Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for Queryable Encryption ...

 Business

Data leaks have become alarmingly common of late. Cybercriminals use all kinds of tricks to gain access to databases and the records stored there. The most logical way to secure databases would be to use encryption, but this is often impractical. After all, the more often a service needs to access a database, the   show more ...

slower it will respond. And if that database is also encrypted, the response time may be even higher. And thats not all — as was shown in a 2009 study of the main problems with database encryption. Fast forward to early June of this year, however, and the developers of the MongoDB database management system (DBMS) announced a breakthrough in their latest release: support for Queryable Encryption. Queryable Encryption is a way of storing data in encrypted form with acceptable query response times. Real-world performance The brains behind the new technology belong to Seny Kamara, Associate Professor of Computer Science at Brown University (in Providence, Rhode Island State, in the U.S.A.), who has worked extensively on the application of reliable encryption in the real world. At the time his startup was acquired by MongoDB, his research was focused on developing a reliable method to protect databases without sacrificing performance. Its no secret that database developers and operators have always prioritized speed and reliability over protection. For encryption experts, on the other hand, ensuring the impossibility of data decryption is the priority, while convenience plays second fiddle. Because of this, past solutions have seesawed between encrypting data either quickly but unreliably, or securely but painfully slowly. Kamara combines a scientific approach (that is, strong encryption) with the needs of real-life users (that is, fast response times). Heres how it looks in MongoDB: System for encrypted database access. Source. Suppose we need to retrieve data about a user based on their social security number. We take the SSN, encrypt it, and send it in encrypted form as part of the query to the database. In response, the database returns other information about the user: name, phone number, email address. Note that no decryption at all takes place on the database side. The query contains only encrypted data, as does the response. Importantly, the secret keys for decrypting the data are stored neither on the database server, nor on the client. This means that even if attackers gain access to the database, the users data is still safe. A bright future — hopefully If this is such a major issue, you ask, why have there been no database encryption solutions before? Well, there have been some, and theyve been around for quite a while. But these were mostly performance-oriented, with encryption as a sideshow — for example, to demonstrate to regulators that protection had not been totally neglected. As such, existing solutions have a number of vulnerabilities. In particular, it was found that if an entire CryptDB-encrypted database were compromised, most of its contents could be decrypted. In other words, such encryption is a mild nuisance to hackers, nothing more. This solution, like others, has never been formally audited to determine the strength of its encryption method. This happens to be a common problem of practical cryptography — when the developers of an information system feel compelled to craft something in-house that meets their particular data encryption requirements. This something then often turns out to be vulnerable because the development process failed to take into account the latest scientific research. And the vulnerabilities are usually such that their presence can be determined only by analyzing the algorithm and predicting its operation. The upshot is that your data is theoretically encrypted, but in practice has long been up for sale on the underground market. In terms of functionality, Queryable Encryption in MongoDB lies at the intersection of science and business — apparently a first. It remains only for the new encryption method to pass a formal audit to prove the security of the data (preliminary feedback is overwhelmingly positive). Real users should also provide their input: does the encryption interfere with performance? And it would be nice to see the appearance a rival system based on similar principles: healthy competition is, after all, the key to progress. So, what next?. In companies that care about client data, almost everything is encrypted anyway: backups, email, communications between devices and the corporate network. So databases may well be the last stronghold of important information stored in plain text. Yes, such databases have maximum protection against outside penetration, but theyre still vulnerable. Lets hope, then, that the successful rollout of encrypted database management systems will help prevent wholesale theft of user data. Sure, it will still be possible to attack individual users; or to harvest open data, which by definition is available online. But to steal a hundred million accounts all at once? Advances in database encryption could render such incidents extremely unlikely.

 Incident Response, Learnings

“Ms. Thompson used her hacking skills to steal the personal information of more than 100 million people, and hijacked computer servers to mine cryptocurrency,” said US Attorney Nick Brown in a press release.

 Identity Theft, Fraud, Scams

One of the typical phishing page scenarios observed in a recent campaign – a fake billing notification sent on behalf of SendGrid, a Colorado-based customer communication platform for transactional and marketing email.

 Expert Blogs and Opinion

It’s vital they have complete control of confidential communications and can securely share information and data for the most effective collaboration – particularly to elicit a fast response and recovery in the event of a security breach.

 Trends, Reports, Analysis

As compared to Q1 2021 this year’s volume of total phishing sites showed a steady growth of 4.4% from January to March. Furthermore, it is anticipated that these numbers would increase throughout 2022.

 Expert Blogs and Opinion

Security defenders working for large venues and international events need to be able to move at machine speed because they have a limited time to detect and recover from attacks. The show must go on, always.

 Expert Blogs and Opinion

For now, researchers say that Magecart client-side attacks are still around and that we could easily be missing them if we rely on automated crawlers and sandboxes, at least if we don’t make them more robust.

 Malware and Vulnerabilities

Researchers have observed new spear-phishing campaigns, dubbed VIP3R, aimed at certain organizations and individuals via infected HTML attachments. If opened, victims are directed at a phishing page impersonating a service often used by them, where they are are urged to input their username and password.

 Malware and Vulnerabilities

Taiwanese vendor QNAP has been hit by another ransomware attack with the latest one coming from the eCh0raix. For this, only a few dozen eCh0raix samples have been submitted so far. To prevent from this, QNAP has urged customers to update their devices' QTS or QuTS hero operating systems to the latest versions.

 Feed

Ubuntu Security Notice 5489-1 - Alexander Bulekov discovered that QEMU incorrectly handled floppy disk emulation. A privileged attacker inside the guest could use this issue to cause QEMU to crash, resulting in a denial of service, or possibly leak sensitive information. It was discovered that QEMU incorrectly handled   show more ...

NVME controller emulation. An attacker inside the guest could use this issue to cause QEMU to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 22.04 LTS.

 Feed

Ubuntu Security Notice 5488-1 - Chancen and Daniel Fiala discovered that OpenSSL incorrectly handled the c_rehash script. A local attacker could possibly use this issue to execute arbitrary commands when c_rehash is run.

 Feed

OpenSSL is a robust, fully featured Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols with full-strength cryptography world-wide.

 Feed

Ubuntu Security Notice 5487-1 - It was discovered that Apache HTTP Server mod_proxy_ajp incorrectly handled certain crafted request. A remote attacker could possibly use this issue to perform an HTTP Request Smuggling attack. It was discovered that Apache HTTP Server incorrectly handled certain request. An attacker   show more ...

could possibly use this issue to cause a denial of service. It was discovered that Apache HTTP Server incorrectly handled certain request. An attacker could possibly use this issue to cause a crash or expose sensitive information.

 Feed

A new kind of Windows NTLM relay attack dubbed DFSCoerce has been uncovered that leverages the Distributed File System (DFS): Namespace Management Protocol (MS-DFSNM) to seize control of a domain. "Spooler service disabled, RPC filters installed to prevent PetitPotam and File Server VSS Agent Service not installed but you still want to relay [Domain Controller authentication to [Active Directory

 Feed

An advanced persistent threat (APT) actor codenamed ToddyCat has been linked to a string of attacks aimed at high-profile entities in Europe and Asia since at least December 2020. The relatively new adversarial collective is said to have commenced its operations by targeting Microsoft Exchange servers in Taiwan and Vietnam using an unknown exploit to deploy the China Chopper web shell and

 Feed

Nearly five dozen security vulnerabilities have been disclosed in devices from 10 operational technology (OT) vendors due to what researchers call are "insecure-by-design practices." Collectively dubbed OT:ICEFALL by Forescout, the 56 issues span as many as 26 device models from Bently Nevada, Emerson, Honeywell, JTEKT, Motorola, Omron, Phoenix Contact, Siemens, and Yokogawa. "Exploiting these

 Feed

Ransomware has been a thorn in the side of cybersecurity teams for years. With the move to remote and hybrid work, this insidious threat has become even more of a challenge for organizations everywhere. 2021 was a case study in ransomware due to the wide variety of attacks, significant financial and economic impact, and diverse ways that organizations responded. These attacks should be seen as a

 Feed

A 36-year-old former Amazon employee was convicted of wire fraud and computer intrusions in the U.S. for her role in the theft of personal data of no fewer than 100 million people in the 2019 Capital One breach. Paige Thompson, who operated under the online alias "erratic" and worked for the tech giant till 2016, was found guilty of wire fraud, five counts of unauthorized access to a protected

2022-06
Aggregator history
Tuesday, June 21
WED
THU
FRI
SAT
SUN
MON
TUE
JuneJulyAugust