<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:yandex="http://news.yandex.ru" xmlns:turbo="http://turbo.yandex.ru" xmlns:media="http://search.yahoo.com/mrss/">
  <channel>
    <title>News EN DQ</title>
    <link>https://dq.kz</link>
    <description/>
    <language>ru</language>
    <lastBuildDate>Fri, 08 May 2026 10:52:12 +0300</lastBuildDate>
    <item turbo="true">
      <title>Insecure APIs and Bot Attacks Cost Companies $186 Billion</title>
      <link>https://dq.kz/tpost/0hohak46u1-insecure-apis-and-bot-attacks-cost-compa</link>
      <amplink>https://dq.kz/tpost/0hohak46u1-insecure-apis-and-bot-attacks-cost-compa?amp=true</amplink>
      <pubDate>Thu, 19 Sep 2024 08:45:00 +0300</pubDate>
      <enclosure url="https://static.tildacdn.com/tild3264-6636-4762-b931-373165326138/DALLE_2024-09-19_161.png" type="image/png"/>
      <description>According to a Thales study, insecure APIs and AI-powered bot attacks cause global companies up to $186 billion in damage every year.</description>
      <turbo:content><![CDATA[<header><h1>Insecure APIs and Bot Attacks Cost Companies $186 Billion</h1></header><figure><img alt="" src="https://static.tildacdn.com/tild3264-6636-4762-b931-373165326138/DALLE_2024-09-19_161.png"/></figure><div class="t-redactor__text">According to a new study by Thales, the rapid adoption of APIs and AI-powered bot attacks cost global companies up to $186 billion annually. Losses caused by insecure APIs have increased from $12 billion in 2021 to $35–87 billion today, while losses from bot attacks may reach up to $116 billion.<br /><br />The rapid expansion of APIs, lack of expertise, and weak coordination between security and development teams create additional risks. Large companies with annual revenue of more than $100 billion are especially vulnerable to these threats.<br /><br />This report on the economic impact of API and bot attacks is based on an analysis of 161,000 cybersecurity incidents conducted by Thales Imperva and the Cyber Risk Intelligence Center at Marsh McLennan.<br /><br />The report notes that APIs are becoming a popular target because they can provide access to sensitive corporate and customer data. Attackers often use automated bots to detect vulnerable or misconfigured APIs.<br /><br />Generative AI enables even inexperienced cybercriminals to launch sophisticated bot attacks by improving methods for bypassing security systems.<br /><br />Companies with high revenue are most often targeted by attacks involving insecure APIs and bots. These threats account for 26% of all security incidents in such organizations, compared with the average rate of 12%.<br /><br />The reason is that large companies usually manage complex API ecosystems that may contain vulnerable interfaces. On average, such enterprises use 613 API endpoints.<br /><br />Dependence on APIs will continue to grow, especially with the development of generative AI and large language models. At the same time, cybercriminals will accelerate the creation of sophisticated bots.<br /><br />As the number of APIs increases and bots become more advanced, the economic damage to companies will continue to grow unless preventive measures are taken.<br /><br />The complexity and interconnection of these threats require companies to integrate security strategies against both bot attacks and API attacks.</div>]]></turbo:content>
    </item>
    <item turbo="true">
      <title>Critical Vulnerabilities in Rockwell Automation, Siemens and Viessmann Products</title>
      <link>https://dq.kz/tpost/64y51yck51-critical-vulnerabilities-in-rockwell-aut</link>
      <amplink>https://dq.kz/tpost/64y51yck51-critical-vulnerabilities-in-rockwell-aut?amp=true</amplink>
      <pubDate>Sun, 22 Sep 2024 08:47:00 +0300</pubDate>
      <enclosure url="https://static.tildacdn.com/tild3534-3136-4264-b963-356131326161/photo.png" type="image/png"/>
      <description>CRIL Research Lab reported critical vulnerabilities in Rockwell Automation, Siemens and Viessmann products. Organizations are advised to apply updates and strengthen security monitoring.</description>
      <turbo:content><![CDATA[<header><h1>Critical Vulnerabilities in Rockwell Automation, Siemens and Viessmann Products</h1></header><figure><img alt="" src="https://static.tildacdn.com/tild3534-3136-4264-b963-356131326161/photo.png"/></figure><div class="t-redactor__text">Top Vulnerabilities of the Week: Critical Flaws in Rockwell Automation, Siemens and Viessmann<br /><br />CRIL Research Lab reported several vulnerabilities identified between September 10 and 16. CISA released 29 security advisories, including serious vulnerabilities found in products from Rockwell Automation, Siemens and Viessmann.<br /><br />1. CVE-2024-45824: Command Injection — Rockwell Automation<br /><br />This is a critical vulnerability in Rockwell Automation FactoryTalk View Site Edition prior to version 14.0, with a CVSS score of 9.8. Exploitation requires network access, but does not require privileges or user interaction.<br /><br />Mitigation: Updating the software resolves the issue. Use ODIN capabilities to assess and protect devices.<br /><br />2. CVE-2024-35783: Execution with Excessive Privileges — Siemens<br /><br />A critical vulnerability with a CVSS score of 9.1 was discovered in Siemens products, including SIMATIC. Exploitation requires high privileges in network conditions.<br /><br />Mitigation: Updating the software resolves the vulnerability.<br /><br />3. CVE-2023-44373: Improper Neutralization of Special Characters — Siemens<br /><br />This vulnerability was discovered in Siemens devices where input fields are not properly sanitized. As a result, a remote attacker with administrative privileges may inject commands, execute code, or gain root-level access through a command injection attack.<br /><br />Affected devices include Siemens RUGGEDCOM and SCALANCE product families.<br /><br />Mitigation: Update the firmware to version 3.0.2 or later.<br /><br />4. CVE-2024-45032: Authorization Bypass — Siemens Industrial Edge Management<br /><br />A critical vulnerability in the Device Token Handler component allows authorization to be bypassed.<br /><br />Mitigation: Update Siemens Industrial Edge Management to versions 1.9.5 or 2.3.1-1 and later.<br /><br />5. CVE-2023-46850: Use After Free — Siemens<br /><br />This vulnerability affects OpenVPN versions 2.6.0–2.6.6 and may lead to memory leakage or remote code execution during the processing of network buffers.<br /><br />The CVSS score is 9.8. Exploitation requires network access, but does not require privileges or user interaction.<br /><br />Mitigation: Install the latest updates provided by Siemens to address the vulnerability.<br /><br />6. CVE-2024-33698: Buffer Overflow — Siemens<br /><br />A vulnerability in Siemens user management components may lead to a buffer overflow. The CVSS score is 9.8. Exploitation is possible over the network without special privileges.<br /><br />Mitigation: Use port filtering and update the software.<br /><br />7. CVE-2023-45852: Command Injection — Viessmann Climate Solutions SE<br /><br />This vulnerability in the Viessmann Vitogate 300 firmware allows an unauthenticated attacker to inject commands through the `ipaddr` parameter, bypassing authentication.<br /><br />The vulnerability has a CVSS score of 9.8, indicating critical severity.<br /><br />Mitigation: Updating the firmware to the latest version resolves the vulnerability.<br /><br />8. CVE-2023-5222: Use of Hard-Coded Credentials — Viessmann<br /><br />This critical vulnerability is related to the use of hard-coded passwords in the management interface, allowing remote exploitation of the system without privileges.<br /><br />Mitigation: Public exploits are available, but the vendor has not yet responded.<br /><br />The distribution of these vulnerabilities shows that most of the issues fall into critical and high-severity categories, especially in products from vendors such as Siemens and Rockwell Automation.<br /><br />These vulnerabilities should be addressed as quickly as possible by applying patches and strengthening security measures. Organizations should pay particular attention to regular updates, security monitoring and risk management in order to protect their systems and critical infrastructure from potential threats.</div>]]></turbo:content>
    </item>
    <item turbo="true">
      <title>Digital Qalqan Wins the NCSIC 2024 Cyber Exercises</title>
      <link>https://dq.kz/tpost/dazl0kbjb1-digital-qalqan-wins-the-ncsic-2024-cyber</link>
      <amplink>https://dq.kz/tpost/dazl0kbjb1-digital-qalqan-wins-the-ncsic-2024-cyber?amp=true</amplink>
      <pubDate>Fri, 06 Sep 2024 08:49:00 +0300</pubDate>
      <enclosure url="https://static.tildacdn.com/tild6438-3735-4734-b961-396566613164/photo.png" type="image/png"/>
      <description>The Digital Qalqan SOC team won the NCSIC 2024 cyber exercises, successfully protecting the infrastructure of the Ministry of Education and demonstrating a high level of cybersecurity expertise.</description>
      <turbo:content><![CDATA[<header><h1>Digital Qalqan Wins the NCSIC 2024 Cyber Exercises</h1></header><figure><img alt="" src="https://static.tildacdn.com/tild6438-3735-4734-b961-396566613164/photo.png"/></figure><div class="t-redactor__text">Winners of the NCSIC 2024 Cyber Exercises<br /><br />Our SOC team became the winner of the NCSIC 2024 cyber exercises by protecting the infrastructure of the Ministry of Education and successfully attacking an IT company. The exercises confirmed the high professionalism of DQ specialists.<br /><br />Digital Qalqan LLP is proud to announce that the team of the Digital Qalqan Security Operations Center (SOC) took first place in the cyber exercises organized by the National Coordination Center for Information Security (NCSIC), which were held on August 19–20, 2024.<br /><br />During the exercises, our Blue Team successfully protected the virtual infrastructure of the Ministry of Education, identifying and investigating 100% of the realized risks. This demonstrated the team’s exceptional skills and high readiness to respond to modern cyber threats.<br /><br />At the same time, the DQ Red Team successfully carried out attacks against the virtual infrastructure of an IT company, realizing two risks.<br /><br />These cyber exercises became a unique experience for us, providing an opportunity to work with new tools such as SIEM Splunk and NTA Arkime. Our team demonstrated flexibility and professionalism, effectively adapting to new conditions and challenges.<br /><br />These results highlight the strong professional skills of our specialists and their ability to respond quickly to information security incidents.<br /><br />We would like to thank all our partners for their cooperation, which allowed us to improve the quality of information security event monitoring and strengthen collaboration in incident response.<br /><br />The results achieved confirm our readiness to continue protecting critical infrastructure and ensuring a high level of security.<br /><br />Link to the Bluescreen news article: https://bluescreen.kz/kvoiki-iest-komu-zashchishchat-iest-nad-chiem-porabotat/</div>]]></turbo:content>
    </item>
    <item turbo="true">
      <title>CrowdStrike Update Failure Affected Millions of Windows Computers</title>
      <link>https://dq.kz/tpost/y50hi6kzu1-crowdstrike-update-failure-affected-mill</link>
      <amplink>https://dq.kz/tpost/y50hi6kzu1-crowdstrike-update-failure-affected-mill?amp=true</amplink>
      <pubDate>Tue, 23 Jul 2024 08:50:00 +0300</pubDate>
      <enclosure url="https://static.tildacdn.com/tild3461-3338-4732-a137-353636383938/photo.png" type="image/png"/>
      <description>A failed CrowdStrike Falcon update caused widespread outages on Windows systems worldwide, affecting around 8.5 million devices and disrupting critical services.</description>
      <turbo:content><![CDATA[<header><h1>CrowdStrike Update Failure Affected Millions of Windows Computers</h1></header><figure><img alt="" src="https://static.tildacdn.com/tild3461-3338-4732-a137-353636383938/photo.png"/></figure><div class="t-redactor__text">CrowdStrike Update Failure Affected Millions of Windows Computers Worldwide<br /><br />At the end of this week, a major outage occurred on computers running Microsoft Windows that had CrowdStrike security software installed. The update of this software caused widespread failures, affecting around 8.5 million PCs worldwide. However, Microsoft stated that this represents less than 1% of all functioning Windows systems.<br /><br />Microsoft published data on the scale of the incident in its blog. According to the company’s assessment, the outage caused by the failed CrowdStrike Falcon update affected computers in different countries, but the total number of impacted devices accounted for less than 1% of all Windows systems.<br /><br />Despite this, David Weston, Vice President of Enterprise and OS Security at Microsoft, noted: “Although the percentage was small, the broad economic and societal impacts reflect the use of CrowdStrike by enterprises that run many critical services.”<br /><br />“This incident demonstrates the interconnected nature of our broad ecosystem — global cloud providers, software platforms, security vendors and other software providers. It also reminds us how important safe software deployment and disaster recovery are, using reliable mechanisms,” a Microsoft representative added.<br /><br />According to Microsoft, CrowdStrike has already provided a scalable fix to help restore the operation of Amazon’s cloud infrastructure. Microsoft is also working with Amazon and Google to identify the best ways to address the consequences of the incident.<br /><br />In addition, hundreds of Microsoft technical support specialists are helping eliminate the impact across customer infrastructures, while internal specialists at affected companies are receiving urgent recovery instructions.<br /><br />Information security experts note that the wide publicity around the incident has attracted the attention of attackers attempting to gain access to the infrastructures of affected companies by posing as CrowdStrike or Microsoft technical consultants.<br /><br />According to some estimates, because CrowdStrike update files may need to be removed manually from computers, full infrastructure recovery in some affected companies may take from several days to several weeks.</div>]]></turbo:content>
    </item>
  </channel>
</rss>
