Cyber Security News

Ransomware Attack Before Holiday Leaves Companies Scrambling At least 200 U.S. businesses were hit, according to a cybersecurity firm that
NEWS!
The National Security Agency, along with CISA, the FBI and the National Cyber Security Centre have released the joint advisory:
Smart devices could expose homes to thousands of cyber attacks a week A home filled with #smart devices could be
700 Million 'Scraped' LinkedIn User Records Offered for Sale Some 700 million records of LinkedIn users have reportedly been offered
The Internet Is Rotting Too much has been lost already. The glue that holds humanity’s knowledge together is coming undone.
What’s at stake in Microsoft’s latest cyberattack Cyber Command’s next act? — House E&C sets sights on cyber legislationWhat’s at
NEWS!
Tue 29 Jun, 2021 - 12:29 PM ET Fitch Ratings-New York/Chicago-29 June 2021: The U.S. health insurance industry is facing
Analysis | The Cybersecurity 202: The United States is still number one in cyber capabilities But China’s the only nation
Denmark's central bank affected by SolarWinds compromise. Notes from the underground. Denmark's central bank affected by SolarWinds compromise. Notes from
NEWS!
More than 70 percent of those surveyed think it is likely that their company will be hit by a successful

Cyber Security News

Why track cyber security news? Cyber security is a world unto itself. It’s a profession, an IT discipline and now a major industry. Companies, consumers and governments are spending billions of dollars a year on cyber security. Security also pervades many areas of life that have little to do, seemingly, with cyberspace. Thus, to keep up with the world in general, it’s helpful to stay aware of news that relates to cyber security.

For example, the dispute between the US government and Huawei is at once about international trade, national security, telecom industry competition… and cybersecurity. Security is a root issue with Huawei, given the suspicions about the company’s connections to the Chinese Communist Party (CCP). However, the company’s size, reach and technological innovation push the matter to the forefront of US-China relations.

cyber security newsOr, take consumer cyber risks. We cover cyber security news that deals with consumers’ exposure to cybercrime and fraud. Consumers are increasingly at risk for identity theft, credit card and other malfeasance at the hands of cyber criminals. The articles we curate on this subject come from law enforcement publications, mainstream media and specialized blogs.

Public policy is now being influenced (or should be) by cyber security news. Policy makers should be aware of how cyber security affect their jobs and constituents’ lives. For instance, the “smart city” is both an innovation and a threat. Using IoT sensors and advanced data analytics to improve municipal services is a great idea. However, the smart city also exposes government data to breach.

This is particularly urgent given the relatively insecure technologies (e.g. Chinese-made sensors) used for the smart city and the wireless connectivity that make it all possible. Add malicious nation-state actors to the mix, such as the ones currently paralyzing American cities with ransomware, and one can see the potential danger.

 

Ransomware Attack Before Holiday Leaves Companies Scrambling

Ransomware Attack Before Holiday Leaves Companies Scrambling

At least 200 U.S. businesses were hit, according to a cybersecurity firm that believes Russians are behind the attack.

Ransomware Attack Before Holiday Leaves Companies Scrambling

News Insights: CISA Says Russian GRU Conducting Global Brute Force Campaign to Compromise Enterprise and Cloud Environments

The National Security Agency, along with CISA, the FBI and the National Cyber Security Centre have released the joint advisory: Russian GRU conducting global brute force campaigns to compromise enterprise and cloud environments.

News Insights:

Saryu Nayyar, CEO, Gurucul (she/her):

“A growing number of ransomware attacks against infrastructure and critical industries, especially those suspected of state sponsorship and involvement, are prompting calls for an international agreement limiting the use of such “cyber warfare” tactics. While such an agreement would be difficult to achieve, it is worthwhile for everyone to try to work toward this goal.  Ransomware and other types of cyber warfare can cause irreparable harm to critical infrastructures, and lead to an escalating level of counterattacks, even if the actual perpetrators are not clearly apparent. A key aspect of any such cyber agreement is enforcement.  Attacks aren’t easily detected early enough to prevent, and once perpetrated, leave the victim at the mercy of the attacker.  By monitoring the thousands of potential security events to identify anomalies, governments and infrastructure providers can take action to stop an attack before it causes real damage.”

Garret Grajek, CEO, YouAttest:  

“It’s heartening to know that the officials at the top of the western nations are finally taking this seriously. But one has to think that the cat is out of the bag. The malicious actors have learned that there is a high return on a low investment in international hacking. Most feel these organizations have profited so much from their ransomware attacks they have been able to buy political protection – at least up till now. Nothing has changed. The onus of cyber security is still on the enterprise – especially since most of the government proposals come in the form of fining businesses for not conducting proper cyber security practices. Enterprises should start with the basics, especially around access and the question of “who has what” – and be alerted on identity privilege changes and change attempts, which are often an unheard first alert to an attack.”

Saumitra Das, CTO and Cofounder, Blue Hexagon:

“The global brute-force campaigns by the GRU show that any weakness in an organization’s security posture will be attacked at scale. The GRU used Kubernetes to orchestrate and scale their attacks to continuously attempt initial access into organizations. This implies high level automation and semi-autonomous attack capabilities to target a wide list and then focus on where they are able to brute force in. While early attacks in March exposed their IPs, subsequent attacks have been masked using VPN and and even multi-hop VPN service to make it very hard to pinpoint where the initial attacks are coming from. This may be one of the reasons for the government takedown of DoubleVPN recently. Additionally, the group attempts to then move laterally into the network aggressively, according to CISA. The emergence of new vulnerabilities like last week just increases the options the attackers have to cause real damage. Organizations need to focus on detection and response because clearly current technology, configurations and the endless stream of security supply chain vulnerabilities together make it hard to prevent initial access into networks.”

Smart devices could expose homes to thousands of cyber attacks a week

Smart devices could expose homes to thousands of cyber attacks a week

A home filled with could be exposed to thousands of hacking or unknown scanning attacks from around the world in a single week, according to a new report.

Smart devices could expose homes to thousands of cyber attacks a week

700 Million ‘Scraped’ LinkedIn User Records Offered for Sale

700 Million ‘Scraped’ LinkedIn User Records Offered for Sale

Some 700 million records of LinkedIn users have reportedly been offered for sale on a hacker forum. The social media platform, and several security experts, say

700 Million ‘Scraped’ LinkedIn User Records Offered for Sale

The Internet Is Rotting

The Internet Is Rotting

Too much has been lost already. The glue that holds humanity’s knowledge together is coming undone.

The Internet Is Rotting

What’s at stake in Microsoft’s latest cyberattack

What’s at stake in Microsoft’s latest cyberattack

Cyber Command’s next act? — House E&C sets sights on cyber legislationWhat’s at stake in Microsoft’s latest cyberattack

Cyber Theft of Customer Data a Growing Risk for US Health Insurers

Tue 29 Jun, 2021 – 12:29 PM ET

Fitch Ratings-New York/Chicago-29 June 2021: The U.S. health insurance industry is facing growing risks from cybersecurity threats due to the increasingly sophisticated techniques used by cybercriminals amid the expansion of remote healthcare delivery and growing digitization of insurance transactions, clinical records and billing. Health insurers and related third parties that fail to inventory and protect sensitive customer information face increased financial, reputational, operational and regulatory risks from cyber attacks, Fitch Ratings says.

 

https://www.fitchratings.com/research/insurance/cyber-theft-of-customer-data-growing-risk-for-us-health-insurers-29-06-2021

Analysis | The Cybersecurity 202: The United States is still number one in cyber capabilities

Analysis | The Cybersecurity 202: The United States is still number one in cyber capabilities

But China’s the only nation that might challenge that position, a new report finds.

Analysis | The Cybersecurity 202: The United States is still number one in cyber capabilities

Denmark’s central bank affected by SolarWinds compromise. Notes from the underground.

Denmark’s central bank affected by SolarWinds compromise. Notes from the underground.

Denmark’s central bank affected by SolarWinds compromise. Notes from the underground: the rise of Cobalt Strike as a commodity initial payload, following Hades, ransomware recruiting, and criminal venture investment.

Denmark’s central bank affected by SolarWinds compromise. Notes from the underground.

Deep Instinct Unveils First Annual Voice of SecOps Report

More than 70 percent of those surveyed think it is likely that their company will be hit by a successful ransomware attack

 

NEW YORK (June 22, 2021) – Deep Instinct, the first company to apply end-to-end deep learning based on the only purpose-built deep learning framework for cybersecurity, today launched its Voice of SecOps Report. This marks the first annual report to highlight current and emerging threats, the impact these have on the day-to-day lives of SecOps professionals, and how automation will play a significant role moving forward. In Deep Instinct’s new survey of 600 IT and cybersecurity professionals, more than half of the survey respondents noted ransomware or zero-day attacks as the biggest threats to their organization.   

 

From the Colonial Pipeline cyberattack to critical infrastructure like the MTA breach, ransomware has cemented its status as a global concern. According to 64 percent of respondents, this is because humans are unable to keep up with the exponential cadence of cybersecurity threats. This reality is compounded by the fact that respondents state they spend about 10 hours a week assessing false positive alerts, and 69 percent of respondents agreed that low staff morale could result from alert fatigue due to the overwhelming volume of false positives. And 80 percent of respondents say time not absorbed there is spent addressing time-consuming security patches and updates to ensure solutions remain effective.

 

“Recent major events have placed a heightened priority on security, but these threats have long deserved the attention they’re just now getting on a global level. As we work to implement a stronger layer of defense, it will be just as important to protect the hard-working employees that sit in the SOC as it is to secure the business,” said Guy Caspi, CEO of Deep Instinct. “The results of this report shed light on the exhausting challenges that today’s security operations teams face on a daily basis. Recognizing the need for a new approach, we set out to provide the relief that teams desperately need.”

 

Through the lens of SecOps teams on the front lines, this report explores strategic threats, overarching priorities and day-to-day challenges that often go unheard. To that end, other key findings from US respondents look at the rise in ransomware attacks, as well as other prevalent threats and factors impacting SecOps teams’ ability to prevent attacks:

  • 66 percent of respondents say that SolarWinds has led to the hiring of more internal IT/cybersecurity professionals, with over half saying it also prompted more questions at the board and executive level about cybersecurity measures;
  • More than 60 percent of companies are considering automated, AI-based solutions following the Microsoft attacks;
  • 62 percent of respondents agreed that threats in their company could get missed due to the overwhelming volume of false positives;
  • 83 percent of respondents agreed in some way that cybersecurity professionals deserve better from their Anti-Virus and Endpoint Detection and Response solutions.

 

Deep Learning Offers a New Path Forward

Organizations across industries are in need of reliable, automated, and timely protection that prevents damage from being done, and saves organizations valuable time and money. According to 86 percent of respondents, the tools driven by data science (AI/Machine Learning/Deep Learning) will make a significant impact in preventing unknown threats and reducing false positives. Taking it a step further, nearly 3/4 of respondents agree that automation of cybersecurity is the only way their company can address cyber threats.

 

The Deep Instinct’s Voice of SecOps Report provides insight from 600 IT professionals, including 300 CISOs spread across multiple verticals and geographies. To learn more about the report and survey methodology, visit https://info.deepinstinct.com/tof/voice-of-secops-2021

 

About Deep Instinct

Deep Instinct is the first and only company applying end-to-end deep learning to cybersecurity. Deep learning is inspired by the brain’s ability to learn. Once a brain learns to identify an object, its identification becomes second nature. Similarly, as Deep Instinct’s artificial deep neural network brain learns to prevent any type of cyber threat, its prediction capabilities become instinctive. As a result, any kind of malware, known and new, first-seen malware, zero-days, ransomware, and APT (advanced persistent threat) attacks from any kind are predicted and prevented in zero-time with unmatched accuracy and speed anywhere in the enterprise – network, endpoint, mobile – enabling multi-layered protection. To learn more, visit https://www.deepinstinct.com/.

 

###