rich9 sign up
rich9 sign up

Bruins see improvements under new coach, tackle Canucks nextPals looks back on almost half a century of law enforcement in North Iowa
Many organizations using Web application firewall (WAF) services from content delivery network (CDN) providers may be inadvertently leaving their back-end servers open to direct attacks over the Internet because of a common configuration error. The problem is so pervasive that it affects nearly 40% of Fortune 100 companies leveraging their CDN providers for WAF services, according to researchers at Zafran who studied the cause and scope of the problem recently. Among the organizations that the researchers found susceptible to attacks included recognizable brands, including Chase, Visa, Intel, Berkshire Hathaway, and UnitedHealth. WAFs act as intermediaries between users and Web applications. They inspect traffic for a range of threats and block or filter anything deemed suspicious or matching known patterns of malicious activity. Many organizations have deployed WAFs in recent years to protect Web applications against vulnerabilities they haven't had time to patch. Organizations have multiple options for deploying WAFs, including on-premises in the form of physical or virtual appliances. There are also cloud- and host-based WAFs. In total, Zafran found some 2,028 domains belonging to 135 companies among the Fortune 1000 that contain at least one supposedly WAF-protected server that an attacker could directly access over the Internet to launch denial-of-service (DoS) attacks, distribute ransomware, and execute other malicious activities. "The responsibility [for] the misconfiguration lies primarily [with] the customers of CDN/WAF providers," says Ben Seri, chief technology officer of Zafran. But CDN providers who offer WAF services share some responsibility as well for failing to offer customers proper risk avoidance measures and for not building their networks and services to circumvent misconfigurations in the first place, he says. The problem, as Seri explains it, has to do with organizations not adequately validating Web requests to back-end origin servers that host the actual content, applications, or data that users are trying to access. With a CDN-integrated WAF service, the CDN provider — like a Cloudflare or an Akamai — provides the WAF as part of its edge infrastructure. All incoming traffic to an organization's Web applications is routed through the CDN's WAF — a reverse proxy server within the vendor's edge network. The reverse proxy identifies which back-end server or resource a particular Web request is intended for and then routes it there in an encrypted fashion. "This means that when a CDN service is used as a WAF, the web application it protects is open to Internet traffic and is expected to validate that it responds only to web traffic that originates from and by the CDN service," according to the Zafran blog post. If the customer is using best practices, the IP address of the back-end server is something that only the customer and CDN provider would know. CDN providers also recommend that organizations add IP filtering mechanisms to ensure that only requests from the CDN provider's IP address range are permitted access to back-end servers. Other recommendations include using pre-shared digital secrets known only to the CDN provider and the back-end server as a validation mechanism, and using what is known as mutual TLS authentication to validate both the origin server and the CDN provider's proxy server. These measures are effective in protecting back-end servers when implemented correctly. But what Zafran discovered was that many organizations have not adopted any of these recommended validation precautions, thereby leaving back-end servers directly accessible over the Internet. "It is a lack of validation in Web applications that are designed to be protected by a CDN/WAF that leaves them open to all Internet traffic," Seri says. "It is like having a private S3 bucket left open to the Internet as a public bucket. Only in this case, it is protected Web applications that are left open to the Internet, instead of allowing only inbound traffic from the CDN provider." Exacerbating the situation is the fact that the IP addresses of enterprise origin services are not as private as many assume, Zafran's researchers found. The security vendor pointed to certificate transparency (CT) logs as one example of a relatively easy place for attackers and researchers to discover all domains belonging to a specific organization. CT logs provide a publicly accessible record of all SSL/TLS certificates that certificate authorities issue to website operators and are meant to improve trust and accountability around certificate issuance. Unfortunately, they also provide a starting point for attackers to gather detailed information on all the domains and subdomains belonging to an organization, including those associated with critical back-end servers and services. "The issue was discovered to be extremely widespread," Seri says. "From a random sample of Internet servers that were designed to be protected by Cloudflare, 13% were found to suffer from this misconfiguration. This means that, potentially, 13% of all domains protected by Cloudflare can be directly attacked." Unfortunately, CDN/WAF providers require the cooperation of their customers, who control their own load balancers and Web applications, to mitigate this threat, he adds. Zafran is contacting affected companies as well as impacted CDN/WAF providers to help them quickly identify the full extent of this misconfiguration and address it, Seri says. Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year career at Computerworld, Jai also covered a variety of other technology topics, including big data, Hadoop, Internet of Things, e-voting, and data analytics. Prior to Computerworld, Jai covered technology issues for The Economic Times in Bangalore, India. Jai has a Master's degree in Statistics and lives in Naperville, Ill.Brighthouse Financial EVP sells $523,100 in stockWelcome to OncLive On Air ® ! I’m your host today, Ashling Wahner. OncLive On Air is a podcast from OncLive ® , which provides oncology professionals with the resources and information they need to provide the best patient care. In both digital and print formats, OncLive covers every angle of oncology practice, from new technology to treatment advances to important regulatory decisions. In today’s episode, supported by BeiGene, Alexey Danilov, MD, PhD, hosted a discussion with Nicole Lamanna, MD, about the use of zanubrutinib (Brukinsa) in patients with chronic lymphocytic leukemia (CLL). Dr Danilov is the Marianne and Gerhard Pinkus Professor of Early Clinical Therapeutics, the medical director of the Early Phase Therapeutics Program for the Systems Clinical Trials Office, co-director of the Toni Stephenson Lymphoma Center, and a professor in the Division of Lymphoma at the Department of Hematology & Hematopoietic Cell Transplantation at City of Hope in Duarte, California. Dr Lamanna is an associate clinical professor of medicine in the Hematologic Malignancies Section of the Hematology/Oncology Division at the Columbia University Herberg Irving Comprehensive Cancer Center in New York, New York. In our exclusive interview, Drs Danilov and Lamanna discussed key efficacy data from the final comparative analysis of the phase 3 ALPINE trial (NCT03734016) in patients with relapsed/refractory CLL, zanubrutinib-associated toxicities to consider when using this agent, and what the future looks like for BTK inhibitor–based therapy in CLL. ___ That’s all we have for today! Thank you for listening to this episode of OncLive On Air , supported by BeiGene. Check back on Mondays and Thursdays for exclusive interviews with leading experts in the oncology field. For more updates in oncology, be sure to visit www.OncLive.com and sign up for our e-newsletters. OncLive is also on social media. On X, follow us at @OncLive. On Facebook, like us at OncLive, and follow our OncLive page on LinkedIn. If you liked today’s episode of OncLive On Air , please consider subscribing to our podcast on Apple Podcasts, Spotify, Amazon Music, and many of your other favorite podcast platforms,* so you get a notification every time a new episode is posted. While you are there, please take a moment to rate us! Thanks again for listening to OncLive On Air . *OncLive On Air is available on: Apple Podcasts, Google Podcasts, Spotify, Amazon Music, Audacy, CastBox, Deezer, iHeart, JioSaavn, Listen Notes, Player FM, Podcast Addict, Podchaser, RadioPublic, and TuneIn.
Simulations Plus director Lisa LaVange sells $20,722 in stockAP News Summary at 3:32 p.m. EST
MANCHESTER, England (AP) — Manchester City manager Pep Guardiola denied he has a “personal problem” with Kevin De Bruyne and insisted Tuesday the playmaker's absence from the team in recent weeks was down to his fitness issues. City has not won in seven games in all competitions — its worst run under Guardiola — and De Bruyne has featured only as a substitute in the last five of those matches after recovering from a pelvic injury. Javascript is required for you to be able to read premium content. Please enable it in your browser settings.
Abono party list president gunned down in Pangasinan
- jollibee 5th ave
- hack fortune rabbit
- 99bet download apk
- +UQ̓ƣ\Hኃ:%oi)TLF7*zTJϯN+]: ci۠A{!|%
6m+z+jNp9W4VbIn{$$a6I;z`[p0PUdnM~^;EQ)0cVkHx<~=p9kw1aWIASmT<67)˘[Cg^v`BI$3;S1y/2k (d[k0ˬM&`~ԭ@(=A
s>hTf0@pt0*),[Cc:aIR&˚p c0j-:Y0j=˶93E6ps&gִ胙Plkb^c1D.D":7aZpjln`xa0^1Hт{4I)qf'a#`)~2gb`W"m]KA'u ,Cu`y "bCM18*TB! >3 Հ1,!j:ӛ!}! .b5`[^m-AR!-˻)lP1j@zqWC $ahrZ59oȪRP7&`3$#aD{"$?0NRŋ9gѯ2_Rv?!JP