Category Archives: Internet Security

At least $2m in savings prevented from being stolen in malware … – The Straits Times

SINGAPORE Scammers who took control of the phones of more than 30 OCBC Bank customers were prevented from stealing at least $2 million following the release of a security measure that blocks access to the banks Internet banking services in the presence of a suspicious app.

Since the update to the OCBC Internet banking app was released on Aug 5, no losses from malware scams had been reported by the banks customers who were using this version of the app, OCBC said in a statement on Thursday.

The security feature, which blocks access to the banking app if it detects apps from non-official platforms and flags those with risky permissions settings, was rolled out as a response to malware scams that give hackers control over a victims device.

It was released after a meeting among banks and the authorities to crack down on malware scams and roll out stronger security features to tackle them, The Straits Times understands.

OCBC received reports from more than 30 customers about their Android mobile phones being hacked by sideloaded apps from non-official sources, such as those outside Google Play Store.

The apps introduced a virus that gave fraudsters control of the victims device, but they were not able to make fund transfers through the OCBC app, said the bank.

The security measure also prevents scammers from logging on to OCBC Internet banking via a web browser to access customers bank accounts as it would require a physical hard token since the digital token has been frozen, said the bank.

OCBC added: While there was already more than $2 million in these customers savings accounts, the amount that might have been lost to scammers could have been much higher as scammers have previously redeemed fixed deposits and unit trusts early, or drawn down cash advances under customers credit cards.

The security measure drew criticism from some users, who said they were unable to concurrently use apps from non-official platforms, such as China-centric apps for business.

The Monetary Authority of Singapore has since backed the banks security feature, and said on Aug 8 that any unintended inconveniences are in the nature of new innovations, and that it will work with the banks to learn from these experiences.

It added: Security measures will come with some measure of added inconvenience for customers, but they are necessary to maintain security of and confidence in digital banking.

DBS said on Thursday in reply to ST queries that it is working with the authorities and industry partners on ways to tackle malware scams.

Its spokesman said: There is a need to take a considered approach for this.

As we work to provide a robust level of protection for our customers, we also want to keep the customer journey as frictionless aspossible.

DBS Banks active surveillance measures protected customers from various scams, including malware scams, with at least $16.5 million in losses prevented over the past three months, said the spokesman.

Malware scams have grown in numbers in past months. In August, at least 27 victims lost around $325,000 after sellers advertising moon cake sales on social media directed them to install Android Package Kit (APK) files that contained viruses.

Read this article:
At least $2m in savings prevented from being stolen in malware ... - The Straits Times

Why is China banning officials and state employees from using iPhones? – Al Jazeera English

China is reportedly barring government officials and employees at state-owned enterprises from using iPhones.

The Wall Street Journal on Thursday reported that Beijing had issued a directive barring central government officials from using the Apple devices.

On Friday, Bloomberg reported that the ban also covered government-backed agencies and state companies and would be expanded to a wide range of government-controlled organisations.

Chinas moves, which have not been announced on official channels, are the latest salvo in the ongoing trade and tech war between Washington and Beijing.

While bad news for Apple and a potential omen for Western tech companies generally, the bans have not come as a total surprise to China watchers.

The United States and China have taken steps to reduce their economic reliance on each other as the two sides increasingly prioritise alleged national security concerns over investment and trade.

Beijing has ramped up efforts to lessen its dependence on foreign technology and prop up domestic companies, including Shenzhen-based Huawei, whose new $1,200 Mate 60 Pro has been described by tech analysts as giving the iPhone a run for its money.

Bank of America has noted the interesting timing of the iPhone ban given the recent launch of the Mate 60 Pro.

China and the US view each others tech companies as potential security risks that could provide backdoor access to sensitive data and government infrastructure.

In May, Montana became the first US state to ban Chinese-owned TikTok over data privacy concerns, with a number of other states mulling similar moves.

US federal agencies and many state governments have already banned the app on government-issued phones.

Washington has also banned US companies from doing business with numerous Chinese tech firms, including Huawei, and restricted US chipmakers from selling China advanced tech.

The release of the Mate 60 Pro, which is powered by the advanced Kirin 9000s processor, has raised questions about the effectiveness of these export controls.

US National Security Adviser Jake Sullivan said last week that the administration of President Joe Biden was seeking more information about the character and composition of the smartphone to determine if the law had been circumvented.

Apples stock price tumbled nearly 6 percent between Wednesday and close of business on Friday, wiping nearly $200bn off the value of the worlds most valuable company.

The ban has also sent a chill through Western companies operating in China generally, amid questions about how welcome foreign firms are in the worlds second-largest economy.

Even as some Chinese officials stress that China is back open for business post COVID-19, police raids on foreign firms, including the Mintz Group, and recently enacted anti-espionage laws have underscored the difficulty of doing business and accessing information.

The increasingly tense security environment comes on top of a host of challenges facing foreign firms, including the fallout of the pandemic, intellectual property theft, government discrimination in favour of domestic competitors and regulatory issues.

The latest restrictions on Apple could add to doubts about doing business in China, especially as the California-based tech giant, until recently, had a relatively good relationship with Beijing.

Apple, which generates about 20 percent of its global sales in China, has historically been happy to comply with Beijings demands for control, such as by removing virtual private networks (VPNs) from its Chinese iOS store to prevent users from evading internet censorship.

As recently as March, Apple CEO Tim Cook met with Chinese Premier Li Qiang in Beijing.

Bill Bishop, author of the popular newsletter Sinocism, said on Friday that the confidence many had that Apple is able to navigate US-China tensions to avoid any material blowback could be increasingly misplaced.

The ban will not prevent everyday Chinese citizens from buying the soon-to-be-released iPhone 15 and other Apple products.

But it does emphasise the growing tension between Beijings desire for control and Chinas economic future.

Companies including Apple were already shifting production and investment away from China but the ban and other recent events may accelerate that trend.

US Commerce Secretary Gina Raimondo said last month that foreign tech companies were starting to see China as uninvestable due to the increasingly hostile business environment.

The souring sentiment threatens to exacerbate the challenges facing Chinas post-pandemic recovery, which is faltering amid deflation, slowing exports, a real estate crisis and high youth unemployment.

Here is the original post:
Why is China banning officials and state employees from using iPhones? - Al Jazeera English

Do Older Macs Need Antivirus? What You Should Know – The Mac Observer

Do older Macs need an antivirus? One reason you may have chosen Mac over Windows is that youve heard the old saying that Macs dont need antivirus software. However, this isnt exactly true. While there are security measures in place to protect your Mac, malicious websites and cybercriminals are typically capable of staying a step ahead of todays modern security. This is especially true when running an outdated macOS.

Citing evidence from one of Apples key employees, Ill take a look at some reasons why its a good idea to have antivirus software on your older Mac. I will also explain some of the security measures already put in place by the company. While there is native Mac malware protection, you may want a solid option that can keep up with modern cybercriminals and threats.

Yes, it is safe to use a Mac without antivirus. To an extent. The features and power of a Mac mean its not a critical necessity to use third-party antivirus software, so long as you can keep the machine up to date. Apples security updates focus on targeting specific types of malware and malicious programs to help protect you, but be aware that cybercriminals, hackers and malware makers are constantly on the hunt for an attractive target.

While Apple does its best to stay up to date on security threats and malicious software programs, cybercriminals remain vigilant in staying one step ahead. Security issues are only going to increase if you are using an older machine, as they can be susceptible to various malware types. Security patches and other built-in security features are critical security measures, and running an older Mac may prevent you from receiving certain security software.

In recent years, Apple has taken notice of malware attacks, and the companys own Craig Federighi has deemed the problem unacceptable. In May of 2021, Federighi noted that there are over 130 types of malware on Mac, with one piece of malware that had an impact on nearly 300,000 machines. Proper malware detection is crucial to dispel any potential threats, especially if you are using an older Mac.

Yes, Mac systems have built-in protections, including XProtect and Gatekeeper. Available with macOS, XProtect is antivirus software that updates regularly and automatically. XProtect will run and perform automatic scans anytime an application is opened or changes are made. Gatekeeper, on the other hand, ensures that users are running only authenticated software, ensuring that you are not running an unwanted program.

Considering these programs were released in 2009 and 2012, the likelihood that you are running a device that excludes them is low. While both are valuable pieces of software, older devices can still be victims of emerging threats. While users can try and follow their common sense by being sure to avoid suspicious links, fraudulent websites, and suspicious emails, it may not be enough in this modern age.

For those running an older Mac, a third-party antivirus solution may be just what they need. Many antivirus software options offer features and services beyond whats available in macOS, which ensures proper protection from potential threats and different types of malware.

Intego Mac Internet Security can be a third-party antivirus software alternative for those who use an older Mac. A powerful anti-virus software and a great app for malware and malware detection, Intego Mac Internet Security provides firewall protection as well. Additionally, Intego specifically works for Macs that go as far back as macOS 10.12, meaning youve got protection even for your older systems.

Intego Internet Security X9 provides real-time scanning and 24-hour protection, protecting you from strains of malware and unwanted software. Not only is it a powerful malware scanning tool thanks to VirusBarrier X9, but Internet Security subscribers also get NetBarrier X9, which protects networks and firewalls.

Going with Intego means that even older machines can still receive built-in antivirus technology and protection from different types of malware. Its a fantastic product that offers users complete control.

Intego Internet Security Block all malicious threats and use one of the most powerful Mac antivirus tools.

Another great option if youre running an older Mac is Bitdefender Internet Security, which is capable of running on macOS 10.10 and newer. A perfect choice if you are running an older Mac, Bitdefender is the most consistently rated antivirus software for 10 years running. Offering a variety of security packages, you can control how much protection you receive.

Offering a variety of services, users can get a basic virus protection plan for a good price. However, you are also able to bundle their antivirus software alongside other services, such as a VPN, password manager, parental controls, and more. A security suite packed with features, Bitdefender is a great alternative if you are using an older Mac.

From automatic updates to firewall options and a powerful antivirus tool, Bitdefender provides stellar real-time malware protection, making it a fantastic third-party option.

Bitdefender Internet Security Bring ultimate antivirus protection for your old Mac by using this trustworthy program.

If youre looking for a good third-party option or are looking for antivirus software options in general, TotalAV may be the way to go. Fighting against malicious software programs, TotalAV provides real-time malware protection, even for older Macs. Available for macOS 10.9 or higher, this anti-virus is great if you are running an older machine.

Not only can it protect you from malicious software programs by offering real-time malware protection, but it also comes with an adblocker, spy-blocker and anti-ransomware measures. Giving you a solid option for complete protection.It can be just what your old Mac needs to stay protected.

TotalAV Solve all cyber threat-related issues on your Mac with the TotalAV software.

Yes, Macs need antivirus software. However, remember that your Mac does provide its own built-in antivirus software thanks to programs like Gatekeeper and XProtect. If anything, you should be aware that there are third-party options available that not only provide powerful antivirus tools, but can extend their abilities beyond what Apple provides.

In modern times, cybercriminals are often capable of staying one step ahead. While Apple does provide Macs with virus protection and security, an older Mac is likely to need more protection against conventional threats. Do your best to keep your machine up to date, and remain vigilant when traversing the internet.

Follow this link:
Do Older Macs Need Antivirus? What You Should Know - The Mac Observer

Cyber Security challenge: SMBs and large enterprises face common threat but separate response routes – The Economic Times

Cybersecurity is a critical concern for businesses of all sizes, however, it poses distinct challenges for small and medium businesses (SMBs) due to their constraints of resources and access to expertise. The attack profiles are increasingly similar between SMBs and large organisations.According to data from the Data Breach Investigation Report 2023 by Verizon, SMBs experience 699 incidents annually with 381 cases of confirmed data disclosure and large businesses face 496 incidents annually with 227 cases of confirmed data disclosure. System intrusion is the top common threat.There are several safeguards companies can implement to protect themselves, says the report. It points to the controls offered by the Center for Internet Security (CIS) a nonprofit that provides products and services to help organisations safeguard their system and data from cyber threats as a good starting point.The nonprofit has developed an interactive software, CIS critical security controls navigator, to assist organisations to analyse their cybersecurity status. It also helps organisations track their advancements in implementing CIS controls, which are guidelines generated by CIS to reduce cyber risk and enhance their defences. It offers a tailored approach by classifying the CIS controls into three implementation groups (IG1, IG2, and IG3) based on the organisation's security maturity level and resources.The classifications are:IG1: Essential cyber hygiene for small businesses with limited resources, providing fundamental steps to defend against common cyber threats.IG2: Advances protection for midsize businesses, addressing social engineering threats and incident response management.

IG3: Comprehensive defence for larger SMBs, incorporating application software security and penetration testing to enhance information security posture.

While the CIS controls provide a strong foundation, each organisation must customise its security measures based on its unique risk profile and tolerance. Regularly tracking security metrics and the ongoing improvements to the security posture are essential for staying ahead of cyber threats.

Original post:
Cyber Security challenge: SMBs and large enterprises face common threat but separate response routes - The Economic Times

The Growing Importance of Global Risk Analytics in Internet Security – Fagen wasanni

Understanding the Growing Importance of Global Risk Analytics in Internet Security

The growing importance of global risk analytics in internet security cannot be overstated. As the digital landscape continues to evolve, so too do the threats that businesses and individuals face online. Cybersecurity is no longer just about protecting against viruses and malware; its about understanding and mitigating risks on a global scale. This is where global risk analytics comes into play.

Global risk analytics is a field that combines data analysis with risk management to identify, assess, and mitigate potential threats. It involves collecting and analyzing vast amounts of data from various sources, including social media, news reports, and other online platforms, to identify patterns and trends that could indicate potential risks. This information is then used to develop strategies to prevent or mitigate these risks, thereby enhancing internet security.

The rise of global risk analytics in internet security can be attributed to several factors. Firstly, the increasing digitization of businesses and the proliferation of internet-connected devices have created a vast amount of data that can be analyzed for potential threats. Secondly, the growing sophistication of cybercriminals and their ability to launch complex, coordinated attacks across borders has necessitated a more comprehensive approach to cybersecurity.

Moreover, the global nature of the internet means that threats can originate from anywhere in the world. Cybercriminals often exploit differences in legal and regulatory frameworks between countries to evade detection and prosecution. Global risk analytics allows businesses to understand and anticipate these threats, enabling them to implement effective security measures regardless of where the threats originate.

The use of global risk analytics in internet security also has significant implications for regulatory compliance. Many countries have introduced stringent data protection laws that require businesses to take proactive steps to protect their customers data. By identifying potential risks and implementing appropriate security measures, businesses can ensure they remain compliant with these regulations, thereby avoiding hefty fines and damage to their reputation.

Furthermore, global risk analytics can also help businesses to protect their bottom line. Cyberattacks can result in significant financial losses, both in terms of the immediate costs of dealing with the attack and the longer-term impact on customer trust and brand reputation. By identifying and mitigating potential threats before they materialize, businesses can avoid these costs and ensure their continued profitability.

In conclusion, the growing importance of global risk analytics in internet security reflects the changing nature of the digital landscape. As businesses become increasingly digital and cyber threats become more sophisticated, the need for a comprehensive, data-driven approach to cybersecurity has never been greater. Global risk analytics provides businesses with the tools they need to understand and mitigate these threats, ensuring their continued success in the digital age. As such, it is likely that the role of global risk analytics in internet security will continue to grow in the coming years.

The rest is here:
The Growing Importance of Global Risk Analytics in Internet Security - Fagen wasanni

The Role of Internet Security Services in Shaping Africa and the … – Fagen wasanni

Exploring the Impact of Internet Security Services on Africa and the Middle Easts Digital Transformation

The digital landscape of Africa and the Middle East is undergoing a significant transformation, with internet security services playing a pivotal role in shaping this change. As these regions continue to embrace digital technologies, the need for robust cybersecurity measures has become increasingly apparent. The rise of digital platforms has brought about a surge in cyber threats, necessitating the implementation of advanced internet security services to safeguard digital assets and ensure the integrity of online transactions.

The advent of the digital age has brought about a plethora of opportunities for Africa and the Middle East. From e-commerce and online banking to digital education and telemedicine, the internet has revolutionized various sectors, driving economic growth and fostering social inclusion. However, this digital transformation has also exposed these regions to a host of cyber threats, including data breaches, phishing attacks, and ransomware.

In response to these challenges, internet security services have emerged as a critical component of the digital infrastructure in Africa and the Middle East. These services encompass a wide range of solutions designed to protect digital platforms from cyber threats, including firewalls, antivirus software, and encryption technologies. By implementing these measures, businesses and individuals can safeguard their digital assets, ensuring the confidentiality, integrity, and availability of their data.

Moreover, internet security services are instrumental in fostering trust in digital platforms. As consumers become increasingly aware of the risks associated with online transactions, the demand for secure digital platforms has grown exponentially. By providing robust security measures, businesses can enhance their credibility, attract more customers, and drive their digital growth.

In addition to protecting digital assets, internet security services also play a crucial role in supporting regulatory compliance. With governments in Africa and the Middle East introducing stringent cybersecurity regulations, businesses are required to implement robust security measures to comply with these laws. Internet security services can help businesses meet these regulatory requirements, avoiding hefty fines and protecting their reputation.

Furthermore, the rise of internet security services has also spurred job creation in Africa and the Middle East. As the demand for these services continues to grow, businesses are increasingly seeking skilled cybersecurity professionals to protect their digital assets. This has led to the creation of numerous job opportunities in the cybersecurity field, contributing to economic growth and social development in these regions.

However, despite the significant strides made in enhancing internet security, challenges remain. Limited awareness of cyber threats, lack of skilled cybersecurity professionals, and inadequate investment in cybersecurity infrastructure are some of the key obstacles hindering the adoption of internet security services in Africa and the Middle East.

To overcome these challenges, concerted efforts are needed from governments, businesses, and educational institutions. Governments need to invest in cybersecurity infrastructure, introduce comprehensive cybersecurity laws, and promote cybersecurity education. Businesses, on the other hand, need to prioritize cybersecurity in their digital strategies, invest in advanced security technologies, and foster a culture of cybersecurity awareness among their employees.

In conclusion, internet security services are playing a pivotal role in shaping the digital landscape of Africa and the Middle East. By safeguarding digital assets, fostering trust in digital platforms, supporting regulatory compliance, and spurring job creation, these services are driving the digital transformation of these regions. However, to fully harness the potential of these services, concerted efforts are needed to overcome the existing challenges and build a secure and resilient digital ecosystem.

Excerpt from:
The Role of Internet Security Services in Shaping Africa and the ... - Fagen wasanni

2022 Top Routinely Exploited Vulnerabilities – CISA

SUMMARY

The following cybersecurity agencies coauthored this joint Cybersecurity Advisory (CSA):

This advisory provides details on the Common Vulnerabilities and Exposures (CVEs) routinely and frequently exploited by malicious cyber actors in 2022 and the associated Common Weakness Enumeration(s) (CWE). In 2022, malicious cyber actors exploited older software vulnerabilities more frequently than recently disclosed vulnerabilities and targeted unpatched, internet-facing systems.

The authoring agencies strongly encourage vendors, designers, developers, and end-user organizations to implement the recommendations found within the Mitigations section of this advisoryincluding the followingto reduce the risk of compromise by malicious cyber actors.

Download the PDF version of this report:

In 2022, malicious cyber actors exploited older software vulnerabilities more frequently than recently disclosed vulnerabilities and targeted unpatched, internet-facing systems. Proof of concept (PoC) code was publicly available for many of the software vulnerabilities or vulnerability chains, likely facilitating exploitation by a broader range of malicious cyber actors.

Malicious cyber actors generally have the most success exploiting known vulnerabilities within the first two years of public disclosurethe value of such vulnerabilities gradually decreases as software is patched or upgraded. Timely patching reduces the effectiveness of known, exploitable vulnerabilities, possibly decreasing the pace of malicious cyber actor operations and forcing pursuit of more costly and time-consuming methods (such as developing zero-day exploits or conducting software supply chain operations).

Malicious cyber actors likely prioritize developing exploits for severe and globally prevalent CVEs. While sophisticated actors also develop tools to exploit other vulnerabilities, developing exploits for critical, wide-spread, and publicly known vulnerabilities gives actors low-cost, high-impact tools they can use for several years. Additionally, cyber actors likely give higher priority to vulnerabilities that are more prevalent in their specific targets networks. Multiple CVE or CVE chains require the actor to send a malicious web request to the vulnerable device, which often includes unique signatures that can be detected through deep packet inspection.

Table 1 shows the top 12 vulnerabilities the co-authors observed malicious cyber actors routinely exploiting in 2022:

In addition to the 12 vulnerabilities listed in Table 1, the authoring agencies identified vulnerabilitieslisted in Table 2that were also routinely exploited by malicious cyber actors in 2022.

The authoring agencies recommend vendors and developers take the following steps to ensure their products are secure by design and default:

For more information on designing secure-by-design and -default products, including additional recommended secure-by-default configurations, see joint guide Shifting the Balance of Cybersecurity Risk: Principles and Approaches for Security-by-Design and -Default.

The authoring agencies recommend end-user organizations implement the mitigations below to improve cybersecurity posture on the basis of the threat actors activity. These mitigations align with the cross-sector Cybersecurity Performance Goals (CPGs) developed by CISA and the National Institute of Standards and Technology (NIST). The CPGs provide a minimum set of practices and protections that CISA and NIST recommend all organizations implement. CISA and NIST based the CPGs on existing cybersecurity frameworks and guidance to protect against the most common and impactful threats, tactics, techniques, and procedures. Visit CISAs Cross-Sector Cybersecurity Performance Goals for more information on CPGs, including additional recommended baseline protections.

The information in this report is being provided as is for informational purposes only. CISA, FBI, NSA, ACSC, CCCS, NCSC-NZ, CERT NZ, and NCSC-UK do not endorse any commercial product or service, including any subjects of analysis. Any reference to specific commercial products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring.

This document was developed by CISA, NSA, FBI, ACSC, CCCS, NCSC-NZ, CERT NZ, and NCSC-UK in furtherance of their respective cybersecurity missions, including their responsibilities to develop and issue cybersecurity specifications and mitigations.

[1] Apache Log4j Vulnerability Guidance

August 3, 2023: Initial version.

CVE

Vendor

Affected Products and Versions

Patch Information

Resources

CVE-2017-0199

Microsoft

Multiple Products

Microsoft Office/WordPad Remote Code Execution Vulnerability w/Windows

CVE-2017-11882

Microsoft

Office, Multiple Versions

Microsoft Office Memory Corruption Vulnerability, CVE-2017-11882

CVE-2018-13379

Fortinet

FortiOS and FortiProxy 2.0.2, 2.0.1, 2.0.0, 1.2.8, 1.2.7, 1.2.6, 1.2.5, 1.2.4, 1.2.3, 1.2.2, 1.2.1, 1.2.0, 1.1.6

FortiProxy - system file leak through SSL VPN special crafted HTTP resource requests

Joint CSAs:

Iranian Government-Sponsored APT Cyber Actors Exploiting Microsoft Exchange and Fortinet Vulnerabilities in Furtherance of Malicious Activities

Russian State-Sponsored Cyber Actors Target Cleared Defense Contractor Networks to Obtain Sensitive U.S. Defense Information and Technology

APT Actors Chaining Vulnerabilities Against SLTT, Critical Infrastructure, and Elections Organizations

CVE-2019-11510

Ivanti

Pulse Secure Pulse Connect Secure versions, 9.0R1 to 9.0R3.3, 8.3R1 to 8.3R7, and 8.2R1 to 8.2R12

SA44101 - 2019-04: Out-of-Cycle Advisory: Multiple vulnerabilities resolved in Pulse Connect Secure / Pulse Policy Secure 9.0RX

CISA Alerts:

Continued Exploitation of Pulse Secure VPN Vulnerability

Chinese Ministry of State Security-Affiliated Cyber Threat Actor Activity

ACSC Advisory:

2019-129: Recommendations to mitigate vulnerability in Pulse Connect Secure VPN Software

Joint CSA:

APT Actors Chaining Vulnerabilities Against SLTT, Critical Infrastructure, and Elections Organizations

CCCS Alert:

APT Actors Target U.S. and Allied Networks - Update 1

CVE-2019-0708

Microsoft

Remote Desktop Services

Remote Desktop Services Remote Code Execution Vulnerability

CVE-2019-19781

Citrix

ADC and Gateway version 13.0 all supported builds before 13.0.47.24

NetScaler ADC and NetScaler Gateway, version 12.1 all supported builds before 12.1.55.18; version 12.0 all supported builds before 12.0.63.13; version 11.1 all supported builds before 11.1.63.15; version 10.5 all supported builds before 10.5.70.12

SD-WAN WANOP appliance models 4000-WO, 4100-WO, 5000-WO, and 5100-WO all supported software release builds before 10.2.6b and 11.0.3b

CVE-2019-19781 - Vulnerability in Citrix Application Delivery Controller, Citrix Gateway, and Citrix SD-WAN WANOP appliance

Joint CSAs:

APT Actors Chaining Vulnerabilities Against SLTT, Critical Infrastructure, and Elections Organizations

Chinese Ministry of State Security-Affiliated Cyber Threat Actor Activity

CCCS Alert:

Detecting Compromises relating to Citrix CVE-2019-19781

CVE-2020-5902

F5

BIG IP versions 15.1.0, 15.0.0 to 15.0.1, 14.1.0 to 14.1.2, 13.1.0 to 13.1.3, 12.1.0 to 12.1.5, and 11.6.1 to 11.6.5

K52145254: TMUI RCE vulnerability CVE-2020-5902

CISA Alert:

Threat Actor Exploitation of F5 BIG-IP CVE-2020-5902

CVE-2020-1472

Microsoft

Windows Server, Multiple Versions

Microsoft Security Update Guide: Netlogon Elevation of Privilege Vulnerability, CVE-2020-1472

ACSC Advisory:

2020-016: Netlogon Elevation of Privilege Vulnerability (CVE-2020-1472)

Joint CSA:

APT Actors Chaining Vulnerabilities Against SLTT, Critical Infrastructure, and Elections Organizations

CCCS Alert:

Microsoft Netlogon Elevation of Privilege Vulnerability - CVE-2020-1472 - Update 1

CVE-2020-14882

Oracle

WebLogic Server, versions 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0

Oracle Critical Patch Update Advisory - October 2020

CVE-2020-14883

Oracle

WebLogic Server, versions 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0

Oracle Critical Patch Update Advisory - October 2020

CVE-2021-20016

SonicWALL

SSLVPN SMA100, Build Version 10.x

Confirmed Zero-day vulnerability in the SonicWall SMA100 build version 10.x

CVE-2021-26855

Microsoft

Exchange Server, Multiple Versions

Microsoft Exchange Server Remote Code Execution Vulnerability, CVE-2021-26855

CISA Alert:

See more here:
2022 Top Routinely Exploited Vulnerabilities - CISA

Industrial Internet Security Situational Awareness Platform Market to Show Incredible Growth and Forecast by 2 – openPR

Industrial Internet Security Situational Awareness Platform Market

Industrial Internet Security Situational Awareness Platform market report presents an overview of the market on the basis of key parameters such as market size, revenue, sales analysis and key drivers. The market size of global Industrial Internet Security Situational Awareness Platform market is anticipated to grow at large scale over the forecast period (2023-2029). The main purpose of the study report is to give users an extensive viewpoint of the market. The report exhibits both Industrial Internet Security Situational Awareness Platform market quantitative as well as qualitative data with tables and figures displayed in the form of bar graphs, and pie charts. Key drivers as well as challenges of the market are discussed in the report. Also reports provides an in depth analysis of the Industrial Internet Security Situational Awareness Platform market with current and future trends.

In addition, the market research industry delivers the detailed analysis of the global Industrial Internet Security Situational Awareness Platform market for the estimated forecast period. The market research study delivers deep insights about the different market segments based on the end-use, types and geography. One of the most crucial feature of any report is its geographical segmentation of the market that consists of all the key regions. This section majorly focuses over several developments taking place in the region including substantial development and how are these developments affecting the market. Regional analysis provides a thorough knowledge about the opportunities in business, market status& forecast, possibility of generating revenue, regional market by different end users as well as types and future forecast of upcoming years.

Get a Sample PDF of the report @ https://www.themarketinsights.com/request-sample/362534

What`s New for 2023?

Special coverage on Russia-Ukraine war; global inflation; easing of zero-Covid policy in China and its `bumpy` reopening; supply chain disruptions, global trade tensions; and risk of recession.Global competitiveness and key competitor percentage market sharesMarket presence across multiple geographies - Strong/Active/Niche/TrivialOnline interactive peer-to-peer collaborative bespoke updatesAccess to digital archives and Research PlatformComplimentary updates for one year

Key Players in the Industrial Internet Security Situational Awareness Platform market:

Trend Micro, Siemens AG, Honeywell, Hangzhou DPtech Technology, WINICSSEC, HUAWEI, SBR-info, Beijing Leadsec Technology Co., Ltd, Venustech, QIANXIN.COM, DAS security, NSFOCUS, Topsec Technologies Group

Cataloging the Competitive Terrain of the Industrial Internet Security Situational Awareness Platform Market:

The report provides an overview of every manufacturers and the products developed by each manufacturer along with the application scope of every product.Data regarding the market share of every company, as well as sales figures concerning each firm, is stated in the report.Details regarding the profit margins and price patterns have been inculcated in the report.

Get a Discount on Research Report @ https://www.themarketinsights.com/check-discount/362534

Segmentation Analysis of the Market:

Global Industrial Internet Security Situational Awareness Platform Market forecast report provides a holistic evaluation of the market. The report offers a comprehensive analysis of key segments, trends, drivers, restraints, competitive landscape, and factors that are playing a substantial role in the market. Global Industrial Internet Security Situational Awareness Platform Market segments and Market Data Break Down are illuminated

By Product Type, the market is primarily segmented into:

Cloud Deployment, Local Deployment

By Applications, the market is segmented into:

Chemical, Industrial, Energy, Other

Industrial Internet Security Situational Awareness Platform Market Regional Analysis:

Geographically,this report is segmented into several key regions, with sales, revenue, market share and growth Rate of Industrial Internet Security Situational Awareness Platform in these regions, covering

North America(USA, Canada and Mexico)Europe(UK, Germany, France and the Rest of Europe)Asia Pacific(China, Japan, India, and the Rest of the Asia Pacific region)South America(Brazil, Argentina and the Rest of South America)Middle East and Africa(GCC and Rest of the Middle East and Africa)

** Note - This report sample includes:

Scope For 2024Brief Introduction to the research report.Table of Contents (Scope covered as a part of the study)Top players in the marketResearch framework (structure of the report)Research methodology adopted by The Market Insights

The Global Industrial Internet Security Situational Awareness Platform Market Industry Report Covers The Following Data Points:

: This section covers the global Market overview, including the basic market introduction, market analysis by its applications, type, and regions. The major regions of the global Market industry include North America, Europe, Asia-Pacific, and the Middle-East and Africa. Industrial Internet Security Situational Awareness Platform Market industry statistics and outlook are presented in this section. Market dynamics states the opportunities, key driving forces, market risk are studied.

: This section covers Market manufacturers profile based on their business overview, product type, and application. Also, the sales volume, market product price, gross margin analysis, and share of each player is profiled in this report.

: These sections present the market competition based on sales, profits, and market division of each manufacturer. It also covers the industry scenario based on regional conditions.

: These sections provide forecast information related to Industrial Internet Security Situational Awareness Platform Market for each region. The sales channels include direct and indirect Marketing, traders, distributors, and development trends are presented in this report.

: In these sections, Industry key research conclusions and outcome, analysis methodology, and data sources are covered.

Request for Customization @ https://www.themarketinsights.com/request-customization/362534

The study analyzes numerous factors that are influencing the Industrial Internet Security Situational Awareness Platform market from supply and demand side and further evaluates market dynamics that are impelling the market growth over the prediction period. In addition to this, the Industrial Internet Security Situational Awareness Platform market report provides inclusive analysis of the SWOT and PEST tools for all the major regions. The report offers regional expansion of the industry with their product analysis, market share and brand specifications. Furthermore, the Industrial Internet Security Situational Awareness Platform market study offers an extensive analysis of the political, economic and technological factors impelling the growth of the market across these economies.

In the final section of the report on Industrial Internet Security Situational Awareness Platform Market, the dashboard view of the companies is provided, to compare the current industrial scenario and their contribution in total Industrial Internet Security Situational Awareness Platform Market. Moreover, it is primarily designed to provide clients with an objective and detailed comparative assessment of key providers specific to a market segment. Report audiences can gain segment-specific manufacturer insights to identify and evaluate key competitors based on the in-depth assessment of their capabilities and success in the Industrial Internet Security Situational Awareness Platform Marketplace.

What makes the information worth buying?

A comprehensive and in-depth overview of the global Industrial Internet Security Situational Awareness Platformindustry in exchange, use, and geographical area sectors is provided.

This research looks at the industry rewards and constraints that influence industry growth.

Developing business strategies and aspects to aid in an emerging market.

Examining free markets and developing appropriate strategies.

Direct Contact:Jitendra Kotwal +1 (614) 602 2897 | +919926555007Email - sales@themarketinsights.comWebsite - https://www.themarketinsights.com

About us:

Delivering foresights along with statistical analysis of the operational business industry impacts has been our foremost priority. With the constant developments in the research & development industry, we have always challenged the conventional research methodologies and discovered new research tactics to evolve the growing B2B requirements.

This release was published on openPR.

Read more:
Industrial Internet Security Situational Awareness Platform Market to Show Incredible Growth and Forecast by 2 - openPR

Addressing the growing threat of cyber attacks – International Water … – International Water Power and Dam Construction

With a new survey finding that only a small minority of companies are ready to defend against cybersecurity threats, experts are warning against the danger of complacency

According to the inaugural Cybersecurity Readiness Index released recently by Cisco, a mere 15% of organisations worldwide possess the necessary level of readiness to effectively combat modern cybersecurity risks. This index was developed in response to the hybrid work environment that emerged after the COVID-19 pandemic, emphasizing the importance of securing users and data in diverse work settings. The report underscores both the strengths and weaknesses of businesses cybersecurity preparedness, highlighting the urgent need for action by global business and security leaders.

Previously, organizations operated in a static manner, with individuals using single devices from a single location and connecting to a fixed network. However, the shift towards a hybrid world has introduced new cybersecurity challenges as people now operate from multiple devices and locations, access applications in the cloud, connect to various networks, and generate large volumes of data.

Titled Cisco Cybersecurity Readiness Index: Resilience in a Hybrid World, the report assesses the resilience of companies in defending against modern threats. It evaluates five core pillars essential for effective defense: identity, devices, network, application workloads, and data. Within these pillars, the report encompasses 19 different solutions.

The survey, conducted by an independent third party, collected responses from 6700 cybersecurity leaders in the private sector across 27 markets. Respondents were asked to indicate which solutions they had deployed and at what stage of deployment. Based on their responses, companies were classified into four stages of increasing readiness: Beginner, Formative, Progressive, and Mature.

The findings reveal a significant readiness gap, with only 15% of companies categorized as Mature. More than half of the companies globally (55%) fall into the Beginner (8%) or Formative (47%) stages, indicating below-average performance in terms of cybersecurity readiness.

This readiness gap is particularly concerning given that 82% of respondents anticipate a cybersecurity incident disrupting their business within the next 12 to 24 months. The cost of being unprepared can be substantial, as 60% of respondents reported experiencing a cybersecurity incident in the past year, with 41% of those affected stating that it cost them at least US$500,000.

Jeetu Patel, executive vice president and general manager of security and collaboration at Cisco, emphasised the need for organisations to shift from using an assortment of individual security tools to integrated platforms that enhance security resilience while reducing complexity. By doing so, businesses can address the cybersecurity readiness gap effectively.

As companies invest in improving their cybersecurity readiness, their confidence in handling risks is also expected to increase. Currently, among companies categorised as Mature, 53% expressed being Very Confident in their ability to tackle risks. In contrast, only 30% of companies in the Beginner stage and 34% in the Formative stage share the same level of confidence.

To build secure and resilient organizations, business leaders must establish a baseline of readiness across the five security pillars, suggests the report. This is especially critical considering that 86% of respondents plan to increase their security budgets by at least 10% over the next 12 months. By establishing this baseline, organisations can capitalize on their strengths, prioritise areas requiring improvement, and enhance their overall resilience.

Over 800 cyber security delegates attended ABBs Ransom-Aware OT Defense Summit on April 19, organized in partnership with the global technology advisory board Industry IoT. The event focused on strategies to reduce risk of ransomware attacks and identify security threats to critical infrastructure.

The likelihood of being attacked is no longer a matter of if but when. Being complacent when it comes to cyber security can be as dangerous as an attack itself, and not being prepared is no longer an option, said Ragnar Schierholz, Global Cyber Security Portfolio Manager at ABB.

During the event, ABB launched its Defense in Depth playbook which includes a recommended risk reduction roadmap for customers and outlines strategies that leverage multiple security measures and defensive mechanisms to protect systems and data from vulnerabilities.

Defense in depth is a tried and tested strategy that can be universally applied to reduce cyber risk, said Joseph Catanese, Cyber Security Practice Lead at ABB and author of the playbook. We have created a guide that shares examples of best practice, with a focus on reducing the surface area of vulnerability. To explain it better, lets visualise a dartboard which represents all the openings an attacker can use to access a machine or system. Each dart that lands on the dartboard is a successful attack. The larger the dartboard, the higher the probability that a dart will stick to the board. However, reducing the surface area will make it more difficult to successfully land on the board.

The efficacy of the defense in depth methodology has been widely acknowledged. The National Institute of Technology (NIST) recommends using it from the very start through to the design of security and privacy architectures. The International Society of Automation (ISA) refers to it as a superior approach to achieving security objectives.

This methodology will help organisations find the best approach to industrial cyber security, to successfully reduce risk of cyber attacks, and therefore downtime, while enabling digitalisation, said Curt Dukes, Executive Vice President and General Manager at the Center for Internet Security (CIS).

ABBs summit brought together industrial cyber experts and technology leaders from companies including IBM, Cisco, Boston Consulting Group, Johnson Matthey, BASF Digital Solutions, Norsk Hydro and Boliden.

Our research shows we still have a lot of work to do to secure our modern connected society, but also that we cant do it all and so need to choose wisely where our focus goes. What is clear is that everybody has the same fear, uncertainty and doubt around what we do not know, and about which doors and windows of their technology castle have been left open, said Derek Harp, Founder and Chairman of The Control System Cyber Security Association International (CS2AI).

Waterfall Security Solutions, an operational technology (OT) security company, and Atlantic Data Security, a cybersecurity solutions provider, recently announced a partnership to protect data centers, building automation systems and critical infrastructure facilities. With attacks on OT networks becoming more powerful and pervasive, this new partnership aims to provide owners and operators with solutions to improve the security posture and preparedness of physical operations.

Providing our clients with the strongest and most advanced OT cyber protection is a top priority for Atlantic Data Security, said Scott Kasper, Executive VP and General Manager for Atlantic Data Security. The partnership with Waterfall Security Solutions reflects this commitment and will improve protection for OT networks from steadily increasing ransomware and targeted attacks.

Waterfalls partnership with Atlantic Data Security is driven by a shared commitment and vision to provide data center facilities and industrial customers with the strongest cyber protection possible, while enabling technological advancement and efficiencies for these owners and operators, added Lior Frenkel, CEO and Co-Founder at Waterfall. The Waterfall Atlantic Data Security partnership brings the strongest unidirectional solutions, providing unbreachable protection for our joint customers.

Waterfall Unidirectional Security Gateways and related solutions are used by some of the worlds most secure industrial sites. Unidirectional Gateways provide hardware-enforced, engineering-grade protection for industrial operations, and are designed to integrate easily into any industrial and operations environment. With the new partnership in place, Waterfall and Atlantic Data Security will provide customers in data centers, power generation, manufacturing, oil & gas, water treatment and more, with the security solutions and support required to maintain the essential elements of a robust OT security infrastructure.

In addition to the partnership with Atlantic Data Security, Waterfall Security Solutions has also joined forces with TCSS to secure OT networks, industrial processes and critical infrastructure in the energy and utilities industries. Advanced automation and the connectivity such automation requires make critical infrastructures and other industrial processes vulnerable to cyberattacks. Worst-case consequences of compromised OT systems can be unacceptable, ranging from damage to long lead-time assets, to employee casualties and even threats to public safety. This new partnership is a timely response to todays steadily deteriorating cyber threat environment.

Joining forces with Waterfall Security Solutions advance our shared goals of better serving our customers and providing them with secure and consolidated OT digitalization solutions, said Dr. Robert Herscovici, Founder and CEO of TCSS. Strong cybersecurity solutions accelerate the deployment of advanced automation solutions, by removing cyber risk as an impediment to innovation.

Critical infrastructure products and services must be both reliable and affordable, commented Lior Frenkel. Our partnership with TCSS brings both TCSS expertise and Waterfall Securitys products and long experience to bear on the task of automating infrastructures for increased efficiencies, while thoroughly securing those infrastructures from cyber attacks.

More here:
Addressing the growing threat of cyber attacks - International Water ... - International Water Power and Dam Construction

The Impact of Passive Authentication on Internet Security Measures – Fagen wasanni

Exploring the Impact of Passive Authentication on Internet Security Measures

The advent of the digital age has brought with it a myriad of advancements, one of which is the evolution of internet security measures. Among these measures, passive authentication has emerged as a significant player, revolutionizing the way we protect our online data. This article explores the impact of passive authentication on internet security measures, shedding light on its benefits and potential drawbacks.

Passive authentication is a security measure that verifies the identity of a user without requiring any direct interaction. It operates in the background, analyzing various factors such as the users behavior, device, and location to confirm their identity. This method of authentication has gained traction due to its ability to provide a seamless user experience while maintaining a high level of security.

One of the most significant impacts of passive authentication on internet security measures is its ability to enhance user convenience. Traditional security measures often require users to remember complex passwords or go through multiple steps to verify their identity. In contrast, passive authentication eliminates these hurdles, allowing users to access their accounts effortlessly. This not only improves the user experience but also encourages users to adopt better security practices.

Moreover, passive authentication has proven to be effective in combating cyber threats. By continuously monitoring user behavior and other factors, it can detect anomalies that may indicate fraudulent activity. For instance, if a user who typically logs in from New York suddenly attempts to access their account from a different location, the system can flag this as suspicious and take appropriate action. This real-time detection capability significantly enhances the overall security posture.

However, the implementation of passive authentication is not without challenges. Privacy concerns are at the forefront of these issues. Since passive authentication involves the collection and analysis of user data, it raises questions about how this data is stored and used. Companies must ensure they adhere to data privacy regulations and maintain transparency with users about their data handling practices.

Another potential drawback is the risk of false positives. While passive authentication is designed to detect unusual behavior, it may sometimes flag legitimate actions as suspicious. This could lead to unnecessary interruptions in service and frustration for the user. Therefore, its crucial for companies to continually refine their algorithms to minimize these occurrences.

Despite these challenges, the benefits of passive authentication are undeniable. It offers a balance between security and convenience, a combination that is highly sought after in todays digital landscape. As cyber threats continue to evolve, so too must our security measures. Passive authentication represents a significant step forward in this regard, providing a robust and user-friendly solution to protect online data.

In conclusion, the impact of passive authentication on internet security measures is profound. It has transformed the way we approach online security, offering a more convenient and effective solution. While it does present certain challenges, with careful implementation and ongoing refinement, passive authentication can significantly enhance our defense against cyber threats. As we continue to navigate the digital age, its clear that passive authentication will play a pivotal role in shaping the future of internet security.

Read the original:
The Impact of Passive Authentication on Internet Security Measures - Fagen wasanni