SlideShare a Scribd company logo
Open Source Insight:
GDPR Best Practices, Struts RCE Vulns, SAST, DAST & Equifax
By Fred Bals | Senior Content Writer/Editor
Cybersecurity News This Week
COSRI research director Chris Fearon makes the case that Equifax
was either unaware of or slow to respond to reports of known critical
vulnerabilities in their system, and as a result had not upgraded to
safer versions. That opinion was later proven out by Congressional
hearings into the breach, as Fred Bals relates in his blog on whether
SAST and DAST fell down on the job for Equifax. Black Duck VP and
General Counsel, Matt Jacobs partners with Irwin Mitchell’s Dan
Headley to review what GDPR will mean for open source code. Is
open source more dangerous than Windows? And Larry Ellison claims
Oracle could have saved Equifax from much heartache in this week’s
open source security and cybersecurity news wrap.
• How Do We Reconcile the Open Source
Security Risk With GDPR Best Practice?
• Examining Apache SCE Vulns
• The Next Step in Modernization
• The Attack of the Car Wash System and
Other Menacing Stories of the Internet of
Things
• Step Aside, Windows! Open Source and
Linux Are IT’s New Security Headache
Open Source News
More Open Source News
• Did SAST and DAST Fail Equifax?
• Ellison Claims Oracle Software Could Have Prevented Equifax
Hack
• BigchainDB Brings Scalable Database Technology to
Blockchains
• Russian Intelligence Reportedly Breached the NSA in 2015,
Stealing Cybersecurity Strategy
• FICO-Like Cybersecurity Scores Are Imminent: What Do They
Mean For Your Business?
• Exception Based Review Process – Less Is More!
via SC Media: GDPR is a top-to-bottom reform of
European data privacy law and deals with a much
wider range of topics than information
security. Nevertheless, security is a key element
of GDPR's overall policy objective of promoting
transparency, accountability and trust in
organisations which deal with people's data, and
its security provisions are a critical part of
achieving that objective...
How Do We Reconcile the Open Source Security
Risk With GDPR Best Practice?
Examining Apache SCE Vulns
via Black Duck blog (Christopher Fearon): The timeline of
related events makes it clear that fixed versions of Struts were
available at or before the security advisories were published, and
that known exploits were not available in the wild beforehand. The
timeline also bears witness to Apache's assertions of consistent
good practise and tells us that the attack was likely to be a
product of poor security practises on the part of Equifax.
via IBM Systems Magazine: Modernization has
evolved from a buzzword to an imperative for
any business that wishes to stay competitive.
New computer hardware and enhanced internet
interconnectivity don’t simply offer greater power
and faster speeds, they allow for new
possibilities. It’s in this environment — which
includes the Internet of Things (IoT) — where
open-source databases (OSDBs) are
increasingly relied upon.
The Next Step in Modernization
The Attack of the Car Wash System and Other
Menacing Stories of the Internet of Things
via Industry of Things (Germany):
Safe software is a short-lived concept.
What is considered safe today can
change overnight when new
vulnerabilities are discovered and
disclosed. The older the code, the
higher the probability that
vulnerabilities will be revealed.
via ComputerWorld: The Equifax breach is the
latest example of attackers targeting open-
source software in the enterprise.
Step Aside, Windows! Open Source and Linux
Are IT’s New Security Headache
Did SAST and DAST Fail Equifax?
via Black Duck blog (Fred Bals): [Equifax] hasn’t elaborated so
far on what was used to “scan” the Equifax systems, but given its
failure to identify a known open source vulnerability, one could
assume that it wasn’t a dedicated open source vulnerability
management solution (or if it was, Equifax should seriously
consider asking for its money back). It’s more likely that Equifax
was using some combination of traditional SAST and DAST tools
to protect itself.
via Market Watch: The massive data breach
at Equifax Inc. could have been prevented
with Oracle Corp.’s automated databases,
Larry Ellison claimed Tuesday, using the
credit-reporting company’s woes as a selling
point for Oracle’s new product.
Ellison Claims Oracle Software Could Have
Prevented Equifax Hack
BigchainDB Brings Scalable Database
Technology to Blockchains
via Black Duck blog (Masha McConaghy | Founder & CMO of
BigchainDB): For nine years, the Black Duck Open Source Rookies
of the Year awards have recognized some of the most innovative and
influential open source projects launched during the previous year.
We sat down with Founder and CMO Masha McConaghy to hear the
exciting story of one of this year's rookies: BigchainDB.
via Techcrunch: The NSA suffered a serious
breach in 2015, exposing the agency’s
cyberwarfare strategy, including its own
defenses and methods of attacking foreign
networks, reports The Wall Street
Journal today. Russian intelligence is said to be
behind the attack, and software from Russia-
based Kaspersky labs is suggested to have
been their vector.
Russian Intelligence Reportedly Breached
the NSA in 2015, Stealing Cybersecurity
Strategy
FICO-Like Cybersecurity Scores Are Imminent: What
Do They Mean For Your Business?
via Forbes: what if we started using a unified rating system for
evaluating cybersecurity like we do in all other aspects of business?
That system is already underway.
via Black Duck blog (Hal Hearst): In my
previous post I wrote about how the changing
situation around open source management has
pushed the need for an exception based review
process for open source. In my opinion, it's the
only process that really works. And by “works,” I
mean scales across a large enterprise in which
the use of open source is common. Exception
based is a key element in the “fast & simple”
approach.
Exception Based Review Process –
Less Is More!
Subscribe
Stay up to date on open source security and cybersecurity –
subscribe to our blog today.
Open Source Insight:  GDPR Best Practices, Struts RCE Vulns, SAST, DAST & Equifax

More Related Content

PPTX
Open Source Insight: NotPetya Strikes, Patching Is Vital for Risk Management
PDF
2015 August - Intel Security McAfee Labs Quarterly Threat Report
PDF
The growing hacking threat to websites
PPTX
Open Source Insight: Amazon Servers Exposed Open Source & the Public Sector...
PDF
MITRE ATT&CKcon 2.0: AMITT - ATT&CK-based Standards for Misinformation Threat...
PDF
Websense security prediction 2014
PPTX
Data Protection & Privacy During the Coronavirus Pandemic
PPTX
Open Source Insight: Drupageddon, Heartbleed Problems & Open Source 360 Surve...
Open Source Insight: NotPetya Strikes, Patching Is Vital for Risk Management
2015 August - Intel Security McAfee Labs Quarterly Threat Report
The growing hacking threat to websites
Open Source Insight: Amazon Servers Exposed Open Source & the Public Sector...
MITRE ATT&CKcon 2.0: AMITT - ATT&CK-based Standards for Misinformation Threat...
Websense security prediction 2014
Data Protection & Privacy During the Coronavirus Pandemic
Open Source Insight: Drupageddon, Heartbleed Problems & Open Source 360 Surve...

What's hot (19)

PDF
Modern Adversaries (Amplify Partners)
PDF
Top 12 Cybersecurity Predictions for 2017
PPTX
Open Source Insight: Apache Struts Exploits, Cloudera IPO Risks & the Next Cy...
PDF
Graph Intelligence: The Essentials for Cybersecurity
PDF
20160713 2016 the honeynet projct annual workshop focus and global trends
PDF
Scared About Supply Chain Cybersecurity? 5 Reasons You Aren't Scared Enough
PDF
Qrator Labs annual report 2017
PDF
5 Security Trends to Watch in 2020
PPTX
Global Threats| Cybersecurity|
PDF
Cisco 2013 Annual Security Report
PPTX
Open Source Insight: OWASP Top 10, Red Hat OpenShift News, & Gmail Phishing Scam
PPTX
Dev Secops Software Supply Chain
PPTX
Security Software Supply Chains - Sonatype - DevSecCon Singapore March 2019
PDF
2017 Data Breach Investigations Report
PDF
Cyber security trends 2018
PDF
Are you ready for the next attack? Reviewing the SP Security Checklist
PDF
1530 track1 ulinski
PDF
[CB20] It is a World Wide Web, but All Politics is Local: Planning to Survive...
PPTX
The Top Five Cybersecurity Threats for 2018
Modern Adversaries (Amplify Partners)
Top 12 Cybersecurity Predictions for 2017
Open Source Insight: Apache Struts Exploits, Cloudera IPO Risks & the Next Cy...
Graph Intelligence: The Essentials for Cybersecurity
20160713 2016 the honeynet projct annual workshop focus and global trends
Scared About Supply Chain Cybersecurity? 5 Reasons You Aren't Scared Enough
Qrator Labs annual report 2017
5 Security Trends to Watch in 2020
Global Threats| Cybersecurity|
Cisco 2013 Annual Security Report
Open Source Insight: OWASP Top 10, Red Hat OpenShift News, & Gmail Phishing Scam
Dev Secops Software Supply Chain
Security Software Supply Chains - Sonatype - DevSecCon Singapore March 2019
2017 Data Breach Investigations Report
Cyber security trends 2018
Are you ready for the next attack? Reviewing the SP Security Checklist
1530 track1 ulinski
[CB20] It is a World Wide Web, but All Politics is Local: Planning to Survive...
The Top Five Cybersecurity Threats for 2018
Ad

Similar to Open Source Insight: GDPR Best Practices, Struts RCE Vulns, SAST, DAST & Equifax (20)

PPTX
Open Source Insight: CVE–2017-9805, Equifax Breach & Wacky Open Source Licenses
PPTX
Threat Check for Struts Released, Equifax Breach Dominates News
PPTX
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...
PPTX
Open Source Insight: Paraskevidekatriaphobia, Web APIs, Jeep Hacking, More ...
PPTX
Open Source Insight: 2017 Top 10 IT Security Stories, Breaches, and Predictio...
PDF
The Intersection Between Open Source and Cybersecurity
PDF
The Future of Software Security Assurance
PPTX
Open Source Insight: Samba Vulnerability, Connected Car Risks, and Are You R...
PPSX
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
PPTX
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
PPTX
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
PPTX
Solnet dev secops meetup
PPTX
Open Source Insight: Happy Birthday Open Source and Application Security for ...
PPTX
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
PDF
Open Source Insight: Struts in VMware, Law Firm Cybersecurity, Hospital Data ...
PPTX
Secure application deployment in the age of continuous delivery
PPTX
Secure application deployment in the age of continuous delivery
PPTX
Managing Open Source in Application Security and Software Development Lifecycle
PPTX
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...
PPTX
Open Source Insight: NVD's New Look, Struts Vuln Ransomware & Google Open So...
Open Source Insight: CVE–2017-9805, Equifax Breach & Wacky Open Source Licenses
Threat Check for Struts Released, Equifax Breach Dominates News
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...
Open Source Insight: Paraskevidekatriaphobia, Web APIs, Jeep Hacking, More ...
Open Source Insight: 2017 Top 10 IT Security Stories, Breaches, and Predictio...
The Intersection Between Open Source and Cybersecurity
The Future of Software Security Assurance
Open Source Insight: Samba Vulnerability, Connected Car Risks, and Are You R...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Solnet dev secops meetup
Open Source Insight: Happy Birthday Open Source and Application Security for ...
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
Open Source Insight: Struts in VMware, Law Firm Cybersecurity, Hospital Data ...
Secure application deployment in the age of continuous delivery
Secure application deployment in the age of continuous delivery
Managing Open Source in Application Security and Software Development Lifecycle
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...
Open Source Insight: NVD's New Look, Struts Vuln Ransomware & Google Open So...
Ad

More from Black Duck by Synopsys (20)

PDF
Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
PDF
FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...
PDF
FLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck Hub
PDF
FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...
PDF
FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...
PDF
Open-Source- Sicherheits- und Risikoanalyse 2018
PDF
FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...
PDF
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
PDF
FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your Deal
PDF
FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...
PPT
FLIGHT Amsterdam Presentation - From Protex to Hub
PPTX
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
PPTX
Open Source Insight: GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
PDF
Open Source Rookies and Community
PPTX
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
PPTX
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...
PPTX
Open Source Insight: Security Breaches and Cryptocurrency Dominating News
PDF
20 Billion Reasons for IoT Security
PPTX
Open Source Insight: IoT Security, Tech Due Diligence, and Software Security ...
PPTX
Open Source Insight: Banking and Open Source, 2018 CISO Report, GDPR Looming
Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...
FLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck Hub
FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...
FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...
Open-Source- Sicherheits- und Risikoanalyse 2018
FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your Deal
FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...
FLIGHT Amsterdam Presentation - From Protex to Hub
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Open Source Insight: GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
Open Source Rookies and Community
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...
Open Source Insight: Security Breaches and Cryptocurrency Dominating News
20 Billion Reasons for IoT Security
Open Source Insight: IoT Security, Tech Due Diligence, and Software Security ...
Open Source Insight: Banking and Open Source, 2018 CISO Report, GDPR Looming

Recently uploaded (20)

PDF
Encapsulation theory and applications.pdf
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
A Presentation on Artificial Intelligence
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Machine learning based COVID-19 study performance prediction
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Empathic Computing: Creating Shared Understanding
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Electronic commerce courselecture one. Pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PPTX
sap open course for s4hana steps from ECC to s4
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Encapsulation theory and applications.pdf
Building Integrated photovoltaic BIPV_UPV.pdf
A Presentation on Artificial Intelligence
gpt5_lecture_notes_comprehensive_20250812015547.pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Advanced methodologies resolving dimensionality complications for autism neur...
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Review of recent advances in non-invasive hemoglobin estimation
Mobile App Security Testing_ A Comprehensive Guide.pdf
Machine learning based COVID-19 study performance prediction
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Empathic Computing: Creating Shared Understanding
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Electronic commerce courselecture one. Pdf
Digital-Transformation-Roadmap-for-Companies.pptx
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
sap open course for s4hana steps from ECC to s4
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...

Open Source Insight: GDPR Best Practices, Struts RCE Vulns, SAST, DAST & Equifax

  • 1. Open Source Insight: GDPR Best Practices, Struts RCE Vulns, SAST, DAST & Equifax By Fred Bals | Senior Content Writer/Editor
  • 2. Cybersecurity News This Week COSRI research director Chris Fearon makes the case that Equifax was either unaware of or slow to respond to reports of known critical vulnerabilities in their system, and as a result had not upgraded to safer versions. That opinion was later proven out by Congressional hearings into the breach, as Fred Bals relates in his blog on whether SAST and DAST fell down on the job for Equifax. Black Duck VP and General Counsel, Matt Jacobs partners with Irwin Mitchell’s Dan Headley to review what GDPR will mean for open source code. Is open source more dangerous than Windows? And Larry Ellison claims Oracle could have saved Equifax from much heartache in this week’s open source security and cybersecurity news wrap.
  • 3. • How Do We Reconcile the Open Source Security Risk With GDPR Best Practice? • Examining Apache SCE Vulns • The Next Step in Modernization • The Attack of the Car Wash System and Other Menacing Stories of the Internet of Things • Step Aside, Windows! Open Source and Linux Are IT’s New Security Headache Open Source News
  • 4. More Open Source News • Did SAST and DAST Fail Equifax? • Ellison Claims Oracle Software Could Have Prevented Equifax Hack • BigchainDB Brings Scalable Database Technology to Blockchains • Russian Intelligence Reportedly Breached the NSA in 2015, Stealing Cybersecurity Strategy • FICO-Like Cybersecurity Scores Are Imminent: What Do They Mean For Your Business? • Exception Based Review Process – Less Is More!
  • 5. via SC Media: GDPR is a top-to-bottom reform of European data privacy law and deals with a much wider range of topics than information security. Nevertheless, security is a key element of GDPR's overall policy objective of promoting transparency, accountability and trust in organisations which deal with people's data, and its security provisions are a critical part of achieving that objective... How Do We Reconcile the Open Source Security Risk With GDPR Best Practice?
  • 6. Examining Apache SCE Vulns via Black Duck blog (Christopher Fearon): The timeline of related events makes it clear that fixed versions of Struts were available at or before the security advisories were published, and that known exploits were not available in the wild beforehand. The timeline also bears witness to Apache's assertions of consistent good practise and tells us that the attack was likely to be a product of poor security practises on the part of Equifax.
  • 7. via IBM Systems Magazine: Modernization has evolved from a buzzword to an imperative for any business that wishes to stay competitive. New computer hardware and enhanced internet interconnectivity don’t simply offer greater power and faster speeds, they allow for new possibilities. It’s in this environment — which includes the Internet of Things (IoT) — where open-source databases (OSDBs) are increasingly relied upon. The Next Step in Modernization
  • 8. The Attack of the Car Wash System and Other Menacing Stories of the Internet of Things via Industry of Things (Germany): Safe software is a short-lived concept. What is considered safe today can change overnight when new vulnerabilities are discovered and disclosed. The older the code, the higher the probability that vulnerabilities will be revealed.
  • 9. via ComputerWorld: The Equifax breach is the latest example of attackers targeting open- source software in the enterprise. Step Aside, Windows! Open Source and Linux Are IT’s New Security Headache
  • 10. Did SAST and DAST Fail Equifax? via Black Duck blog (Fred Bals): [Equifax] hasn’t elaborated so far on what was used to “scan” the Equifax systems, but given its failure to identify a known open source vulnerability, one could assume that it wasn’t a dedicated open source vulnerability management solution (or if it was, Equifax should seriously consider asking for its money back). It’s more likely that Equifax was using some combination of traditional SAST and DAST tools to protect itself.
  • 11. via Market Watch: The massive data breach at Equifax Inc. could have been prevented with Oracle Corp.’s automated databases, Larry Ellison claimed Tuesday, using the credit-reporting company’s woes as a selling point for Oracle’s new product. Ellison Claims Oracle Software Could Have Prevented Equifax Hack
  • 12. BigchainDB Brings Scalable Database Technology to Blockchains via Black Duck blog (Masha McConaghy | Founder & CMO of BigchainDB): For nine years, the Black Duck Open Source Rookies of the Year awards have recognized some of the most innovative and influential open source projects launched during the previous year. We sat down with Founder and CMO Masha McConaghy to hear the exciting story of one of this year's rookies: BigchainDB.
  • 13. via Techcrunch: The NSA suffered a serious breach in 2015, exposing the agency’s cyberwarfare strategy, including its own defenses and methods of attacking foreign networks, reports The Wall Street Journal today. Russian intelligence is said to be behind the attack, and software from Russia- based Kaspersky labs is suggested to have been their vector. Russian Intelligence Reportedly Breached the NSA in 2015, Stealing Cybersecurity Strategy
  • 14. FICO-Like Cybersecurity Scores Are Imminent: What Do They Mean For Your Business? via Forbes: what if we started using a unified rating system for evaluating cybersecurity like we do in all other aspects of business? That system is already underway.
  • 15. via Black Duck blog (Hal Hearst): In my previous post I wrote about how the changing situation around open source management has pushed the need for an exception based review process for open source. In my opinion, it's the only process that really works. And by “works,” I mean scales across a large enterprise in which the use of open source is common. Exception based is a key element in the “fast & simple” approach. Exception Based Review Process – Less Is More!
  • 16. Subscribe Stay up to date on open source security and cybersecurity – subscribe to our blog today.