Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for Weekly Vulnerability ...

 Cybersecurity News

Cyble Research & Intelligence Labs (CRIL) researchers investigated 22 security vulnerabilities this week, plus industrial control system (ICS) vulnerabilities and dark web exploits, to help us arrive at our list of six vulnerabilities that security teams need to prioritize. Those vulnerabilities include   show more ...

exploitable flaws in ServiceNow, Acronis, VMware, Microsoft Outlook, Progress Telerik and Docker Engine. Each week, The Cyber Express partners with Cyble’s highly skilled dark web and threat intelligence researchers to highlight the vulnerabilities that are at higher risk of exploit and attack and should be prioritized for fixes by security teams. The Week’s Top Vulnerabilities These are the six high-severity and critical vulnerabilities that Cyble researchers have highlighted this week. CVE-2024-37085: VMware ESXi Impact Analysis: This high-severity authentication bypass vulnerability impacts VMware ESXi, an enterprise-class, type-1 hypervisor, and is under active attack by ransomware groups. A malicious actor with sufficient Active Directory (AD) permissions can gain full access to an ESXi host that was previously configured to use AD for user management. The attacker can also add new users to the 'ESX Admins' group and leverage admin permissions to steal sensitive data from VMs, move laterally through victims' networks, and then encrypt the ESXi hypervisor's file system, causing outages and disrupting business operations. Internet Exposure? Yes Patch Available? Yes CVE-2017-11774: Microsoft Outlook Impact Analysis: This high-severity vulnerability impacts Microsoft Outlook 2010 SP2, Outlook 2013 SP1 and RT SP1, and Outlook 2016, and allows an attacker to execute arbitrary commands due to how Microsoft Office handles objects in memory. Recently, researchers released a new red team post-exploitation framework named "Specula," with which Microsoft Outlook can be turned into a C2 beacon to remotely execute code. The framework works by creating a custom Outlook Home Page using WebView by exploiting CVE-2017-11774. Since outlook.exe is a trusted process, it makes it easier for attackers to evade existing software as commands are executed. Cyble researchers concluded that because of the new research, “we believe that we may observe attackers using the tool for malicious purposes in the future.” Internet Exposure? No Patch Available? Yes CVE-2024-4879: ServiceNow Impact Analysis: This critical severity input validation vulnerability affects the ServiceNow cloud-based enterprise workflow management platform. The vulnerability allows unauthenticated attackers to perform remote code execution on multiple versions of the Now Platform and leads to date breach attacks. Internet Exposure? Yes Patch Available? Yes CVE-2024-6327: Progress Telerik Report Server Impact Analysis: This critical insecure deserialization vulnerability impacts Progress Telerik Report Server, a server-based reporting platform. Attackers can exploit the vulnerability to compromise vulnerable devices, leading to remote code execution and later data exfiltration attacks. It’s the second time in recent months that Progress Telerik has been hit by major vulnerabilities. Internet Exposure? Yes Patch Available? Yes CVE-2024-41110: Docker Engine Impact Analysis: This 10/10 critical vulnerability impacts certain versions of Docker Engine, an open-source client-server technology. Attackers can leverage the vulnerability to bypass authorization plugins (AuthZ) under certain circumstances, which could lead to unauthorized actions, including privilege escalation. Internet Exposure? No Patch Available? Yes CVE-2023-45249: Acronis Cyber Infrastructure Impact Analysis: This critical remote command execution vulnerability impacts Acronis Cyber Infrastructure (ACI), a multi-tenant, hyper-converged infrastructure solution designed for cyber protection. The vulnerability allows attackers to bypass authentication on vulnerable servers using default credentials. Recently, CISA added the vulnerability to its Known Exploited Vulnerabilities Catalog, implying that attackers are actively exploiting the flaw to target organizations. Internet Exposure? Yes Patch Available? Yes Dark Web Exploits, ICS Vulnerabilities, and More The full Cyble report for subscribers also looks at 11 vulnerability exploits discussed on the dark web, three industrial control system (ICS) vulnerabilities, and the vulnerabilities with the highest number of web asset exposures, some numbering in the hundreds of thousands. The vulnerability report is just one of hundreds produced by Cyble researchers each week, in addition to client-specific customizable reporting and alerts. Cyble’s weekly sensor report, for example, this week looked at roughly 20 vulnerability exploits and malware, ransomware and phishing attacks observed in Cyble's scanning activities, along with indicators of compromise (IoCs).

image for White House Confirms ...

 Firewall Daily

A historic prisoner swap with Russia was completed on Thursday in Turkey that secured the release of sixteen high-profile individuals, including Wall Street Journal reporter Evan Gershkovich, Marine veteran Paul Whelan, and Russian-American journalist Alsu Kurmasheva. But the deal has reportedly come at the cost of   show more ...

exchanging alleged hackers, spies, and assassins. "Today, three American citizens and one American green-card holder who were unjustly imprisoned in Russia are finally coming home: Paul Whelan, Evan Gershkovich, Alsu Kurmasheva, and Vladimir Kara-Murza," U.S. President Joe Biden said in a press statement. "The deal that secured their freedom was a feat of diplomacy. All told, we’ve negotiated the release of 16 people from Russia—including five Germans and seven Russian citizens who were political prisoners in their own country," Biden added. While neither Moscow nor Washington has officially confirmed the prisoner swap, the involvement of Germany, Poland, Slovenia, Norway, Belarus and Turkey has added to the speculation. Flight tracking data and anonymous sources within both governments had earlier in the day fueled rumors of the impending swap. Hackers and Spies Part of the Prisoner Swap In exchange for the 16 "unjustly" detained individuals, Russia had reportedly asked for the repatriation of individuals accused of cybercrimes. Central to the Russia-U.S. prisoner swap are four Russian nationals: Alexander Vinnik, Vladislav Klyushin, Roman Seleznev, and Vladimir Dunaev. These individuals, convicted on various cybercrime charges, have seen their names mysteriously disappear from the U.S. Bureau of Prisons database, a likely indicator of the prisoner exchange. Vinnik, linked to the cryptocurrency exchange BTC-е, pleaded guilty to money laundering. Klyushin, a businessman, was sentenced for his role in a $93 million stock market manipulation scheme involving stolen corporate data. Seleznev, known as one of the world's most prolific cybercriminals, was convicted for credit card fraud that caused over $169 million in losses. Dunaev, a key figure in the Trickbot malware operation, was sentenced for cyberattacks targeting U.S. infrastructure. The potential hacker exchange has sparked intense debate about the implications for cybersecurity and international relations. As the world watches with bated breath, the outcome of the Russia-U.S. prisoner swap will undoubtedly shape the global landscape for years to come. This is a developing story and more details will be added as they become available.

image for Medusa Ransomware Gr ...

 Cybersecurity News

Researchers uncovered a critical operational security (OPSEC) failure by the Medusa Ransomware Group, allowing them to access the group's cloud storage, revealing a trove of exfiltrated data from various victims. The incident came to light during a ransomware response operation. Investigators found that Medusa had   show more ...

used Rclone, a popular data transfer tool, to move stolen information to their cloud account. Unlike many ransomware groups that prefer mega.nz or mega.io, Medusa opted for put.io as their storage platform. Medusa Ransomware OPSEC Failure The MEDUSA ransomware group had first come to the attention of security researchers in June 2021 after targeting several countries across different industries, including healthcare, education, manufacturing, and retail. [caption id="attachment_84884" align="alignnone" width="975"] Exposed Rclone locations used by Medusa Ransomware (Source: darkatlas.io)[/caption] The threat actors' mistake was leaving behind a configuration file after dropping rclone.exe in the C:WindowsAppCompat directory. This file contained the put.io token, which typically requires additional credentials for full access. Rclone which provides support for the integration with over 70 cloud providers, seeing increased usage among ransomware groups. However, the Dark Atlas Squad discovered they could authenticate using only this token. By employing Burp Suite to replace their own token with Medusa's, they gained complete access to the group's cloud repositories. This breach revealed the email address associated with Medusa's account: pussinputs@onionmail.org. More importantly, it exposed data stolen from numerous victims, including the Kansas City Area Transportation Authority. Recovery and Prevention Acting swiftly, the team developed a Python script to automate the recovery of stolen data. They created zip files and downloaded them, racing against time to complete the task before Medusa could detect the intrusion. The researchers then began deleting sensitive files belonging to victims and reached out to as many affected parties as possible to assist with recovery. To help prevent future incidents, the security research team created a Sigma rule designed to detect DNS queries related to put.io within networks. This rule, while potentially generating false positives from legitimate put.io usage, serves as a valuable tool for identifying suspicious activity. As ransomware groups continue to evolve their tactics, this incident potential for turning attackers' mistakes into opportunities for defense and recovery. Earlier in June 2024, the ransomware group demanded bounties of US $120,000 from Fitzgerald, DePietro & Wojnas CPAs, P.C and $100,000 from Tri-City College Prep High School to prevent publicizing stolen data from these institutions. Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.

image for American States Move ...

 Cybersecurity News

As cyberattacks on healthcare organizations surge, several state-level lawmakers are pushing back against what they see as excessive class-action lawsuits over data breaches in the United States. Several states have moved to reduce liability for healthcare providers that adopt new security protocols. Tennessee is the   show more ...

latest state to join the growing list of those that have taken moves to reduce liability for healthcare amidst the on-going debate on balancing adequate cybersecurity measures with patient protections. Growing Factor in United States Healthcare The push to limit liability comes amid a surge in data breaches, with more than 144 million people in the U.S. having their health data compromised in 2023 alone. This number is nearly triple the total from 2022, and it highlights the growing threat that hackers pose to the healthcare sector. Healthcare organizations have become a prime target for cyberattacks, with hackers seeking to exploit sensitive patient information for financial gain. Lawmakers argue that healthcare providers cannot reasonably be held responsible for every attack, and that the current system of class-action lawsuits is unfair. "What happens is they get hacked and then by law they have to report there is a breach, and then you have these class-action suits pop up," said Florida state Rep. Mike Giallombardo, a Republican who helped pass a bill to limit liability expressed, "The victim is being sued for tens of millions of dollars for so-called negligence when the fact is they weren’t negligent. Nobody’s immune from this." Critics Argue that Healthcare Firms Are Not Doing Enough However, critics argue that healthcare firms are not doing enough to safeguard patient information, and that the new laws will only serve to minimize payouts rather than incentivize cybersecurity. "These companies make millions and millions of dollars, and they just profit," said Thomas Loeser, a partner at Cotchett Pitre & McCarthy, which represents consumers in class-action suits. "They don’t spend the money to protect the information they collect from consumers because nobody has made them do it." Patient advocates worry the laws prioritize minimizing payouts over improving security. But lawmakers say healthcare providers are unfairly targeted by lawsuits when breaches occur despite reasonable precautions. Looking Ahead Proponents say liability limits will allow healthcare organizations to invest in cybersecurity rather than legal defense. But critics argue the laws remove incentives for protecting patient data. The trend toward limiting liability is likely to continue as more states consider similar legislation. But the approach remains controversial, with patient advocates and cybersecurity experts divided on its potential impacts. Some argue stronger federal standards are needed to ensure consistent protections nationwide. Others say state-level innovation allows for tailored approaches. As the healthcare sector faces mounting cyber threats, the liability debate is poised to intensify. Lawmakers must weigh complex tradeoffs between security incentives, accountability and patient rights.  

image for Mining Giant Fresnil ...

 Cybersecurity News

Fresnillo plc, the world’s largest primary silver producer and Mexico’s leading gold producer has reported a cybersecurity incident resulting in unauthorized access to certain IT systems and data. The company immediately initiated response measures on knowing the Fresnillo cybersecurity incident in line with its   show more ...

established protocols. "Fresnillo plc (the "Company") announces that it has been the subject of a cyber security incident which has resulted in unauthorized access to certain IT systems and data," reads the official notice. The company which is listed on the London and Mexican Stock Exchanges under the symbol FRES operates eight mines in Mexico: Fresnillo, Saucito, Juanicipio, Ciénega, Herradura, Soledad-Dipolos, Noche Buena, and San Julián (Veins and Disseminated Ore Body). Additionally, the company is advancing four exploration projects—Orisyvo, Rodeo, Guanajuato, and Tajitos—and has numerous other long-term exploration prospects. The company is a significant player in the precious metals industry, and its swift response to the cyber incident underscores its commitment to maintaining operational integrity and security. Fresnillo Cybersecurity Incident Upon discovering the breach, Fresnillo’s IT experts, in collaboration with external cybersecurity specialists, launched a thorough investigation to determine the extent and impact of the unauthorized access. These efforts are ongoing as the company aims to fully understand and mitigate Fresnillo data breach. Despite the Fresnillo cybersecurity incident, Fresnillo has reported that all business units continue to operate normally. There has been no material operational or financial impact observed, nor is any anticipated at this time. The situation will be continuously monitored to ensure any potential risks are promptly addressed. "All business units continue their activities and no material operational or financial impact has been experienced or is foreseen. This will be assessed on an ongoing basis until the situation is resolved," reads the notice. Fresnillo plc has reiterated its dedication to cybersecurity, emphasizing that it takes such incidents very seriously. The company is committed to a comprehensive investigation and will implement all necessary measures to prevent future breaches. Fresnillo plc has assured stakeholders that it will provide further updates as more information becomes available. The company’s proactive communication reflects its transparency and responsibility in handling the situation. Fresnillo plc takes the issue of cyber security extremely seriously and will continue to fully investigate this incident and take all appropriate measures," informed the company. Industry Implications As the world's leading primary silver producer and a significant player in gold production, Fresnillo plc's cybersecurity incident highlights the growing threat of cyberattacks in the mining sector. The industry, which relies heavily on technology and data management systems, is increasingly becoming a target for cyber criminals. This Fresnillo cyberattack highlights the importance of enhanced cybersecurity measures and proactive threat management in protecting critical infrastructure and sensitive information. As the company works diligently to investigate and address the breach, its proactive measures and commitment to cybersecurity will be essential in safeguarding its operations and maintaining its reputation as a leading global mining company. Fresnillo plc’s response to this incident will be closely watched by industry peers and investors alike, as it navigates the complexities of cyber threat management and strives to fortify its defenses against future attacks.

image for FBI and CISA Issue U ...

 Cybersecurity News

The Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) have issued a joint announcement to raise awareness about the potential impact of Distributed Denial of Service (DDoS) attacks on election infrastructure as we approach the 2024 US general election. While these   show more ...

low-level DDoS attacks could disrupt public access to election-related information, they will not compromise the security or integrity of the voting process. DDoS attacks are anticipated to target election-related functions such as voter look-up tools or unofficial election night reporting, potentially causing temporary disruptions. However, the FBI and CISA emphasize that these attacks will not affect the actual voting process. Threat actors may use DDoS attacks to create false narratives of election compromise, aiming to undermine public confidence in 2024 US general elections. Historically, DDoS attacks have been a favored tactic of hacktivists and cybercriminals with social, political, or ideological motives. Understanding DDoS Attacks A DDoS attack occurs when malicious actors flood an internet-accessible server with excessive requests, making it slow or entirely inaccessible. This prevents legitimate users from accessing online resources and services, causing disruptions in business activities and public services. In the context of elections, DDoS attacks could impede access to information about polling locations, voter registration, or unofficial results. Importantly, the FBI and CISA have no evidence that DDoS attacks have ever compromised the integrity of voting systems, prevented eligible voters from casting their ballots, or disrupted the tabulation and transmission of election results. Even in the event of such attacks, the underlying data and internal systems remain secure, ensuring that every eligible voter can cast a ballot. Measures to Mitigate Impact Election officials nationwide have implemented multiple safeguards, backup processes, and incident response plans to mitigate the effects of DDoS attacks. These measures ensure minimal disruption to election operations. Alternative communication channels, such as traditional news outlets and direct messaging to voters, are also in place to disseminate crucial election information. To minimize the potential impact of DDoS attacks, the FBI and CISA recommend that voters: Seek information from official sources about voter registration, polling locations, voting by mail, and final election results. Contact state or local election officials if the official website is unavailable. Remember that DDoS attacks cannot impact the security or integrity of election systems. Agency Coordination and Support CISA and the FBI collaborate closely with federal, state, and local election partners to safeguard U.S. voting processes and maintain the resilience of elections. The FBI is responsible for investigating and prosecuting election crimes, foreign influence operations, and malicious cyber activities targeting election infrastructure. CISA supports critical infrastructure owners and operators in ensuring the security and resilience of election systems against physical and cyber threats. The FBI and CISA encourage the public to report any suspicious or criminal activity, such as DDoS attacks, to their local FBI field office, by calling 1-800-CALL-FBI (1-800-225-5324), or online at ic3.gov. DDoS attacks impacting election infrastructure can also be reported to CISA by calling 1-844-Say-CISA (1-844-729-2472) or emailing report@dhs.cisa.gov. Public Service Announcement As part of their ongoing public service announcement series for the 2024 US General election cycle, CISA and the FBI have released “Just So You Know: DDoS Attacks Could Hinder Access to Election Information, Would Not Prevent Voting.” This PSA is part of their commitment to providing the public with information and the election infrastructure community with the support needed to conduct safe and secure elections. [caption id="attachment_84893" align="aligncenter" width="678"] SourceL CISA's X account[/caption] “With Election Day less than 100 days away, it is important to help put into context some of the incidents the American public may see during the election cycle that, while potentially causing some minor disruptions, will not fundamentally impact the security or integrity of the democratic process,” said CISA Senior Advisor Cait Conley. “DDoS attacks are one example of a tactic that we have seen used against election infrastructure in the past and will likely see again in the future, but they will NOT affect the security or integrity of the actual election. They may cause some minor disruptions or prevent the public from receiving timely information. It is important to talk about these potential issues now because nefarious actors, like our foreign adversaries or cybercriminals, could use DDoS incidents to cast doubt on the election systems or processes. An informed public is key to neutralizing the impact of foreign influence operations and disinformation, which is why we put out this advisory on what a DDoS attack could – and couldn’t – do.” “DDoS are low-level attacks that work by overwhelming websites with traffic to render them inaccessible," said FBI Deputy Assistant Director Cynthia Kaiser. “Given the prevalence of false claims about DDoS attacks in prior U.S. and foreign elections, we are warning that DDoS attacks against election-related websites could temporarily disrupt access to some online election functions, like voter look-up tools, but would not prevent voting or compromise the integrity of voting systems. This warning highlights the importance for voters to seek out information about how to vote prior to Election Day and demonstrates the FBI’s and CISA’s continued commitment to sharing information with the public about potential cyber threats.” Conclusion This joint announcement aims to educate the public on DDoS attacks, their potential effects on election infrastructure, and the importance of seeking reliable information from official sources. By staying informed and vigilant, voters can help maintain the integrity and resilience of U.S. elections.

image for Shield Your Bank: A  ...

 Cybersecurity News

In today's digital age, cybersecurity for banking executives has become a paramount concern. The banking sector, with its vast repositories of sensitive data and financial assets, is a prime target for cybercriminals. The importance of attack surface management for banking executives cannot be overstated as it   show more ...

plays a crucial role in safeguarding these institutions from an array of cyber threats. The market for IT security in banking has maintained its rapid growth in 2024. Financial institutions are primary attack targets, and investments in protection continue to scale. The market value reached $38.72 billion in 2021, and projections see a compound growth rate of 22.4% and a value of $195.5 billion by 2029. This significant growth underscores the escalating need for robust cybersecurity measures. A major driver behind these growth figures is the increase in cybercriminal activity. The volume of fraud attacks is on an upward trajectory, with cyber incidents almost tripling the reported accounts since 2013. As banks digitize more services, the frequency and sophistication of cybercrime attempts have surged, highlighting the need for comprehensive attack surface management. Banking executives play a pivotal role in ensuring strong cybersecurity. Their leadership in implementing effective cybersecurity strategies and fostering a security-conscious culture is vital in mitigating risks. By understanding and managing the attack surface, executives can protect their institutions against the evolving threat landscape. In this article, we will delve into the intricacies of comprehensive attack surface management for banking executives. We will explore the importance of cybersecurity in the banking sector, provide an overview of the increasing cyber threats targeting banks, and discuss the critical role of banking executives in ensuring robust cybersecurity. Understanding the Attack Surface To effectively safeguard their institutions, banking executives must understand the concept and importance of comprehensive attack surface management. The global Attack Surface Management (ASM) market was valued at USD 0.9 billion in 2024 and is expected to grow at a compound annual growth rate (CAGR) of 29.3% from 2024 to 2029. By 2029, the ASM market is projected to reach a revenue of USD 3.3 billion, underscoring the increasing recognition of its significance in cybersecurity for banking executives. Comprehensive Attack Surface Management involves a holistic approach to identifying, analyzing, prioritizing, and mitigating cybersecurity risks and potential weaknesses within an organization's attack surface. The core goal of ASM is to enable organizations to comprehend their entire attack surface comprehensively. This entails the ongoing identification and monitoring of potential entry points, allowing organizations to proactively address vulnerabilities and substantially mitigate overall security risks. Key elements of banking attack surface management include: Continuous Monitoring: Regularly scanning and assessing all digital assets to identify vulnerabilities and potential entry points for cyber threats. Remediation: Addressing identified vulnerabilities promptly to minimize risk. Reduction: Implementing measures to minimize the attack surface, thus reducing the number of options available for hackers to breach the network perimeter. Prioritization: Analyzing and prioritizing risks to allocate resources efficiently and tackle the most critical vulnerabilities first. By maintaining a minimal attack surface, banking executives can significantly enhance their institution's cybersecurity posture, ensuring robust protection against the ever-evolving threat landscape. Through attack surface management, banks can better anticipate and defend against cyber threats, safeguarding their assets and maintaining the trust of their customers. Banking Cybersecurity Strategies Formulating and implementing effective banking cybersecurity strategies is crucial for safeguarding financial institutions against the growing threat of cyberattacks. Cybersecurity for banking executives begins with a thorough risk assessment to identify vulnerabilities and potential threats unique to the banking sector. Executives must develop a comprehensive cybersecurity strategy that includes policies, procedures, and technologies designed to protect sensitive data and critical infrastructure. Cybersecurity solutions for banking executives involve leveraging advanced tools and technologies to detect, prevent, and respond to cyber threats. This includes the deployment of intrusion detection systems, firewalls, encryption technologies, and continuous monitoring solutions. By integrating these tools into a cohesive cybersecurity framework, banking executives can ensure robust protection across all digital assets. Implementing effective banking executive cybersecurity measures also requires a focus on employee training and awareness. Cybersecurity is not solely a technological challenge but a human one as well. Executives must foster a culture of security within their organizations, emphasizing the importance of adhering to cybersecurity protocols and staying vigilant against potential threats. In addition to technical solutions and training, banking executives should establish strong incident response plans. These plans should outline clear steps for detecting, containing, and mitigating cyber incidents, ensuring a swift and coordinated response to minimize damage. By formulating effective cybersecurity strategies and implementing comprehensive cybersecurity solutions for banking executives, financial institutions can fortify their defenses against cyber threats, protect their assets, and maintain the trust of their customers. Techniques for Attack Surface Reduction Attack surface reduction for banks is a critical aspect of enhancing cybersecurity and protecting sensitive data. Effective techniques for reducing the attack surface involve identifying and mitigating vulnerabilities, along with implementing best practices that minimize potential entry points for cyber threats. Regular Vulnerability Assessments: Conducting frequent vulnerability scans and penetration tests to identify weak points in the network. For example, a bank might discover outdated software that needs patching. Patch Management: Promptly applying patches and updates to software and systems to fix known vulnerabilities. This prevents cybercriminals from exploiting these weaknesses. Access Controls: Implementing strict access controls to ensure that only authorized personnel can access sensitive data. For instance, multi-factor authentication (MFA) can be used to add an extra layer of security. Best Practices for Reducing the Attack Surface Network Segmentation: Dividing the network into segments to limit the spread of a potential breach. For example, separating customer-facing systems from internal financial systems can reduce risk. Minimizing Exposure: Reducing the number of internet-facing applications and services. Banks should disable unnecessary services and close unused ports to minimize entry points for attackers. Encryption: Encrypting sensitive data both at rest and in transit to protect it from unauthorized access. This ensures that even if data is intercepted, it remains unreadable without the proper decryption key. Cyble, the leading provider of AI-driven cybersecurity solutions, specializes in securing digital assets through extensive attack surface management, actively protecting against threats to web and mobile apps, cloud devices, domains, email servers, IoT devices, and public code repositories. The optimal frequency of attack surface management (ASM) assessments depends on various factors such as the organization's size, the complexity of its attack surface, and the associated risk level. However, best practices suggest that ASM should occur continuously rather than intermittently. This continuous approach allows for real-time detection and mitigation of vulnerabilities, ensuring that the attack surface remains minimal and secure. Comprehensive Cybersecurity Solutions for Banking Executives For banking executives, implementing comprehensive cybersecurity solutions is crucial for protecting sensitive financial data and ensuring robust defenses against cyber threats. To achieve this, executives must focus on evaluating and implementing effective cybersecurity solutions, establishing vendor partnerships, and maintaining continuous monitoring and improvement. Evaluating and Implementing Cybersecurity Solutions: Criteria for Selecting Effective Solutions: When choosing cybersecurity solutions, consider factors such as scalability, integration capabilities, and the solution’s ability to address specific vulnerabilities within the banking environment. Look for solutions that offer real-time threat detection, automated response capabilities, and comprehensive reporting features. For example, Cyble's platform continuously monitors these assets, identifying vulnerabilities and providing actionable insights to mitigate risks. This proactive approach ensures the safety and integrity of an organization’s online presence, thereby reducing the attack surface effectively. Vendor Partnerships and Third-Party Solutions: Partnering with reputable vendors and leveraging third-party solutions can provide access to specialized expertise and advanced technologies. Evaluate potential vendors based on their track record, customer reviews, and the effectiveness of their solutions in mitigating relevant risks. For instance, collaborating with a vendor that offers advanced threat intelligence and incident response services can enhance banking attack surface management. Continuous Monitoring and Improvement: Ongoing Assessment and Improvement: Regularly assess and update cybersecurity measures to address new vulnerabilities and threats. This involves continuously monitoring systems, conducting routine security audits, and implementing updates to security protocols. For example, conducting quarterly vulnerability assessments and penetration testing can help identify and address emerging risks. Adapting to Evolving Threats and Technologies: The cybersecurity landscape is constantly evolving, with new threats and technologies emerging regularly. Stay informed about the latest trends and adapt security measures accordingly. This might involve integrating new threat detection tools, updating security policies, or enhancing employee training programs. Cyble provides a strong attack surface management tool that helps banks secure their digital assets by actively monitoring and managing potential entry points across web and mobile apps, cloud devices, domains, email servers, IoT devices, and public code repositories. By leveraging Cyble's platform, banks can achieve effective attack surface reduction for banks and strengthen their banking executive cybersecurity measures. Explore how Cyble can assist in cybersecurity for banking executives and ensure a comprehensive approach to banking attack surface management. Discover more by scheduling a demo today!

image for 5 Essential Steps to ...

 Features

In an increasingly digital world, biometric authentication has emerged as a powerful tool for securing access to sensitive information and systems. Biometrics, which utilize unique physical or behavioral characteristics, offer a convenient and often more secure alternative to traditional passwords. However, as the   show more ...

adoption of biometric technologies grows, so does the threat of biometric hacking.  Biometric data, such as fingerprints, facial recognition patterns, and iris scans, are inherently unique and irreplaceable. If this data is compromised, it can lead to severe privacy breaches, as the affected individuals cannot simply reset their biometric identifiers like they can with passwords.  How to Protect Biometric Data The compromise of biometric data can have severe and long-lasting consequences, as these identifiers cannot be changed or reset like passwords. Defending against biometric hacking is crucial to protect individual privacy, ensure the integrity of security systems, and maintain trust in digital authentication methods. Here are some comprehensive security measures organizations can place to mitigate the chances of biometric hacking.  Encrypt Biometric Data Encryption of biometric data is crucial in protecting sensitive information from unauthorized access and tampering. It should be encrypted both in transit and at rest. Encryption in transit involves securing data as it moves across networks, preventing interception by unauthorized parties. Protocols such as Transport Layer Security (TLS) can be used to encrypt data during transmission. Encryption at rest involves securing data stored on devices or servers, using strong encryption algorithms like Advanced Encryption Standard (AES) to protect it from being accessed by hackers.  Key management is another vital aspect of encryption. The keys used for encrypting and decrypting biometric data must be securely stored and managed to prevent unauthorized access. Utilizing hardware security modules (HSMs) or secure key management services can enhance the security of encryption keys. Additionally, implementing encryption policies and regularly auditing encryption practices can help maintain the integrity and confidentiality of biometric data.   Implement Multi-Factor Authentication (MFA) Multi-factor Authentication (MFA) enhances security by requiring users to provide multiple forms of authentication before accessing a system. This approach reduces the reliance on a single factor and adds additional layers of security, making it more challenging for attackers to gain unauthorized access. MFA usually requires a password only the user knows, a code receivable on a device only the user has, and of course, biometric data.   By requiring two or more of these factors, MFA ensures that even if one factor is compromised, the attacker would still need to overcome the other factors to gain access. For biometric systems, integrating MFA can involve using biometrics in conjunction with traditional passwords or security tokens.   For example, a user might be required to scan their fingerprint and enter a one-time password (OTP) sent to their mobile device. This layered approach significantly enhances security by mitigating the risk of biometric data alone being used for unauthorized access.  Use Anti-Spoofing Technologies Anti-spoofing technologies are essential in preventing attackers from bypassing biometric systems using fake or replicated biometric data. Spoofing attacks involve using artificial representations, such as photographs, videos, or 3D-printed replicas, to fool biometric sensors into granting access. Liveness detection is a key component of anti-spoofing technology. It involves verifying that the biometric data comes from a living individual rather than a static image or a replicated artifact. Techniques for liveness detection include checking for natural movements, such as blinking or facial expressions, measuring blood flow, or detecting temperature differences. For example, in facial recognition systems, liveness detection can involve prompting the user to perform specific actions, such as smiling or turning their head, to confirm their identity. Fingerprint sensors can use ultrasonic technology to detect the presence of blood flow in the finger, ensuring that a live finger is being presented. Additionally, regularly updating and testing anti-spoofing technologies is crucial to keep up with evolving spoofing techniques. Regularly Update and Patch Systems Keeping biometric systems up to date with the latest security patches and updates is critical in defending against biometric hacking. Software and hardware components used in biometric systems can have vulnerabilities that, if left unaddressed, can be exploited by attackers. Regularly updating and patching these systems helps mitigate the risk of such vulnerabilities being exploited.    Organizations should establish a systematic process for identifying and applying security updates. This involves staying informed about the latest security advisories from software and hardware vendors and promptly applying patches to address any known vulnerabilities.   Automated patch management solutions can streamline this process by automatically identifying and deploying relevant updates. It's also essential to prioritize updates based on the severity of the vulnerabilities. Critical security patches that address high-risk vulnerabilities should be applied as soon as possible to minimize the window of exposure. Additionally, organizations should conduct regular security assessments and vulnerability scans to identify potential weaknesses in their biometric systems and address them proactively. Conduct Security Audits and Penetration Testing Regular security audits and penetration testing are essential in identifying and addressing potential vulnerabilities in biometric systems. These practices help organizations understand their security posture, uncover weaknesses, and take corrective actions to strengthen their defences against biometric hacking.   Security auditors assess the system's configuration, access controls, data protection measures, and compliance with relevant security standards and regulations. They also evaluate the effectiveness of encryption, authentication mechanisms, and anti-spoofing technologies. By conducting thorough audits, organizations can identify gaps in their security and implement necessary improvements.  Penetration testing, or ethical hacking, involves simulating real-world attacks on the biometric system to identify vulnerabilities that could be exploited by attackers. Skilled security professionals, known as penetration testers, use various techniques to attempt to breach the system's defences.   Both security audits and penetration testing should be conducted regularly and after significant changes to the biometric system, such as software updates or infrastructure modifications. By continuously assessing and improving their security measures, organizations can stay ahead of emerging threats and ensure the ongoing protection of their biometric data. Defending against biometric hacking is essential in safeguarding sensitive information and maintaining the integrity of digital security systems. The irreversible nature of biometric data makes it even more necessary. By prioritizing the measures listed above, organizations can significantly reduce the risk of biometric data breaches, protect individual privacy, and enhance the overall security of their authentication systems. As biometric technologies advance, the strategies and practices used to defend against potential threats must also evolve. This ensures that the benefits of biometrics are fully realized without compromising security. By doing so, organizations can significantly enhance the protection of individual privacy, secure their biometric systems, and safeguard the sensitive data they manage. 

image for How to guard against ...

 Tips

Evil twins — malicious Wi-Fi hotspots that intercept user data — are back in vogue. While the threat itself is nothing new (weve covered it before), fake Wi-Fi incidents have recently reached new heights — literally. In a particularly interesting case from Australia, a passenger was arrested for setting up evil   show more ...

twins both at the airport and on board the plane during the flight. Theres a good reason these days why passengers are more likely to use in-flight Wi-Fi: airlines are increasingly offering entertainment streamed directly to your devices rather than on the seatback screens. Heres how it works: after takeoff, you enable Wi-Fi on your phone, laptop or tablet, connect to the access point, open your browser, and voilà — youre on the airlines media portal. From there you can choose from a selection of movies, music, games, and more. And sometimes this same portal offers internet access —usually for an additional fee. While streaming entertainment saves airlines money on installing and maintaining seatback screens, it requires more vigilance from passengers — who probably dont expect to be targeted mid-flight. In the case mentioned above, the perpetrator carried on board a laptop and a mobile Wi-Fi hotspot with the same network name as the legitimate airline Wi-Fi. Unsuspecting passengers, connecting to what they thought was the official network simply because its signal was stronger (the weaker, genuine one with the same name generally isnt shown) — were then directed to a fake authentication page. This page requested an email address — and password! — or social network credentials, supposedly to sign in to the airlines online services. According to police, the criminal intended to use this data to hijack accounts and access personal information. The insidiousness of this kind of attack lies in the victims limited options: stuck on board a plane, connected to what they believe is legitimate Wi-Fi, they have just two options: (i) provide the requested information, or (ii) forgo any and all in-flight entertainment — because neither cellular networks nor other Wi-Fi access points are available during the flight. Therefore, the chances of a successful attack are… sky-high. How to use in-flight Wi-Fi safely Our traditional advice about using free Wi-Fi boils down to two simple tips: use 4G/5G cellular access instead of public Wi-Fi hotspots wherever possible, and when thats not an option — protect your connection with a reliable VPN. But these dont… quite fly at cruising altitude: cellular data is out of reach; you have to disable your VPN to connect to the in-flight portal; and even if you pay for in-flight internet access, the VPN is likely to be patchy or not work at all. So, heres some tailored advice for staying safe when using in-flight Wi-Fi: Dont connect to in-flight Wi-Fi just out of curiosity to see whats on offer. Come prepared. Download movies and music to your devices beforehand so as not to rely on the airlines entertainment options. That done, you probably wont need in-flight Wi-Fi at all. If you still do need Wi-Fi, review the instructions in your seat pocket carefully. It should list the official Wi-Fi name and connection process. Be wary of discrepancies. If something about the Wi-Fi connection seems off compared to the instructions, or if youre asked to enter detailed personal information like email, passwords, passport details, or payment information, disconnect immediately and alert a flight attendant. Confirm with them whether this information is actually required to use the Wi-Fi. Show them the device screen so that they can verify the legitimacy of the connection interface. Avoid downloading anything during the flight. Connecting to the planes network should never require installing apps, plugins, or certificates. If asked to install anything of the sort — disconnect immediately by enabling airplane mode. If you connect to Wi-Fi to use the in-flight internet, try enabling your VPN as soon as the connection is established. If the VPN cant be turned on, minimize your online activity, and never log in to sensitive services such as online banking, government websites, or email. Keep the number of devices you connect to the in-flight Wi-Fi to a minimum — preferably no more than one. If you do connect, before landing, make sure to go to the Wi-Fi settings and forget the airline network. You can then put your device in airplane mode, as required by the aviation regulations.

 Identity Theft, Fraud, Scams

A threat actor recently impersonated Google through a fake ad for the Google Authenticator, a popular multi-factor authentication program. This resulted in innocent users unknowingly downloading malware or falling victim to phishing scams.

 Malware and Vulnerabilities

TgRat Trojan, previously targeting Windows, now focuses on Linux, using Telegram to control infected machines. Discovered by Dr. Web, this RAT allows cybercriminals to exfiltrate data and execute commands.

 Breaches and Incidents

Microsoft confirmed that an eight-hour outage on Tuesday affecting its Azure portal, Microsoft 365, and Microsoft Purview services was caused by a DDoS attack. The company mentioned that its response to the outage may have worsened the impact.

 Malware and Vulnerabilities

Apple has released a critical zero-day patch for older Macs running macOS Monterey 12.7.6, addressing an actively exploited vulnerability (CVE-2024-23296). The flaw in Apple’s RTKit real-time OS could allow unauthorized access to kernel memory.

 Trends, Reports, Analysis

A report by Vipre Security Group, based on data from processing 1.8 billion emails, revealed that 49% of blocked spam emails were BEC attacks, with CEOs, HR, and IT being common targets. The study also found that 40% of BEC attacks were AI-generated.

 Innovation and Research

Birgit Hofer and Thomas Hirsch from TU Graz have developed a new approach to speed up software bug fixes. By identifying bottlenecks in fault localization, they created a scalable solution using NLP and metrics to analyze code for faults.

 Trends, Reports, Analysis

Security researchers have uncovered the largest ransomware payment ever recorded, amounting to $75m, which was made to the Dark Angels group. This finding was revealed in Zscaler's ThreatLabz Ransom Report for 2024.

 Feed

Ubuntu Security Notice 6936-1 - It was discovered that Apache Commons Collections allowed serialization support for unsafe classes by default. A remote attacker could possibly use this issue to execute arbitrary code.

 Feed

Ubuntu Security Notice 6941-1 - It was discovered that the Python ipaddress module contained incorrect information about which IP address ranges were considered “private” or “globally reachable”. This could possibly result in applications applying incorrect security policies.

 Feed

Google has announced that it's adding a new layer of protection to its Chrome browser through what's called app-bound encryption to prevent information-stealing malware from grabbing cookies on Windows systems. "On Windows, Chrome uses the Data Protection API (DPAPI) which protects the data at rest from other users on the system or cold boot attacks," Will Harris from the Chrome security team

 Feed

Facebook users are the target of a scam e-commerce network that uses hundreds of fake websites to steal personal and financial data using brand impersonation and malvertising tricks. Recorded Future's Payment Fraud Intelligence team, which detected the campaign on April 17, 2024, has given it the name ERIAKOS owing to the use of the same content delivery network (CDN) oss.eriakos[.]com. "These

 Feed

Cybersecurity researchers have uncovered a new Android remote access trojan (RAT) called BingoMod that not only performs fraudulent money transfers from the compromised devices but also wipes them in an attempt to erase traces of the malware. Italian cybersecurity firm Cleafy, which discovered the RAT towards the end of May 2024, said the malware is under active development. It attributed the

 Feed

How to detect and prevent attackers from using these various techniques Obfuscation is an important technique for protecting software that also carries risks, especially when used by malware authors. In this article, we examine obfuscation, its effects, and responses to it. What Is Obfuscation? Obfuscation is the technique of intentionally making information difficult to read, especially in

 Feed

Over a million domains are susceptible to takeover by malicious actors by means of what has been called a Sitting Ducks attack. The powerful attack vector, which exploits weaknesses in the domain name system (DNS), is being exploited by over a dozen Russian-nexus cybercriminal actors to stealthily hijack domains, a joint analysis published by Infoblox and Eclypsium has revealed. "In a Sitting

 Feed

In yet another sign that threat actors are always looking out for new ways to trick users into downloading malware, it has come to light that the question-and-answer (Q&A) platform known as Stack Exchange has been abused to direct unsuspecting developers to bogus Python packages capable of draining their cryptocurrency wallets. "Upon installation, this code would execute automatically,

2024-08
Aggregator history
Thursday, August 01
THU
FRI
SAT
SUN
MON
TUE
WED
AugustSeptemberOctober