Online Security

Telcos around the world hit by large-scale, long-term intelligence gathering cyberattack

Telcos around the world hit by large-scale, long-term intelligence gathering cyberattack

A long-term, large scale attack targeting telecom companies around the world has been discovered. The attack, dubbed Operation Soft Cell by security firm Cybereason, saw hundreds of gigabytes of information exfiltrated. The company claims the attackers had total control of compromised networks and could have easily brought down entire cellular networks if they so wished. “Cellular service is a critical infrastructure nowadays,” says Amit Serper, principal security researcher at Cybereason and author of the report. “What really worries me is the amount of access they have–the complete access they have to the network. The worst thing they can do is …

Read More »

CrowdStrike Falcon breaks the EDR mold

CrowdStrike Falcon breaks the EDR mold

These days, every endpoint within an enterprise is going to have some form of antivirus software. It’s mandated in a lot of industries, plus it makes no sense to run a system without it, if nothing else than to protect the endpoint from random, untargeted threats. But antivirus is also fairly ineffective against targeted and more sophisticated attacks, which are often created specifically to get around normal AV protection. For that, the next level of protection needed is an endpoint detection and response (EDR) platform. EDR works by looking for malicious activity or processes on endpoints, including code and unusual …

Read More »

6 Reasons it’s Smart to Work in the Cloud

6 Reasons it’s Smart to Work in the Cloud

In 2019, more organizations than ever are moving to the cloud. As on-premises systems become end-of-life, many organizations are discovering cloud solutions that meet their needs and provide a few additional benefits. Cloud infrastructure makes sense for both small organizations and large enterprises interested in leveraging modern security solutions and flexible computing power. Here are six reasons it’s smart for organizations to work in the cloud. Scalability Organizations are making the shift to the cloud versus buying additional hardware at on-premise datacenters because cloud resources can be rapidly scaled up as they are needed. Conversely, as the need for a …

Read More »

Three Ways Microsoft 365 Boosts Productivity

Three Ways Microsoft 365 Boosts Productivity

Understanding that most users rely on a core set of functionality day in and day out, Microsoft has harnessed artificial intelligence to improve the user experience with Office 365, included in Microsoft 365, by reducing redundancy and repetitive tasks. The result is a dramatic drop in the time it takes to create or revise documents. “No matter what the role is, we all have to-do lists that have no bottom,” notes Brad Anderson, Microsoft Corporate Vice President, Enterprise Experiences and Management. “We’re able to leverage what we’ve learned in the cloud on a global scale to help users get their …

Read More »

New Mac Malware Exploits GateKeeper Bypass Bug that Apple Left Unpatched

macos malware gatekeeper

Cybersecurity researchers from Intego are warning about possible active exploitation of an unpatched security vulnerability in Apple’s macOS Gatekeeper security feature details and PoC for which were publicly disclosed late last month. Intego team last week discovered four samples of new macOS malware on VirusTotal that leverage the GateKeeper bypass vulnerability to execute untrusted code on macOS without displaying users any warning or asking for their explicit permission. However, the newly discovered malware, dubbed OSX/Linker, has not been seen in the wild as of now and appears to be under development. Though the samples leverage unpatched Gatekeeper bypass flaw, it …

Read More »

Top 6 macOS Mojave endpoint protection products

Top 6 macOS Mojave endpoint protection products

The AV-TEST Institute, a Germany-based independent service provider of IT security and antivirus research, recently tested the six popular, business-focused macOS Mojave 10.14.3 client endpoint protection products on three primary criteria: Protection: Detection of 557 samples of widespread and prevalent malware discovered in the last four months. Performance: The average influence the product had on computer speed when downloading and installing frequently used applications, launching standard software applications, and copying files locally and over a network. Usability: The number of false detections of legitimate software as malware and false warnings given while installing and using legitimate software.   Each product …

Read More »

4 ways to build a strong security culture

4 ways to build a strong security culture

Security teams can’t protect what they can’t see. While monitoring tools are getting better, end users and business managers need to tell IT and security teams what they’re doing with data on different applications, and more importantly, when something has gone awry. A culture of blame and fear when it comes to security means end users won’t tell you if they are using an unsanctioned app, have clicked on a malicious link or have seen unusual activity until it’s too late. Security teams should empower users with a culture of personal responsibility so that they treat data security in the …

Read More »

4 security concerns for low-code and no-code development

4 security concerns for low-code and no-code development

Low-code and no-code development promises to speed up the deployment of new applications and to allow non-technical users to create apps. The idea has been around for a long time. Now, new cloud-based platforms for creating mobile and web apps, as well as tools built into platforms like Microsoft’s Office 365, Google’s G Suite and Salesforce, are bringing app development capabilities to a growing user base. According to research by Markets and Markets, the low-code development platform market is expected to grow from $4.3 billion in 2017 to more than $27 billion by 2022. In fact, 84% of enterprises have …

Read More »

Will the US ever get serious about security and privacy?

Will the US ever get serious about security and privacy?

The beginning of what we now call cybercrime I have been in this career for decades, yet it seems like we are still at square one. Back in 1970-1995 Kevin Mitnick had an advantage – he was a groundbreaking hacker, long before all the script kiddies showed up on the scene. Mitnick penetrated some of the most high-profile networks in the world using social engineering schemes. He tricked insiders into revealing access codes and passwords. We now call this phishing and it’s highly automated. Then, in 1988, worms like the Morris Worm showed up. What started as a seemingly small …

Read More »

Minimize Cloud Risk at AWS Public Sector Summit 2019 with Amazon and CIS

Minimize Cloud Risk at AWS Public Sector Summit 2019 with Amazon and CIS

Security and cloud experts from the CIS team are heading to Washington, DC on June 11-12 for AWS Public Sector Summit. We’ll be sharing information about CIS Benchmarks, CIS Hardened Images, and how our partnership with AWS helps with the Shared Responsibility Model. If your organization is working in the cloud or moving between cloud and on-premises infrastructure, this event is for you. Sessions at AWS PSS will help your organization implement security best practices to limit threats in the cloud. You’ll discover how to defend against cyber-attacks while meeting compliance in cloud environments. Learn how to accelerate your time to …

Read More »

12 top cloud security threats: The dirty dozen

12 top cloud security threats: The dirty dozen

Cloud computing continues to transform the way organizations use, store, and share data, applications, and workloads. It has also introduced a host of new security threats and challenges. With so much data going into the cloud—and into public cloud services in particular—these resources become natural targets for bad actors. “The volume of public cloud utilization is growing rapidly, so that inevitably leads to a greater body of sensitive stuff that is potentially at risk,” says Jay Heiser, vice president and cloud security lead at Gartner, Inc. Contrary to what many might think, the main responsibility for protecting corporate data in …

Read More »

How to disable basic authentication in Microsoft Office 365

How to disable basic authentication in Microsoft Office 365

Attackers will go after weaker credentials and passwords to gain network access. Small businesses often set up shared mailboxes that are used for various functions. If one set of credentials for a shared mailbox is compromised, it could have a wide impact on the company. If you’ve enabled multi-factor authentication (MFA), you might think that you’ve done enough to ensure you are protected. Unless you disable legacy authentication in your Office 365 implementation, however, you are still at risk. Basic authentication is enabled by default in all Office 365 implementations unless you disable it. First, how do you know if …

Read More »

Is AI fundamental to the future of cybersecurity?

Is AI fundamental to the future of cybersecurity?

Every time you connect to the internet from a computer, tablet or smartphone, there is a growing risk of cyberattack. If the threat is aimed at your workplace, then the entire organization around you could be vulnerable as well and, too often, the result is a major data breach. A well-run company, regardless of its size or global reach, must eventually acknowledge that cybersecurity requires a significant investment. But what tools and processes return the most bang for your buck? A growing number of experts believe that new technology based on machine learning and artificial intelligence are where the smart …

Read More »

Why the Huawei ban is bad for security

Why the Huawei ban is bad for security

Last week, Google reportedly warned the Trump Administration that its current ban on exports to Huawei might actually jeopardize national security by forcing Huawei to create an insecure fork of its Android operating system, according to the Financial Times. That ban was imposed as part of a Commerce Department effort announced in mid-May which placed the Chinese telecom and tech giant on a U.S. export blacklist, the “entity list,” for its purported efforts to spy on behalf of the Chinese government. Two other companies — the telecom giant ZTE and a memory chip maker, Fujian Jinhua Integrated Circuit — were …

Read More »

3 email security protocols help prevent spoofing: How to use them

3 email security protocols help prevent spoofing: How to use them

If you are not using global email security standards SPF, DKIM and DMARC, you should be. They’ve been around for many years and used and trusted by millions of people. They can only help. Sender Policy Framework (SPF), Domain Keys Identified Mail (DKIM) and Domain-Based Message Authentication, Reporting and Conformance (DMARC) allow you to prevent malicious third parties from spoofing your email domain to others who use it. They don’t work perfectly, but when enabled will absolutely cut down on some forms of email maliciousness. For these protocols to work, the sender’s email domain administrator enables them in DNS using …

Read More »