Cyber beyond human: Compliance Trends & Security Risks

Cyber Beyond Humans by Oasis Security

Published on

December 18, 2024

Recent News

Musk and Ramaswamy's DOGE Plan
Elon Musk and Vivek Ramaswamy propose the Department of Government Efficiency (DOGE) to reduce bureaucracy and costs, with a focus on executive actions and Supreme Court guidance. Full article.


Preparing for Cybersecurity Compliance
Explore the upcoming regulations enhancing cybersecurity standards globally. Understand how these regulations impact industries and the steps needed for compliance.
Full article.

FCC Proposes Stronger Telecom Cyber Rules
The FCC, led by Jessica Rosenworcel, proposes new rules to enhance telecom network security following China-linked cyberattacks. Aimed at fortifying defenses, the rules include legal obligations under the Communications Assistance for Law Enforcement Act and annual cybersecurity certifications. Full article.

Breaches to learn from

Recent Breach in December 2024

Finastra Data Breach
Data breach involving the unauthorized access & exfiltration of data from its internal FTP. Full article.

Slot Machine Incident
Game Technology Plc said an unauthorized 3rd party gained access to certain of its systems. Full article.

What are we up to at Oasis

Authquake - Oasis Security vulnerability unveiled

Oasis Security Research team has uncovered a critical vulnerability in Microsoft Azure's MFA that allowed attackers to bypass multi-factor authentication (MFA) and gain access to sensitive accounts. Our research demonstrated how attackers could exploit this flaw to bypass 2FA without any user interaction. Microsoft has since addressed and fixed this issue following our disclosure.

Dive into the full report to explore the technical details and our recommendations. Full report.

Active Directory (AD) x Oasis Security

Catch up with our latest feature - Oasis Security Integration with Microsoft Active Directory, this is a game-changer for securing non-human identities across hybrid environments. With this integration, you can:

  • Automatically discover all NHIs in your AD.
  • Gain actionable insights into ownership and consumer activity.
  • Assess and remediate risky configurations, stale accounts, and unrotated credentials.

Read the full story here.

Happy New Year! We look forward to catching up with you in person next year!

About Cyber Beyond Humans

Your Monthly Pulse on Non-Human Identity Security and Beyond. Subscribe now and never miss an update.

More like this