Sooner or later, most organizations will have to think about postpandemic work routines. Although many companies, still staggering from pandemic effects, have yet to make their final decisions about handling new workplace realities, even a partial return to the office requires certain measures from IT and IT security show more ...
teams. Switching to working from home was difficult, but oddly enough, returning to the office may be just as tricky. Organizations will have to roll back some changes, which can entail as much work as deploying them did. They will also need to recheck internal service security and meet employee needs for the software they got used to during lockdown. To help stressed IT security managers prioritize, we put together some cybersecurity action items for businesses. 1. Keep work-from-home cybersecurity workarounds To maintain the security of corporate endpoints while employees were working from home, many companies introduced additional protection measures such as security checks and centralized patch management of remote computers, adding or expanding VPN access, and offering dedicated awareness training. Detection and response agents on endpoints played important roles identifying and closing network perimeter gaps. Whether your workforce is returning from home to office or simply travels a bunch, using VPN, EDR, and intrusion detection systems on endpoints will ensure their safe return to on-site work. 2. Restore any security controls you disabled for remote workers To allow remote employees to connect to the corporate network, especially from personal devices, some organizations weakened or disabled cybersecurity controls such as Network Admission Control (NAC). NAC checks computers for compliance with corporate security requirements such as up-to-date malware protection before granting access to the corporate network. When employees return to the office and connect to the corporate network, NAC should be turned on to protect the internal systems in case the machines pose any risks. But since computers have been remote for about 18 months, they could have missed some updates. This means that enabling NAC for dozens or even hundreds of such machines can cause many errors. As a result, switching the service on could turn into a step-by-step, fine-tuning process for small groups of staff. Organizations need to anticipate such issues and have a plan that includes resources, deadlines, bug fixes, and maybe even help from IT integrators. 3. Update internal systems Don’t forget to check internal critical services. If there are any unpatched servers in the building, the IT security team needs to know about them before letting anyone in. When we were all sitting at office desktops, our computers were constantly connected to the corporate network and were under 24/7 protection and policy control. Accordingly, the risks of an exploit penetrating the network from a PC and compromising a vulnerable server were lower. With everyone returning to the office and connecting their laptops to the corporate network at once, just one unpatched domain controller can provide broad access to, for example, employee account data and passwords. A vigilant IT security team should detect the problem in time and head off serious trouble, but that still leaves the extra work of reorganizing the network and changing all passwords. 4. Get ready to save — and also to pay Bringing employees back to the office will save employers some money. For example, at Kaspersky we increased the number of VPN tunnels from 1,000 to more than 5,000 to enable most of our staff to work from home. It is likely that we will cut this cost as our team returns to the office. Similarly, companies can reduce the number of subscription-based cloud solutions such as Slack or Microsoft Teams. With staff in the office, companies will not need as many cloud licenses, and they may be able to bring some services back as local resources. The same strategy applies to electronic signature apps, necessary during lockdown but replaceable (or scalable) with a return to traditional document signature processes. Consider spending those freed-up budgets on organizing digital workstations such that employees can split their weeks between the office and elsewhere. The concept is not new, but the pandemic has made it more common, as Gartner notes. From virtual desktop infrastructure (VDI) to desktop as a service (DaaS), remote-work technologies can essentially move workspaces to the cloud, making them accessible from any connected device — and virtual desktops are much easier to deploy, manage, fix, and protect than remote computers. 5. Save the tools and settings employees were using remotely Working remotely, employees mastered new communication and collaboration tools — for chats, videoconferencing, planning, CRM, and more. If those tools worked at all well, employees will want to continue using them. Thanks to their pandemic experience, 74% of our survey respondents said they want more flexible and comfortable working conditions. Banning such innovations may not be wise. It could provoke the growth of a sort-of shadow IT, staff members using apps without IT approval. Companies should be prepared either to approve new services or to suggest, and defend, alternatives. Dedicated solutions can help organizations manage access to cloud services — using dedicated cloud discovery features in a security solution or cloud access security brokers — and enforce associated security policies. IT security should be a business enabler, not a barrier. Ignoring a massive behavioral change can damage an employee’s view of the company, whereas allowing flexible working and services that are convenient for workers can do just the opposite. That applies to future candidates and staff as well. We saw that happen with Apple, where some employees wrote an open letter asking Tim Cook and executives to “consider remote and location-flexible work decisions to be as autonomous for a team to decide as hiring decisions are.” The pandemic and global transitions to remote work represented force majeure challenges for companies and their IT departments. Despite the difficulties, this experience is invaluable and provides a crucial lesson for the future. One of the pandemic’s most important takeaways is how quickly businesses can change. Having learned so much from the experience, IT security should offer options and support ongoing flexibility. A smart and safe return to office work in any form can help companies stay on top of this trend and make the most of their business processes.
Electric vehicle maker Tesla Inc will work with global regulators to ensure data security, Chief Executive Elon Musk told World New Energy Vehicle Congress, an industry event in China.
The Alaska health department has shared more information about the cyberattack detected earlier this year, and the organization says the attack was conducted by state-sponsored hackers.
In the first half of the year, malicious actors exploited flaws across different types of platforms, leading to major attacks that shut down fuel networks and extracted millions from enterprises.
New Cooperative -- an Iowa-based farm service provider -- has been hit with a ransomware attack, continuing a streak of incidents affecting agricultural companies this year.
F5 Networks, one of the world's largest providers of enterprise networking gear, announced on Monday that it is acquiring cloud security company Threat Stack for $68 million.
Researchers at NYU recently analyzed code generated by Copilot and found that, for certain tasks where security is crucial, the code contains security flaws around 40 percent of the time.
Apache OpenOffice is currently vulnerable to a remote code execution vulnerability and while the app's source code has been patched, the fix has only been made available as beta software.
According to the CERT-In, over 290,000 cyberattacks related to digital banking were reported in 2020, including phishing attacks, network scanning and probing, viruses, and website hacking.
Indonesian authorities have found no evidence that the country’s main intelligence service’s computers were compromised, after a cybersecurity company alerted them of a suspected breach.
FortiGuard Labs has now begun to encounter offers of fake vaccine passports as lures in email scams. It reflects how cybercriminals think that they can successfully exploit this issue.
Dams, levees, and other water structures are considered part of the 16 critical infrastructure sectors overseen by CISA, according to the Department of Homeland Security's inspector general's report.
"The data included over 15 million unique email addresses, names, phone numbers, physical addresses, purchases and passwords stored in various formats," according to Have I Been Pwned.
A survey of 2,001 UK office staff working in organizations with 500+ employees found that 34 percent believe cybersecurity awareness is the biggest issue when it comes to hybrid working.
In the latest security incident involving a DeFi protocol, pNetwork announced Sunday it had been hacked for 277 pBTC, a form of wrapped bitcoin, with losses worth over $12 million at current value.
DeepFactor announced that it raised $15 million in series A financing led by Insight Partners with participation from Emergent Ventures, Security Leadership Capital, and Tricentis.
Remote electronic voting was held in 6 regions, including the city of Sevastopol and the Kursk, Murmansk, Nizhny Novgorod, Rostov, and Yaroslavl regions, Russian News Agency Tass reported.
CIC was established in 1964 as the DoD Computer Institute. In 1981, it was incorporated into NDU located at Fort McNair, Washington, D.C., and reports to the Chairman of the Joint Chiefs of Staff.
A British cybersecurity researcher stumbled across his own personal data online after discovering an unsecured database containing the personal information of millions of visitors to Thailand.
Over the past few months, these attacks have leaked sensitive government data, thwarted the operations of hundreds of businesses and even temporarily shut down one of the US’ biggest oil pipelines.
The FBI, CISA, and CGCYBER issued a joint advisory warning against the exploitation of a critical bug in the Zoho ManageEngine ADSelfService Plus software by the nation-state actors. Besides applying a patch, organizations are suggested to baseline the normal behavior in web server logs to spot a web shell when deployed.
New Capoae malware strain is reportedly targeting WordPress and Linux systems worldwide. Written in GoLang, it exploited around four different RCE vulnerabilities. Moreover, the malware contains a port scanner to find open ports and services for further exploitation. Among other advice, experts recommend users never use weak or default credentials for deployed applications.
The cryptomining trojan z0Miner has been taking advantage of Atlassian’s Confluence remote code execution (RCE) vulnerability assigned as CVE-2021-26084, which was disclosed by Atlassian in August.
A report from Sonatype revealed that supply chain attacks on open-source public repositories have increased up to 650% year-over-year. The security firm has mentioned that the significant increase in supply-chain attacks has been mainly caused by the exploitation of flaws in popular open-source ecosystems. It is show more ...
always recommended to strictly monitor the open-source projects used in the production environment for any anomalies.
The possible compromise of sensitive personal data arose from unauthorized access to employee email accounts over a seven-day period between May 12-18, 2021, according to a data breach notice.
In terms of authentication, everything is a resource. Employees, user devices, data sources, services and more — they all have the same status: the system doesn’t let them in by default.
On Monday, Marketron announced the incident saying that it was dealing with a “cyber event” that disrupted some of its business operations and impacted all its customers.
Nine Senate Democrats are urging the FTC to make new data privacy rules that will work in parallel with the long-running effort by Congress to reach an agreement on a federal privacy law.
Data privacy, governance, and compliance platform OneTrust has announced plans to acquire Tugboat Logic, a platform that companies use to garner security certifications such as ISO 27001.
The attacker used publicly available file hosting services such as “archive.org”, “transfer.sh”, and "discord.com", to host the malware while hacked WordPress websites were used to host phishing kits.
An online survey of 2,500 adults in Canada and the United States found that in relation to cybersecurity, seven in ten respondents (69%) said news of data breaches caused them stress.
Threat actors are compromising Microsoft Windows IIS servers to add expired certificate notification pages that prompt visitors to download a malicious fake TeamViewer installer.
On the day Apple released iOS 15, a Spanish security researcher disclosed an iPhone lock screen bypass method that can be exploited to grant attackers access to a user’s notes.
The company sent SMS messages to its clients on Sunday, saying that the perpetrators of the attack were "hackers from abroad." However, Voicenter claimed that the attack did not affect its work.
Cisco Talos researchers recently discovered a new backdoor used by the Russian Turla APT group. They observed infections in the U.S., Germany, and, more recently, in Afghanistan.
ESET reported a new Numando banking Trojan that abuses YouTube, Pastebin, and other public platforms to fool victims into stealing their financial credentials. It can simulate mouse clicks, keyboard actions, hijack PC’s shutdown/restart functions, kill browser processes, and take screenshots. Banking customers are suggested to follow all the security practices to stay protected.
Azure customers are requested to urgently address the OMIGOD flaw exploited by Mirai botnet operators. Microsoft has released additional guidance on securing Linux machines impacted by the critical flaw that concerns thousands of Azure customers and millions of endpoints. Due to no auto-update mechanism, customers have to update manually to protect endpoints from OMIGOD exploits.
An HTTP endpoint used by the Manage Engine OpManager Smart Update Manager component can be leveraged to deserialize an arbitrary Java object. This can be abused by an unauthenticated remote attacker to execute OS commands in the context of the OpManager application. This vulnerability is also present in other products show more ...
that are built on top of the OpManager application. This vulnerability affects OpManager versions 12.1 through 12.5.328.
Ubuntu Security Notice 5079-4 - USN-5079-2 fixed vulnerabilities in curl. One of the fixes introduced a regression. This update fixes the problem. Patrick Monnerat discovered that curl incorrectly handled upgrades to TLS. When receiving certain responses from servers, curl would continue without TLS even when the option to require a successful upgrade to TLS was specified. Various other issues were also addressed.
Red Hat Security Advisory 2021-3623-01 - Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. Issues addressed include denial of service, path sanitization, and use-after-free vulnerabilities.
Ubuntu Security Notice 5084-1 - It was discovered that LibTIFF incorrectly handled certain malformed images. If a user or automated system were tricked into opening a specially crafted image, a remote attacker could crash the application, leading to a denial of service, or possibly execute arbitrary code with user privileges.
Red Hat Security Advisory 2021-3572-01 - Network Security Services is a set of libraries designed to support the cross-platform development of security-enabled client and server applications. Netscape Portable Runtime provides platform independence for non-GUI operating system facilities. Issues addressed include a denial of service vulnerability.
Red Hat Security Advisory 2021-3598-01 - OpenShift Virtualization is Red Hat's virtualization solution designed for Red Hat OpenShift Container Platform.
Red Hat Security Advisory 2021-3582-01 - The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP.
Ubuntu Security Notice 5079-3 - USN-5079-1 fixed vulnerabilities in curl. One of the fixes introduced a regression on Ubuntu 18.04 LTS. This update fixes the problem. It was discovered that curl incorrect handled memory when sending data to an MQTT server. A remote attacker could use this issue to cause curl to crash, show more ...
resulting in a denial of service, or possibly execute arbitrary code. Patrick Monnerat discovered that curl incorrectly handled upgrades to TLS. When receiving certain responses from servers, curl would continue without TLS even when the option to require a successful upgrade to TLS was specified. Patrick Monnerat discovered that curl incorrectly handled responses received before STARTTLS. A remote attacker could possibly use this issue to inject responses and intercept communications. Various other issues were also addressed.
Red Hat Security Advisory 2021-3590-01 - MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon and many client programs and libraries. Issues addressed include a denial of service vulnerability.
Red Hat Security Advisory 2021-3576-01 - Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted show more ...
third party, the Kerberos key distribution center. Issues addressed include denial of service and null pointer vulnerabilities.
2020 was a year of relentless disruptions. The protective layer of secured enterprise networks and controlled IT environments of the physical premises did not exist. Over the past year, CISOs (Chief Information Security Officers) have had to grapple with the challenges of bolstering the security posture, minimizing risks, and ensuring business continuity in the new normal. The rise in volumes
Unidentified threat actors breached a server running an unpatched, 11-year-old version of Adobe's ColdFusion 9 software in minutes to remotely take over control and deploy file-encrypting Cring ransomware on the target's network 79 hours after the hack. The server, which belonged to an unnamed services company, was used to collect timesheet and accounting data for payroll as well as to host a
A recently discovered wave of malware attacks has been spotted using a variety of tactics to enslave susceptible machines with easy-to-guess administrative credentials to co-opt them into a network with the goal of illegally mining cryptocurrency. "The malware's primary tactic is to spread by taking advantage of vulnerable systems and weak administrative credentials. Once they've been infected,
Cybersecurity researchers on Tuesday disclosed details of an unpatched vulnerability in macOS Finder that could be abused by remote adversaries to trick users into running arbitrary commands on the machines. "A vulnerability in macOS Finder allows files whose extension is inetloc to execute arbitrary commands, these files can be embedded inside emails which if the user clicks on them will
106 people have been arrested, mostly in Spain and some in Italy, following a multi-national investigation into online fraud. Read more in my article on the Hot for Security blog.