble’s dark web monitoring revealed 90 instances of cybercriminals claiming successful supply chain breaches between February and mid-August 2024.

IT service providers were the primary targets, accounting for one-third of these breaches. Technology product companies were also significantly impacted, experiencing 14 breaches. The aerospace and defense, manufacturing, and healthcare sectors followed, each reporting between eight and nine breaches.

Despite the concentration of attacks in certain industries, Cyble’s data shows that 22 out of 25 sectors tracked have experienced supply chain attacks in 2024. The U.S. led in the number of breaches claimed on the dark web, with 31 incidents, followed by the UK with 10, and Germany and Australia with five each. Japan and India each reported four breaches.

Significant Supply Chain Attacks in 2024

Cyble’s blog detailed eight notable attacks, ranging from codebase hijacks affecting over 100,000 sites to disruptions of essential services. Examples include:

  • jQuery Attack: In July, a supply chain attack targeted the JavaScript npm package manager, using trojanized versions of jQuery to exfiltrate sensitive form data from websites. This attack impacted multiple platforms and highlighted the urgent need for developers and website owners to verify package authenticity and monitor code for suspicious modifications.
  • Polyfill Attack: In late June, a fake domain impersonated the Polyfill.js library, injecting malware into over 100,000 websites. This malware redirected users to unauthorized sites, underscoring the security risks associated with external code libraries and the importance of vigilant website security.
  • Programming Language Breach: The threat actor IntelBroker claimed unauthorized access to a node package manager (npm) and GitHub account related to an undisclosed programming language, including private repositories with privileges to push and clone commits.
  • CDK Global Inc. Attack: On June 19, a ransomware attack targeted CDK Global Inc., a provider of software to automotive dealerships, disrupting sales and inventory operations for weeks across North American auto dealers, including major networks like Group1 Automotive Inc. and AutoNation Inc.
  • Access to 400+ Companies: IntelBroker also claimed in June to have access to over 400 companies through a compromised third-party contractor, with data access to platforms like Jira, GitHub, and AWS, potentially affecting large organizations such as Lockheed Martin and Samsung.
Mitigating Supply Chain Risks through Zero Trust and Resilience

To counter supply chain attacks, Cyble researchers recommend adopting zero trust principles, enhancing cyber resilience, and improving code security. Key defenses include:

  1. Network microsegmentation
  2. Strong access controls
  3. Robust user and device identity authentication
  4. Encrypting data both at rest and in transit
  5. Ransomware-resistant backups that are “immutable, air-gapped, and isolated”
  6. Honeypots for early detection of breaches
  7. Secure configuration of API and cloud service connections
  8. Monitoring for unusual activity using tools like SIEM and DLP
  9. Regular audits, vulnerability scanning, and penetration testing are also essential for maintaining these controls.

Enhancing Secure Development and Third-Party Risk Management

Cyble also emphasizes best practices for code security, including developer audits and partner assessments. The use of threat intelligence services like Cyble’s can further aid in evaluating partner and vendor risks.

Cyble’s third-party risk intelligence module assesses partner security across various areas, such as cyber hygiene, dark web exposure, and network vulnerabilities, providing specific recommendations for improvement. Their AI-powered vulnerability scanning also helps organizations identify and prioritize their own web-facing vulnerabilities.

As security becomes a more critical factor in purchasing decisions, vendors will likely need to improve their security controls and documentation to meet these demands, the report concludes.

The Need For A Vulnerability Operations Center (VOC) in Modern Cybersecurity


 

Many organisations tend to focus on immediate threats, prioritising the detection and mitigation of the latest vulnerabilities. However, this approach overlooks a broader issue: many cyberattacks exploit vulnerabilities that have existed for years. In fact, 76% of vulnerabilities targeted by ransomware were identified more than three years ago, highlighting a critical gap in long-term security strategies.

Why VOCs Matter

To effectively address this gap, organisations should adopt a more centralised and automated approach to vulnerability management. This is where a dedicated Vulnerability Operations Center (VOC) comes into play. A VOC serves as a specialised unit, either integrated within or operating alongside a Security Operations Center (SOC), with the primary task of managing security flaws within the IT infrastructure. Unlike a SOC, which focuses on real-time threat alerts and incidents, a VOC zeroes in on vulnerabilities—identifying, prioritising, and mitigating them before they escalate into serious security breaches.

What Is a VOC?

Creating a seamless connection between a SOC and a VOC is crucial for effective cybersecurity. This integration ensures that vulnerability data is quickly and efficiently passed to threat response teams. The process begins with appointing a team to set up the VOC, overseen by the Chief Information Security Officer (CISO) or another senior security leader. Given the scope of this initiative, it should be treated as a major security operations project, with clear roles and responsibilities outlined from the start.

Connecting VOC and SOC

The initial step involves using vulnerability assessment tools to evaluate the organisation’s current security posture. This assessment helps to identify existing vulnerabilities across all assets. The next phase is to aggregate, clean, and organise this data, making it actionable for further use. Once this dataset is established, it is integrated into the SOC’s security information and event management (SIEM) systems, thereby enhancing the SOC’s ability to monitor and respond to threats with greater context and clarity.

Focusing on Risk

An essential component of VOC operations is moving beyond just technical vulnerability assessments to a more risk-based prioritisation approach. This means evaluating vulnerabilities based on their potential impact on the business and addressing the most critical ones first. Automating routine SOC tasks—such as regular vulnerability scans, alert handling, and patch management—also plays a vital role. By implementing automation tools that leverage the VOC’s data, SOC teams can focus on more complex tasks that require human intervention, improving overall efficiency and effectiveness.

Continuous Improvement

Once the VOC is fully operational, the focus should shift to continuous improvement and adaptation. As new vulnerabilities and trends emerge, the SOC must update its monitoring and response strategies to keep pace. Establishing feedback loops between the SOC and VOC ensures that both teams are aligned and responsive to the incessant development of threats.

Building a Strong Policy

Moreover, a strong policy and governance framework is necessary to support the integration of the VOC and SOC. Security teams need to define clear schedules, rules, and Service Level Agreements (SLAs) for addressing vulnerabilities. For example, vulnerabilities like Log4j, which are widely exploited, should trigger immediate notifications to SOC teams to ensure a swift response.

The Future of Security

While setting up a VOC may seem challenging, it is a critical step towards addressing the persistent vulnerability issues. Unlike the current reactive approach, a VOC allows for a more proactive, risk-based management of vulnerabilities across IT and security teams. By moving beyond the outdated, piecemeal strategies of the past, organisations can achieve a higher level of security, protecting their assets from both old and new threats.