Week in review: Fileless malware, usable cybersecurity, Magecart goes after S3 buckets - 8 minutes read
Week in review: Fileless malware, usable cybersecurity, Magecart goes after S3 buckets
Here’s an overview of some of last week’s most interesting news and articles:
Inside the NIST team working to make cybersecurity more user-friendly Cybersecurity is usually not a user’s primary duty, yet they suffer an increasing burden to respond to security warnings, maintain many complex passwords, and make security decisions for which they are not equipped. This is the main reason why security needs to be usable and why the National Institute of Standards and Technology (NIST) has a team of researchers working on projects aimed at understanding and improving the usability of cybersecurity software, hardware, systems, and processes.
Why identity is the foundation of security Though some information may still be hosted on in-house servers, much of it has migrated to the cloud. According to a recent Flexera survey, 84% of enterprises have a multi-cloud strategy, with public cloud adoption surpassing private cloud adoption.
German banks to stop using SMS to deliver second authentication/verification factor German banks are moving away from SMS-based customer authentication and transaction verification (called mTAN or SMS-TAN), as the method is deemed to be too insecure.
British Airways is facing £183 million fine for 2018 data breach The UK Information Commissioner’s Office (ICO) wants British Airways to pay a £183.39 million (nearly $230 million) fine for failing to protect personal and financial information of approximately 500,000 of its customers. It also wants to fine Marriott International £99,200,396 (around $123 million) for infringements of the General Data Protection Regulation (GDPR).
The pervasive use of second screens endangers corporate IT networks Despite techies having argued for years that having a second computer screen is a great way to improve productivity in the workplace, a new study from Gigamon has revealed that many people today use their additional monitor to stream music and watch sporting events and companies are struggling to cope with the extra internet bandwidth.
Insider attacks still far more difficult to detect and prevent than external cyber attacks A recent survey conducted by Gurucul of more than 320 IT security experts, found that 15 percent of people said they would delete files or change passwords upon exiting a company.
Magecart compromised 17,000+ sites through unsecured Amazon S3 buckets We often hear about misconfigured Amazon S3 buckets exposing sensitive business and customer data, but there’s another present danger: Magecart attackers have been exploiting them to inject payment card skimming scripts into websites.
Citrix plugs critical Citrix SD-WAN flaws, patch ASAP! Researchers have found critical vulnerabilities in Citrix SD-WAN, one of the most widely used SD-WAN solutions out there, and are urging administrators to patch them as soon as possible.
Most SMB devices run Windows versions that are expired or will expire by January 2020 There is a steady increase in attacks and changes in attack methods that target weaknesses in encryption, workload configuration, limited visibility into vulnerabilities and outdated and unsupported operating systems, according to a research by Alert Logic.
July 2019 Patch Tuesday: Microsoft plugs two actively exploited zero-days For July 2019 Patch Tuesday, Microsoft has pushed out patches for 78 CVE-numbered vulnerabilities (15 of them critical) and Adobe for three, but none of them in its most widely used software.
Are humans ready for AI to take control of digital security? Just over a quarter (26%) of people in EMEA would prefer their cybersecurity to be managed by AI rather than a human, an online study conducted by Palo Alto Networks and YouGov alongside Dr Jessica Barker reveals.
What can financial institutions do to improve email security? Financial institutions are in a fully-fledged war against data breaches. And rightly so – the finance sector is a frequent target of ransomware, phishing, and other malicious attacks. Sensitive communications are particularly vulnerable, with thousands getting leaked every year.
A fileless campaign is dropping the Astaroth info-stealer Attackers are delivering the Astaroth info-stealing backdoor by leveraging a combination of fileless malware and “living off the land” techniques, Microsoft’s security team warns.
Discovering and fingerprinting BACnet devices BACnet is a communication protocol deployed for building automation and control networks. The most widely accepted networks include Internet Protocol (BACnet/IP) and the Master-Slave Token-Passing network (BACnet MS/TP). Generally, routers are required to interconnect BACnet networks while gateways are preferred for connecting non-compliant devices to a primary BACnet network.
U.S. Coast Guard shares cybersecurity best practices for commercial vessels Spurred by a recent cyber incident they were called in to help resolve, the U.S. Coast Guard has detailed basic measures to improve vessels ‘cybersecurity.
Whitepaper: Know your enemy, know your risk Understanding the risks to your most sensitive data begins with understanding the mindset of the hackers attacking it.
How mobile use cases in financial services are affecting security Financial services organizations are increasingly exposed to cyber threats, according to Wandera. The report “Mobile Security in the Financial Services,” includes analysis of six months of security data from 225 financial services customers with 50,000 devices collectively under management.
How businesses can become more nimble and secure by moving to the cloud Today’s business landscape is more dynamic than ever before. Organizations are being inundated with data, generated by an ever-increasing number of connected devices and systems. According to IDC, volume of data worldwide will grow ten-fold to 163ZB by 2025, and the majority of that will be created and managed by enterprises.
Do cloud apps make you a target for cyber attacks? Almost half (49%) of businesses believe cloud apps make them a target for cyber attacks, a Thales research reveals.
How companies innovate as they face industry disruption Nearly three-quarters (72%) of industry sectors experienced an increase in disruption over the past eight years, leaving $41 trillion in enterprise value (market capitalization + net debt) exposed to disruption today, according to a new report from Accenture.
Incident response at the speed of light: Cynet launches free offering for incident response service providers More and more, organizations take the route of outsourcing incident response to Managed Security Service Providers. This trend is distinct regardless of the organization’s cyber maturity level and can be found across a wide range of cyber maturity, from small companies with no dedicated security team, to enterprises with a fully equipped SOC. The hands of the incident response service providers are extremely busy and the need from their side to scale while maintaining top quality has never been greater.
New infosec products of the week: July 12, 2019 A rundown of infosec products released last week.
Source: Wordpress.com
Powered by NewsAPI.org
Keywords:
Fileless malware • Computer security • National Institute of Standards and Technology • Computer security • Usability • Computer security • Security • Password • Computer security • Decision-making • Computer security • Usability • National Institute of Standards and Technology • National Institute of Standards and Technology • Research • Usability • Computer security • Software • Computer hardware • System • Business process • Security • Information • Server (computing) • Business • Strategy • Cloud computing • Cloud computing • Authentication • Authentication • Transaction verification • Transaction authentication number • British Airways • Data breach • Information Commissioner's Office • Information Commissioner's Office • British Airways • Financial institution • Information technology • Marriott International • General Data Protection Regulation • General Data Protection Regulation • Computer monitor • Gigamon • Computer monitor • Bandwidth (computing) • Cyberwarfare • Computer security • Security • Corporation • Amazon S3 • Amazon S3 • Data • Payment card • Automated teller machine • Citrix Systems • Citrix Systems • SD-WAN • Patch (computing) • ASAP (T.I. song) • Citrix Systems • SD-WAN • SD-WAN • System administrator • Patch (computing) • Server Message Block • Computer hardware • Microsoft Windows • Software development process • Encryption • Configuration management • Vulnerability (computing) • Operating system • Patch Tuesday • Microsoft • Exploit (computer security) • Zero Days • Patch Tuesday • Microsoft • Patch (computing) • Common Vulnerabilities and Exposures • Vulnerability (computing) • Adobe Systems • Software • Artificial intelligence • Europe, the Middle East and Africa • Computer security • Artificial intelligence • Internet • Palo Alto Networks • YouGov • Jessica Barker • Financial institution • Data breach • Ransomware • Phishing • Malware • Communication • Vulnerability (computing) • United States diplomatic cables leak • Astaroth • Security hacker • Astaroth • Backdoor (computing) • Fileless malware • Microsoft • Computer security • BACnet • Gadget • BACnet • Communications protocol • Software deployment • Building automation • Internet Protocol • BACnet • Internet Protocol • Master/slave (technology) • Token passing • Computer network • BACnet • Microsoft • Router (computing) • BACnet • Computer network • Gateway (telecommunications) • Electronics • BACnet • Computer network • United States Coast Guard • Computer security • United States Coast Guard • Computer security • Know Your Enemy (Manic Street Preachers album) • Risk • Security hacker • Financial services • Threat (computer) • Mobile security • Financial services • Data analysis • Data • Financial services • Customer • Cloud computing • Today's Business • Organization • Data • System • Data center • Data • Business • Cloud computing • Cyber-attack • Business • Cloud computing • Mobile app • Cyberwarfare • Thales Group • Research and development • Company • Innovation • Industry • Disruptive innovation • Industry • Disruptive innovation • Enterprise value • Market capitalization • Accenture • Speed of Light (Iron Maiden song) • Incident management • Organization • Trade route • Outsourcing • Incident management • Managed security service • Organization • Mature technology • Company • Security • Business • Incident management • Information security • Information security •
Here’s an overview of some of last week’s most interesting news and articles:
Inside the NIST team working to make cybersecurity more user-friendly Cybersecurity is usually not a user’s primary duty, yet they suffer an increasing burden to respond to security warnings, maintain many complex passwords, and make security decisions for which they are not equipped. This is the main reason why security needs to be usable and why the National Institute of Standards and Technology (NIST) has a team of researchers working on projects aimed at understanding and improving the usability of cybersecurity software, hardware, systems, and processes.
Why identity is the foundation of security Though some information may still be hosted on in-house servers, much of it has migrated to the cloud. According to a recent Flexera survey, 84% of enterprises have a multi-cloud strategy, with public cloud adoption surpassing private cloud adoption.
German banks to stop using SMS to deliver second authentication/verification factor German banks are moving away from SMS-based customer authentication and transaction verification (called mTAN or SMS-TAN), as the method is deemed to be too insecure.
British Airways is facing £183 million fine for 2018 data breach The UK Information Commissioner’s Office (ICO) wants British Airways to pay a £183.39 million (nearly $230 million) fine for failing to protect personal and financial information of approximately 500,000 of its customers. It also wants to fine Marriott International £99,200,396 (around $123 million) for infringements of the General Data Protection Regulation (GDPR).
The pervasive use of second screens endangers corporate IT networks Despite techies having argued for years that having a second computer screen is a great way to improve productivity in the workplace, a new study from Gigamon has revealed that many people today use their additional monitor to stream music and watch sporting events and companies are struggling to cope with the extra internet bandwidth.
Insider attacks still far more difficult to detect and prevent than external cyber attacks A recent survey conducted by Gurucul of more than 320 IT security experts, found that 15 percent of people said they would delete files or change passwords upon exiting a company.
Magecart compromised 17,000+ sites through unsecured Amazon S3 buckets We often hear about misconfigured Amazon S3 buckets exposing sensitive business and customer data, but there’s another present danger: Magecart attackers have been exploiting them to inject payment card skimming scripts into websites.
Citrix plugs critical Citrix SD-WAN flaws, patch ASAP! Researchers have found critical vulnerabilities in Citrix SD-WAN, one of the most widely used SD-WAN solutions out there, and are urging administrators to patch them as soon as possible.
Most SMB devices run Windows versions that are expired or will expire by January 2020 There is a steady increase in attacks and changes in attack methods that target weaknesses in encryption, workload configuration, limited visibility into vulnerabilities and outdated and unsupported operating systems, according to a research by Alert Logic.
July 2019 Patch Tuesday: Microsoft plugs two actively exploited zero-days For July 2019 Patch Tuesday, Microsoft has pushed out patches for 78 CVE-numbered vulnerabilities (15 of them critical) and Adobe for three, but none of them in its most widely used software.
Are humans ready for AI to take control of digital security? Just over a quarter (26%) of people in EMEA would prefer their cybersecurity to be managed by AI rather than a human, an online study conducted by Palo Alto Networks and YouGov alongside Dr Jessica Barker reveals.
What can financial institutions do to improve email security? Financial institutions are in a fully-fledged war against data breaches. And rightly so – the finance sector is a frequent target of ransomware, phishing, and other malicious attacks. Sensitive communications are particularly vulnerable, with thousands getting leaked every year.
A fileless campaign is dropping the Astaroth info-stealer Attackers are delivering the Astaroth info-stealing backdoor by leveraging a combination of fileless malware and “living off the land” techniques, Microsoft’s security team warns.
Discovering and fingerprinting BACnet devices BACnet is a communication protocol deployed for building automation and control networks. The most widely accepted networks include Internet Protocol (BACnet/IP) and the Master-Slave Token-Passing network (BACnet MS/TP). Generally, routers are required to interconnect BACnet networks while gateways are preferred for connecting non-compliant devices to a primary BACnet network.
U.S. Coast Guard shares cybersecurity best practices for commercial vessels Spurred by a recent cyber incident they were called in to help resolve, the U.S. Coast Guard has detailed basic measures to improve vessels ‘cybersecurity.
Whitepaper: Know your enemy, know your risk Understanding the risks to your most sensitive data begins with understanding the mindset of the hackers attacking it.
How mobile use cases in financial services are affecting security Financial services organizations are increasingly exposed to cyber threats, according to Wandera. The report “Mobile Security in the Financial Services,” includes analysis of six months of security data from 225 financial services customers with 50,000 devices collectively under management.
How businesses can become more nimble and secure by moving to the cloud Today’s business landscape is more dynamic than ever before. Organizations are being inundated with data, generated by an ever-increasing number of connected devices and systems. According to IDC, volume of data worldwide will grow ten-fold to 163ZB by 2025, and the majority of that will be created and managed by enterprises.
Do cloud apps make you a target for cyber attacks? Almost half (49%) of businesses believe cloud apps make them a target for cyber attacks, a Thales research reveals.
How companies innovate as they face industry disruption Nearly three-quarters (72%) of industry sectors experienced an increase in disruption over the past eight years, leaving $41 trillion in enterprise value (market capitalization + net debt) exposed to disruption today, according to a new report from Accenture.
Incident response at the speed of light: Cynet launches free offering for incident response service providers More and more, organizations take the route of outsourcing incident response to Managed Security Service Providers. This trend is distinct regardless of the organization’s cyber maturity level and can be found across a wide range of cyber maturity, from small companies with no dedicated security team, to enterprises with a fully equipped SOC. The hands of the incident response service providers are extremely busy and the need from their side to scale while maintaining top quality has never been greater.
New infosec products of the week: July 12, 2019 A rundown of infosec products released last week.
Source: Wordpress.com
Powered by NewsAPI.org
Keywords:
Fileless malware • Computer security • National Institute of Standards and Technology • Computer security • Usability • Computer security • Security • Password • Computer security • Decision-making • Computer security • Usability • National Institute of Standards and Technology • National Institute of Standards and Technology • Research • Usability • Computer security • Software • Computer hardware • System • Business process • Security • Information • Server (computing) • Business • Strategy • Cloud computing • Cloud computing • Authentication • Authentication • Transaction verification • Transaction authentication number • British Airways • Data breach • Information Commissioner's Office • Information Commissioner's Office • British Airways • Financial institution • Information technology • Marriott International • General Data Protection Regulation • General Data Protection Regulation • Computer monitor • Gigamon • Computer monitor • Bandwidth (computing) • Cyberwarfare • Computer security • Security • Corporation • Amazon S3 • Amazon S3 • Data • Payment card • Automated teller machine • Citrix Systems • Citrix Systems • SD-WAN • Patch (computing) • ASAP (T.I. song) • Citrix Systems • SD-WAN • SD-WAN • System administrator • Patch (computing) • Server Message Block • Computer hardware • Microsoft Windows • Software development process • Encryption • Configuration management • Vulnerability (computing) • Operating system • Patch Tuesday • Microsoft • Exploit (computer security) • Zero Days • Patch Tuesday • Microsoft • Patch (computing) • Common Vulnerabilities and Exposures • Vulnerability (computing) • Adobe Systems • Software • Artificial intelligence • Europe, the Middle East and Africa • Computer security • Artificial intelligence • Internet • Palo Alto Networks • YouGov • Jessica Barker • Financial institution • Data breach • Ransomware • Phishing • Malware • Communication • Vulnerability (computing) • United States diplomatic cables leak • Astaroth • Security hacker • Astaroth • Backdoor (computing) • Fileless malware • Microsoft • Computer security • BACnet • Gadget • BACnet • Communications protocol • Software deployment • Building automation • Internet Protocol • BACnet • Internet Protocol • Master/slave (technology) • Token passing • Computer network • BACnet • Microsoft • Router (computing) • BACnet • Computer network • Gateway (telecommunications) • Electronics • BACnet • Computer network • United States Coast Guard • Computer security • United States Coast Guard • Computer security • Know Your Enemy (Manic Street Preachers album) • Risk • Security hacker • Financial services • Threat (computer) • Mobile security • Financial services • Data analysis • Data • Financial services • Customer • Cloud computing • Today's Business • Organization • Data • System • Data center • Data • Business • Cloud computing • Cyber-attack • Business • Cloud computing • Mobile app • Cyberwarfare • Thales Group • Research and development • Company • Innovation • Industry • Disruptive innovation • Industry • Disruptive innovation • Enterprise value • Market capitalization • Accenture • Speed of Light (Iron Maiden song) • Incident management • Organization • Trade route • Outsourcing • Incident management • Managed security service • Organization • Mature technology • Company • Security • Business • Incident management • Information security • Information security •