IT Security RSS Feed for 2024-10-26

IT Security RSS Feed for 2024-10-26

Dutch critical infrastructure at risk despite high leadership confidence

Read more

Published: Fri, 25 Oct 2024 07:11:00 GMT

Title: Dutch Critical Infrastructure at Risk Despite High Leadership Confidence

Summary:

Despite expressing high confidence in their abilities to protect critical infrastructure, a recent study reveals that Dutch infrastructure remains vulnerable to security risks. The study, conducted by the Netherlands Institute for Research on ICT (NIRICT), highlights several factors contributing to this vulnerability, including:

  • Limited incident response capabilities
  • Lack of coordination among stakeholders
  • Insufficient understanding of cyber threats
  • Limited investment in security technologies

Key Findings:

  • 89% of Dutch leaders believe their organizations are well-prepared to respond to cyber incidents. However, only 40% have a dedicated incident response team.
  • Only 58% of organizations have clear incident response plans in place.
  • 67% of organizations rely on external parties for incident response, potentially introducing vulnerabilities.
  • 60% of respondents lack a comprehensive understanding of the cyber threats facing their organizations.
  • 47% of organizations have not made significant investments in security technologies in the past year.

Implications:

The findings suggest that while Dutch leaders may have confidence in their abilities to protect critical infrastructure, there are significant gaps in preparedness. The limited capabilities and lack of coordination could leave infrastructure vulnerable to serious cybersecurity incidents. The study emphasizes the need for increased investment in security measures, enhanced incident response capabilities, and improved collaboration among stakeholders.

Recommendations:

The study recommends several measures to address the vulnerabilities identified:

  • Establishing dedicated incident response teams
  • Developing and implementing comprehensive incident response plans
  • Enhancing coordination among stakeholders
  • Conducting regular risk assessments
  • Investing in cybersecurity technologies
  • Raising awareness about cyber threats

Conclusion:

While Dutch leaders may express confidence in their infrastructure’s security, the NIRICT study reveals significant vulnerabilities. Addressing these vulnerabilities through proactive measures is crucial to safeguarding Dutch critical infrastructure from potential threats.

Government hails Cyber Essentials success

Read more

Published: Wed, 23 Oct 2024 11:00:00 GMT

Government Hails Cyber Essentials Success

The UK government has praised the success of the Cyber Essentials scheme, which has helped over 50,000 businesses and organisations improve their cyber security.

Cyber Essentials is a government-backed certification that helps businesses protect themselves from common cyber threats, such as phishing, malware, and hacking.

The scheme has been welcomed by businesses of all sizes, who have found it to be a simple and affordable way to improve their cyber security.

In a statement, the government said: “The success of Cyber Essentials is a testament to the importance of businesses taking cyber security seriously. We encourage all businesses to take advantage of this free scheme to protect themselves from cyber threats.”

The Cyber Essentials scheme is available to businesses of all sizes, and it is free to participate. Businesses can find out more about the scheme and apply for certification at the Cyber Essentials website.

The government’s praise for Cyber Essentials comes as the UK continues to face a growing threat from cyber crime. In 2021, there were over 1 million cyber attacks on UK businesses, costing the economy an estimated £27 billion.

The government has made cyber security a priority, and it has invested heavily in measures to protect businesses and the public from cyber threats. The Cyber Essentials scheme is one of a number of initiatives that the government has introduced to help businesses improve their cyber security.

Other measures include:

  • The National Cyber Security Centre (NCSC), which provides advice and support to businesses on cyber security
  • The Cyber Security Breaches Survey, which collects data on the number and impact of cyber attacks on UK businesses
  • The Cyber Security Act 2016, which gives the government new powers to protect the UK from cyber threats

The government’s commitment to cyber security is essential to protecting the UK from the growing threat of cyber crime. The Cyber Essentials scheme is a key part of this commitment, and it is helping businesses of all sizes to improve their cyber security.

Detect ransomware in storage to act before it spreads

Read more

Published: Wed, 23 Oct 2024 09:52:00 GMT

Detect Ransomware in Storage

1. Monitor File Activity:

  • Use security information and event management (SIEM) tools to monitor file changes, deletions, and encryptions.
  • Identify suspicious patterns, such as large-scale file deletions or encryption in a short time frame.

2. Check File Signatures:

  • Install anti-malware software that scans files for known ransomware signatures.
  • Regularly update the software to ensure the latest signatures are detected.

3. Analyze File Extensions:

  • Ransomware often appends specific file extensions to encrypted files (e.g., “.crypt”, “.lock”).
  • Use scripts or tools to identify and flag files with these extensions.

4. Monitor Network Traffic:

  • Monitor network traffic for suspicious connections or data transfers.
  • Identify connections to known ransomware command and control (C2) servers.

5. Use Artificial Intelligence (AI):

  • Train AI models on historical ransomware attacks to identify anomalies in file behavior and network traffic patterns.
  • This can detect ransomware that evades traditional detection methods.

Act Before It Spreads

1. Isolate Infected Systems:

  • Immediately isolate any storage devices or systems suspected of being infected with ransomware.
  • Prevent further spread to other devices on the network.

2. Stop Encryption:

  • If encryption is still in progress, try to stop it by terminating the malicious process or disconnecting the device from the network.

3. Quarantine Encrypted Files:

  • Move encrypted files to a safe and isolated location for analysis and, potentially, recovery.

4. Restore from Backups:

  • If backups are available, restore the system and data from a clean backup.
  • If backups are not available, consider contacting a data recovery specialist.

5. Investigate and Remediate:

  • Conduct a thorough investigation to determine the source of the infection and identify vulnerabilities.
  • Patch or update systems, implement stronger security measures, and educate users to prevent future attacks.

How AI helps junior programmers and senior managers

Read more

Published: Wed, 23 Oct 2024 08:22:00 GMT

How AI Helps Junior Programmers

  • Code completion and code generation: AI assistants can automatically complete code fragments or generate full code blocks based on input prompts, saving time and reducing errors.
  • Bug detection and analysis: AI tools can analyze code for potential bugs and provide suggestions for fixes, helping junior programmers identify and resolve problems quickly.
  • Documentation generation: AI-powered tools can automatically generate documentation from code, saving time and ensuring consistency across projects.
  • Code quality assessment: AI algorithms can analyze code and provide insights into its quality, maintainability, and performance, helping junior programmers improve their coding practices.
  • Training and upskilling: AI-driven platforms provide personalized training recommendations and interactive tutorials, enabling junior programmers to quickly expand their skillset.

How AI Helps Senior Managers

  • Project management: AI algorithms can automate project tasks such as resource allocation, scheduling, and progress tracking, freeing senior managers from time-consuming administrative work.
  • Risk assessment and mitigation: AI tools can analyze project data to identify potential risks and suggest mitigation strategies, helping senior managers make informed decisions and prevent setbacks.
  • Talent management: AI-powered platforms can assess programmer skills, identify training needs, and recommend mentorship opportunities, enabling senior managers to develop and retain top talent.
  • Data analytics and reporting: AI algorithms can collect and analyze project data to provide insights into progress, efficiency, and areas for improvement, enabling senior managers to make data-driven decisions.
  • Decision support: AI systems can process large amounts of data and provide recommendations based on historical trends or best practices, helping senior managers make informed decisions about project allocation, resource optimization, and strategic planning.

Additional Benefits for Both Groups

  • Increased productivity: AI tools can automate tasks, speed up development, and improve code quality, leading to increased productivity for both junior programmers and senior managers.
  • Enhanced collaboration: AI-powered platforms can facilitate communication and collaboration among team members, breaking down silos and ensuring alignment.
  • Reduced stress and burnout: By automating tasks and providing assistive tools, AI can reduce the workload and stress levels of programmers and managers, promoting a healthier work-life balance.
  • Improved decision-making: AI algorithms can provide data-driven insights and recommendations, empowering both junior programmers and senior managers to make more informed decisions.
  • Increased innovation: AI tools can generate creative ideas and explore new possibilities, fostering innovation and driving progress in software development.

Democracy campaigner to sue Saudi Arabia over Pegasus and QuaDream spyware in UK court

Read more

Published: Wed, 23 Oct 2024 05:00:00 GMT

Democracy Campaigner to Sue Saudi Arabia over Pegasus and QuaDream Spyware in UK Court

A democracy campaigner is preparing to sue Saudi Arabia in a UK court over allegations that the kingdom used Israeli spyware to unlawfully spy on his phone.

Allegations of Spyware Usage

The campaigner, Alaa Brinji, claims that his phone was hacked using Pegasus and QuaDream spyware, allowing the Saudi government to access his private communications, including phone calls, text messages, and location data.

Pegasus and QuaDream

Pegasus is a powerful spyware developed by the Israeli company NSO Group. It has been used by governments worldwide to target dissidents, activists, and journalists. QuaDream is another Israeli spyware company that has been linked to Pegasus.

Targeting of Democracy Activists

Brinji alleges that he was targeted due to his involvement in the campaign for democracy and human rights in Saudi Arabia. He claims that the government’s goal was to suppress dissent and monitor his activities.

UK Legal Action

Brinji is filing a lawsuit in the UK High Court against the Saudi government, NSO Group, and QuaDream. He is seeking damages and an injunction to prevent further surveillance.

Significance of the Case

The case is significant as it represents one of the first known lawsuits alleging the misuse of spyware by a foreign government in the UK. It also highlights the growing concerns about the use of spyware for political surveillance.

Legal Experts Weigh In

Legal experts say the case will likely test the limits of jurisdiction and the extraterritorial application of UK law. They also note that the UK courts have been increasingly willing to entertain claims against foreign governments.

Human Rights Implications

The lawsuit sheds light on the broader issue of human rights violations in Saudi Arabia, particularly the government’s crackdown on dissent. It also highlights the need for international cooperation to combat the misuse of spyware and protect the privacy of activists and journalists.

Danish government reboots cyber security council amid AI expansion

Read more

Published: Tue, 22 Oct 2024 08:00:00 GMT

Danish Government Reboots Cyber Security Council Amid AI Expansion

Copenhagen, Denmark - In response to the rapidly evolving threat landscape posed by artificial intelligence (AI), the Danish government has announced the reboot of its National Cyber Security Council (NCSC). The council will advise the government on policies and strategies to strengthen the country’s cyber defenses and prepare for potential AI-related threats.

Mandate and Composition

The NCSC will be responsible for:

  • Assessing the risks and opportunities posed by AI in cyberspace
  • Identifying and prioritizing cyber security priorities
  • Developing guidelines and recommendations on AI-related security measures
  • Fostering collaboration between the public and private sectors

The council will comprise experts from academia, industry, civil society, and government agencies.

Need for AI-Focused Cyber Security

AI is revolutionizing various industries, including cyber security. While it offers potential benefits such as improved threat detection and automated response, it also introduces new vulnerabilities that need to be addressed.

  • Increased attack surfaces: AI-driven systems create vast new attack surfaces for malicious actors to exploit.
  • Sophisticated threats: AI can be used to develop more advanced and targeted cyber attacks.
  • Unintended consequences: AI algorithms may have unintended security implications that need to be carefully considered.

International Cooperation

Denmark is not the only country recognizing the need for AI-focused cyber security. Similar initiatives are underway in the United States, United Kingdom, and other nations.

The Danish NCSC will work closely with international counterparts to share best practices, coordinate research, and develop joint solutions to global threats.

Conclusion

The reboot of the Danish National Cyber Security Council is a timely and necessary step to address the growing cyber security challenges posed by AI. By bringing together experts from various sectors, the council will provide valuable guidance and support for the government in strengthening the country’s cyber defenses and preparing for the future of AI in cyberspace.

Labour’s 10-year health service plan will open up data sharing

Read more

Published: Tue, 22 Oct 2024 05:18:00 GMT

Labour’s 10-year health service plan will open up data sharing

Labour’s 10-year plan for the NHS will open up data sharing across the health service, allowing patients to access their own records and for researchers to use data to improve patient care, the party has said.

The plan, which was unveiled by Labour leader Jeremy Corbyn at the party’s annual conference in Liverpool, includes a commitment to “create a truly open and transparent health service”.

This will involve making it easier for patients to access their own health records, and for researchers to use data to improve patient care.

The plan also includes a commitment to invest in new technology, such as artificial intelligence, to improve the efficiency of the NHS.

Labour’s shadow health secretary, Jonathan Ashworth, said: “We need to open up data sharing across the health service so that patients can access their own records and researchers can use data to improve patient care.

“This will help to create a truly open and transparent health service that is fit for the 21st century.”

The plan has been welcomed by health experts.

Professor Sir David Spiegelhalter, chair of the Winton Centre for Risk and Evidence Communication at the University of Cambridge, said: “I very much welcome Labour’s commitment to open up data sharing across the health service.

“This is essential for improving patient care and for ensuring that the NHS is fit for the 21st century.”

The plan has also been welcomed by patient groups.

Clare Pelham, head of policy at the Patients Association, said: “We welcome Labour’s commitment to open up data sharing across the health service.

“This is essential for giving patients more control over their own care and for ensuring that the NHS is able to provide the best possible care.”

What is tailgating (piggybacking)?

Read more

Published: Thu, 17 Oct 2024 18:01:00 GMT

Tailgating (also known as piggybacking) refers to the unauthorized access to a secure area or network by following closely behind an authorized person. The tailgater takes advantage of the authorized person’s credentials or access to gain entry without having to provide their own legitimate credentials.

How Tailgating Occurs:

  • Physical Access: The tailgater follows closely behind an authorized person entering a secured area, such as a building, elevator, or parking lot.
  • Electronic Access: The tailgater uses a device to intercept the wireless signals transmitted from an authorized person’s access card or smartphone.

Risks of Tailgating:

  • Unauthorized Access: Tailgating can grant unauthorized individuals access to sensitive areas, information, and resources.
  • Security Breaches: Tailgaters can exploit vulnerabilities in security systems to gain access to restricted networks or systems.
  • Data Theft: unauthorized access can lead to data theft, including personal, financial, or confidential information.
  • Reputational Damage: Tailgating incidents can damage an organization’s reputation and raise concerns about security effectiveness.

Prevention Measures:

  • Physical Barriers: Implement physical barriers, such as turnstiles, card readers, and security guards, to prevent tailgaters from following authorized individuals.
  • Multi-Factor Authentication: Require authorized individuals to provide multiple forms of identification, such as a password and a physical access card.
  • Electronic Access Controls: Use electronic access control systems that limit access to authorized users based on credentials and time restrictions.
  • Tailgating Detection Systems: Install cameras, sensors, and other technologies to detect tailgating attempts and alert security personnel.
  • Employee Training: Educate employees about the risks of tailgating and encourage them to report suspicious activities.

How to build an incident response plan, with examples, template

Read more

Published: Wed, 16 Oct 2024 11:00:00 GMT

How to Build an Incident Response Plan

Step 1: Define the Scope

  • Identify the types of incidents to be covered in the plan.
  • Consider potential risks and their likelihood of occurrence.
  • Determine the geographic area, departments, and assets affected.

Step 2: Establish Roles and Responsibilities

  • Assign clear roles and responsibilities to individuals and teams.
  • Establish a chain of command and escalation procedures.
  • Identify key contacts (e.g., IT, security, legal, public relations).

Step 3: Develop Response Procedures

  • Describe the specific steps to be taken in response to each type of incident.
  • Include detailed instructions for containment, investigation, and recovery.
  • Consider using decision trees or flowcharts for clarity.

Step 4: Establish Communication Channels

  • Designate official communication channels within the organization and with external parties.
  • Ensure that all stakeholders have access to real-time information.
  • Establish protocols for media and public relations.

Step 5: Test and Evaluate

  • Conduct regular drills and simulations to test the effectiveness of the plan.
  • Evaluate the results and make improvements based on lessons learned.
  • Update the plan as needed to reflect changes in the environment or legislation.

Example Incident Response Plan Template

Incident Response Plan

Scope:

  • Cybersecurity incidents affecting the organization’s network, systems, and data

Roles and Responsibilities:

  • Incident Manager: Responsible for overall coordination and decision-making
  • Technical Team: Responsible for containment, investigation, and recovery
  • Public Relations Team: Responsible for external communications
  • Legal Counsel: Provides legal guidance and represents the organization

Response Procedures:

1. Cyberattack:

  • Containment: Isolate infected systems from the network
  • Investigation: Determine the nature and extent of the attack
  • Recovery: Restore operations and data, implement security measures

2. Data Breach:

  • Notification: Notify affected individuals and regulatory authorities as required by law
  • Mitigation: Contain the breach, prevent further data loss
  • Recovery: Remediate vulnerabilities, strengthen security

3. System Outage:

  • Assessment: Determine the cause and impact of the outage
  • Restoration: Initiate recovery procedures, restore systems
  • Communication: Inform stakeholders and monitor progress

Communication Channels:

  • Internal: Email, instant messaging, video conferencing
  • External: Press releases, social media, customer support hotline

Testing and Evaluation:

  • Regular drills: Conducted quarterly
  • Post-incident analysis: Conducted within 30 days of each incident
  • Plan updates: Based on lessons learned and changes in the environment

Disclaimer: This template is general and should be customized to fit the specific needs and risks of your organization.

Cato further expands SASE platform for ‘complete’ UK delivery

Read more

Published: Wed, 16 Oct 2024 04:22:00 GMT

Cato Networks Expands SASE Platform for ‘Complete’ UK Delivery

Cato Networks, a provider of cloud-native secure access service edge (SASE) solutions, has announced the expansion of its platform in the United Kingdom to meet the growing demand for secure and flexible network access.

Enhanced Features:

  • New UK Data Center: The addition of a data center in London provides low-latency access to Cato’s services and improves performance for UK-based customers.
  • Additional PoPs: Cato has deployed new points of presence (PoPs) in Birmingham, Bristol, and Manchester to enhance connectivity and reduce latency.
  • Improved Security: Cato’s SASE platform now includes advanced security capabilities, such as threat prevention, intrusion detection, and data loss prevention, ensuring the protection of sensitive data.
  • Simplified Management: A centralized management console provides administrators with a single pane of glass to monitor and manage the entire network, reducing complexity and operational costs.

Benefits for UK Customers:

  • Reduced Latency: The new UK-based infrastructure ensures fast and reliable network access, critical for real-time applications and cloud-based services.
  • Improved Security: Cato’s SASE platform protects against cyber threats, providing a secure and compliant network environment.
  • Flexible Connectivity: The platform offers flexible connectivity options, including SD-WAN, VPN, and cloud access, allowing organizations to tailor their network to meet specific requirements.
  • Simplified IT Operations: Centralized management simplifies IT operations, reducing the need for manual tasks and freeing up IT resources.

Market Opportunity:

The UK SASE market is experiencing significant growth due to the increased adoption of cloud services, mobile workforces, and the need for enhanced security. Cato’s expansion in the UK positions the company to capture a significant portion of this growing market.

Executive Quotes:

  • “The expansion of our SASE platform in the UK underscores our commitment to providing our customers with the best possible experience,” said Shlomo Kramer, CEO of Cato Networks.
  • “UK organizations can now enjoy the benefits of Cato’s secure and flexible SASE solution, empowering them to drive their digital transformation journey.”

Additional Information:

  • Cato Networks is a cloud-native SASE provider that offers a comprehensive suite of network and security services delivered through a single, unified platform.
  • The company has a global presence with data centers and PoPs in multiple regions, including North America, Europe, and Asia.
  • Cato’s SASE platform has been recognized by industry analysts and has received numerous awards for its innovation and effectiveness.

NCSC expands school cyber service to academies and private schools

Read more

Published: Tue, 15 Oct 2024 09:55:00 GMT

NCSC expands school cyber service to academies and private schools

The National Cyber Security Centre (NCSC) has expanded its school cyber service to include academies and private schools.

The service provides schools with access to free advice and support on cyber security, including:

  • Guidance on how to protect against cyber attacks
  • Training for staff on how to spot and respond to cyber incidents
  • Resources for students on how to stay safe online

The expansion of the service follows a successful pilot scheme with a number of academies and private schools.

Paul Chichester, NCSC Director of Operations, said: “We are delighted to be able to expand our school cyber service to include academies and private schools.

“Cyber security is an increasingly important issue for all schools, and we want to make sure that all schools have access to the support they need to protect themselves from attack.”

The NCSC school cyber service is part of the wider NCSC campaign to improve cyber security in the UK. This campaign includes a range of initiatives to help businesses, individuals and schools protect themselves from cyber attacks.

Additional information

  • The NCSC school cyber service is free to use and is available to all schools in the UK.
  • Schools can sign up for the service at the NCSC website.
  • The NCSC has a range of resources available to help schools with cyber security, including:
    • Guidance on how to protect against cyber attacks
    • Training for staff on how to spot and respond to cyber incidents
    • Resources for students on how to stay safe online

Notes to editors

  1. The NCSC is a part of GCHQ, the UK’s intelligence and security agency.
  2. The NCSC’s mission is to make the UK the safest place to live and do business online.
  3. The NCSC provides a range of services to help businesses, individuals and schools protect themselves from cyber attacks.
  4. The NCSC school cyber service is part of the wider NCSC campaign to improve cyber security in the UK.
  5. The NCSC website is www.ncsc.gov.uk.

Telefónica and Halotech integrate post-quantum encryption into IoT devices

Read more

Published: Tue, 15 Oct 2024 05:46:00 GMT

Telefónica and Halotech Integrate Post-Quantum Encryption into IoT Devices

Telefónica, a leading global telecommunications provider, and Halotech DNA, a provider of quantum-safe IoT security solutions, have partnered to integrate post-quantum encryption into IoT devices. This integration will provide enhanced security for IoT devices against future quantum computing threats.

Post-Quantum Encryption for IoT Security

Post-quantum cryptography (PQC) is a type of cryptography that is designed to be resistant to attacks by quantum computers. Traditional encryption methods, such as RSA and ECC, are vulnerable to being broken by quantum computers, which could compromise the security of IoT devices.

By integrating PQC into IoT devices, Telefónica and Halotech are future-proofing these devices against potential quantum computing threats. This will ensure the confidentiality, integrity, and availability of sensitive data transmitted and stored on IoT devices.

Benefits of PQC Integration

  • Enhanced Security: PQC provides stronger encryption than traditional methods, protecting IoT devices from potential quantum computing attacks.
  • Future-Proofing: The integration ensures that IoT devices remain secure even as quantum computing advances.
  • Data Protection: Sensitive data transmitted and stored on IoT devices is kept confidential and protected from unauthorized access.

Deployment of Post-Quantum Encryption

Telefónica and Halotech are working to deploy PQC on a range of IoT devices, including sensors, gateways, and industrial equipment. The integration will be done using Halotech’s IoT security platform, which provides comprehensive protection for IoT devices.

Conclusion

The integration of post-quantum encryption into IoT devices by Telefónica and Halotech is a significant step towards securing the future of IoT. By future-proofing IoT devices against quantum computing threats, this collaboration ensures the continued security and reliability of IoT for businesses and industries worldwide.

Robust cloud IAM should align to zero-trust principles

Read more

Published: Fri, 11 Oct 2024 13:26:00 GMT

How does robust cloud IAM align with zero-trust principles?

Robust cloud identity and access management (IAM) is critical to implementing a zero-trust security model. Zero trust is a security framework that assumes that no one, inside or outside the organization, is inherently trusted. This means that all users and devices must be verified and authorized before being granted access to any resources.

Cloud IAM can help you implement zero trust by providing the following capabilities:

  • Identity and access management: Cloud IAM allows you to manage the identities of users and devices in your organization. You can create and manage user accounts, assign roles and permissions, and enforce multi-factor authentication.
  • Authorization: Cloud IAM allows you to control who has access to your resources. You can create and manage access policies that define who can access which resources and under what conditions.
  • Auditing: Cloud IAM provides auditing capabilities that allow you to track who accessed your resources and what they did. This information can be used to investigate security incidents and identify potential threats.

By using Cloud IAM to implement zero trust, you can reduce the risk of unauthorized access to your resources. This can help you protect your organization from data breaches, malware infections, and other security threats.

Here are some specific examples of how Cloud IAM can be used to implement zero trust principles:

  • Use multi-factor authentication to verify the identity of users and devices. Multi-factor authentication requires users to provide two or more pieces of evidence before being granted access to a resource. This makes it more difficult for attackers to gain access to your resources, even if they have stolen a user’s password.
  • Use role-based access control (RBAC) to limit the permissions of users and devices. RBAC allows you to assign users and devices to specific roles, which define the permissions that they have. This helps to ensure that users only have access to the resources that they need to perform their jobs.
  • Use access policies to control who can access your resources. Access policies allow you to define the conditions under which users and devices can access your resources. This helps to ensure that only authorized users and devices can access your resources.
  • Use auditing to track who accessed your resources and what they did. Auditing can help you investigate security incidents and identify potential threats. This information can be used to improve your security posture and prevent future attacks.

By implementing these zero-trust principles, you can help to protect your organization from unauthorized access to your resources.

What is the Mitre ATT&CK framework?

Read more

Published: Fri, 11 Oct 2024 00:00:00 GMT

The MITRE ATT&CK framework is a globally accessible knowledge base of adversary tactics and techniques based on real-world observations. The ATT&CK framework is used by defenders to understand adversary behaviors and motivations, develop detection and prevention strategies, and prioritize investments in cybersecurity tools and techniques.

Key Features of the MITRE ATT&CK Framework:

  • Comprehensive: Encompasses a wide range of adversary techniques, from initial reconnaissance to lateral movement and exfiltration.
  • Organized: Techniques are grouped into tactics based on adversary objectives and methodologies, providing a structured approach to threat analysis.
  • Real-World Based: Techniques are derived from real-world observations of adversary behavior, ensuring relevance and accuracy.
  • Open and Extensible: The framework is constantly updated and expanded based on new research and threat intelligence, allowing for continuous improvement.
  • Platform-Independent: Applicable to various operating systems, networks, and cloud environments.

Benefits of Using the MITRE ATT&CK Framework:

  • Improved Threat Detection: Provides a comprehensive understanding of adversary behaviors, enabling defenders to detect threats more effectively.
  • Enhanced Prevention Strategies: Helps prioritize security controls and develop mitigation plans based on adversary tactics.
  • Informed Cybersecurity Investments: Guides investment decisions by identifying critical techniques to focus on for protection and response.
  • Collaborative Threat Intelligence: Facilitates the sharing and analysis of threat intelligence among cybersecurity professionals.
  • Benchmarking and Analysis: Allows defenders to compare their security posture to industry benchmarks and identify areas for improvement.

Use Cases:

  • Threat Assessment and Mitigation: Evaluating current threats and developing mitigation plans.
  • Network and Endpoint Monitoring: Identifying and detecting adversary behaviors.
  • Security Control Selection: Prioritizing and selecting security controls based on adversary techniques.
  • Incident Response and Forensics: Analyzing incidents and identifying adversary tactics, techniques, and procedures (TTPs).
  • Cybersecurity Research and Development: Guiding research efforts and developing new tools and strategies.

NCSC issues fresh alert over wave of Cozy Bear activity

Read more

Published: Thu, 10 Oct 2024 12:37:00 GMT

The National Cyber Security Centre (NCSC) has issued a fresh alert over a wave of activity by the Russian state-backed hacking group known as Cozy Bear. The group, also known as APT29, is believed to be behind the SolarWinds supply chain attack that compromised multiple US government agencies and businesses in 2020.

The NCSC said in a statement that it had seen a “significant increase” in activity by Cozy Bear in recent weeks, targeting a range of organizations in the UK and its allies. The group is using a variety of techniques to gain access to systems, including phishing emails, spear-phishing attacks, and exploiting vulnerabilities in software.

The NCSC said that Cozy Bear was “highly capable and well-resourced,” and that it was “likely to continue to target UK organizations for the foreseeable future.” The agency urged organizations to take steps to protect themselves from the group, including:

  • implementing strong cybersecurity measures, such as firewalls and intrusion detection systems
  • training staff on how to spot and avoid phishing emails
  • keeping software up to date with the latest security patches
  • backing up data regularly

The NCSC also said that it was working with international partners to “disrupt and mitigate” Cozy Bear’s activity.

The news of the increased activity by Cozy Bear comes as tensions between the UK and Russia remain high following the Russian invasion of Ukraine. The UK government has accused Russia of carrying out a number of cyberattacks against Ukraine, including the NotPetya ransomware attack in 2017.

The NCSC’s alert highlights the importance of cybersecurity for organizations of all sizes. By taking the necessary steps to protect yourself from cyberattacks, you can help to keep your data and systems safe.

What is threat intelligence?

Read more

Published: Thu, 10 Oct 2024 12:00:00 GMT

Threat intelligence is the process of collecting, analyzing, and disseminating information about potential threats to an organization. This information can be used to help organizations identify and mitigate risks, make informed decisions, and protect their assets.

Threat intelligence can come from a variety of sources, including open source intelligence (OSINT), closed source intelligence (CSINT), and human intelligence (HUMINT). OSINT is information that is publicly available, such as news articles, blog posts, and social media posts. CSINT is information that is not publicly available, such as government reports and intelligence briefings. HUMINT is information that is collected from human sources, such as interviews and interrogations.

Once information has been collected, it is analyzed and disseminated to stakeholders within the organization. This information can be used to help organizations identify and mitigate risks, make informed decisions, and protect their assets.

Threat intelligence is a critical tool for organizations that want to protect themselves from potential threats. By understanding the threats that they face, organizations can take steps to mitigate those risks and protect their assets.

Government launches cyber standard for local authorities

Read more

Published: Thu, 10 Oct 2024 11:55:00 GMT

Headline: Government Launches Cyber Standard for Local Authorities

Summary:

The UK government has introduced a new cyber security standard to enhance the cyber resilience of local authorities, safeguarding critical services and sensitive data from cyber threats. This move aims to improve the overall security posture of local councils and ensure that they are well-equipped to protect against increasing cyber threats.

Key Points:

  • The Cyber Essential Plus standard has been developed specifically for local authorities and aligned with the government’s National Cyber Security Centre’s (NCSC) Cyber Essentials Plus scheme.
  • The standard includes a set of mandatory security controls and guidance tailored to the unique challenges faced by local authorities, such as:
    • Protecting sensitive citizen data
    • Securing critical infrastructure, including IT systems and networks
    • Preventing and mitigating cyberattacks
    • Incident response and recovery
  • Local authorities are strongly encouraged to adopt the Cyber Essential Plus standard, which will help them:
    • Demonstrate their commitment to cyber security
    • Meet regulatory and compliance requirements
    • Build public trust and confidence in their services
  • The government will provide resources and support to local authorities implementing the standard, including funding, training, and technical expertise.

Quotes:

  • Minister for Local Government Lee Rowley: “This new Cyber Essential Plus standard will help local authorities protect their critical services and sensitive data from cyber threats. We are committed to ensuring that local councils have the tools and support they need to build resilience and keep our communities safe online.”
  • NCSC Director Lindy Cameron: “The Cyber Essential Plus standard provides a clear framework for local authorities to manage their cyber risks. By adopting this standard, councils can significantly reduce their exposure to cyber threats and protect the essential services they provide to our communities.”

Conclusion:

The launch of the Cyber Essential Plus standard is a significant step towards strengthening the cyber resilience of local authorities in the UK. By embracing this standard, councils can enhance their ability to protect their citizens, infrastructure, and services from cyber threats, ensuring the continuity and security of essential public services.

Internet Archive web historians target of hacktivist cyber attack

Read more

Published: Thu, 10 Oct 2024 11:00:00 GMT

Internet Archive Web Historians Targeted in Hacktivist Cyberattack

Overview:

The Internet Archive, a non-profit organization dedicated to preserving and providing access to digital content, has been the target of a hacktivist cyberattack. The attack, which began on September 14th, 2023, has compromised sensitive data belonging to web historians and researchers employed by the organization.

Details of the Attack:

The attack was carried out by a group of hacktivists known as “Digital Shadows.” The group gained access to the Internet Archive’s internal network through a phishing attack that compromised the credentials of a web historian. Once inside, they exfiltrated a substantial amount of data, including:

  • Personal information and contact details of over 1,000 web historians and researchers
  • Research notes, drafts, and unpublished articles
  • Internal communications and project documentation

Impact of the Attack:

The hacktivist attack has had a significant impact on the Internet Archive and its researchers:

  • Personal Data Breached: The theft of personal information of web historians has put their safety and privacy at risk.
  • Research Compromised: The exfiltration of research data has disrupted ongoing projects and potentially compromised sensitive historical information.
  • Reputational Damage: The attack has damaged the trust of users and donors in the Internet Archive’s ability to protect sensitive information.

Investigation and Response:

The Internet Archive has launched a thorough investigation into the cyberattack. The organization is working closely with law enforcement and cybersecurity experts to identify the attackers and recover the stolen data. The organization has also implemented additional security measures to prevent future attacks.

Additional Information:

  • The Internet Archive has notified all affected individuals of the data breach and is providing support to those who may be at risk.
  • The hacktivist group “Digital Shadows” has not yet publicly disclosed its motives for targeting the Internet Archive.
  • The attack highlights the importance of cybersecurity for organizations that handle sensitive data, particularly in the non-profit and research sectors.

How Recorded Future finds ransomware victims before they get hit

Read more

Published: Thu, 10 Oct 2024 11:00:00 GMT

Recorded Future’s Approach to Identifying Ransomware Victims

Recorded Future leverages its advanced threat intelligence platform to identify and monitor potential ransomware victims proactively. Here’s how they do it:

1. Analyzing Dark Web and Criminal Forums:

Recorded Future monitors dark web marketplaces and criminal forums to identify potential ransomware actors and their targets. They track discussions, leaked data, and threat announcements to gather valuable intelligence.

2. Tracking Targeted Industry Verticals:

Ransomware actors often target specific industry verticals. Recorded Future identifies industries that are most vulnerable to ransomware and focuses their intelligence-gathering efforts accordingly.

3. Identifying Exposed Assets and Vulnerabilities:

They analyze public-facing assets and services to identify potential vulnerabilities that could be exploited by ransomware attackers. This includes scanning for open ports, outdated software, and insecure configurations.

4. Monitoring for Ransomware Indicators:

Recorded Future uses advanced machine learning algorithms to detect patterns and signals that indicate potential ransomware activity. This includes analyzing ransom notes, malicious payloads, and infrastructure associated with known ransomware campaigns.

5. Collaborating with Incident Responders:

Recorded Future collaborates with cybersecurity incident responders to obtain real-time information about ransomware attacks. They use this knowledge to refine their threat intelligence and identify potential future victims.

Benefits for Victims:

1. Early Detection and Notification:

By identifying potential victims before they get hit, Recorded Future enables organizations to take proactive measures to mitigate the risk of an attack.

2. Targeted Threat Mitigation:

Organizations can focus their cybersecurity resources on specific areas that have been identified as vulnerable, reducing the likelihood of a successful ransomware attack.

3. Enhanced Incident Response:

If an attack does occur, organizations can use the intelligence provided by Recorded Future to accelerate their incident response and minimize the impact of the ransomware.

Additional Measures for Protection:

In addition to Recorded Future’s intelligence-gathering capabilities, organizations should also implement comprehensive cybersecurity measures such as:

  • Regular security audits
  • Strong network segmentation
  • Offsite data backups
  • Employee training on ransomware prevention

MoneyGram customer data breached in attack

Read more

Published: Wed, 09 Oct 2024 10:48:00 GMT

MoneyGram Customer Data Breached in Attack

Summary:

MoneyGram, a leading global money transfer company, has confirmed a data breach that affected certain customer information. An unauthorized third party gained access to customer data between April 12 and July 12, 2023.

Affected Data:

The breached data may include:

  • Names
  • Addresses
  • Phone numbers
  • Email addresses
  • Social Security numbers (in some cases)

Impact:

MoneyGram has notified affected customers and is offering free credit monitoring services. The company is also working with law enforcement to investigate the breach.

Recommendations for Affected Individuals:

MoneyGram advises affected customers to:

  • Monitor their credit reports closely.
  • Be cautious of suspicious emails or phone calls.
  • Do not provide personal information in response to unsolicited requests.
  • Change passwords for all online accounts.

Company Response:

MoneyGram has apologized for the breach and is working to strengthen its security measures. The company has also implemented additional monitoring systems to detect and prevent future attacks.

Additional Information:

  • The breach was discovered during a routine security audit.
  • MoneyGram has not disclosed the full extent of the breach or the number of affected customers.
  • The company has set up a dedicated website (www.moneygramdatabreach.com) with information for affected individuals.

Importance:

This data breach highlights the importance of protecting personal information. Individuals should be vigilant about protecting their data and should take steps to monitor their credit reports and online accounts.