Tamnoon, a leader in Managed Cloud Security Remediation, today announced its status as a launch partner for Wiz Defend. The new solution from Wiz draws upon the power of Wiz Integration Network (WIN) partners to better detect and respond to cloud threats in real-time. Tamnoon was selected as a launch partner due to its leading Managed Cloud Security Remediation capabilities, seamlessly integrating with Wiz Defend to empower customers and their SOC/Incident Response teams.
The WIN platform enables bi-directional sharing of security findings across the cloud security ecosystem comprised of hundreds of industry-leading partners like Tamnoon that help mutual customers gain security insight and visibility. With the introduction of Wiz Defend, Wiz is now extending its value to SOC and IR teams for better preparation, investigation, detection, and response to cloud incidents.
WIN enables mutual customers of Tamnoon and Wiz to receive the following benefits:
- Enhanced Cloud Visibility: Wiz’s agentless scanning gives teams immediate visibility into all workloads and cloud services, ensuring no security issues are missed across their infrastructure. Combining this visibility with AI-driven, human-verified managed cloud security from Tamnoon allows customers to bring down critical threats faster than ever.
- Reduced Alert Fatigue: Wiz Issues combine toxic risk combinations that lead to open attack paths, helping teams identify what to prioritize and fix. Tamnoon enriches all Wiz Issues with proactive, human, and AI-driven investigation, correlating current and past alerts and factoring in information about critical assets, ownership, encryption, public exposure, and more. To enhance the collaboration between security and engineering, Tamnoon offers curated, highly relevant remediation playbooks that facilitate quick handover between teams, closing the loop on the original issues.
- Cloud Exposure Remediation: The integration automates the remediation of Wiz issues by leveraging Tamnoon’s managed cloud remediation that allows for safe and scalable remediation and ongoing incident response monitoring, including exposure reduction SLAs and KPIs for continuous improvement — all driving critical cloud threats and exposures to zero within months.
The combined value of these two offerings will streamline security for organizations seeking to eliminate blind spots and telemetry gaps in order to improve cloud incident response readiness, multi-cloud threat detection, investigation, and threat hunting.
30M protected links exposed by ‘safe’ link-sharing provider
Posted in Commentary with tags Cybernews on December 3, 2024 by itnerdCybernews research has shown that a safe linking service accidentally leaked millions of links that were meant to be private and exposed who created them.
Researchers discovered that Safelinking.net, a platform designed to protect and manage links, had publicly leaked a tremendous amount of user data that was supposed to be protected.
Apart from making 30 million private links public, the platform also exposed the account data of over 156,000 users.
Safe linking services allow you to create protected links with various safety controls, such as passwords, PINs, IP address limitations, or real-time URL scanning, to secure access and protect users from malicious links.
Microsoft and Google integrated safe linking to their products long ago. For those who do not subscribe to the tech giants’ solutions, there are platforms on the internet that provide similar services. However, using third-party services can pose risks, particularly when human error occurs.
What data was leaked?
Malicious bots find the data
The leak was caused by a poorly configured and passwordless MongoDB database. After investigating the leak, the research team discovered traces of malicious bots that had already targeted the unprotected database.
Misconfigured MongoDB databases are often targeted by automated bots, which insert README notes with a ransom demand. If the database owner does not pay the ransom, the bots destroy the database’s content by sending a “delete” command.
Such a note was discovered in the leaked database belonging to Safelinking. The note demanded payment of 0.0057 BTC, which at the time of publishing, was nearly $660. “In 48 hours, your data will be publicly disclosed and deleted,” reads the ransom note.
Following the ransom demand, a malicious bot destroyed the open database, which is now not publicly available. Cybernews have contacted the company for a comment, but they have yet to receive a response.
To read the full research, please click here.
Leave a comment »