Connect with us

Cyber Security

Nation States Will Deploy New Attack Vectors for Cyberwars

Published

on

How to Protect Supply Chains and the Hybrid Workforce
cyberwar, IoT, 5G, Boardroom, Identity Detection and Response, Predictions, supply chains, hybrid workforce

More countries are now leveraging the cyberspace in warfare and you can see that with the most current news (the Russia-Ukraine conflict). This year you will see nations conniving with APT groups to deploy new methods of attack for cyberwar. Here are my three predictions for 2022.

By Dick Wilkinson, Chief Technology Officer at Proof Labs

2022 will see more proliferation of ransomware and likely a higher average payout for each attack. This trend has been ongoing for several years and does not seem to be nearing a peak or plateau. The relative impunity available to ransomware criminals means there is no end in sight other than the market capacity of how much companies are willing to pay. If you successfully robbed a bank and knew you couldn’t get caught, wouldn’t you do it again?

The good news for 2022 is the increase in cyber professionals entering the workforce. The labor shortage in cyber skills has been well documented, with projections showing the gap widening soon. The projections may be wrong. The recent upheaval in so many people’s careers has caused a significant shift to security roles where a new certification vs. a new degree could land you a great job. Barriers to entry in the security market are also being identified and actively changed by many industry hiring managers. The skills gap won’t close this year, but the tide has likely shifted in the right direction.

I believe we may globally see some cyber “firsts” where nation-states or APT groups deploy a new method of attack that was previously held back for political concerns. Many countries now see cyberspace as a legitimate realm to create strategic outcomes. The unspoken agreement to use cyberspace as a battlespace for proxy agitation, and escalation will be more obvious this year and some players will not hold back on the more damaging attacks any longer. Criminal APT groups are already part of the proxy nature of cyberwar being directly controlled and funded by nation states. Their involvement will rise, but the veil of secrecy on who they work for will become thinner.

Also see:

With Cyberwars, Cyber Espionage has Reached New Level


About the Author

Dick_WilkinsonDick Wilkinson is the Chief Technology Officer at Proof Labs. He also served as the CTO on staff with the Supreme Court of New Mexico. He is a retired Army Warrant Officer with 20 years of experience in the intelligence and cybersecurity field. He has led diverse technical missions ranging from satellite operations, combat field digital forensics, enterprise cybersecurity as well as cyber research for the Secretary of Defense.

Disclaimer

Views expressed in this article are personal. The facts, opinions, and language in the article do not reflect the views of CISO MAG and CISO MAG does not assume any responsibility or liability for the same.

Source link

Cyber Security

Threat Notification Isn’t the Solution – It’s a Starting Point

Published

on

Most organizations have the tools in place to receive notification of attacks or suspicious events. But taking the information gleaned from cybersecurity tools is only step one in handling a security threat.

“The goal of a security practitioner is to link those data sets together and do something with the information,” says Mat Gangwer, VP of managed detection and response at Sophos. “The threat notification is just the beginning.”

It’s a common misconception that a tool has effectively blocked or remediated an issue simply because the IT or security team have received a notification of malicious activity.

“Practitioners often think notification also means prevention, but it doesn’t,” Gangwer says. “It doesn’t mean the threat has been neutralized. That’s the start of your investigation.”

Gangwer offers these 3 essential steps for moving beyond threat detection.

1 – Minimize the damage

To prevent widespread damage, organizations, or a managed security services provider (MSSP) acting on their behalf, should take certain targeted actions to neutralize threats after detection, including:

  • Triaging and validating the threat or incident
  • Determining the scope and severity of the threat
  • Seeking information on the threat’s context and potential impact
  • Acting to remotely disrupt, contain, and neutralize the threat
  • Determining the root cause of the incident to prevent future breaches or attacks

2 – Incorporate new learnings

Once a threat has been neutralized and remediated, organizations should seek to incorporate any new learnings back into incident preparedness and ongoing monitoring and threat hunting efforts. It’s critical to leverage these new learnings so processes and procedures can be quickly adapted. Updating documented policies and your incident response plan allows teams to know what is necessary to do in the future, the next time a threat is detected.

“It’s better to make sure everybody’s on the same page and aware of expectations going into an event rather than trying to figure it out when it happens and scrambling around trying to remedy and fix what’s going on,” he says.

3 – Enlist additional resources

But what if you lack the in-house tools, people, and processes to defend against cyber threats once they are uncovered? An ongoing skills gap in security has made it difficult for many companies to fill their security ranks and support a robust security program.

The good news: An MSSP can assist with managed detection and response. Most MSSPs and MDR providers offer the necessary skills and expertise to fill the gaps.

What’s more, an MSSP can bring in outside experts while still allowing practitioners to control how potential incidents are handled and what response to take.

Click here to learn more.

Copyright © 2022 IDG Communications, Inc.

Source link

Continue Reading

Cyber Security

Financial services increasingly targeted for API-based cyberattacks

Published

on

A report published Monday by cloud services and CDN (content delivery network) platform Akamai said that the financial services industry is an increasingly popular target for a wide range of cyberattacks, with application and API attacks against the vertical more than tripling in the past year.

APIs are a core part of how financial services firms are changing their operations in the modern era, Akamai said, given the growing desire for more and more app-based services among the consumer base. The pandemic merely accelerated a growing trend toward remote banking services, which led to a corresponding growth in the use of APIs.

With every application and every standardization of how various app functions talk to one another, which creates APIs, the potential target surface for an attacker increases, however. Only high-tech firms and e-commerce companies were more heavily targeted via API exploits than the financial services industry.

“Once attackers launch web applications attacks successfully, they could steal confidential data, and in more severe cases, gain initial access to a network and obtain more credentials that could allow them to move laterally,” the report said. “Aside from the implications of a breach, stolen information could be peddled in the underground or used for other attacks. This is highly concerning given the troves of data, such as personal identifiable information and account details, held by the financial services vertical.”

Beyond attacking financial services firms themselves, the report said, cybercriminals have customer accounts in their sights as well. More than 80% of attacks against companies in the industry target customers, instead of institutions, via phishing or direct attack.

Attackers have been quick to leverage zero-day vulnerabilities discovered in systems used by financial services companies, noted Akamai. One example from this year is the remote code execution vulnerability found in Atlassian’s Confluence Server and Data Center products—less than a week after the flaw was publicly disclosed, Akamai recorded nearly 80,000 Confluence-based attacks per hour during one period in the evening of June 7.

The company said the speed with which Confluence and other flaws of its type can be exploited by bad actors underlines the need for businesses to remain up-to-date with patching.

While application and API attacks against financial services companies have risen most sharply, Akamai said that other techniques are also becoming more and more common, with botnet activity up 81% year-on-year, and DDoS attacks up by 22%.

Copyright © 2022 IDG Communications, Inc.

Source link

Continue Reading

Cyber Security

5 Reasons to Protect the Performance and Security of Your Pharmaceutical Business

Published

on

One of the greatest lessons resulting from the COVID-19 pandemic is to expect the unexpected and proactively prepare for future unknowns. Like many others, the pharmaceutical industry has been revolutionized by accelerated digital transformation over the last few years. Research has shown that pharma leaders investing in the Internet of Things (IoT) are better equipped to overcome unforeseen challenges.

For these proactive pharmaceutical leaders, two major areas have become increasingly important: preventing network outages and increasing security against cyberattacks. The 2021 State of Pharmaceuticals and Cybersecurity Report from Fortinet found that in the last year, 40% of businesses experienced outages affecting productivity, safety, compliance, revenue, or brand image. These outages are no small glitches: Industry experts estimate the total downtime cost (TDC) of a production disruption ranges from $100,000 to $500,000 per hour. A few disruptions a year can have a massive effect on the bottom line. This necessitates network and application performance management to minimize downtime.

If the impact of network outages on reputation, output, and the bottom line were not enough, pharmaceutical companies also have had to combat rampant cyberattacks. The rapid expansion of their attack surface has created visibility gaps and increased their risk. There has long been a growing desire for network operations (NetOps) and security operations (SecOps) teams to collaborate and share information. In some cases, early-stage planning, common budgets, and project-level cooperation have improved and enhanced cross-team collaboration. In fact, Enterprise Management Associates (EMA) studies have shown that 78% of enterprises have some formal collaboration between the two groups, with 47% fully converging the groups with shared tools and processes.

NETSCOUT solutions help collaboration between NetOps and SecOps as they proactively protect businesses from both a security and network and application performance management standpoint. Here are five major reasons this is important for pharmaceutical companies:

  1. Understand your attack surface. Your proprietary information, such as secret formulas, trial results, and other strictly confidential company information, are attractive targets for bad actors to gain access to and either sell on the dark web or ransom back for potentially millions of dollars. Know where that information is and protect it. NETSCOUT’s scalable packet-level network visibility with patented Adaptive Service Intelligence (ASI) technology converts packet data into a rich source of unique layer 2–7 metadata that we call Smart Data. Smart Data enables you to see the data that matters so you can assure the application performance of your critical services for authorized employees, while also protecting it from security threats.
  2. Comply with manufacturing regulations. Network uptime is essential to meet the production standards in the pharma industry. If monitoring, processing, shipping, and tracking of goods through manufacturing ecosystems were not complex enough, you also must meet strict regulations to maintain compliance. NETSCOUT network and application performance management provides advanced warning of system degradations and empowers NetOps teams to determine the scope and impact of issues via problem isolation and triage. Our solutions allow for “back in time” investigation to ensure gaps in compliance are addressed as quickly as possible. 
  3. Secure customer data. As pharma companies move toward more digitization and storing of information online, they are becoming an easier target for bad actors looking to steal customer records that can be sold on the dark web for multiple nefarious purposes. Losing your customer data can cost lives, create identity theft, impact brand reputation, and subject you to massive fines for not meeting compliance requirements. Being able to detect known and unknown threats is critical, and network visibility is fundamental. NETSCOUT’s solutions provide better network visibility in combination with continuous threat intelligence feeds, empowering you with multiple types of detection for both known and unknown threats.
  4. Maintain uptime and protect the bottom line. Reliability and maximum productivity are always top priorities for businesses. Pharmaceutical manufacturers that make smart investments in advanced technologies can benefit from improved operational efficiency, reduced downtime, and improved visibility and analytics. NETSCOUT’s solutions provide end-through-end visibility into network and application performance, leveraging Smart Data to identify the root cause of issues directly impacting the bottom line.
  5. Consider the cost of a breach. According to IBM’s Cost of a Data Breach Report, the healthcare industry ranks highest in terms of cost, with an average price tag of more than $10 million per breach and an 11-month cycle to identify and contain the breach. It is more important than ever to be able to reduce the mean time to knowledge (MTTK) and mean time to response (MTTR) to reduce the potential impacts of these breaches. NETSCOUT’s Omnis Cyber Intelligence solution is designed for seamless integration with your existing cybersecurity toolset to make your entire security stack stronger and more effective. Omnis Cyber Intelligence also integrates with your firewalls to instruct immediate blocking at the edge, and NETSCOUT’s Smart Data can be exported and combined with your other sources of data for custom analysis, filling the gaps in visibility to increase incident investigation efficiency and decreasing MTTR.

NETSCOUT believes in achieving what we call Visibility Without Borders by enabling a single source of smart packet-derived layer 2–7 metadata—NETSCOUT Smart Data—for more efficient service assurance and cybersecurity. NETSCOUT gives you the most comprehensive attack surface observability in the industry and provides continuous intelligence, with real-time detection of all network activity, so you can halt attackers in their tracks.

See how NETSCOUT network and security solutions can make a difference in your organization.

Copyright © 2022 IDG Communications, Inc.

Source link

Continue Reading

Trending

URGENT: CYBER SECURITY UPDATE