Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for Myths and reality of ...

 Business

Ever since we started working on our own operating system, weve encountered numerous myths that significantly hinder the adoption of new technologies. Fortunately, its not so difficult to provide compelling evidence that these myths are just that: myths. In this post, we address some of the most common misconceptions.   show more ...

Myth 1: current operating systems can already handle all the latest challenges Weve been hearing people say we dont need another OS for more than 20 years. However, for all this time, mainstream operating systems have continued to suffer from the same three problems: Cyberthreats: in 2022, Kasperskys security systems detected over 400,000 new malicious files Windows remains the primary target (accounting for 85% of threats), but the number of threats for Linux and Android is steadily increasing (with a 20% and 10% rise, respectively, last year). Instability: the infamous Windows blue screen of death still haunts our workdays. If anyone thinks things are different with Linux, theyre mistaken — it also has a screen of death, only its black (and its known as kernel panic). Mutual incompatibility: every year, were surrounded by more and more smart devices. According to analysts, by 2025, the number of connected devices worldwide will reach 27 billion. Sometimes, devices produced by one and the same company may run on different operating systems. Consequently, software developers often have to put tremendous effort into adapting the same applications for different OS environments. Here at Kaspersky we found the solution to these problems by creating KasperskyOS. Its based on the microkernel concept, the MILS architectural approach, and FLASK architecture. Average daily number of malicious files detected by Kaspersky security solutions from 2019 to 2022 Myth 2: the cybersecurity advantages of microkernels havent been proven Its not easy to compare which architecture is better — microkernel or monolithic kernel. However, there have been many serious studies dedicated to this. From these, its become evident that: Approximately 95% of critical vulnerabilities in Linux and exploits targeting this system wouldnt be critical in microkernel operating systems. Approximately 55% of these critical vulnerabilities could have been mitigated through microkernel verification. Approximately 30% could simply have been prevented entirely by implementing a microkernel architecture. Myth 3: microkernel OS is slow The performance of an operating system during processes requiring connections to remote desktops is an important concern. Therefore, we paid particular attention to it. And thanks to multicore and codec support, we managed to achieve a level of performance comparable to Linux. Games are some of the most performance-demanding applications, so as part of our testing we set ourselves the task of running a recently released game that uses GPU heavily on KasperskyOS. This doesnt mean were going to start developing games or consoles. But this experiment did let us clearly demonstrate to our partners which will develop devices on KasperskyOS the systems real capabilities of performing tasks related to design and 3D modeling. Myth 4: Linux containers can perform the same tasks that KasperskyOS can using MILS. If we look closely at the architecture of our Cyber Immune gateway (one of the first KasperskyOS-based devices to hit the market), we find there around 200 security domains. If we tried to build the same thing on Docker containers in Linux, it would require more than 5GB of RAM. Such a gateway implemented in the form of 200 containers on low-spec hardware with a single-core processor would work extremely slowly. The fundamental difference lies in the approaches: in Linux containers, we essentially take a complete system and trim off what we dont need, whereas in KasperskyOS, we build it from the ground up with only the necessary components. This significantly optimizes resource consumption. Architecture of the Cyber Immune gateway Myth 5: you cant build dynamic systems with FLASK The FLASK concept provides control over security domains using security policies. There is a common belief that this approach makes it impossible to expand OS functionality through applications. However, the evolution of specific products based on KasperskyOS clearly demonstrates the opposite: In 2021, we proved with our IoT gateway the possibility of creating KasperskyOS-based Cyber Immune solutions with fixed functionality. In 2022, using a thin client as an example, we demonstrated the ability to create Cyber Immune solutions with support for a graphical user interface. Moreover, the partner with which we implemented this project added their own applications to KasperskyOSs thin client functionality without any hitches. Were currently in the third evolutionary stage — where external developers can create certain types of applications for KasperskyOS. To facilitate this, were developing our own application distribution system. The first Cyber Immune platform capable of accepting such applications will be the gateway — since it must be able to connect to a wide range of different devices. However, were not stopping there; were now working to transition to the next stage, where on the basis of KasperskyOS it will be possible to create full-fledged Cyber Immune platforms and systems with a large number of applications. Mobile devices are an example of such systems. Myth 6: development is narrowly specialized It might seem that development of a new operating system requires developers to completely retrain. But thats not the case. KasperskyOS is already bringing together developers from entirely different paradigms who use the tools theyre familiar with. Web applications are being developed for gateways and thin clients utilize the Qt framework, popular in the Linux community. For controllers, theres nothing preventing the creation of console applications familiar to almost every programmer from their student days. Furthermore, together with colleagues working on developing an automotive gateway, we offer the option to use standard frameworks from the automotive industry, such as AUTOSAR Adaptive. Were actively working on providing Flutter technology capabilities in our OS, which will ensure compatibility with Android applications. Myth 7: the difficulty of porting to different hardware platforms Some developers fear that developing new operating systems is pointless because drivers are only written for mainstream OS (Linux, Android, Windows). Therefore, any new OS will only work with a limited range of hardware. Understanding this, we launched a research project with the goal of creating technology that enables Linux drivers to run on KasperskyOS with minimal modifications — Linux Compat. The idea is simple: in KasperskyOS, you can run a piece of code in the secure domain like in a container. We add a thin software layer to this container so the Linux driver thinks its operating in its familiar Linux environment. Thanks to this technology, weve ported around 300,000 lines of Linux code to KasperskyOS — changing less than 5%. 300,000 lines of code is 8–10 years of work for an experienced developer (when it comes to driver development). Now for some concrete numbers. For example, accelerometer and gyroscope drivers in Linux contain about 7000 lines of code. To run this code using our technology on KasperskyOS, only 20 lines needed to be modified. And the NFC driver, used to support equipment with which mobile devices interact with payment terminals, contains about 1200 lines of code; with our technology, this driver ran without any changes at all. In my opinion, weve developed a technology that will allow us to upscale in the future. And right now were choosing the product on which we can fully test this technology. Everybody needs to choose for themselves whether they want to be mired in myth or in the new Cyber Immune reality. You can learn more on our KasperskyOS website and in blog on Cyber Immunity. Lets debunk myths together: reality is way more interesting!

 Malware and Vulnerabilities

The use of the Forked IcedID variant, which removes banking functionality and focuses on payload delivery, highlights a shift in malware tactics toward prioritizing ransomware delivery.

 Expert Blogs and Opinion

The rise of hardware- and firmware-related attacks and supply chain threats has fundamentally changed the cybersecurity landscape, requiring a deeper understanding of these areas in the context of the MITRE ATT&CK framework.

 Breaches and Incidents

Ace Hardware is currently experiencing a cyberattack that has disrupted its IT systems. While in-store payment systems and credit card processing are unaffected, online services such as placing orders are currently unavailable.

 Breaches and Incidents

EleKtra-Leak, an ongoing cryptojacking campaign, exploits exposed IAM credentials on GitHub to mine Monero. The attackers are said to have used each stolen credential within five minutes of its discovery. The payloads are delivered via a Google Drive URL, another widely used application, to evade detection. It is   show more ...

recommended to audit the GitHub repository cloning events for any suspicious operations and secure the exposed keys.

 Expert Blogs and Opinion

Recovery efforts should prioritize patching vulnerabilities, removing malicious artifacts, and strengthening protective and detective controls to enhance cyber resilience and reduce the risk of follow-up attacks.

 Trends, Reports, Analysis

The Parallax RAT has seen a significant increase in usage, particularly through infected DLLs in seemingly legitimate invoices, making it harder for users to detect the attack.

 Companies to Watch

The Kirkland, Washington-based security company raised $61 million in Series B funding. The round was led by Spark Capital, with participation from existing investors Sequoia Capital, Amplify Partners, The Chainsmoker's Mantis VC, and Banana Capital.

 Malware and Vulnerabilities

Out of the 15 vulnerabilities patched, 13 of which were reported by external researchers. Three of the bugs are rated as high severity, while the remaining ones are medium and low severity.

 Mobile Security

Auto Blocker prevents the installation of risky apps downloaded from outside the official app stores to protect users from malware and spyware. It also blocks unauthorized commands and software installations via the USB port.

 Feed

The Russia-linked hacking crew known as Turla has been observed using an updated version of a known second-stage backdoor referred to as Kazuar. The new findings come from Palo Alto Networks Unit 42, which is tracking the adversary under its constellation-themed moniker Pensive Ursa. "As the code of the upgraded revision of Kazuar reveals, the authors put special emphasis on Kazuar's ability to

 Feed

F5 is warning of active abuse of a critical security flaw in BIG-IP less than a week after its public disclosure that could result in the execution of arbitrary system commands as part of an exploit chain. Tracked as CVE-2023-46747 (CVSS score: 9.8), the vulnerability allows an unauthenticated attacker with network access to the BIG-IP system through the management port to achieve code execution

 Feed

State-sponsored threat actors from the Democratic People's Republic of Korea (DPRK) have been found targeting blockchain engineers of an unnamed crypto exchange platform via Discord with a novel macOS malware dubbed KANDYKORN. Elastic Security Labs said the activity, traced back to April 2023, exhibits overlaps with the infamous adversarial collective Lazarus Group, citing an analysis of the

 Feed

The browser has become the main work interface in modern enterprises. It’s where employees create and interact with data, and how they access organizational and external SaaS and web apps. As a result, the browser is extensively targeted by adversaries. They seek to steal the data it stores and use it for malicious access to organizational SaaS apps or the hosting machine. Additionally,

 Feed

A threat actor affiliated with Iran's Ministry of Intelligence and Security (MOIS) has been observed waging a sophisticated cyber espionage campaign targeting financial, government, military, and telecommunications sectors in the Middle East for at least a year. Israeli cybersecurity firm Check Point, which discovered the campaign alongside Sygnia, is tracking the actor under the name Scarred

 Feed

A threat actor known as Prolific Puma has been maintaining a low profile and operating an underground link shortening service that's offered to other threat actors for at least over the past four years. Prolific Puma creates "domain names with an RDGA [registered domain generation algorithm] and use these domains to provide a link shortening service to other malicious actors, helping them evade

2023-11
Aggregator history
Wednesday, November 01
WED
THU
FRI
SAT
SUN
MON
TUE
NovemberDecemberJanuary