article thumbnail

Jeff Bezos’ investment fund is backing a startup hoping to be the AWS for SMB accounting

TechCrunch

Bezos Expeditions — Amazon founder Jeff Bezos’ personal investment fund — and Whale Rock Capital (a $10 billion hedge fund) co-led the round, which also included participation from Sequoia Capital, Index Ventures, Authentic Ventures and others. . Ironically, Pilot says it aspires to the “AWS of SMB backoffice.” (In

SMB 257
article thumbnail

CVE-2024-8260: SMB Force-Authentication Vulnerability in OPA Could Lead to Credential Leakage

Tenable

Tenable Research discovered an SMB force-authentication vulnerability in Open Policy Agent (OPA) that is now fixed in the latest release of OPA. This exploration led us to discover an SMB force-authentication vulnerability (CVSSv3 6.1) affecting all existing versions of OPA for Windows at that time.

SMB 77
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Microsoft’s November 2024 Patch Tuesday Addresses 87 CVEs (CVE-2024-43451, CVE-2024-49039)

Tenable

Successful exploitation would lead to the unauthorized disclosure of a user’s NTLMv2 hash, which an attacker could then use to authenticate to the system as the user. of the vulnerabilities patched this month, followed by elevation of privilege (EoP) vulnerabilities at 29.9%. It was assigned a CVSSv3 score of 9.8

Windows 124
article thumbnail

It's 2022. Why do you keep using SMB?

Ivanti

During the last 25 years, companies have relied on SMB protocol to allow them to collaborate and centralize corporate documents. The history of SMB (and why it's no longer relevant). The latest iteration, SMB 3.1.1, encryption added in SMB3 and implemented a pre-authentication integrity check using?SHA-512?hash.

SMB 75
article thumbnail

Microsoft’s May 2025 Patch Tuesday Addresses 71 CVEs (CVE-2025-32701, CVE-2025-32706, CVE-2025-30400)

Tenable

An authenticated attacker can leverage this vulnerability to elevate their privileges to administrator by exploiting a user after free condition. of the vulnerabilities patched this month, followed by elevation of privilege (EoP) vulnerabilities at 25.4%. It was assigned a CVSSv3 score of 7.8 and rated as Important.

Windows 103
article thumbnail

Cybersecurity Snapshot: Five Eyes Rank 2023’s Most Frequently Exploited CVEs, While CSA Publishes Framework for AI System Audits

Tenable

Require phishing-resistant multi-factor authentication for all users and on all VPN connections. For example, the paper suggests 19 questions to ask about AI security systems, organized into seven sub-categories, including authentication and access control; data sanitization; encryption and key management; and security monitoring.

System 80
article thumbnail

Leverage Two-Factor Authentication for Maximized Security

Kaseya

Phishing, social engineering and unsecured networks have made password based authentication insecure for some time. In today’s age where security breaches have become an everyday occurrence, password-only authentication is not sufficient. Increase Security with Two-Factor Authentication.