• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Security Architecture

MIS 5214 - Section 001 - David Lanter

Security Architecture

MIS 5214.001 ■ Spring 2024 ■ David Lanter
  • Homepage
  • Instructor
  • Syllabus
  • Deliverables
    • Assignments
    • Case Studies
      • Case Study 1 – A High Performance Computing Cluster Under Attack: The Titan Incident
      • Case Study 2 – Data Breach at Equifax
    • Participation
    • Team Project
  • Harvard Coursepack

In The News

March 20, 2024 by David Lanter 7 Comments

Filed Under: 10 - Application Security Tagged With:

Reader Interactions

Comments

  1. Eyup Aslanbay says

    March 23, 2024 at 4:43 pm

    Akamai Technologies released a new report revealing that 29% of web attacks in 2023 targeted APIs, with the commerce sector being the most affected. The report emphasizes the increasing importance of API security due to their critical role in digital transformations and highlights common attack methods such as Local File Inclusion, SQL injection, and Cross-Site Scripting. It also points out the challenges in detecting and managing these threats, especially in the rapidly evolving API landscape, and stresses the need for organizations to integrate robust security measures and comply with emerging legislation.

    https://www.darkreading.com/application-security/akamai-research-finds-29-of-web-attacks-target-apis

    Log in to Reply
  2. Ooreofeoluwa Koyejo says

    March 24, 2024 at 9:43 pm

    Websites Infected with Sign1 Malware Campaign

    https://www.securityweek.com/39000-websites-infected-in-sign1-malware-campaign/

    Over 39,000 websites have been infected with the Sign1 malware that redirects visitors to scam domains. Sign1 malware is a JavaScript malware found inside WordPress custom HTML widgets or within the Simple Custom CSS and JS WordPress plugin that the attackers added to the compromised websites. With this, hackers infect websites without placing any malicious code into server files which allows the malware to stay unnoticed for a long time — as it’s much more common for security providers to scan website files for malware than to check in the database.

    The interesting part is that the malware, however, uses obfuscation to hide its presence and would only execute if the visitor comes from a major website, such as Facebook, Google, Instagram, or Yahoo. Over the past six months, over 39,000 sites have been infected with different variants of the malware, with the most recent of them infecting more than 2,500 sites in the past two months.

    Log in to Reply
  3. Jon Stillwagon says

    March 26, 2024 at 2:59 pm

    https://www.securityweek.com/zenhammer-attack-targets-dram-on-systems-with-amd-cpus/

    In this week News is that Rowhammer attacks can be targeted against a dynamic random-access memory on AMD Zen 2 and Zen 3 CPU powered systems. The attack on these powered systems can be used to bypass memory protections, escalate privileges, and even to decrypt sensitive data. Researchers had previously demonstrated that the attacks can be launched remotely and against mobile devices. ZenHammer can be conducted even though target row refresh mitigations should be able to detect and prevent RowHammer attacks by refreshing victim rows before the bits can flip.

    Log in to Reply
  4. Bo Wang says

    March 26, 2024 at 5:58 pm

    https://www.infosecurity-magazine.com/news/boards-cyber-expertise-financial/
    The report by Diligent and Bitsight reveals that only 5% of businesses globally have a cybersecurity expert on their board, despite evidence linking stronger cybersecurity with better financial performance. Countries vary in the proportion of organizations with cyber experts, with France at 10% and Canada at 1%. Integration of cyber experts into specialized risk committees significantly improves cybersecurity performance, with companies achieving higher security scores. Strong cybersecurity correlates with superior financial performance, with companies in the advanced security range showing significantly higher total shareholder returns over three to five years. Highly-regulated industries like healthcare and financials tend to outperform others in cybersecurity, highlighting the importance of cyber risk management for boards and business leaders.

    Log in to Reply
  5. Yannick Rugamba says

    March 26, 2024 at 7:55 pm

    A Russian government-backed hacking group, Midnight Blizzard/Nobelium, breached Microsoft’s network, stealing emails and documents from senior executives, particularly in cybersecurity and legal departments. Detected on January 12, 2024, with origins in November 2023, the attack used a password spray tactic on a test account but didn’t compromise Microsoft’s products, customer data, or AI systems. Following this, Microsoft announced security enhancements for its legacy systems to prevent future breaches. This incident follows a separate attack by Chinese spies on US government organizations’ email inboxes. Midnight Blizzard/Nobelium is also known for the 2020 SolarWinds attack.https://www.securityweek.com/microsoft-says-russian-gov-hackers-stole-email-data-from-senior-execs/

    Log in to Reply
  6. Celinemary Turner says

    March 26, 2024 at 9:43 pm

    US Government Issues New DDoS Mitigation Guidance

    https://www.securityweek.com/us-government-issues-new-ddos-mitigation-guidance/

    The US cybersecurity agency CISA, the FBI, and the MS-ISAC have released updated joint guidance on how federal agencies and other organizations can defend against denial-of-service (DoS) and distributed denial-of-service (DDoS) attacks. The US government has released new guidance on DDoS mitigation, providing updated recommendations and categorizations of DDoS attacks. The guidance emphasizes proactive measures, incident response, and reporting to CISA, the FBI, or MS-ISAC. It aims to enhance cybersecurity resilience and encourages organizations to review and apply the recommendations.
    In response, organizations should activate their incident response plans, notify internet service providers (ISP) or hosting providers, collect evidence, implement traffic filtering, enable DDoS mitigation services if available, scale up resources such as bandwidth, enable a Content Delivery Network (CDN) service, and maintain communication with internal teams and external stakeholders.

    Log in to Reply
  7. Edge Kroll says

    March 27, 2024 at 9:26 am

    https://www.securityweek.com/vpn-apps-on-google-play-turn-android-devices-into-proxies/

    Dozens of VPN applications infiltrated Google Play, turning Android devices into residential proxies. Associated with Asocks, these apps were swiftly removed from the store, but Proxylib’s presence in the LumiApps SDK allowed for its integration into other APKs. This covert operation enables threat actors to initiate malicious activities by routing traffic through users’ devices, mimicking residential IP addresses. With developers enticed by claims of alternative monetization, the threat actor behind Proxylib promotes it as a lucrative method, while access to the proxy network is allegedly sold through Asocks, hinting at a potential common ownership between LumiApps and Asocks.

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • 01 – Introduction (1)
  • 01 – Threat Environment (3)
  • 02 – System Security Plan (6)
  • 03 – Planning and Policy (7)
  • 04 – Cryptography (4)
  • 05 – Secure Networks (7)
  • 06 – Firewalls (5)
  • 08 – Access Control (7)
  • 09 – Host Hardening (5)
  • 10 – Application Security (6)
  • 11 – Data Protection (4)
  • 12 – Incident and Disaster Response (5)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in