Author Archives: Help Net Security

Discover hidden cybersecurity talent to solve your hiring crisis

Not having access to technical talent is a common complaint in the cybersecurity world. Folks with security experience on their resumes are in such high demand, CISOs need to hunt beyond the fields we know. To borrow a phrase from the ever-logical Mr. Spock, CISOs need to embrace Infinite Diversity in Infinite Combinations. By this I mean embracing diversity not only of bodies but of talents and experiences. First, focus on acquiring the key cybersecurity … More

Global cyber risk perception: Highest management priorities

Few organizations are highly confident in their ability to manage the risk of a cyber-attack, despite viewing cybersecurity as a top risk management priority, according to a survey conducted by Marsh and Microsoft. Cybersecurity confidence In the global survey of more than 1,300 senior executives, two-thirds ranked cybersecurity among their organizations’ top five risk management priorities – approximately double the response to a similar question Marsh asked in 2016. The survey also found that a … More

Week in review: Vulnerability tracking, GDPR quick guide, tackling the insider threat

Here’s an overview of some of last week’s most interesting news and articles: Intel offers to pay for Spectre-like side channel vulnerabilities Intel is expanding the bug bounty program it started last March, and is raising considerably the awards it plans to give out for helpful vulnerability information. The company is, simultaneously, starting a new bug bounty program focused specifically on side channel vulnerabilities, i.e., vulnerabilities that are rooted in Intel hardware but can be … More

GDPR quick guide: Why non-compliance could cost you big

If you conduct business in the EU, offer goods or services to, or monitor the online behavior of EU citizens, then the clock is ticking. You only have a few more months – until May – to make sure your organization complies with GDPR data privacy regulations. Failure to abide by GDPR means you could get hit with huge fines. Finding and investigating data breaches: Why it’s always too little, too late Personal data protection … More

Still relying solely on CVE and NVD for vulnerability tracking? Bad idea

2017 broke the previous all-time record for the highest number of reported vulnerabilities. The 20,832 vulnerabilities cataloged during 2017 by Risk Based Security (VulnDB) eclipsed the total covered by MITRE’s Common Vulnerability Enumeration (CVE) and the National Vulnerability Database (NVD) by more than 7,900. “Incredibly, we see too many companies still relying on CVE and NVD for vulnerability tracking, despite the US government funded organization falling short year after year. While some argue that the … More

7 steps security leaders can take to deal with Spectre and Meltdown

Security and risk management leaders must take a pragmatic and risk-based approach to the ongoing threats posed by an entirely new class of vulnerabilities, according to Gartner. Spectre and Meltdown are the code names given to different strains of a new class of attacks that target an underlying exploitable design implementation inside the majority of computer chips manufactured over the last 20 years. Security researchers revealed three major variants of attacks in January 2018. The … More

Why do we need a risk-based approach to authentication?

20 years ago, everyone worked at a desktop workstation hardwired into an office building. This made network security simple and organizations felt they could depend on the time-tested method of the trusted perimeter. Firewalls were relied on to keep out external threats, and anything within the network was considered secure and safe. Today, however, the number of variables has skyrocketed. The move to the cloud, BYOD, and increased use of outside contractors means a legitimate … More

A five-year analysis of reported Windows vulnerabilities

Based on analysis of all disclosed Microsoft vulnerabilities in 2017, a new Avecto report shows a significant rise in the number of reported vulnerabilities. Last year, 685 vulnerabilities were found versus 325 vulnerabilities that were found in 2013. The removal of admin rights could mitigate 80% of all critical Microsoft vulnerabilities reported in 2017. Nearly all (95%) of critical vulnerabilities in Microsoft browsers could be mitigated by the removal of admin rights. The rise of … More

Cryptomining malware continues to drain enterprise CPU power

Cryptomining malware continues to impact organizations globally as 23% were affected by the Coinhive variant during January 2018, according to Check Point’s latest Global Threat Impact Index. Researchers discovered three different variants of cryptomining malware in its Top 10 most prevalent ranking, with Coinhive ranking first, impacting more than one-in-five organizations. Coinhive performs online mining of Monero cryptocurrency when a user visits a web page without the user’s approval. The implanted JavaScript then uses the … More

Here’s what keeps your CISO up at night

89.1 percent of all information security leaders are concerned about the rise of digital threats they are experiencing across web, social and mobile channels, according to the 2018 CISO Survey by RiskIQ. Some 1,691 U.S. and U.K. information security leaders across multiple verticals, including enterprise, consulting, government and education, provided insights into their cyber risk concerns and plans for 2018. Overall, the survey revealed a coming “perfect storm,” where the problem of staff shortages collides … More

Love letters from a Black Hat to all the fools on the Internet

As an underground, “black hat” hacker, I don’t have time for significant others. I’m too busy earning stacks of cash to improve my Bitcoin mining rigs and working to pay off college loans. This Valentine’s Day I want to show my appreciation by sending love letters to all those ignorant and over-trusting fools on the Internet that pay my bills by making the same mistakes over and over. To Bob from the law firm Roses … More

Hybrid data storage is growing rapidly in the digital workplace

82% of businesses are currently deploying a mix of cloud and on- premises infrastructure. Egnyte analyzed over 14 petabytes of data across thousands of businesses worldwide to better understand the trends around the content that is being stored, shared, and collaborated on. The analysis uncovered a number of trends, including: Businesses have increased their storage footprint by 55% YoY The average file size for all businesses in 2018 is 3.13 MB, up from 2.59 MB … More

Canon selects Vera to secure the future of digital imaging and printing

Canon has selected Vera to secure and protect Canon’s fleet of digital imaging and printing products and services. This partnership will help enterprises protect their intellectual property and business information from data leaks for all information processed or handled by Canon devices. Canon will leverage Vera’s award-winning encryption and dynamic data protection technology to further its commitment to innovation and deliver advanced rights management across its entire product portfolio. Vera’s data-centric security platform gives customers … More

Most CIOs plan to deploy artificial Iintelligence

Meaningful artificial intelligence (AI) deployments are just beginning to take place. Gartner’s 2018 CIO Agenda Survey shows that four percent of CIOs have implemented AI, while a further 46 percent have developed plans to do so. “Despite huge levels of interest in AI technologies, current implementations remain at quite low levels,” said Whit Andrews, research vice president and distinguished analyst at Gartner. “However, there is potential for strong growth as CIOs begin piloting AI programs … More

What CISOs prioritize in order to improve cybersecurity practices

In a new study by the The Financial Services Information Sharing and Analysis Center (FS-ISAC), CISOs weighed in on the most critical cyber-defense methods, frequency of cyber-preparedness reporting to their respective boards of directors as well as the current cyber chain of command within their respective financial organizations. Critical defense CISOs surveyed were split on their top priorities for securing their organizations against cyberattacks. 35 percent of CISOs surveyed said that employee training is a … More

Consumers want more IoT regulation

A demand for more regulation may seem counterintuitive in today’s world and yet that’s exactly what consumers who understand IoT technologies want, according to a new study from Market Strategies International. The study identified two distinct groups: the IoT “Haves” and the IoT “Have Nots.” The Haves are defined as people who have worked with IoT technologies in their workplace, whether in an office, home office, retail space, factory or other work setting. They comprise … More

Download: The 2017 State of Endpoint Security Risk Report

To determine the cost and impact of evolving threats, the Ponemon Institute, a preeminent research center dedicated to data privacy and protection, surveyed 665 IT and security leaders. Their responses indicate today’s organizations are struggling to secure their endpoints, and paying a steep cost for each successful attack — $5 million for a large organization or an average of $301 per employee. Get the full report here. Attacks are evolving This year, over 40% of … More

How to ensure your IT and security teams stay aligned amid digital transformation

Even for sensitive industries, the movement to cloud-based technologies is generally accepted as a cost-effective and efficient infrastructure strategy and immediate priority. The migration to more agile products are occuring in nearly every department and physical security is no exception. New technologies make it possible for video surveillance data to shift from on-premise to the cloud, and provide additional insights to support larger digital transformation goals. In order to succeed, however, CIOs will need to … More

Cybercrime shifts: Rise of Russian cybercrime, attacks on cryptocurrency marketplaces

Cryptocurrency marketplaces, designed to facilitate trading on the full range of digital currencies, are experiencing a range of fraudulent activity. The world of cryptocurrency has moved from being the playground of the criminal underworld to be a prime target for attacks on legitimate transactions, according to the Q4 2017 Cybercrime Report by ThreatMetrix. Fraudulent new accounts are created using stolen or synthesized identities to set up mule accounts to launder money. Additionally, legitimate accounts are … More

Worldwide spending on blockchain services to reach $8.1 billion in 2021

Interest and investment in blockchain as an emerging technology is accelerating as firms seek secure, sequential, and immutable solutions to improve business processes, enable new services, and reduce service costs. Worldwide spending on blockchain services Given the maturity state of the technology, the hype surrounding potential applications, and the need for specialized skills, the majority of blockchain spending will be in the services market – both business and technology services. A new forecast from IDC … More

February Patch Tuesday forecast: Key updates to act on

Love is in the air! Can’t you feel it? This Patch Tuesday falls the day before the most romantic day of the year – Valentine’s Day! We’ve been hearing just how much love our fellow security administrators have been shown by both their bosses and their users as a result of the Spectre and Meltdown vulnerabilities. First Microsoft released a series of patches in early January to mitigate the issue. And then AMD released their … More

Week in review: Crypto-mining malware hits SCADA network, server-side exploits dominate threat landscape

Here’s an overview of some of last week’s most interesting news and articles: When crypto-mining malware hits a SCADA network Radiflow has recently discovered Monero-mining malware on five servers of a water utility company located in Europe. Intel releases new Spectre microcode updates for some affected processors Now that Intel has shipped new microcode updates, it expects OEMs to push out new firmware again and urges users to implement them as soon as possible. 99 … More

Server-side exploits dominate the threat landscape

Skybox Security released its inaugural Vulnerability and Threat Trends Report, which analyzes vulnerabilities, exploits and threats in play in 2017. Cybercrime is a money–making machine A trend observed for the last several years has seen threat actors turn cybercrime into a money–making machine. An integral part of this approach means taking the path of least resistance: leveraging existing attack tools rather than developing new ones, using the same attack on as many victims as possible … More

Integrated IT: The changing role of technology across organizations

The role that IT is playing in business is changing: 85% of the IT professionals surveyed by Insight noted that their executives view the organization as an IT company at heart. This finding inspired Insight to field a follow-on survey of 104 CIOs/CTOs and 105 Procurement professionals, to better understand how this evolution has affected IT at enterprise-level companies. “This change has been taking shape over years but now is fully underway. Technology has enabled … More

Most remain dissatisfied with threat intelligence quality and accuracy

While security professionals are increasingly recognizing the importance of threat intelligence, the majority remain dissatisfied with its accuracy and quality, according to a study conducted by the Ponemon Institute. Meanwhile, because many security teams still execute threat investigations solo rather than pooling intelligence, their ability to quickly act on threats is limited. The report found that 67 percent of IT and security professionals spend more than 50 hours per week on threat investigations, instead of … More

Credential phishing kits target victims differently depending on location

There is a new attack vector in town – the customization of phishing kits. In a recent case uncovered by PhishMe Intelligence, a phishing kit was crafted to target residents of specific regions using either TrickBot or Locky. Instead of determining what malware to deploy, this kit determined what personal information to collect from its victims. Because the United States was the first in online banking, phishers originally began targeting United States residents. As online … More

99 percent of domains are not protected by DMARC

Essentially every global domain is vulnerable to phishing and domain name spoofing. A new report incorporates data from Agari, revealing that 90 percent of its customers have been targeted by domain name fraud. Insight from the Farsight Security indicates that less one percent of all domains are authenticated and protected by Domain Message Authentication Reporting & Conformance (DMARC). “This report provides compelling evidence of the successes of DMARC adoption in protecting customers and brands, driving … More

IT ops and engineering are embracing automation to increase business agility

Based on a survey of nearly 700 engineering and operations individuals globally, a report by Indeni and GNS3 reveals a programming knowledge gap that is having an impact on the productivity of businesses surveyed, putting network availability at risk. Knowledge gaps and productivity challenges Individuals surveyed identify creating, parsing, and analyzing scripts as the biggest gaps in their knowledge for managing network and security efforts. Due to a lack of programming experience, individuals surveyed spend … More

2017 was extraordinary: 5,200 breaches exposed 7.8 billion records

Once again, the record has been broken for both the most breaches and the most data compromised in a year. There were 5,207 breaches recorded last year, surpassing 2015’s previous high mark by nearly 20%, according to the 2017 Data Breach QuickView Report by Risk Based Security. The number of records compromised also surpassed all other years with over 7.8 billion records exposed, a 24.2% increase over 2016’s previous high of 6.3 billion. “The level … More

Identity fraud enters a new era of complexity

The number of identity fraud victims increased by eight percent (rising to 16.7 million U.S. consumers) in the last year, a record high since Javelin Strategy & Research began tracking identity fraud in 2003. The 2018 Identity Fraud Study found that despite industry efforts to prevent identity fraud, fraudsters successfully adapted to net 1.3 million more victims in 2017, with the amount stolen rising to $16.8 billion. With the adoption of EMV cards and terminals, … More

Why developing an internal cybersecurity culture is essential for organizations

ENISA published a report providing organisations with practical tools and guidance to develop and maintain an internal cybersecurity culture. Understanding the dynamics of cybersecurity culture The Cybersecurity Culture in Organisations report is based on a multi-disciplinary research, conducted to better understand the dynamics of how cybersecurity culture can be developed and shaped within organisations. This research draws from different disciplines, including organisational sciences, psychology, law and cybersecurity as well as the knowledge and experiences of … More

Cloud service adoption creates new data center demands

Both consumer and business applications are contributing to the growing dominance of cloud services over the Internet, according to the Cisco Global Cloud Index (2016-2021). For consumers, streaming video, social networking, and Internet search are among the most popular cloud applications. For business users, enterprise resource planning (ERP), collaboration, analytics, and other digital enterprise applications represent leading growth areas. Strong multicloud traffic growth projected Driven by surging cloud applications, data center traffic is growing fast. … More

Data and analytics maturity: Most organizations should be doing better

91 percent of organizations have not yet reached a transformational level of maturity in data and analytics, despite this area being a number one investment priority for CIOs in recent years, according to a worldwide survey of 196 organizations by Gartner. Overview of the maturity model for data and analytics “Most organizations should be doing better with data and analytics, given the potential benefits,” said Nick Heudecker, research VP at Gartner. “Organizations at transformational levels … More

UK data protection authority issues record fines

Since August 2015, The UK’s independent authority, The Information Commissioner’s Office, has fined 104 organisations a total of £8.7 million for breaches in data security and anti-spam regulations. Every month the UK body releases detailed information on which companies have been issued with fines for breaking the regulations. The figures for January reveal that they are ramping up the pressure still further on companies that break the rules by issuing record fines for the month. … More

8 trends in government tech for an enterprise-focused approach to IT

Deloitte examined emerging trends in government technology, and highlighted eight trends that are shaping strategic and operational transformations and redefining IT’s role within the enterprise. “Instead of implementing ‘one-off IT initiatives’ in a single domain, government organizations can be more forward-looking and develop an approach by which disruptive technologies can work in harmony in a holistic way across an agency, department or multiple departments,” said Scott Buchholz, managing director, Deloitte Consulting LLP, and federal CTO. … More

Investigation uncovers Luminosity Link RAT distributors, victims are in the thousands

A hacking tool allowing cybercriminals to remotely gain complete control over a victim’s computer is no longer available as a result of an UK-led operation targeting hackers linked to the Remote Access Trojan (RAT) Luminosity Link. Coordinated by the UK National Crime Agency with the support of Europol, this operation saw the involvement of over a dozen law enforcement agencies in Europe, Australia and North America. Once installed upon a victim’s computer, a user of … More

The new gold rush: A look inside cryptocurrency fraud

Cybercriminals are flooding to the new world of cryptocurrencies looking to exploit the boom in interest and adoption of these electronic currencies, according to Digital Shadows. This new gold rush is creating a new frontier for professional cybercriminals moving away from less profitable techniques and exploits to make money on the back of the huge interest in these digital currencies. With over 1,400 cryptocurrencies in circulation, and new alternative coins – “altcoins” – emerging every … More

Macro-less malware: The cyclical attack

Last year, attackers linked to the Russian hacking group APT28 (sometimes called Fancy Bear) started hacking like its 1999 with Microsoft Word-based malware that doesn’t trigger security warnings along the way. These types of attacks are called “macro-less malware” because they bypass the security warnings added to Microsoft Office programs in response to traditional macro malware like the Melissa virus at the end of the 20th century. In a November 2017 analysis, security giant McAfee … More

7 steps for getting your organization GDPR-ready

While the EU has had long established data protection standards and rules, its regulators haven’t truly commanded compliance until now. Under the General Data Protection Regulation (GDPR), financial penalties for data protection violations are severe – €20 million (about $24.8 million USD) or 4 percent of annual global turnover (whichever is higher), to be exact. What’s more is that GDPR does not merely apply to EU businesses, but any organization processing personal data of EU … More

Number of Internet-accessible ICS components is increasing every year

The number of industrial control system (ICS) components – which run factories, transport, power plants and other facilities – left open to Internet access, is increasing every year. In Germany, for example, researchers from Positive Technologies found 13,242 IP addresses for ICS components, up from 12,542 in 2016. Internet-accesible ICS components around the world Advanced industrial countries, such as the U.S., Germany, China, France, and Canada, were home to the largest numbers of Internet-accesible ICS … More

Week in review: The future of smartphone security, automated cyber threat anticipation

Here’s an overview of some of last week’s most interesting news and articles: Authentication today: Moving beyond passwords A new global study from IBM Security examining consumer perspectives around digital identity and authentication, found that people now prioritize security over convenience when logging into applications and devices. Dridex gang follows trends, also created FriedEx ransomware The gang behind the infamous banking Trojan Dridex has also created the FriedEx (aka BitPaymer) ransomware, ESET researchers confidently claim. … More

Groundhog Day: Third-party cyber risk edition

Over the past four years, I’ve had countless conversations with hundreds of companies around third-party cyber risk issues. It’s been my personal Groundhog Day, so to speak. Regardless of sector or size of company, the conversations are almost identical as most everyone faces a similar challenge: “How can I truly manage risk from third parties where I have little or no control over their information security practices?” “I know I have massive risk from third … More

The future of smartphone security: Hardware isolation

Mobile spyware has become increasingly more ubiquitous in corporate networks and devices. In a 2017 study, Check Point has found that out of the 850 organizations that they queried, 100% had experienced a mobile malware attack at least once in the past. To date, most cybersecurity companies have focused either on software-only or built-in hardware solutions as a way of fighting back against these threats. While some of these solutions have proven to be effective, … More

BEC scams surge, cybercriminals target nearly all organizations

96 percent of organizations have received business email compromise (BEC) emails during the second half of 2017, according to Agari. “BEC is a particularly effective attack vector because its lack of payload makes it nearly impossible for conventional email security solutions to detect and prevent,” said Markus Jakobsson, chief scientist, Agari. “At its core, business email compromise is a social engineering attack that leverages familiarity, authority and trust, which can result in billions of dollars … More

Innovative organizations build security into their cloud strategy

Businesses are increasingly evolving their security strategy to advance their cloud strategy. Based on research and interviews with industry practitioners, Hurwitz & Associates sees clear evidence that balancing velocity and security in the cloud starts with adopting new approaches to security. When evaluating an ideal cloud solution, what is your most important priority? “Customers are increasingly depending on cloud computing to support the need for business agility and speed of transformation. However, to be successful … More

How do your IT complexity challenges compare to those of other CIOs?

A global survey of 800 CIOs conducted by Vanson Bourne reveals that 76% of organizations think IT complexity could soon make it impossible to manage digital performance efficiently. IT complexity is growing The study further highlights that IT complexity is growing exponentially; a single web or mobile transaction now crosses an average of 35 different technology systems or components, compared to 22 just five years ago. This growth has been driven by the rapid adoption … More

The Ransomware Survival Handbook

When a ransomware infection spreads through your network, its goal is to encrypt any files it can access (even backups) as quickly as possible. That can happen in a matter of minutes or even seconds. And from there, the clock starts ticking. Because everyone is expecting you to get things back up and running. Read The Ransomware Survival Handbook and learn how to recover quickly and effectively (and not get hit again). Written based on … More

Multiple zero-day vulnerabilities found in ManageEngine products

Digital Defense uncovered multiple, previously undisclosed vulnerabilities within several Zoho ManageEngine products. ManageEngine offers more than 90 tools to help manage IT operations, including networks, servers, applications, service desk, Active Directory, security, desktops, and mobile devices. Currently, the company claims to have more than 40,000 customers, including three out of every five Fortune 500 company. Vulnerability impact The discovered vulnerabilities allow unauthenticated file upload, blind SQL injection, authenticated remote code execution and user enumeration, potentially … More

Building a coping mechanism for data breaches

Data breaches may be daily news, but they will always be a significant worry for business stakeholders. It is the IT team, however, that have to deal with the technical side of breaches. Here’s my view on establishing a coping mechanism. In most of the breaches that we analyse, there is always an element of human failure: You are just one stupid password away from a data breach Default passwords are asking for trouble Build … More

Most top US and EU e-retailers are putting their consumers at risk

A new study by 250ok has revealed that 87.6 percent of the root domains operated by top e-retailers in the United States and European Union are putting their brands and consumers at risk for phishing attacks. SPF and DMARC Phishing and spoofing attacks against consumers are most likely when companies don’t have a published Sender Policy Framework (SPF) or Domain-based Message Authentication, Reporting and Conformance (DMARC) policy properly in place. SPF is an email validation … More

Widespread API use heightens cybersecurity risks

A new Imperva survey showed a heightened concern for cybersecurity risk related to API use. Specifically, 63 percent of respondents are most worried about DDoS threats, bot attacks, and authentication enforcement for APIs. APIs power the interactive digital experiences users love and are fundamental to an organization’s digital transformation. However, they also provide a window into an application that presents a heightened cybersecurity risk. The survey shows that 69 percent of organizations are exposing APIs … More

Achieving zero false positives with intelligent deception

Cyber attacks are not single events. When attackers compromise an asset, they don’t know which asset is infected. They must determine where they are in the network, the network structure and where they can find valuable information. That means attackers carefully try to find out as much as possible about the organization. This is precisely the behavior that intelligent deception technology can exploit in order to thwart attackers and protect organizations. Breadcrumbs are clues for … More

What is a security data lake?

The concepts of the data lake and the specialized security data lake are relatively new. While data lakes have a bit of a head start in adoption – largely among data science teams – some security teams are beginning to look into security data lakes to keep afloat in the wash of security log data they amass every day. Understanding the capabilities and differences between the two types of repositories will help determine if implementing … More

Waterfall Security and HCNC collaborate to provide OSIsoft PI offerings to the Korean market

Waterfall Security Solutions, a global leader in cybersecurity technologies for critical infrastructure and industrial control systems, announced a partnership with HCNC Co., a systems integrator based in Korea, to further extend Waterfall’s and HCNC’s OSIsoft product offering within the region. HCNC specializes in integrating OSIsoft PI solutions throughout a wide spectrum of industries including power, oil and gas, utilities and transportation. HCNC’s combination of strong, local support coupled with extensive knowledge of and services for … More

It’s time to get serious about email security

In today’s hyper-connected world, email is the foundation of every organization’s collaboration, productivity, and character. And despite annual rumors of its demise, there’s no reason to believe we’ll be writing its eulogy anytime soon. With its ubiquity and universal appeal, email is a treasure trove of sensitive business information. That’s why emails leaks aren’t just data loss events. They’re direct attacks on your brand and reputation. Despite team collaboration and communication tools like Slack and … More

Authentication today: Moving beyond passwords

A new global study from IBM Security examining consumer perspectives around digital identity and authentication, found that people now prioritize security over convenience when logging into applications and devices. Authentication methods perceived as most secure (global perspective) Generational differences also emerged showing that younger adults are putting less care into traditional password hygiene, yet are more likely to use biometrics, multifactor authentication and password managers to improve their personal security. With millennials quickly becoming the … More

How can we avoid another record year for breaches and ransomware?

More than 14.5 billion emails laced with malware were sent in 2017 according to the annual Global Security Report issued by AppRiver. The majority of cyber threats were initiated in the US and persisted throughout the year, with significant peaks in August, September and October. In the first half of 2017, 1.9 billion data records were lost or stolen as a result of cyberattacks. This followed a tough year in 2016, when losses totaled $16 … More

PCI DSS 3.2 will unveil compliance cramming culture

February 1, 2018 marks the deadline for businesses to adopt the new industry standard, PCI DSS 3.2, aimed at reducing and better responding to cyber attacks resulting in payment data breaches. Originally announced in 2016, the industry has had almost two years to prepare for these increased requirements but a significant percentage of businesses are still not prepared, secure payment solutions provider, PCI Pal, warns. “The industry has developed a culture of compliance cramming, treating … More

Week in review: Intel testing new Spectre fixes, ICO protection, cybercrooks abusing travel industry

Here’s an overview of some of last week’s most interesting news, articles, and whitepapers: British teenager hacked top ranking US officials using social engineering How did British teenager Kane Gamble, who at the time was only 15 years old, manage to break into email accounts of the CIA and DNI chiefs, as well as gain access to a number of sensitive databases and plans for intelligence operations in Afghanistan and Iran? The answer is social … More

Good privacy is good for business, so pay attention

Data privacy concerns are causing significant sales cycle delays for up to 65 percent of businesses worldwide, according to findings in the new Cisco 2018 Privacy Maturity Benchmark Study. The study shows that privacy maturity is connected to lower losses from cyberevents: 74 percent of privacy-immature organizations experienced losses of more than $500,000 last year caused by data breaches, compared with only 39 percent of privacy-mature organizations. Privacy maturity is a framework defined by the … More

Cyber attacks surge, ransomware leading the way

The Online Trust Alliance (OTA) found that cyber incidents targeting businesses nearly doubled from 82,000 in 2016 to 159,700 in 2017. Since the majority of cyber incidents are never reported, OTA believes the actual number in 2017 could easily exceed 350,000. “Surprising no one, 2017 marked another ‘worst year ever’ in data breaches and cyber incidents around the world,” said Jeff Wilbur, director of the OTA initiative at the Internet Society. “This year’s big increase … More

Rise in cryptomining malware impacts organizations worldwide

Cybercriminals are increasingly turning to cryptominers to develop illegal revenue streams, while ransomware and malvertising adware continue to impact organizations worldwide, according to Check Point. During the period July to December 2017, one in five organizations were impacted by cryptomining malware, tools that enable cybercriminals to hijack the victim’s CPU or GPU power and existing resources to mine cryptocurrency, using as much as 65% of the end-user’s CPU power. Key malware trends in H2 2017 … More

Data breaches at an all time high: How are businesses protecting themselves?

Digitally transformative technologies are shaping the way organisations do business and moving them to a data-driven world, with 94% of organisations using sensitive data in cloud, big data, IoT, container, blockchain and/or mobile environments, according to the 2018 Thales Data Threat Report. Digital transformation is driving efficiency and scale as well as making possible new business models that drive growth and profitability. Enterprises are embracing this opportunity by leveraging all that digital technology offers, with … More

ICO protection: Key threats, attack tools and safeguards

Group-IB has analyzed the basic information security risks for the cryptoindustry and compiled a rating of key threats to an ICO (initial coin offering). On average, over 100 attacks are conducted on one ICO, and criminals are increasingly using modified Trojans that were previously used for thefts from banks, as well as targeted attacks with a view to compromise secret keys and secure control over accounts. Ranking threats While summing up a year of protecting … More

Download: 2018 Cybersecurity Checklist

Today’s attacks are spreading faster, evolving quicker, and evading even the most widely used security solutions. But that doesn’t mean you can’t fight back. Get practical recommendations for preventing and mitigating the latest attacks with this free checklist. Get actionable suggestions on how to: Prevent compromise in the first place by defending against the most popular attack vectors Mitigate post-exploitation activities like privilege escalation and lateral movement attempts Know when attackers attempt to launch malicious … More

Will explosive data exfiltration continue in 2018?

Last year was a banner year for cybercrime. More data was stolen in the first six months of 2017 than in the entirety of 2016. Gemalto’s Breach Level Index found that over 900 data breaches occurred during the first half of 2017, compromising 1.9 billion records. According to Jing Xie, senior threat intelligence analyst for Venafi, this explosive development in data exfiltration will continue in 2018. In an even more ominous trend, the number of … More

Government CIOs will increase spending on cloud, cybersecurity and analytics

Cloud solutions, cybersecurity and analytics are the top technologies targeted for new and additional spending by public sector CIOs in 2018, while data center infrastructure is the most commonly targeted for cost savings, according to a survey from Gartner. Sixteen percent of government CIOs said they plan to increase spending on business intelligence (BI) and analytics (16 percent) and data management (six percent) in 2018. Gartner’s 2018 CIO Agenda Survey gathered data from 3,160 CIO … More

Download: The Ultimate Guide to the CISSP

The CISSP is an elite way to demonstrate your knowledge, advance your career, and join a community of like-minded cybersecurity leaders. Earning your CISSP will show your employer that you have all it takes to design, engineer, implement, and run an information security program. The Ultimate Guide to the CISSP is a must-have resource if you are planning to sit for the exam – and it was developed by (ISC)², the creator of the CISSP … More

Cybercriminals stole $172 billion from 978 million consumers in the past year

Consumers are confident they’re safe online, but hackers have proven otherwise, stealing $172 billion from 978 million consumers in 20 countries in the past year, according to the 2017 Norton Cyber Security Insights Report. Globally, cybercrime victims share a similar profile: they are everyday consumers who use multiple devices whether at home or on the go, but have a blind spot when it comes to cyber security basics. This group tends to use the same … More

Future workforce: Intelligent technology meets human ingenuity

Businesses risk missing major growth opportunities unless CEOs take immediate steps to pivot their workforces and equip their people to work with intelligent technologies. The potential of AI Accenture estimates that if businesses invest in Artificial Intelligence (AI) and human-machine collaboration at the same rate as top performing companies, they could boost revenues by 38 percent by 2022 and raise employment levels by 10 percent. Collectively, this would lift profits by $4.8 trillion globally over … More

Escape future ransomware attacks by leveraging the right technology

Last year, multiple industry verticals saw the extreme effects of ransomware, with WannaCry and Petya leading the pack in terms of damage. To make matters worse, according to a report by Kaspersky, the number of ransomware threats is expected to increase in 2018. The evolution of ransomware, resulting in more diverse and innovative attacks, is going to heavily hit enterprises in 2018. In my previous articles, I explained how ransomware has evolved over the years … More

GDPR: Whose problem is it anyway?

With the GDPR deadline looming on May 25, 2018, every organization in the world that transmits data related to EU citizens is focused on achieving compliance. And for good reason. The ruling carries the most serious financial consequences of any privacy law to date – the greater of 20 million EUR or 4 percent of global revenue, potentially catastrophic penalties for many companies. Compounding matters, the scope and complexity of GDPR extends beyond cyber security, … More

Big predictions for sensors in the global security and surveillance market

The Internet of Things (IoT) is bringing about a new era of connectivity in the digital age, connecting critical business sectors through a network of secure data flow, analytics, and management. IoT is also bringing numerous opportunities for sensor participants through security technologies required for remote services and enhanced accessibility of devices. The total sensors market in security and surveillance applications was worth $6,267.9 million in 2016, with image sensors holding the largest market share … More

IT infrastructure spending for cloud environments to reach $46.5 billion in 2017

Total spending on IT infrastructure products (server, enterprise storage, and Ethernet switches) for deployment in cloud environments is expected to total $46.5 billion in 2017 with year-over-year growth of 20.9%, according to a new forecast from IDC. Public cloud datacenters will account for the majority of this spending, 65.3%, growing at the fastest annual rate of 26.2%. Off-premises private cloud environments will represent 13% of cloud IT infrastructure spending, growing at 12.7% year over year. … More

HITB Security Conference in Amsterdam to feature innovative research on attack and defense topics

The agenda for Day 1 of the 9th annual HITB Security Conference in The Netherlands has been announced and it’s packed with cutting edge research on a range of attack and defense topics from crypto currencies to fuzzing and more. Invoke-DOSfuscation: Techniques FOR %F IN (-style) DO (S-level CMD Obfuscation) In this presentation, Daniel Bohannon, a Senior Applied Security Researcher with MANDIANT’s Advanced Practices group, will dive deep into cmd.exe’s multi-faceted obfuscation opportunities beginning with … More

Is ethical hacking more lucrative than software engineering?

HackerOne published its 2018 Hacker Report, which examines the geography, demographics, experience, tools used and motivations of nearly 2,000 bug bounty hackers across 100 countries. On average, top earning ethical hackers make up to 2.7 times the median salary of a software engineer in their respective home countries; hackers in India are making as much as 16 times the median. And yet, the new data finds that overall hackers are less motivated by monetary gain, … More

How digital transformation is reshaping the modern enterprise

F5 Networks announced the results of its 2018 State of Application Delivery report, which shows accelerating multi-cloud deployments are enabling organizations to select the cloud platform that best meets the requirements of a specific application. However, this also increases the challenges many companies face in managing operations and security across multiple clouds as they transform their application portfolio to compete in the digital economy. “In this year’s report, respondents made clear they are heavily focused … More

Why GDPR will drive a best practice approach

When GDPR was first discussed, many feared that it would force businesses to act more insular and become more defensive about their data. Some even believed there would be a counter-movement against the cloud with organisations taking back data into their internal systems. Thankfully, the reality has been very different. Instead we’ve seen a new willingness to work together with partners and specialist cloud providers. Now it looks likely that this collaboration will help to … More

Oracle addresses 237 vulnerabilities across multiple products

The January 2018 Oracle Critical Patch Update (CPU) fixes 237 new security vulnerabilities across hundreds of Oracle products, including the company’s widely used Oracle Database Server and Java SE. The CPU includes: Fixes for the Java Virtual Machine and four other vulnerable components within the Oracle Database Server, the most severe of which carries a CVSS Base Score of 9.1 out of 10; three of the flaws may be exploited remotely without credentials. New security … More

Insights from 700M thwarted cyberattacks show how the fight against cybercrime has intensified

2017 was a record-setting year in the fight against cybercrime. Based on analysis of real world cybercrime attacks, ThreatMetrix confirmed a 100 percent increase in volume of attacks over the last two years. The good news is that record numbers of these attacks are thwarted by organizations investing in innovative, digital-first strategies to protect consumers facing downstream attacks from large-scale data breaches. Fraudsters are no longer looking to make a quick buck from stolen credit … More

Global IT spending to reach $3.7 trillion in 2018

Worldwide IT spending is projected to total $3.7 trillion in 2018, an increase of 4.5 percent from 2017, according to the latest forecast by Gartner. “Global IT spending growth began to turn around in 2017, with continued growth expected over the next few years. However, uncertainty looms as organizations consider the potential impacts of Brexit, currency fluctuations, and a possible global recession,” said John-David Lovelock, research vice president at Gartner. “Despite this uncertainty, businesses will … More

Stackhackr: Free malware simulation tool

Stackhackr lets you create and customize your own mock malware that simulates malicious behavior — without actually doing any harm on your machine. It’s a quick and safe way to find out whether your company’s machines are vulnerable to real attacks. In just two minutes you can build and customize your own mock malware and see how your current security stands up to two of the most common and damaging types of cyber attack — … More

The rise of ransom hacks, and the potential impact on your business

The percentage of companies reporting financially motivated cyber attacks has doubled over the past two years, with 50% of companies experiencing a cyber attack motivated by ransom in the past year, according to Radware. As the value of bitcoin and other cryptocurrencies has appreciated, ransom attacks provide an opportunity for hackers to cash out for lucrative gains months later. Ransom attacks “The rapid adoption of cryptocurrencies and their subsequent rise in price has presented hackers … More

Internet of Things security issues bleed into 2018

In 2017 Internet of Things (IoT) devices rose to prominence as attackers have continued to target and use them to support various cyberattacks. IoT devices are almost the perfect target for cyberthieves. They sit on internal networks, have their own IP address, and allow communication with other internet connected devices and systems. Their ubiquity and large numbers make them highly attractive targets. Yet, despite their growing numbers, IoT devices are relatively unprotected and make easy … More

As the cloud’s popularity grows, so does the risk to sensitive data

While the vast majority of global companies (95%) have adopted cloud services, there is a wide gap in the level of security precautions applied by companies in different markets. Organizations admitted that on average, only two-fifths (40%) of the data stored in the cloud is secured with encryption and key management solutions. Who is responsible for protecting sensitive data stored in the cloud? The findings – part of the Ponemon Institute “2018 Global Cloud Data … More

eBook: 5 emerging rails cybersecurity standards

With massive capital investments in rail infrastructure and technology, many countries understand that it’s time cybersecurity standards prescribe technology that prevents cyberattacks from entering critical signaling and control networks. Unidirectional Gateway technology has featured throughout these standards as best practice for protecting control networks. Download Waterfall’s eBook detailing global rail standards’ view on industrial control systems cybersecurity and Unidirectional Gateway technology.

On-card biometric for contactless payments tested in first commercial pilots

Visa has initiated pilots with Mountain America Credit Union and Bank of Cyprus of a new EMV dual-interface (chip- and contactless-enabled) payment card, making these the first commercial pilots to test an on-card biometric for contactless payments. With biometric authentication gaining momentum and the EMV migration well underway, the biometric payment card pilots will test the use of fingerprint recognition as alternatives to PIN or signature to authenticate the cardholder. “The world is quickly moving … More

Week in review: WPA3, Intel AMT vulnerability, Meltdown and Spectre attack detection

Here’s an overview of some of last week’s most interesting news and articles: CBP releases new guidelines on phone, laptop searches at US borders The US Customs and Border Protection agency released an update to its Directive governing Border Searches of Electronic Devices. What the rise of cyber indictments means for 2018 The growing implementation of indictments throughout 2017 was arguably the most impactful government action to counter cyber attacks, and yet received little attention. … More

Intel AMT security issue gives attackers complete control over a laptop

F-Secure reports a security issue affecting most corporate laptops that allows an attacker with physical access to backdoor a device in less than 30 seconds. The issue allows the attacker to bypass the need to enter credentials, including BIOS and Bitlocker passwords and TPM pins, and to gain remote access for later exploitation. It exists within Intel’s Active Management Technology (AMT) and potentially affects millions of laptops globally. The simple yet dangerous security issue The … More