Data leaks have become alarmingly common of late. Cybercriminals use all kinds of tricks to gain access to databases and the records stored there. The most logical way to secure databases would be to use encryption, but this is often impractical. After all, the more often a service needs to access a database, the show more ...
slower it will respond. And if that database is also encrypted, the response time may be even higher. And thats not all — as was shown in a 2009 study of the main problems with database encryption. Fast forward to early June of this year, however, and the developers of the MongoDB database management system (DBMS) announced a breakthrough in their latest release: support for Queryable Encryption. Queryable Encryption is a way of storing data in encrypted form with acceptable query response times. Real-world performance The brains behind the new technology belong to Seny Kamara, Associate Professor of Computer Science at Brown University (in Providence, Rhode Island State, in the U.S.A.), who has worked extensively on the application of reliable encryption in the real world. At the time his startup was acquired by MongoDB, his research was focused on developing a reliable method to protect databases without sacrificing performance. Its no secret that database developers and operators have always prioritized speed and reliability over protection. For encryption experts, on the other hand, ensuring the impossibility of data decryption is the priority, while convenience plays second fiddle. Because of this, past solutions have seesawed between encrypting data either quickly but unreliably, or securely but painfully slowly. Kamara combines a scientific approach (that is, strong encryption) with the needs of real-life users (that is, fast response times). Heres how it looks in MongoDB: System for encrypted database access. Source. Suppose we need to retrieve data about a user based on their social security number. We take the SSN, encrypt it, and send it in encrypted form as part of the query to the database. In response, the database returns other information about the user: name, phone number, email address. Note that no decryption at all takes place on the database side. The query contains only encrypted data, as does the response. Importantly, the secret keys for decrypting the data are stored neither on the database server, nor on the client. This means that even if attackers gain access to the database, the users data is still safe. A bright future — hopefully If this is such a major issue, you ask, why have there been no database encryption solutions before? Well, there have been some, and theyve been around for quite a while. But these were mostly performance-oriented, with encryption as a sideshow — for example, to demonstrate to regulators that protection had not been totally neglected. As such, existing solutions have a number of vulnerabilities. In particular, it was found that if an entire CryptDB-encrypted database were compromised, most of its contents could be decrypted. In other words, such encryption is a mild nuisance to hackers, nothing more. This solution, like others, has never been formally audited to determine the strength of its encryption method. This happens to be a common problem of practical cryptography — when the developers of an information system feel compelled to craft something in-house that meets their particular data encryption requirements. This something then often turns out to be vulnerable because the development process failed to take into account the latest scientific research. And the vulnerabilities are usually such that their presence can be determined only by analyzing the algorithm and predicting its operation. The upshot is that your data is theoretically encrypted, but in practice has long been up for sale on the underground market. In terms of functionality, Queryable Encryption in MongoDB lies at the intersection of science and business — apparently a first. It remains only for the new encryption method to pass a formal audit to prove the security of the data (preliminary feedback is overwhelmingly positive). Real users should also provide their input: does the encryption interfere with performance? And it would be nice to see the appearance a rival system based on similar principles: healthy competition is, after all, the key to progress. So, what next?. In companies that care about client data, almost everything is encrypted anyway: backups, email, communications between devices and the corporate network. So databases may well be the last stronghold of important information stored in plain text. Yes, such databases have maximum protection against outside penetration, but theyre still vulnerable. Lets hope, then, that the successful rollout of encrypted database management systems will help prevent wholesale theft of user data. Sure, it will still be possible to attack individual users; or to harvest open data, which by definition is available online. But to steal a hundred million accounts all at once? Advances in database encryption could render such incidents extremely unlikely.
“Ms. Thompson used her hacking skills to steal the personal information of more than 100 million people, and hijacked computer servers to mine cryptocurrency,” said US Attorney Nick Brown in a press release.
One of the typical phishing page scenarios observed in a recent campaign – a fake billing notification sent on behalf of SendGrid, a Colorado-based customer communication platform for transactional and marketing email.
According to data breach notifications sent to exposed customers, Flagstar experienced a security incident in December 2021 when intruders breached the bank’s corporate network.
It’s vital they have complete control of confidential communications and can securely share information and data for the most effective collaboration – particularly to elicit a fast response and recovery in the event of a security breach.
To coerce a remote server to authenticate against a malicious NTLM relay, threat actors could use various methods, including the MS-RPRN, MS-EFSRPC (PetitPotam), and MS-FSRVP protocols.
"The increasing adoption and use of ICT has increased the attack surface and threat perception to government, due to lack of proper cyber security practices followed on the ground," the document opens.
The Attorney General has issued an arrest warrant for the Russian hacker Nikolaj Kozachek who is accused to have carried out a cyber-espionage attack against the NATO think tank Joint Air Power Competence Center in Germany.
An advanced persistent threat (APT) group dubbed ToddyCat has been targeting Microsoft Exchange servers throughout Asia and Europe for more than a year, since at least December 2020.
Of the 56 vulnerabilities discovered, 38% allow for compromise of credentials, 21% allow for firmware manipulation, 14% allow remote code execution, and 8% of flaws enable tampering with configuration information.
This new round is made with 115K, the new innovation fund of La Banque Postale dedicated to FinTech, AssurTech, and Cybersecurity startups, as well as Elaia Partners, one of the main European investment funds specialized in deeptech.
After All World Cards, another credit card market, also decided to publish a dataset of data for free to advertise, BidenCash yesterday published an archive containing various stolen information of credit card holders.
As compared to Q1 2021 this year’s volume of total phishing sites showed a steady growth of 4.4% from January to March. Furthermore, it is anticipated that these numbers would increase throughout 2022.
Vulnerabilities in the web interface of Jacuzzi’s SmartTub app could have enabled an attacker to view and potentially manipulate the personal data of hot tub owners, a security researcher claims.
"Yodel is currently experiencing service delays due to a system-wide outage," said an update on Beer Hawk's website, which says the issues have been affecting their deliveries since at least Monday.
Security defenders working for large venues and international events need to be able to move at machine speed because they have a limited time to detect and recover from attacks. The show must go on, always.
A cross-party group in the House of Lords has proposed an amendment to the Product Security and Telecommunications Infrastructure Bill that would address concerns about security researchers being prosecuted in the course of their work.
The initial ingress point was a pair of VMWare Horizon Unified Access Gateways that were vulnerable to Log4Shell. The attackers utilized several different tools, including Cobalt Strike, Sliver, and multiple commercial network scanners.
For now, researchers say that Magecart client-side attacks are still around and that we could easily be missing them if we rely on automated crawlers and sandboxes, at least if we don’t make them more robust.
Researchers have observed new spear-phishing campaigns, dubbed VIP3R, aimed at certain organizations and individuals via infected HTML attachments. If opened, victims are directed at a phishing page impersonating a service often used by them, where they are are urged to input their username and password.
Taiwanese vendor QNAP has been hit by another ransomware attack with the latest one coming from the eCh0raix. For this, only a few dozen eCh0raix samples have been submitted so far. To prevent from this, QNAP has urged customers to update their devices' QTS or QuTS hero operating systems to the latest versions.
Ubuntu Security Notice 5489-1 - Alexander Bulekov discovered that QEMU incorrectly handled floppy disk emulation. A privileged attacker inside the guest could use this issue to cause QEMU to crash, resulting in a denial of service, or possibly leak sensitive information. It was discovered that QEMU incorrectly handled show more ...
NVME controller emulation. An attacker inside the guest could use this issue to cause QEMU to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 22.04 LTS.
Ubuntu Security Notice 5488-1 - Chancen and Daniel Fiala discovered that OpenSSL incorrectly handled the c_rehash script. A local attacker could possibly use this issue to execute arbitrary commands when c_rehash is run.
OpenSSL is a robust, fully featured Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols with full-strength cryptography world-wide.
Ubuntu Security Notice 5487-1 - It was discovered that Apache HTTP Server mod_proxy_ajp incorrectly handled certain crafted request. A remote attacker could possibly use this issue to perform an HTTP Request Smuggling attack. It was discovered that Apache HTTP Server incorrectly handled certain request. An attacker show more ...
could possibly use this issue to cause a denial of service. It was discovered that Apache HTTP Server incorrectly handled certain request. An attacker could possibly use this issue to cause a crash or expose sensitive information.
Red Hat Security Advisory 2022-5132-01 - Updated images are now available for Red Hat Advanced Cluster Security for Kubernetes (RHACS). The updated image includes bug and security fixes.
A new kind of Windows NTLM relay attack dubbed DFSCoerce has been uncovered that leverages the Distributed File System (DFS): Namespace Management Protocol (MS-DFSNM) to seize control of a domain. "Spooler service disabled, RPC filters installed to prevent PetitPotam and File Server VSS Agent Service not installed but you still want to relay [Domain Controller authentication to [Active Directory
An advanced persistent threat (APT) actor codenamed ToddyCat has been linked to a string of attacks aimed at high-profile entities in Europe and Asia since at least December 2020. The relatively new adversarial collective is said to have commenced its operations by targeting Microsoft Exchange servers in Taiwan and Vietnam using an unknown exploit to deploy the China Chopper web shell and
Nearly five dozen security vulnerabilities have been disclosed in devices from 10 operational technology (OT) vendors due to what researchers call are "insecure-by-design practices." Collectively dubbed OT:ICEFALL by Forescout, the 56 issues span as many as 26 device models from Bently Nevada, Emerson, Honeywell, JTEKT, Motorola, Omron, Phoenix Contact, Siemens, and Yokogawa. "Exploiting these
Ransomware has been a thorn in the side of cybersecurity teams for years. With the move to remote and hybrid work, this insidious threat has become even more of a challenge for organizations everywhere. 2021 was a case study in ransomware due to the wide variety of attacks, significant financial and economic impact, and diverse ways that organizations responded. These attacks should be seen as a
A 36-year-old former Amazon employee was convicted of wire fraud and computer intrusions in the U.S. for her role in the theft of personal data of no fewer than 100 million people in the 2019 Capital One breach. Paige Thompson, who operated under the online alias "erratic" and worked for the tech giant till 2016, was found guilty of wire fraud, five counts of unauthorized access to a protected
Have you received an email notification that there is a voicemail waiting to be listened to by you? Maybe you would be wise to think carefully before clicking on the attachment.