Category Archives: Internet Security
91.5% of All Malware Arrived Over HTTPS Connections in Q2 – Tech.co
Across Q2 of 2021, 91.5% of all malware discovered had arrived across an encrypted connection, a new study has found.
In other words, standard internet security protocols are no longer enough to stop the vast majority of malicious software something that everyone with an internet connection needs to make sure they understand.
The study, out today from security company WatchGuard Technologies, also pinpointed a few additional big trends in cyber threats: Network attacks and the ever-popular ransomware threat. Here are the biggest takeaways.
If you're on the internet, you likely recognize HTTPS from the start of most links you've visited. It stands for Hypertext Transfer Protocol Secure, and it means that information transmitted between your device and the website has been encrypted. But all that means is that your data can't be compromised by a third-party intruder. The website itself can still send your malware.
And, according new data, malware is more and more frequently found on these HTTPS-encrypted sites.
Put simply, any organization that is not examining encrypted HTTPS traffic at the perimeter is missing 9/10 of all malware, WatchGuard says.
After all, these websites claim to be secure right there in the acronym, and that makes them the best way to deliver malware to unsuspecting victims.
Network attacks are booming in Q2, with plenty of hackers attempting to access a company's internal network. They're up 22% over the previous quarter, which by WatchGuard's analysis is the highest volume since three years ago in early 2018.
Q1 had almost 4.1 million network attacks, while Q2 boosted that number by another million.
A rise in this particular type of security concern may seem counterintuitive, given the pandemic-driven shift towards remote workforces over the past year and a half. But company networks are still around, and keeping up with perimeter security is more important than ever.
Ransomware detections were actually dropping in the months between 2018 and 2020, which is part of the reason why they've seemed to ramp up so strongly ever since. In Q2 2021, that trend continues the quarter included one particularly high-profile case in which the Colonial Pipeline, a supplier of roughly 45% of all oil to the East Coast, was shut down temporarily.
The first half of 2021 has already seen nearly as many ransomware detections as the entirety of 2020, and WatchGuard projects that the entire year will see a volume increase that's more than 150% up from the previous year.
As ever, businesses small and large should keep updated on the latest security technologies, from VPNs all the way up to the top remote access software available. And whatever you do, don't trust a website just because it has the HTTPS stamp of approval.
Read more from the original source:
91.5% of All Malware Arrived Over HTTPS Connections in Q2 - Tech.co
Majority of malware occurs via HTTPS-encrypted connections – TechSpot
In a nutshell: A new report from WatchGuard Technologies reveals how nearly all malware is arriving via HTTPS-encrypted connections. The firms latest quarterly Internet Security Report also highlights noticeable increases in fileless malware, as well as network and ransomware attacks.
The network security company said that in Q2 2021, 91.5% of malware arrived over an encrypted connection. It added that any company not examining encrypted HTTPS traffic at the perimeter will miss out on 9/10 of all malware. The data is derived from the firms own active WatchGuard Fireboxes.
With much of the world still firmly operating in a mobile or hybrid workforce model, the traditional network perimeter doesnt always factor into the cybersecurity defence equation, said Corey Nachreiner, chief security officer at WatchGuard.
Ransomware attacks were decreasing between 2018 and 2020, but during just the first half of 2021, attacks equaled the total amount seen in 2020. Thus, this years volume is expected to increase by over 150% compared to 2020.
WatchGuard blocked more than 16.6 million malware variants (438 per device) and nearly 5.2 million network threats (137 per device). The report also shows how even though malware attacks experienced a small 3.8% decline in Q2, threat actors have taken advantage of hybrid work models by targeting malware towards both remote users at home and office infrastructure.
The increase in the use of malware has targeted Microsoft Exchange servers and generic email users to download remote access trojans (RATs) in highly sensitive locations, with the reason most likely attributed to the workforce and learners returning to hybrid offices and academic environments.
Additionally, Microsoft Office continues to be a popular malware target. Debuting on top of the 10 most-widespread network attacks list, the 2017 RCE vulnerability affects Microsoft browsers. Though it may be an old exploit and patched in most systems (hopefully), those that have yet to patch are in for a rude awakening if an attacker is able to get to it before they do, the report warns.
Despite remote workforces becoming more commonplace, WatchGuard detected an increase in network attacks, rising by 22% to 5.1 million compared to a million fewer during Q1. The statistics show an aggressive course that highlights the growing importance of maintaining perimeter security alongside user-focused protections.
A new threat report from Eset, meanwhile, detailed how hackers are turning up their efforts for guessing passwords. Between May and August 2021, the security firm detected 55 billion new brute-force attacks focused on public-facing RDP (Remote Desktop Protocol) services, a 104% increase compared to the 27 billion attacks carried out during the first four months of 2021. Attackers are exploiting the opportunity because of the increase in remote working; the pandemic has led to much of the workforce utilizing remote-desktop services.
Visit link:
Majority of malware occurs via HTTPS-encrypted connections - TechSpot
Why James Bond Doesnt Use an iPhone – WIRED
No Time To Die is almost upon us, and scores of James Bond fanatics are eager to see the spy use ingenious gadgets to save the day. But does he actually use the very best tech to get the job done? We think not. Laser Polaroid camera, anyone?
Before we get into what competent real-life spies should be using, lets look at what Bond is set to wield in his long-delayed latest outing. Thanks to the pandemic's cinematic shutdown, the movie will feature the Nokia 3310, Nokia 7.2, and Nokia 8.3 5G. Release dates for these phones came in the year 2000, September 2019, and October 2020, respectively.
Even looking past the unlikely union of Britain's fictional superspy and Nokia, a brand that captured a mere 0.7 percent of the smartphone market in Q4 last year, out-of-date mobiles are hardly cutting edge bad-guy-beating techand thats probably not entirely a good thing.
James Hadley, CEO and founder of Immersive Labsa cybersecurity training and skills platformand previously of the UK's Government Communications Headquarters had this to say on Bonds untimely mobile choices: If Bond is handed an older Android phone, he should check Q has updated the OS to prevent against new software vulnerabilities.
However, Hadley sees the merits in older phones, but they just arent practical for a modern spy. There are some people who believe using dumb phonespre-smartphone devices less reliant on softwarekeep them safer," he says. "However, this would obviously limit Bond's ability to use even the most basic internet applications.
So, for these older phones, its about prepping them to make them less vulnerable. As Hadley says, fingers crossed Q is savvy when it comes to modern security threats and not just lethal fountain pens. Jake Moore, a cybersecurity expert at internet security firm Eset and a former police officer, explains: Usually older devices come with more security threats, but if a device has been set up correctly with limited user control and bespoke tweaks, then the anti-tracking, anti-surveillance would balance out the legacy operating system and other flaws.
What if Bond were using a bleeding-edge technology then, the very latest? Well, we know from the director of another Daniel Craig joint, Rian Johnson of Knives Out, that James Bond would be free to use an iPhone should a deal be struck. The director revealed in an interview with Vanity Fair that Apple disallows movie villains from using its latest and greatest devices.
However, an iPhone would not be a good option for 007. Untraceable phones with anti-surveillance, anti-interception, and location-spoofing functionality are a must for James Bond. An iPhone, however formatted, just wouldnt be able to offer this ability to ensure tracking isnt an option," says Moore. "The security of an iPhone is impressive enough for the normal user, but with threats such as Pegasus around periodically, it makes it difficult for a spy to use one securely and confidently.
Pegasus is a piece of NSO (an Israeli technology firm) spyware affecting the iPhone that could copy messages, record calls, and even access the camera. Apple has responded by releasing patches to fix bugs that were thought to have been exploited by Pegasus.
Pegasus spyware would no doubt be used by adversaries to target James Bond if he were an iPhone user, says Moore. While an iPhone might be good for capturing pictures of explosions and car chases, any downloading of embassy blueprints or covert incursions should be done on a locked-down terminal managed by a specialist team, inside a secure network, Hadley says.
However, theres also more to it than Pegasus, with a recent explosive spywarereportlooking into the further concerns security experts have relating to iOS, stating Apple's closed ecosystem approach restricts their ability to use monitoring tools and conduct investigations necessary to uncover vulnerabilities.
Read the original:
Why James Bond Doesnt Use an iPhone - WIRED
WatchGuard Threat Lab Reports 91.5% Of Malware Arriving Over Encrypted Connections – ISBuzz News
New research also shows dramatic increases in fileless malware, malware detections per appliance and booming network and ransomware attacks
The latest quarterlyInternet Security Report from the WatchGuard Threat Lab released today shows an astonishing 91.5% of malware arriving over HTTPS-encrypted connections during Q2 2021. This is a dramatic increase over the previous quarter and means that any organisation that isnt examining encrypted HTTPS traffic at the perimeter is missing 9/10 of all malware. Researchers also found alarming surges across fileless malware threats, a dramatic growth in ransomware and a big increase in network attacks.
With much of the world still firmly operating in a mobile or hybrid workforce model, the traditional network perimeter doesnt always factor into the cybersecurity defence equation, said Corey Nachreiner, chief security officer at WatchGuard. While a strong perimeter defence is still an important part of a layered security approach, strong endpoint protection (EPP) and endpoint detection and response (EDR) is increasingly essential.
Among its most notable findings, WatchGuards Q2 2021 Internet Security Report reveals:
The rest is here:
WatchGuard Threat Lab Reports 91.5% Of Malware Arriving Over Encrypted Connections - ISBuzz News
IT security day illuminates the interaction between AI and cybersecurity – Market Research Telecast
The use of artificial intelligence will increasingly help cybersecurity systems to detect the intelligent attacks of hackers much better, to avoid damage and to minimize risks in the digitization process. This makes AI a critical factor in corporate cybersecurity. Against this background, the program for this years IT Security Day came about. The event, which will be held online again this year, will take place on November 11th and will include six lectures and three panel discussions.
Central task of the von Heise Academy in cooperation with the Institute for Internet Security of the Westphalian University of Gelsenkirchen conducted online conference is the answer to the following questions:
The IT security day is aimed at security officers, security experts, data scientists and IT project managers. The event costs 149 euros up to and including October 14th, then 199 euros (all prices including VAT). Further information can be found on the conference website.
(me)
Article Source
Disclaimer: This article is generated from the feed and not edited by our team.
Here is the original post:
IT security day illuminates the interaction between AI and cybersecurity - Market Research Telecast
GriftHorse is a massive Android premium services scam. Facebook open-sources a test tool. Updates on the Sachkov affair. – The CyberWire
Attacks, Threats, and Vulnerabilities
GriftHorse Android Trojan Steals Millions from Over 10 Million Victims Globally | Zimperium Mobile Security Blog (Zimperium Mobile Security Blog) The Zimperium zLabs researchers discovered the GriftHorse malware, a global premium services Trojan leading to millions stolen.
New GriftHorse malware has infected more than 10 million Android phones (The Record by Recorded Future) Security researchers have found a massive malware operation that has infected more than 10 million Android smartphones across more than 70 countries since at least November 2020 and is making millions of dollars for its operators on a monthly basis.
Hundreds of Scam Apps Hit Over 10 Million Android Devices (Wired) The so-called GriftHorse campaign used clever techniques to avoid detection in Google Play for nearly a year.
Cyberespionage Implant Delivered via Targeted Government DNS Hijacking (SecurityWeek) Newly discovered Tomiris backdoor contains technical artifacts suggesting the possibility of common authorship or shared development practices with the group that executed the SolarWinds supply chain compromise.
DarkHalo after SolarWinds: the Tomiris connection (SecureList) In December 2020, news of the SolarWinds incident took the world by storm. While supply-chain attacks were already a documented attack vector leveraged by a number of APT actors, this specific campaign stood out due to the extreme carefulness of the attackers and the high-profile nature of their victims. It is believed that when FireEye discovered the first traces of the campaign, the threat actor (DarkHalo aka Nobelium) had already been working on it for over a year. Evidence gathered so far indicates that DarkHalo spent six months inside OrionITs networks to perfect their attack and make sure that their tampering of the build chain wouldnt cause any adverse effects.
Tomiris Backdoor Linked to SolarWinds Malware (Threatpost) Newly discovered code resembles the Kazuar backdoor and the Sunshuttle second-stage malware distributed by Nobelium in the SolarWinds supply-chain attacks.
Kaspersky links new Tomiris malware to Nobelium group (Register) Typical: you wait months for new nasties then two come along at once
Squirrelwaffle: New Loader Delivering Cobalt Strike (Zscaler) Squirrelwaffle, Cobaltstrike, VBS, Macro, Hidden sheet, xls4.0, Thread Hijacking
Azure Active Directory bug lets hackers attempt brute force attacks without getting caught (Computing) Microsoft thinks it is behaviour 'by design'
China Intensified Attacks on Major Afghan Telecom Firm as U.S. Finalized Withdrawal (SecurityWeek) Four China-linked cyberespionage groups targeted a major Afghan telecom firm as the U.S. was finalizing its withdrawal from the country.
Iran is aware of electric substation cyber threats and vulnerabilities (Control Global) Mojtaba S. is a project manager, consultant, and industrial security specialist for the Electric Industry of Iran. His well-written article, Detecting Cyber Intrusions in Substation Networks, demonstrates detailed knowledge of electric substation designs, protocols, and cyber vulnerabilities.
The Rise of One-Time Password Interception Bots (KrebsOnSecurity) In February, KrebsOnSecurity wrote about a novel cybercrime service that helped attackers intercept the one-time passwords (OTPs) that many websites require as a second authentication factor in addition to passwords. That service quickly went offline, but new research reveals a
Cybercriminals bypass 2FA and OTP with robocalling and Telegram bots (CSO Online) The automated bots are highly successful because they effectively emulate legitimate service providers.
CISA Warns of Hikvision Camera Flaw as U.S. Aims to Rid Chinese Gear From Networks (SecurityWeek) CISA is telling organizations to patch their Hikvision cameras, just as the FCC announced taking steps toward removing Chinese equipment from U.S. networks.
Russian hacker Q&A: An Interview With REvil-Affiliated Ransomware Contractor (Flashpoint) Flashpoint translates an interview with a Russian-speaking threat actor who claims to work with REvil and other sophisticated ransomware collectives.
REvils Cryptobackdoor Con: Ransomware Groups Tactics Roil Affiliates, Sparking a Fallout - Flashpoint (Flashpoint) REvils tactics have recently come under renewed scrutiny. Threat actors operating on XSS and Exploit are currently reacting to evidence that REvil included a secret backdoor in its ransomware codeallegedly enabling the ransomware group to steal illicit ransom proceeds from its affiliates.Flashpoint cybersecurity analysts examine the chatter and subsequent fallout.
There are now over 250 different ransomware families currently operational worldwide (TechRadar) No industry is immune to ransomware attacks, research claims
Bitdefender Threat Debrief | August 2021 (Bitdefender) Bitdefender's monthly report on the current ransomware threats and threat actors.
Ransomware attacks against hospitals are having some very grim consequences (ZDNet) Researchers asked staff working in healthcare about the impact of cyberattacks - and the findings are worrying.
Ransomware attack disrupts hundreds of bookstores across France, Belgium, and the Netherlands (The Record by Recorded Future) Hundreds of bookstores across France, Belgium, and the Netherlands have had their operations disrupted this week after a ransomware attack crippled the IT systems of TiteLive, a French company that operates a SaaS platform for book sales and inventory management.
COVID-19's Healthcare Feeding Frenzy for Cybercriminals (SecurityWeek) The COVID-19 pandemic has enlarged the threat landscape for all industry sectors; but none more so than healthcare. The primary areas of concern include insecure working from home, and stress related lax behavior at the office.
Device Security is 'The Big Hairy Monster Under the Bed' (Decipher) The security of IoT and non-general purpose computing devices represents a systemic risk to corporate and national security, experts say.
Trucking giant Forward Air reports ransomware data breach (BleepingComputer) Trucking giant Forward Air has disclosed a data breach after a ransomware attack that allowed threat actors to access employees' personal information.
Results of Operations and Financial Condition (FWRD Forward Air 8-K) As previously disclosed, on December 15, 2020, Forward Air Corporation (the Company) detected a ransomware incident impacting its operational and information technology systems. The Companys internal security teams, supplemented by leading cyber defense firms, took active steps to assess, contain and remediate this incident.
Bandwidth hit by cyber attack that causes disruptions to some business phone calls (Herald-Sun) Raleigh technology company Bandwidth, which makes software for internet-based voice and text communication, is experiencing outages after it was hit by a cyber attack over the weekend, the company said Tuesday.
Pottawatomie Co. services back to normal following cyber-attack (WIBW) Pottawatomie Co. officials tell 13 NEWS late Wednesday afternoon, Sept. 29, their services are back up.
New leak of Epik data exposes company's entire server (The Daily Dot) The hacking collective Anonymous has released what it claims to be new data from the controversial web hosting company Epik.
All Trains Cancelled: How an e-Signature Failure Derailed a 3bn Swiss-Austrian Transport Deal (Crytpomathic) Last week an order for 186 double decker trains was nullified due to a legal formality surrounding the Qualified Electronic Signature used to ink the deal. Here, we unpack what went wrong and highlight what businesses everywhere can learn from the debacle.
Systemic risk in private sector dominates conversation at cyber summit (SC Media) With a changing understanding of what denotes a national security risk, this year's Aspen Cyber Summit traditionally a hub for talks about statecraft in infosec veered toward systemic risk across the private sector.
NSA Cyber Chief Warns Hackers Increasingly Use Commercial Tools to Stay Hidden (Nextgov.com) Advanced persistent threat actors are becoming harder to spot and making attribution more difficult.
Around the world with the NSA's cyber chief (The Record by Recorded Future) The head of the National Security Agencys cyber branch on Wednesday warned that the number of digital threats has proliferated.
CISA chief: Cyber incident reporting can't become a burden (FCW) Jen Easterly, the director of the Cybersecurity and Infrastructure Security Agency, stressed the importance of cyber incident reporting but said mandates should be careful of potentially overburdening companies -- and CISA -- with 'reporting noise.'
WatchGuard Threat Lab Reports 91.5% of Malware Arrived over Encrypted Connections in Q2 2021 (Yahoo Finance) New research also shows dramatic increases in fileless malware, malware detections per appliance, and booming network and ransomware attacksSEATTLE, Sept. 30, 2021 (GLOBE NEWSWIRE) -- WatchGuard Technologies, a global leader in network security and intelligence, advanced endpoint protection, multi-factor authentication (MFA) and secure Wi-Fi, today released its latest quarterly Internet Security Report, detailing the top malware trends and network security threats analyzed by WatchGuard Threat
Theres a Multibillion-Dollar Market for Your Phones Location Data (The Markup) A huge but little-known industry has cropped up around monetizing peoples movements
Cyberattacks from Russia and the Targeting of US Businesses (The Cipher Brief) Cipher Brief Expert Dan Hoffman is a former senior CIA Officer, three-time station chief and former senior executive Clandestine Services officer. He is currently a national security analyst with Fox News. This column first appeared in FOX News Opinionon FoxNews.com. Shawnee Delaney was a Clandestine Officer and former Detachment Chief for the Defense Intelligence Agency Continue reading "Cyberattacks from Russia and the Targeting of US Businesses"
Highlights From the Unit 42 Cloud Threat Report, 2H 2021 (Unit42) The Unit 42 Cloud Threat Report, 2H 2021, covers supply chain attacks in the cloud and provides actionable recommendations to help prevent them.
Behavioral Analytics Provider ForMotiv Raises $6 Million (SecurityWeek) Real-time user behavior analysis platform ForMotiv this week announced it has raised $6 million in a third seed funding round.
BlueVoyant Acquires Concanon to Augment the Deployment of End-to-End Splunk Cloud Platform Capabilities (PR Newswire) BlueVoyant, a cybersecurity company, today announced the acquisition of global professional services and big data solutions consultancy,...
Akamai to acquire cloud security firm Guardicore for about $600 mln (Reuters) Akamai Technologies Inc will acquire Israel-based Guardicore for about $600 million, it said on Wednesday, to beef up its cloud security offerings and help businesses combat ransomware attacks.
Akamai to Acquire Guardicore in $600M Zero Trust Tech Deal (SecurityWeek) Akamai to acquire Guardicore for new capabilities to help customers thwart ransomware attacks by blocking the spread of malware within an already-compromised enterprise.
Israeli cybersecurity merger: HUB Security buys Comsec (Globes) HUB says the main goal of the acquisition is to enter more markets worldwide and double its revenue.
SecZetta Announces $20.5 Million Series B Funding to Advance its Leadership in Third-Party Identity Lifecycle and Risk Management (BusinessWire) SecZetta announced an oversubscribed Series B round led by SYN Ventures, with participation from MassMutual Ventures, ClearSky, and Rally Ventures
Peraton Books $109M Cybercom Task Order for Cyberspace Operations Support Services; Tom Afferton Quoted (GovCon Wire) Looking for the latest GovCon News? Check out our story: Peraton Books $109M Cybercom Task Order for Cyberspace Ops Support Services. Click to read more!
The Security Interviews: How SolarWinds came through its darkest hour (ComputerWeekly) In his first major UK press interview, SolarWinds CEO Sudhakar Ramakrishna tells Computer Weekly how a relentless focus on transparency saw the company safely through a nightmare cyber breach scenario.
Google Announces Rewards for Tsunami Security Scanner Plugin (SecurityWeek) Google this week announced that it is offering monetary payouts to individuals who help expand the detection capabilities of the Tsunami security scanner.
Crypto Firms Beef Up Compliance Hiring as Regulatory Scrutiny Mounts (Wall Street Journal) The hunt for crypto-focused compliance executives has intensified in recent months as the industry faces growing regulatory pressure, both in the U.S. and abroad.
Relativity Recognized for Threat Intelligence Innovation in 2021 CyberSecurity Breakthrough Awards Program (PR Newswire) Relativity, a global legal and compliance technology company, today announced that its free-to-use Threat Intel Feed has been named the winner...
KnowBe4 Enhances Research Capabilities And Appoints Kai Roer Chief Research Officer (PR Newswire) KnowBe4, the provider of the world's largest security awareness training and simulated phishing platform, today announced that it has enhanced...
Variscite and Sequitur Labs' new partnership accelerates the development of reliable and secure IoT products (PR Newswire) Variscite, a leading worldwide System on Module vendor in the embedded market, announced a new partnership with Sequitur Labs, a leading...
PDI to Showcase Fully Managed XDR Complete Security Service at NACS Show 2021 (Professional Datasolutions, Inc.,) PDI XDR Complete will be featured in NACS Cool New Products Preview Room. Dont miss Ransomware Is a Symptom live education session presented by Rob Chapman, Director of Information Security at PDI.
2021.09.29 | Dell Technologies Drives the Evolution of Modern Support and Security (Dell Technologies) Dell Technologies Drives the Evolution of Modern Support and Security
Cowbell Cyber Further Unites Cybersecurity and Cyber Insurance with Connector to Secureworks Taegis VDR (Cowbell) Cowbell Connector for Secureworks Taegis VDR Vulnerability, Detection and Response enhances policyholders risk ratings, resulting in insurance terms better aligned with covered exposures
Relativity Trace to Introduce New AI-Powered Data Cleansing Capabilities at Relativity Fest (PR Newswire) Relativity, a global legal and compliance technology company, will showcase new data cleansing capabilities integrated in its AI-powered...
Huawei Launches OceanProtect Data Protection Solution (Yahoo) At Huawei Connect 2021, Huawei launched the OceanProtect Data Protection Solution, covering both Disaster Recovery (DR) and backup fields to offer comprehensive protection for diversified types of data throughout the lifecycle. It belongs to the Huawei All-Flash Data Center Solution to build the fast, green, reliable, and intelligent infrastructure for various industries. The solution is built on the concept of "full DR of hot data, and quick backup and restore of warm data", which ensures zero
Shared Assessments Introduces 2022 Third Party Risk Management Toolkit (BusinessWire) The Shared Assessments Program, the member-driven leader in third party risk assurance, today issued the 2022 Shared Assessments Third Party Risk Mana
Sumo Logic Addresses Digital Transformation Complexity Driven By Exponential Growth of Digital Services (Sumo Logic) New DevSecOps Enhancements Including Advanced Analytics for Alert Response, Open XDR, and Open Integration Framework to Collect and Analyze Telemetry Data Across Cloud, Applications, Endpoints and End Users to Provide Universal Approach to Digital Service Management
Microsoft and At-Bay partner to offer data-driven cyber insurance coverage (Microsoft Stories) Customers managing cyber-risk with Microsoft 365s built-in security controls qualify for savings on At-Bay cyber insurance policies
Israel's SCADAfence to supply cybersecurity for OT infrastructures worldwide (Israel Defense) The company is partnering with Keysight Technologies to accelerate innovation in the fields of connectivity and security as well as to help organizations gain better cyber control of industrial environments
Exabeam Announces Availability of Exabeam Fusion SIEM and Exabeam Fusion XDR on Google Cloud Marketplace (BusinessWire) Exabeam announced the availability of Fusion SIEM and Fusion XDR on Google Cloud Marketplace.
Buoyant Introduces Secure, Zero Trust Network Policies for Kubernetes in Linkerd 2.11 and Buoyant Cloud (PR Newswire) Buoyant, the creators of the world's lightest and fastest service mesh, Linkerd, today unveiled new security features in Linkerd and in Buoyant...
Approov Introduces Free Tool to Help Thwart Mobile App API Man-in-the-Middle Attacks (BusinessWire) Approov Offers Free Tool to Help Thwart Mobile App API Man-in-the-Middle Attacks; Helps Organizations Meet OWASP Guidelines for Mobile App Security
AttackIQ Introduces New Vanguard Managed Security Validation Service To Proactively Discover and Remediate Security Gaps Before Adversaries Mount Cyberattacks (BusinessWire) AttackIQ, the leading independent vendor of Breach and Attack Simulation (BAS) systems, today announced the availability of the new AttackIQ Vanguard
Securiti Launches Free Data Privacy Certification Program (BusinessWire) Multi-module training program covers data privacy management concepts including data privacy laws, governance and operations for enterprises.
Stratasys Introduces Data Security Platform Supporting Growing U.S. Government Implementations of 3D Printing (BusinessWire) Stratasys Ltd. (NASDAQ: SSYS), a leader in polymer 3D printing solutions, today announced that the company has introduced a new data security solution
New DNV recommended practice defends power grid substations from growing threat of cyber-attacks (DNV) DNV Recommended Practice DNV-RP-0575 outlines 45 risk-reducing measures to improve the cyber security of protection devices and digital technologies in power system substations
Improving the Nations Cybersecurity: Progress and Next Steps in Carrying Out Executive Order 14028 (NIST) Officials responsible for carrying out the
Insider Risk Self-Assessment Tool (CISA) Insider threats pose significant risk to the safety and security of Americas critical infrastructure and the organizations that keep infrastructure operational. The Insider Risk Self-Assessment is a tool to assist owners and operators or organizations, especially small and mid-sized ones who may not have in-house security departments, to gauge their vulnerability to an insider threat incident.
TRAM: Advancing Research into Automated TTP Identification in Threat Reports (Medium) Written by Jon Baker and Richard Struse.
Platform Security Controls Defend Against Adversaries: Heres How (Medium) Written by Nicholas Amon, Suneel Sundar, and Jon Baker.
What Can We Learn From the Top Cloud Security Breaches? (Check Point Software) By Jonathan Maresky, Cloud Product Marketing Manager, published September 30, 2021 (This blog post was first published in TheNewStack.) According
Facebook open-sources tool to find Android app security flaws (BleepingComputer) Facebook today open-sourced astatic analysis tool its software and security engineers use internally to find potentially dangerous security and privacy flaws in the company's Android and Java applications.
Recovering locked Facebook accounts is a nightmare. Thats on purpose. (Washington Post) Social media companies are juggling account security and recovery and failing users in the process
Latvian Operator LMT Tests Data Encryption with Quantum Technologies (Fast Mode) LMT has collaborated with MikroTik, and the Institute of Mathematics and Computer Science of the University of Latvia (LU
Tying quantum computing to AI prompts a smarter power grid (Cornell Chronicle) Fumbling to find flashlights during blackouts soon may be a memory, as quantum computing and AI may quickly solve an electric grids hiccups so fast, humans may not notice.
Designing smart security for smart devices (EurekAlert!) Modern society is inundated with different types of smart devices designed to make peoples lives easier, from virtual assistants to household appliances and health-monitoring devices not to mention smartphones. While each device has some amount of built-in security to help combat the threat of cyberattacks, the increased prevalence of these devices in recent years has created an industry-wide need for a new, smart approach to protect all smart devices from cyberattacks, since the mass-production of these devices by different manufacturers prohibits them from being managed manually for security purposes.
Designing an Australian DARPA (The Strategist) In The Strategist in July, we outlined our concept for an Australian equivalent of the US Defense Advanced Research Projects Agency (DARPA), mooted by ASPI. We envisaged this Australian version of DARPA filling the valley ...
Data-Privacy Impasse Hangs Over U.S.-EU Trade and Technology Summit (Wall Street Journal) Companies including Google urge officials to strike a new deal to ease trans-Atlantic data flows.
Call for coordinated response to Singapores OT security challenge (Channel Asia) Cooperation and collaboration on the agenda at Singapore's inaugural Operational Technology Cybersecurity Expert Panel (OTCEP) Forum.
Government departments asked to disclose use of personal phones and emails for official business (Computing) Campaigners hope the evidence will support the call for a judicial review into what they call a 'WhatsApp government'
The whos who of NZs government & public cybersecurity agencies (Security Brief) With every new technology-enabledpath we forge, we must also defend ourselves from cyber threats and exploitation. Here we take a look at some of Aotearoa's main cyber defenders.
FTC Weighs New Online Privacy Rules (Wall Street Journal) Under Democratic Chairwoman Lina Khan, the agency is considering ways to strengthen consumer privacy protections, including for children, as legislative logjams persist in Congress.
US Mulls Cyber-attack Reporting Mandate (Infosecurity Magazine) Critical infrastructure companies may be required to report cyber-attacks to federal government
What you should know about Bitskrieg: The New Challenge of Cyberwarfare (Military Times) Its less about an arms race and more about an organizational race.
Schools Aren't Required to Report Increasing Cyber Attacks: Kids at Risk, Parents in The Dark (Good Day Sacramento) Cybercriminals are targeting schools at an alarming rate and putting kids at risk of identity theft - and their parents may never know.
The whos who of NZs government & public cybersecurity agencies (Security Brief) With every new technology-enabledpath we forge, we must also defend ourselves from cyber threats and exploitation. Here we take a look at some of Aotearoa's main cyber defenders.
In U.S. v Wilson, the Ninth Circuit Reaffirms Fourth Amendment Protection for Electronic Communications (Electronic Frontier Foundation) In a powerful new ruling for digital privacy rights, the Ninth Circuit Court of Appeals has confirmed that the police need to get a warrant before they open your email attachmentseven if a third partys automated system has flagged those attachments as potentially illegal. We filed an amicus brief...
Facebook whistleblower to testify at U.S. Senate hearing next week, lawmakers say (Reuters) Two U.S. senators said on Tuesday a Facebook Inc whistleblower will testify at a Senate hearing next week about what one of them called the social media company's "toxic effects" on young users.
Opinion: The Supreme Court has a chance to shed light on a secretive judicial process (Washington Post) Judicial power, although superficially anomalous in a nation committed to regular elections and majority rule, is indispensable to limited government and minority rights.
Russia Detains Head of Cybersecurity Group on Treason Charges (SecurityWeek) A Moscow court on Sept. 29 ordered Ilya Sachkov, co-founder of one of Russia's leading cybersecurity firms, Group-IB, to be detained on charges of treason.
Top Russian Cybersecurity CEO Charged with Treason (GovInfoSecurity) The founder of Group-IB, one of Russia's largest cybersecurity companies, has been detained on state treason charges and will be held in custody for two months,
Russia detains cyber-security tycoon Ilya Sachkov in treason case (BBC News) Ilya Sachkov, co-founder of the firm Group-IB, will be held in pre-trial custody for two months.
Russia arrests cybersecurity expert on treason charge (Ars Technica) Ilya Sachkov is founder of Group-IB, which specializes in ransomware attack prevention.
Russia Arrests One Of Its Biggest Cyber Stars On Treason Charges (Forbes) A Moscow news agency suggests Ilya Sachkov has been accused of sharing classified information with a foreign entity, as Group-IB's offices are raided.
Ilya Sachkov handed over classified cybersecurity data to foreign intelligence source (TASS) According to the source, Sachkov could have been "employed" by intelligence agencies of several countries
Russian Cybersecurity Group-IB CEO Arrested for Treason by FSB (Security Boulevard) The evening of September 28, 2021, the FSB rolled up to the offices of Group-IB in marked vehicles and a full-size passenger bus and raided the companys
How Meme Detectives Stop NFT Fraud (Wired) Many classic memes were recently auctioned off for big bucks by their owners as NFTs. But how do you determine meme ownership? Don Caldwell and his team from Know Your Meme from been using their extensive knowledge of meme history to thwart NFT fraud. This is how they do it.
Read more from the original source:
GriftHorse is a massive Android premium services scam. Facebook open-sources a test tool. Updates on the Sachkov affair. - The CyberWire
Washington Adventist University in Md. confirms ongoing ransomware attack – WTOP
Washington Adventist University, a private four-year college in Montgomery County, confirmed an ongoing ransomware attack.
Washington Adventist University, a private four-year college in Montgomery County, Maryland, confirmed an ongoing ransomware attack Sunday.
The attack has restricted access to several pieces of technology on campus, ranging from campus intranet services to digital signage around the property.
In a statement, the school confirmed that the ransomware attack was first discovered after 11 p.m. on Saturday by its technology services department.
School officials have since said that Wi-Fi and internet access will not be available to students on campus until further notice.
There is a balance that has to be reached between access and security, the school wrote. The timeline therefore may be incremental rather than an overnight solution.
Despite the attack, the school will remain open for in-person instruction and will continue to hold virtual courses through Zoom. Access to services outside of the university intranet like campus email and Zoom also remain unaffected.
The school is currently working with the Montgomery County Cyber Taskforce and the Federal Bureau of Investigation to resolve the situation. A spokesperson did not tell WTOP the requested ransom amount or what data may have been accessed.
Like WTOP on Facebook and follow @WTOP on Twitter to engage in conversation about this article and others.
Get breaking news and daily headlines delivered to your email inbox by signing up here.
2021 WTOP. All Rights Reserved. This website is not intended for users located within the European Economic Area.
See the article here:
Washington Adventist University in Md. confirms ongoing ransomware attack - WTOP
Women and BAME individuals are hardest hit by cyber crime – IT PRO
Women, black, Asian and Minority Ethnic (BAME) individuals are more likely to be affected by cyber crime, causing substantial stress as well as financial loss.
That's according to a new report fromMalwarebytes, which surveyed more than 5,000people across the UK, US, and Germany.
According to its findings, 48% of people dont feel private online and 28% do not feel safe, with this number rising to 36% forBAME respondents in the UK.
Similarly, women weremore likely to feel unsafe online, with 35% admitting to feeling so, compared to 27% of men and were also more likely to have their social media accounts hacked, with 46% having fallen victim to the crime, compared to 37% of men.
Financial loss related to cyber crime was most likely to affect BAME individuals, having been experienced by more than half (53%) of respondents the highest percentage of all demographics considered by Malwarebytes survey.
Unsurprisingly, these experiences can affect the victims wellbeing: 21% of women and 23% of BAME respondents admitted to having experienced substantial stress as a result of dealing withsuspicious online activity, compared to 17% of all respondents. The survey also found that cyber crime is ever-present, with not a single respondent being able to avoid suspicious online activities.
Nine traits you need to succeed as a cyber security leader
What characteristics and certifications make a successful cyber security leader?
Malwarebytes CEO Marcin Kleczynski said that the disparity between populations feeling safe online and the emotional impact of threats on already vulnerable communities is unacceptable.
Understanding the impact that cybercrime has on vulnerable people (or populations), particularly women and minorities, across the world is critical as online access becomes essential to modern life. As an industry, we need to work together to make safe internet access available to everyone, he added.
Commenting on the findings, Robert Burda, interim CEO of Cybercrime Support Network, a non-profit organisation thatsupports victims of cyber crime, said that the digital world has an increasing effect on our private lives:
As technology and internet accessibility become more entwined in our day-to-day routines, our financial and emotional lives are more significantly impacted by cyber crime. With a greater understanding of how the digital world impacts disadvantaged communities, we can provide better programmes and resources that meet people where they are, he added.
The ultimate guide to going mobile for fire/emergency medical services
Get your free guide to going mobile for fire services and EMS
VMware Cloud workload migration tools
Cloud migration types, phases, and strategies
Eight steps to fight ransomware
Insights into how you can protect yourself from this ever increasing threat
IDC: The business value of Avi Vantage
A study of enterprises using next-generation application delivery
View original post here:
Women and BAME individuals are hardest hit by cyber crime - IT PRO
Howard University Returns to In-Person Instruction Amid Cyberattack – The Hilltop Online
Howard University faced a ransomware cybersecurity attack in the first week of September. Since the attack, the University has returned to some normalcy, proceeding with in-person and hybrid classes on Sept. 14.
The University sent out an email disclosing steps to reset email passwords, so students, faculty, and staff can reaccess their accounts and connect to the internet. However, Howard did confirm that the internet is still weak in certain areas.
Luckily, Enterprise Technology Services, the provider of IT services for Howard, was able to prevent any personal information from being accessed by the hackers, and have continued to place protective measures to ensure an invasion doesnt happen again.
The motive for the attack still remains unknown. However, with an increased use of technology, cyber security attacks have been a prominent issue since the start of the pandemic.
According to Varonis, a cyber security company, 88% of organizations worldwide experienced spear phishing attempts in 2019. Spear phishing is a scheme in which scammers pretend to be trusted senders in order to get confidential information out of the receivers.
Frank Tramble, Vice President of Howard Communications, disclosed how the University resolved the issue and measures to prevent another attack.
We evoked the Universitys incident response plan. Since that time, we have contained the threat and are restoring operations within the constraints of our hardened security strategy, said Tramble. Our IT team continues to work diligently to harden security within our operations.
Since the investigation is still ongoing, the University plans to share more updates with the community at a later date.
Although the campus internet is restored, there are still some difficulties for professors and students.
I havent been able to get to my old routine. Ive still been having difficulties connecting to the wifi. Ill go in and out throughout class, said freshman biology major Malana Baez.
The WiFi outage disrupted the entire campus, and continues to influence the semester. Dr. Christine McWhorter, an assistant professor, spoke about the lasting effects of the outage.
Theres still connectivity issues. The cyberattack lasted one week, but it put our courses back three weeks, said McWhorter. Weve had to allow time for students to learn what they didnt learn and put that into practice.
Though this has been a trying time for the Howard community, students have still found ways to press forward and finish coursework despite the difficulty. Latanya Khissy Beyniouah, a freshman computer science major, describes how she is able to stay on top of her work.
Ive walked to Whole Foods because I heard through GroupMe that its good [service], and if thats full, Ill try Potbelly or Mcdonalds, said Beyniouah. But, a week and a half ago, I found out about the writing center, and I was going there.
Enterprise Technology Services has been working tirelessly to assure students and faculty can proceed with their everyday routines. Howard University President Wayne A.I. Frederick took a moment to acknowledge the work that the Enterprise Technology Services does in a recent email.
On behalf of our entire campus community, I would like to express my sincerest and most deeply felt gratitude to all the members of our Enterprise Technology Services team and all our IT professionals, said Frederick.
The Howard community is still working to recover from the attack, and is doing their best to continue with normal operation.
See the article here:
Howard University Returns to In-Person Instruction Amid Cyberattack - The Hilltop Online
Education Cyber Security Market to Witness Remarkable Growth by Fortinet, Microsoft, Proofpoint, Zscaler Bulk Solids Handling – Bulk Solids Handling
Global Education Cyber Security Market Research Report 2021 is latest research study released by AMA evaluating the market, highlighting opportunities, risk side analysis, and leveraged with strategic and tactical decision-making support. The study provides information on market trends and development, drivers, capacities, technologies, and on the changinginvestment structure of the Global Education Cyber Security Market. Some of the key players profiled in the study are F5 Networks, Inc. (United States),Broadcom, Inc. (United States),Check Point Software Technologies (Israel),Cisco Systems, Inc (United States),Fortinet, Inc. (United States),IBM (United States),Microsoft (United States),Palo Alto Networks Inc. (United States) ,Proofpoint Inc. (United States),Sophos Ltd. (United Kingdom),Zscaler, Inc. (United States)
You can get free access to samples from the report here:https://www.advancemarketanalytics.com/sample-report/30370-global-education-cyber-security-market
Education Cyber Security Market Overview:The Australian education cybersecurity market is expected to grow at a healthy pace during the forecast period, according to the AMA study. The rising demand for precautions from the cybersecurity attacks such as DDoS attacks, data theft, financial gain, Espionage, and the growing demand for tracking of threats such as data leaks are expected to be some of the major factors aiding the growth of the market. However, the market is expected to witness a decline in growth during FY 2020 but it is again expected to rise at a healthy pace after the COVID-19 pandemic is over.
If you are involved in the Education Cyber Security industry or intend to be, then this study will provide you comprehensive outlook. Its vital you keep your market knowledge up to date segmented by Application (Network Security, Cloud Application Security, End-Point Security, Secure Web Gateway, Internet Security, Others), End Users (Private Educational Institutions, Government Educational Institutions), Enterprise Size (SMEs, Large Enterprises), Service (Managed, Professional) and major players. If you want to classify different company according to your targeted objective or geography we can provide customization according to your requirement.
Education Cyber SecurityMarket: Demand Analysis & Opportunity Outlook 2026Education Cyber Security research study is to define market sizes of various segments & countries by past years and to forecast the values by next 5 years. The report is assembled to comprise each qualitative and quantitative elements of the industry facts including: market share, market size (value and volume 2015-2020, and forecast to 2026) which admire each countries concerned in the competitive examination. Further, the study additionally caters the in-depth statistics about the crucial elements which includes drivers & restraining factors that defines future growth outlook of the market.
Important years considered in the study are:Historical year 2015-2020 ; Base year 2020; Forecast period** 2021 to 2026 [** unless otherwise stated]
Enquire for customization in Report @https://www.advancemarketanalytics.com/enquiry-before-buy/30370-global-education-cyber-security-market Whats Trending in Market:
Rising Internet & Cloud-based Platform Penetration Across the Educational Sector in Australia
Challenges:
Lack of Budget or Resources for Cybersecurity in Education Across Different Institutions
Opportunities:
Rising Penetration of Virtual Classrooms Across Australia is Expected to Generate Huge Opportunities for Market Vendors During the Forecast Period
Increasing Number of Cyber Attacks Across the Educational Institutions Across Australia
Market Growth Drivers:
The Rising Demand for Boosting the Cyber Security Capabilities of Australian Universities
Need for Data Leak Tracking Across the Education Sector in Australia
If opting for the Global version of Education Cyber Security Market analysis is provided for major regions as follows: North America (USA, Canada and Mexico) Europe (Germany, France, the United Kingdom, Netherlands, Russia , Italy and Rest of Europe) Asia-Pacific (China, Japan, Australia, New Zealand, South Korea, India and Southeast Asia) South America (Brazil, Argentina, Colombia, rest of countries etc.) Middle East and Africa (Saudi Arabia, United Arab Emirates, Israel, Egypt, Nigeria and South Africa)
Buy this research report @https://www.advancemarketanalytics.com/buy-now?format=1&report=30370
Key Answers Captured in Study areWhich geography would have better demand for product/services?What strategies of big players help them acquire share in regional market?Countries that may see the steep rise in CAGR & year-on-year (Y-O-Y) growth?How feasible is market for long term investment?What opportunity the country would offer for existing and new players in the Education Cyber Security market?Risk side analysis involved with suppliers in specific geography?What influencing factors driving the demand of Education Cyber Security near future?What is the impact analysis of various factors in the Global Education Cyber Security market growth?What are the recent trends in the regional market and how successful they are?
There are 15 Chapters to display the Global Education Cyber Security market.Chapter 1, About Executive Summary to describe Definition, Specifications and Classification of Global Education Cyber Security;Chapter 2, objective of the study.Chapter 3, to display Research methodology and techniques.Chapter 4 and 5, to show the Education Cyber Security Market Analysis, segmentation analysis, characteristics;Chapter 6 and 7, to show Five forces (bargaining Power of buyers/suppliers), Threats to new entrants and market condition;Chapter 8 and 9, to show analysis by regional segmentation[North America, United States, Canada, Mexico, Asia-Pacific, China, India, Japan, South Korea, Australia, Indonesia, Singapore, Rest of Asia-Pacific, Europe, Germany, France, UK, Italy, Spain, Russia, Rest of Europe, Central & South America, Brazil, Argentina, Rest of South America, Middle East & Africa, Saudi Arabia, Turkey & Rest of Middle East & Africa ], comparison, leading countries and opportunities; Regional Marketing Type Analysis, Supply Chain AnalysisChapter 10, to identify major decision framework accumulated through Industry experts and strategic decision makers;Chapter 11 and 12, Global Education Cyber Security Market Trend Analysis, Drivers, Challenges by consumer behavior, Marketing ChannelsChapter 13 and 14, about vendor landscape (classification and Market Ranking)Chapter 15, deals with Global Education Cyber Security Market sales channel, distributors, Research Findings and Conclusion, appendix and data source.
Read Detailed Index of full Research Study at @https://www.advancemarketanalytics.com/reports/30370-global-education-cyber-security-market
Thanks for reading this article; you can also get individual chapter wise section or region wise report version like North America, Europe or Asia or Oceania [Australia and New Zealand].
Media Contact:
Craig Francis (PR & Marketing Manager)AMA Research & Media LLPUnit No. 429, Parsonage Road Edison, NJNew Jersey USA 08837Phone: +1 (206) 317 1218sales@advancemarketanalytics.com
Connect with us athttps://www.linkedin.com/company/advance-market-analyticshttps://www.facebook.com/AMA-Research-Media-LLP-344722399585916https://twitter.com/amareport