Page 2,571«..1020..2,5702,5712,5722,573..2,5802,590..»

Cardano and Five Altcoins Set To Outperform Bitcoin As New Phase of Market Cycle Begins, Predicts Crypto St… – The Daily Hodl

A popular crypto strategist and trader says six mid-to-large cap altcoins will likely shine brighter than Bitcoin (BTC) in the coming months.

The pseudonymous crypto analyst known in the industry as Capo tells his 173,000 Twitter followers that he expects big moves from the smart contract platform Cardano (ADA).

ADA is currently trading at $2.28, virtually the same from a week ago after battling back from a low of $2.13 on Wednesday.

Capo, who uses Elliot Wave theory for much of his analysis, says ADA and a number of additional crypto assets appear to be at the start of a fresh altcoin season.

Elliot Wave theory is a form of technical analysis that aims to predict future price movements by identifying collective trader psychology that appears on charts in waves.

He points to a new bull wave that appears to be starting in the Altcoin Perpetual Futures Index as one sign of whats to come.

ALTPERP bullish trend is intact too. Its also forming a potential cup and handle, whose minimum extension is very high. Maybe the w3 is starting here because many altcoins are starting their w3.

Capo is also looking for NOIA, the native token of the Syntropy ecosystem, to outperform BTC in the weeks and months ahead. Syntropy is an open-source protocol aimed at improving the internet via encryption and optimized performance. NOIA is priced at $0.40 at time of writing, up 14% over the past week, according to CoinGecko.

Next on the analysts list is COTI, an enterprise-grade platform that allows organizations to build their own payment solutions and digitize any form of currency using the networked datastructure protocol Trustchain. CoinGecko pegs COTI at $0.52, down 14% from $0.60 a week ago.

Next up is the decentralized machine-learning network Fetch.ai. The FET token is valued at $0.75, down 35% from its all-time high of $1.17 in early September.

The Ethereum-based virtual world known as The Sandbox is also on Capos list of coins that appear ready to outrun Bitcoin. The platforms native token SAND is designed to allow users to monetize their gaming experience. SAND currently sits at $0.79, having ranged between $0.76 and $0.88 since last Friday, according to CoinGecko.

Last on Capos list is the eSports and blockchain-based video entertainment protocol Verasity. Its native token VRA is up 60% over the last week to $0.05, including a 30% surge over the past 24 hours.

Capo further explains in a lengthy thread why hes seeing a new altcoin season in the making. He says Bitcoin appears to be targeting the six-figure mark.

During bull markets money tends to flow from Bitcoin to altcoins, because people [are] greedy and always want more profits.

Now Bitcoin is confirming the bullish scenario, and $100k and higher targets are likely to happen in the next few months. This would create the perfect scenario for people to get comfortable and start speculating on altcoins.

He is also seeing signs that Bitcoins dominance of the overall crypto market cap will lower but does warn of the potential of a major correction in early 2022, which might end the altseason as well as the overall crypto bull cycle.

Huge hidden bearish divergence showing up, and the green support is getting weaker.

In my opinion, it will take the 2018 lows (36.50%) and the altseason could end there.

Featured Image: Shutterstock/tunnelmotions/Dario Lo Presti

Read the original post:
Cardano and Five Altcoins Set To Outperform Bitcoin As New Phase of Market Cycle Begins, Predicts Crypto St... - The Daily Hodl

Read More..

Top 3 Price Prediction Bitcoin, Ethereum, XRP: Altcoin lag while BTC marches higher – FXStreet

Bitcoin price appears to have hit a minor top, with selling pressure pouring in during the late morning and early afternoon New York trade session. A bearish hammer candlestick pattern is developing, indicating a high is likely in. Ethereum shows some mixed behavior on its chart. Despite having an extremely bullish Ichimoku chart, buyers are not pursuing any follow-through to propel Ethereum price higher. XRP price remains in a very stagnate position.

Bitcoin price has made spectacular gains since last Friday, moving higher nearly 28% in a week. However, the current daily price action looks a little top-heavy, with some selling pressure coming at the $56,000 value area. I anticipate a -13% drop from the $56,000 level to return to the Tenkan-Sen between $48,000 and $50,000. There is a substantial gap between the daily candlesticks and the Tenkan-Sen; gaps do not last long between price and the Tenkan-Sen.

BTC/USD Daily Ichimoku Chart

Additionally, the Optex Bands oscillator shows Bitcoin is trading at extremes. The Composite Index has been trading at the second-highest level since July 29th and the third-highest level since December 19th, 2020. If the Relative Strength Index returns below the 65 level, we could see a continuation move south for Bitcoin that may extend beyond $48,000.

Ethereum price recently fulfilled all conditions necessary to confirm an Ideal Bullish Ichimoku Breakout pattern. Typically, significant momentum enters the market when this pattern completes, and strong buying support crashes in to rally the instrument higher. But while Ethereum has generated some higher moves above the Cloud, the response is not what one would expect to form such a bullish breakout. Warning signs exist in the oscillators that the move could be under threat of termination. The Optex Bands are at an extreme, and there is extended hidden bearish divergence in the Composite Index.

ETH/USD Daily Ichimoku Chart

Bulls should be wary of any loss of momentum and increases in selling pressure on faster time frames. If sellers take control, then bears will most likely retest the $3,000 level where the Tenkan-Sen, Kijun-Sen and 50% Fibonacci retracement line. However, if buyers continue pushing Ethereum higher and beyond the all-time high, nothing stops it from rallying to the $6,200 value area.

XRP price remains constricted inside the Ichimoku Cloud and continues to experience very choppy trading conditions. Buyers could be waiting for the Chikou Span to close above the candlesticks at $1.12, but XRP would still be inside the Cloud even if that even occurs. The same kind of hidden bearish divergence for Ethereum in the Composite Index also exists for XRP. XRP will be in danger of further sell-side pressure if it closes below the Cloud at $0.99. From there, bears may push XRP to test prior support near $0.84. If a breakout above the Cloud occurs, then the path to $3.00 should be relatively smooth.

XRP/USD Daily Ichimoku Chart

Traders and investors on both sides of the market should be prepared to see XRP price consolidate even further into October, until at least October 20th when the Cloud thins out to a mere sliver.

See the original post:
Top 3 Price Prediction Bitcoin, Ethereum, XRP: Altcoin lag while BTC marches higher - FXStreet

Read More..

Analytics Firm Issues Altcoin Warning, Says Crypto Asset Thats Surged 393,000% Year-to-Date Is Likely Ov… – The Daily Hodl

Blockchain analytics platform Santiment says that a memecoin which has soared by nearly 400% over the past seven days could be due for a correction.

Santiment points out that the number of Shiba Inus (SHIB) active deposits is extremely high, which suggests a possible reversal in the future.

Yellow flags starting here. Extremely high active deposits are suggesting that its probably a top forming.

The crypto analytics firm says that even though SHIB inflow to exchanges is not very high, it nevertheless hints that a reversal could be imminent.

Its not very high, we would expect to see much higher. But still its suggesting the same, probably a top forming.

Santiment also says that profit-taking by SHIB traders is low, an indication that traders are betting on the price of the memecoin surging even higher. The firm warns that markets often punish this kind of overconfidence.

potential profit-taking from Shiba is still relatively low, not a whole lot yet.

We would notice that higher price tops are built on lower profit-taking spikes. This could potentially indicate that traders are becoming too confident on price action, like no need to sell, its going to pump more. Market tends to punish this sort of confidence.

Shiba Inu is trading at $0.000034 at time of writing, according to CoinGecko. Since the start of the year when the memecoin was priced at $0.000000000077, SHIB has surged by over 440,000%. SHIB is currently ranked 12th by market cap.

Featured Image: Shutterstock/Giovanni Cancemi/Vladimir Sazonov

More:
Analytics Firm Issues Altcoin Warning, Says Crypto Asset Thats Surged 393,000% Year-to-Date Is Likely Ov... - The Daily Hodl

Read More..

How Small Businesses Can Fund Their Ransomware Protection – BizTech Magazine

Make Use of Cybersecurity Threat Feeds

With threat detection, its important to keep your ear to the ground to know whats coming, and publicly accessible threat feeds offer a way to do just that. Many of these feeds such as the Cybersecurity and Infrastructure Security Agencys Automated Indicator Sharing network, a program of the Department of Homeland Security are accessible to businesses as a way to understand potential risks. The AIS network is also available through information sharing and analysis centers (ISACs), which provide targeted information on threats to specific industries, as well as a way to privately share information about emerging threats.

The National Council of ISACs offers a starting point for specific fields; for those interested in signing up for more general feeds, the Center for Internet Security is a great place to start. These feeds, however, are often quite busy, making it difficult to know whether your business might be affected by a given threat. With that in mind, a security information and event management solution from a vendor such as RSA would make a good potential investment.

Ransomware has been a major area of focus for nonprofit organizations such as the National Cyber Security Alliance, which helps put on Cybersecurity Awareness Month and also publishes a variety of resources for businesses.

Organizations such as these offer digital resources that can help companies understand potential risks and how to avoid them. The Global Cyber Alliance, a nonprofit based in the United States and Europe, offers a toolkit targeted at small businesses that lays out basic recommendations for both employers and team members, including tips for data encryption, website security and integrating multifactor authentication using tools such as Okta.

EXPLORE:How smaller organizations can benefit from cloud security posture management.

As a part of its cybersecurity offerings, the Small Business Administration and its resource partners offer a variety of free and low-cost events, largely virtual, geared specifically to small businesses, as does NCSA.

Associations can also serve as an asset for small businesses. Some in the financial and retail sectors, for example, have helped to create security resources that offer basic frameworks to follow when approaching topics such as penetration testing, insider threats and protocols around COVID-19 all of which can help a business strengthen its position. Others, such as the National Retail Federation, offer cyber risk exchanges to members that can help keep them abreast of the latest risks within their sector.

Each of these offerings can point you in the right direction to improve your approach to cybersecurity, and can provide information about potential threats and effective strategies for arming your employees with the information they need to avoid unwittingly creating problems down the line.

Of course, if a security event happens, you want to be able to respond quickly, and it helps to have resources readily available. CDWs incident response program offers no-fee retainer agreements that make incident response available immediately in the event of an attack. This lets you focus on solving the problem immediately, not how much the solution is going to cost.

The best way to save money now is to have a solution in place when something happens.

This article is part ofBizTech'sAgilITy blog series. Please join the discussionon Twitterbyusing the#SmallBizIT hashtag.

Continued here:
How Small Businesses Can Fund Their Ransomware Protection - BizTech Magazine

Read More..

Fortinet, Okta: With Cyberattacks on The Rise, Pick These Stocks – Forbes

BRAZIL - 2019/07/17: In this photo illustration the Fortinet logo is seen displayed on a smartphone. ... [+] (Photo Illustration by Rafael Henrique/SOPA Images/LightRocket via Getty Images)

Our theme of Cyber Security Stocks is up by about 25% year-to-date, meaningfully outperforming the S&P 500 which was up by about 16% over the same period. There has been a renewed interest in cybersecurity stocks, due to several high-profile cyber attacks in recent months, including the ransomware attacks on the Colonial pipeline and software company Kaseya, and the massive data breach at wireless behemoth T-Mobile. Moreover, with businesses increasingly moving online following the pandemic, there is a looming incentive for cybercriminals. For example, per the SonicWall Cyber Threat Report, there has been a 62% increase in ransomware attacks globally since 2019, and a 158% jump in North America. This could make companies and governments more serious about protecting their networks and digital infrastructure, translating into higher demand for cybersecurity tools and services in the years to come.

Within our theme, Fortinet, a company that provides cybersecurity-related hardware such as firewalls and software, has been the strongest performer, rising by about 101% year-to-date on account of stronger than expected quarterly results and its ongoing pivot to the cloud. On the other side, Okta stock (NASDAQ: OKTA) has been the weakest performer, with its stock price down by about 11% year-to-date.

[8/6/2021] Why Cyber Security Stocks Have Rallied Over The Last Month

Our theme of Cyber Security Stocks has gained a solid 6% over the last month and remains up by about 22% year-to-date. In comparison, the broader Nasdaq-100 NDAQ has returned about 18% over the same period. The recent outperformance comes on the back of a renewed interest in the cybersecurity space following several high-profile cyberattacks, including the recent attack on software company Kaseya and the ransomware attack on the Colonial Pipeline in May. This could make companies and governments more serious about protecting their networks and digital infrastructure, translating into higher demand for the companies in our theme in the years to come. Moreover, going by the performance of the few companies that have already reported results, investors are expecting strong numbers from cybersecurity players this earnings season.

Within our theme, Fortinet, a company that provides cybersecurity-related hardware such as firewalls and software, has been the strongest performer, rising by about 102% year-to-date on account of stronger than expected quarterly results and its ongoing pivot to the cloud. On the other side, the stock price for Qualys, a company that provides cloud security, compliance, and related services, remains down by about 14% this year, as its guidance for this fiscal year was weaker than expected. Other stocks in our theme include CrowdStrike CRWD , which is up 25% year-to-date, and Zscaler ZS which is up around 24%.

[6/8/2021] Cyber Security Stocks To Watch After Colonial Pipeline And JBS Hacks

Our theme of Cyber Security Stocks remains down by about 1% year-to-date, significantly underperforming the S&P 500 which has gained about 13% over the same period. However, the theme has picked up a bit since our last update in mid-May, when it was down by 6%. The underperformance versus the broader indices is likely due to the fact that most of the stocks in the theme are high-growth, high-multiple names that have been out of favor in the current market, as investors rotate into value and cyclical stocks to play the post-Covid boom in the U.S. economy. However, theres good reason for investors with a long-term view to increase their exposure to cybersecurity stocks. Companies and governments are getting more serious about protecting their networks and infrastructure, following multiple high-profile cybersecurity incidents in recent months, including the ransomware attack on the Colonial Pipeline, the SolarWinds SWI hack, and the recent cyber attack on JBS - the worlds largest meat supplier. The increasing shift from on-premise to cloud-based information systems should also make companies prioritize security. Moreover, IT spending by corporates, in general, is likely to pick up from this year, after they scaled back on spending in 2020 due to Covid-19. This should bode well for companies that provide software, hardware, and services that help protect computer systems and networks.

Within our theme, Fortinet FTNT a company that provides cybersecurity-related hardware and software, has been the strongest performer, rising by about 49% year-to-date on account of stronger than expected quarterly results and its pivot to the cloud. On the other side, the stock price for Qualys QLYS a company that provides cloud security, compliance, and related services, remains down by about 18% this year, as its guidance for this fiscal year was weaker than expected.

[5/17/2021]

Our theme of Cyber Security Stocks has declined by about -6% year-to-date, significantly underperforming the S&P 500 which has gained about 11% over the same period. However, the sector is likely to come back into focus for a couple of reasons. Firstly, there was a major cyber attack on the computer systems of the Colonial Pipeline forcing a shutdown of a pipeline that controls roughly half the gasoline, jet fuel, and diesel flowing along the U.S. East Coast. This marks the second major attack on core U.S. infrastructure in six months, coming on the heels of the Solar Winds hack which was reported last December. Secondly, last week, President Joe Biden signed an executive order aimed at bolstering the federal governments cybersecurity defenses, with a host of plans to implement stronger cybersecurity standards. The recent events are likely to cause companies and the U.S. government re-assess threats and potentially increase cybersecurity-related budgets. This should bode well for companies that provide software, hardware, and services that help protect computer systems and networks.

Within our theme, Fortinet, a company that provides cybersecurity-related hardware and software, has been the strongest performer, rising by about 37% year-to-date driven by stronger than expected earnings in recent quarters. On the other side, the stock price for Qualys a company that provides cloud security, compliance, and related services, remains down by about 18% this year, as its outlook for this fiscal year was lighter than analysts expected.

[4/14/2021] Hows Our Cybersecurity Theme Faring?

Our indicative portfolio of Cyber Security Stocks has declined by about -1% year-to-date, underperforming the S&P 500 which has gained about 10% over the same period. However, the theme remains up by over 130% since the end of 2019, significantly outperforming the broader markets. The recent sell-off comes as investors book profits on remote working and SaaS stocks that rallied big through the pandemic. However, this could present a good opportunity for investors to enter the cybersecurity space. Global IT spending is expected to pick up this year after a muted 2020, rising by about 8.4% to $4.1 trillion per Gartner IT . Cybersecurity is likely to be a major focus area for most companies given the increasing shift to distributed workplaces and cloud-based applications and some high-profile security breaches in recent months. Within our theme, Fortinet, a company that provides cybersecurity-related hardware and software, has been the strongest performer, rising by about 34% year-to-date driven by stronger than expected earnings. On the other side, Mimecast Limited, a company that develops cloud security and risk management services for email and corporate data, was the weakest performer declining -28% so far this year, as some of its products were impacted by a security breach in January.

[3/11/2021] Time To Buy Cybersecurity Stocks?

Our indicative portfolio of Cyber Security Stocks has declined by about 8% year-to-date, driven by the broader sell-off in technology and high growth stocks. The theme has also underperformed the Nasdaq-100, which is down by about 4% over the same period. However, we think this could be a good time to enter these stocks. Governments and corporations are likely to prioritize digital security spending following some recent high-profile cyber attacks. In December, there was a sizable data breach on U.S. Federal government computer systems, tied to network management software vendor SolarWinds. More recently, Verkada, a company that provides cloud-based security camera services to a host of institutions and companies including Tesla TSLA , was hacked. Within our theme, Fortinet, a company that provides cybersecurity-related hardware and software, has been the strongest performer, rising by about 21% year-to-date. On the other side, Mimecast Limited, a company that develops cloud security and risk management services for email and corporate data, was the weakest performer declining 25% so far this year.

[2/22/2021] Cybersecurity Stocks To Watch After SolarWinds Attack

Our indicative theme of Cybersecurity Stocks has returned over 150% since the end of 2019, compared to gains of about 21% on the S&P 500 over the same period. The theme is up by about 5% year-to-date. Cybersecurity companies typically provide software, hardware, and services that help protect computer systems and networks from data theft and potential disruption of services. The sector saw renewed interest late last year, following news of a large cyber-attack on IT infrastructure and network management software vendor SolarWinds, causing increasing concerns that software tools used daily by organizations and governments could be vulnerable. More broadly, following Covid-19, economic activity is increasingly moving online with businesses also becoming more distributed on account of the work from home trend. This should cause companies to prioritize their cybersecurity spending. Within our theme, Zscaler and CrowdStrike have been the strongest performers, with their stock prices rising by almost 5x each since the end of 2019. On the other hand, Qualys has underperformed, declining by about 16% over the same period.

See our Cybersecurity Stocks theme for a complete list of the companies in our theme and a look at their recent performance.

[5/22/2020] Cybersecurity Stocks

Cybersecurity stocks have rallied sharply this year, with our indicative theme of six cybersecurity stocks that include Palo Alto Networks PANW (NYSE: PANW), Zscaler (NASDAQ: ZS), and others up by about 28% year-to-date, on an equally weighted basis. While cybersecurity is a relatively diverse and complex sector, we believe there could be two broad trends driving the surge. Firstly, with the spread of the Coronavirus pandemic, more people have been working from home, and this has required companies to better secure corporate IT infrastructure, driving up demand for cybersecurity tools. Secondly, most of these companies offer their services on a subscription basis, with recurring revenue streams that could make them a stable bet during times of uncertainty. Its also very likely that the crisis will cause a structural shift in the way businesses operate, benefiting these stocks well past the pandemic. Our theme of Cyber Security Stocks outlines some of the key names in the cybersecurity space and how they have performed in recent years. A part of the analysis is summarized below.

Zscaler ($10 billion market cap, $303 million FY19 revenue), offers two tools, namely Zscaler Private Access which provides secure access to internally managed applications, that are hosted internally in data centers or in private or public clouds, and Zscaler Internet Access, which enables users to connect to externally managed applications such as Microsofts MSFT Office 365 and Salesforce. The stock has surged by 60% this year, as an increasingly distributed workforce drives demand for the companys secure access solutions.

Palo Alto Networks ($23 billion market cap, $2.9 billion revenue) is a cybersecurity company best known for its firewalls, which are network security devices that scan for malicious traffic. The company has been increasingly focusing on cloud-based software-as-a-service (SaaS) security tools. While the stock is down slightly year-to-date, partly due to slowing revenue growth, the company could be a good long-term bet as businesses increasingly move online.

CrowdStrike ($17 billion, $481 million revenue) offers a cloud-delivered endpoint protection platform, which relies on lightweight software running on the customers servers or laptops. These applications, in turn, send data to a cloud-based security system that analyses threats. The stock is up by over 60% year-to-date, as the coronavirus pandemic has expanded the companys addressable market meaningfully.

Invest with Trefis Market Beating Portfolios

See all Trefis Price Estimates

Read the original:
Fortinet, Okta: With Cyberattacks on The Rise, Pick These Stocks - Forbes

Read More..

Trend Micro blocks 41 billion cyber threats – manilastandard.net

Global cybersecurity leader Trend Micro Incorporated (TYO: 4704; TSE: 4704) announced in early September that it blocked 40.9 billion email threats, malicious files, and malicious URLs for customers in the first half of 2021, a 47% year-on-year increase.Ransomware remained the standout threat in the first half of the year as cybercriminals continued to target big-name victims and used Advanced Persistent Threat tools and techniques to steal and encrypt victims' data.Ransomware was a major threat to global organizations in the first half of 2021, but it was not the only one. Trend Micro's report also reveals: Business email compromise (BEC) attacks increased by 4%, potentially as a result of new COVID-19 opportunities for threat actors. The Philippines ranked fourth among Southeast Asian countries that encountered BEC threats at 8.4%, with Singapore ranking first at 55.8%. Cryptocurrency miners became the most detected malware, having surged ahead of WannaCry and web shells in recent months. The Zero Day Initiative reported 770 vulnerabilities, a slight (2%) drop from 1H 2020. A total of 164 malicious apps related to COVID-19 scams were detected, 54% of which impersonated TikTok. Healthcare is the top industry affected by ransomware in the Philippines, followed by food and beverage, then banking.According to a report by Hootsuite, the Philippines ranks the highest in internet and social media usage in the world. A Pew Research study conducted in 2020 also revealed that 60% of Filipinos own a smartphone. Given this, Filipinos are more likely to be exposed to malicious links and Android malware, especially if not equipped with proper internet security knowledge. The Philippines ranked first among Southeast Asian countries and third globally after the US and Japan in terms of users accessing malicious URLs, and second among Southeast Asian countries in terms of Android malware detected.Mitigating cyber risk effectively necessitates the thorough understanding of the scale, complexity, and specific characteristics of the threat landscape. said Alma Alvarez, Trend Micro Threat Hunting Director." Alongside the comprehensive protection Trend Micro provides against fast-evolving threats and our biannual roundup reports, our annual cyber security conference DECODE brings together industry professionals and presents the latest in local cybersecurity to empower and inform the continuous transformation of organizations digital infrastructures.The report's overall findings highlight the effectiveness of and increasing need for a holistic and scalable cybersecurity solution at the enterprise level. As threats continue to increase in frequency and sophistication, enterprise SOC teams will require a platform that can streamline security processes without sacrificing reliability.To read a full copy of the report, Attacks from All Angles: 2021 Midyear Security Roundup, please visit:https://www.trendmicro.com/vinfo/us/security/research-and-analysis/threat-reports/roundup/attacks-from-all-angles-2021-midyear-security-roundup

COMMENT DISCLAIMER: Reader comments posted on this Web site are not in any way endorsed by The Standard. Comments are views by thestandard.ph readers who exercise their right to free expression and they do not necessarily represent or reflect the position or viewpoint of thestandard.ph. While reserving this publications right to delete comments that are deemed offensive, indecent or inconsistent with The Standard editorial standards, The Standard may not be held liable for any false information posted by readers in this comments section.

See the article here:
Trend Micro blocks 41 billion cyber threats - manilastandard.net

Read More..

Oxford Statement on International Law Protections in Cyberspace: The Regulation of Ransomware Operations – Just Security

In the past few months, nothing has reminded everyone of the etymology of the expression computer virus like ransomware. This form of malicious code is delivered through a vulnerability in the victims system, such as a phishing email or password spraying, infiltrating and potentially crippling it like a disease. Specifically, ransomware is used to encrypt user data and either delete or release that data unless a demand (commonly for money) is met. Ipso facto, ransomware causesby definitionadverse consequences for its intended and unintended targets. Even when the ransom is paid or the attackers demand is eventually met, frequently a portion of the encrypted data will have been lost anyway and the victim may be forced to stay offline for a while, incurring significant costs to repair or change its systems. Where the victim serves others, for example, providing public goods like healthcare, education, or utilities, the adverse consequences can quickly, and foreseeably, spread beyond the ransomwares initial targets. In other cases, the means by which ransomware is delivered especially when delivered through or as part of a digital supply chain attack can produce a range of cascade effects harming entities who were not the real target of the operation but nonetheless suffer its consequences.

Recent months saw asignificant surgein ransomware operations. For instance, in May 2021, Colonial Pipeline, a United States oil pipeline system carrying gasoline and jet fuel, was forced to halt its operations to ensure system safety following aransomware attack. As a result, there was panic buying and shortage of gasoline which led to the highest average gasoline prices in the US for seven years. The attack on the meat provider JBS has been connected to a rise in the price of beef and pork. In the United Kingdom,ransomware attackshave targeted the education sector with increasing frequency, leading to the loss of student coursework, school financial records and data relating to COVID-19 testing. The internal network of Brazils National Treasury was hit by ransomware in August 2021, and September saw a ransomware operation against South Africas Justice Department. It is no wonder that using an expression that has sadly become all too common we are witnessing a ransomware epidemic. The cost of this epidemic, both financially and otherwise, may be very high. According to recent reports, India saw a significant increase in the financial impact of ransomware operations: the approximate recovery cost from the impact of ransomware tripled in the last year, up from $1.1 million in 2020, to $3.38 million in 2021.

The ever-growing number of attacks and increased professionalization of actors behind ransomware operations call for robust action by states to meaningfully protect cyber infrastructure under their jurisdiction and control. Countering ransomware is not just a matter of national security and good governance. It is an obligation under international law, one highlighted in the latest, and fifth, Oxford Statement on the Protections of International Law in Cyberspace. Like previous iterations of the Oxford Process, the Fifth Statement aims to reflect existing principles and rules of international law in their application to cyber operations and to call upon all states and other international actors to abide by them. Previous Oxford Statements on international law protections in cyberspace have focused on the rules of international law when viewed from the perspective of objects or processes which deserve protection, e.g. the rules which apply to cyber operations that target the health sector, vaccine research, electoral processes. However, as with our Fourth Statement, which sets out rules relating to information operations and activities, the present Statement focuses on a specific type or method of cyber operation.

While it may appear obvious that states must not themselves engage in ransomware, calling into play a set of negative obligations under international law, this is just the starting point. Ransomware is a problem not only when state-directed or state-sponsored, but even when carried out by non-state actors and tolerated or acquiesced in by different states, including the one from which it originates. For this reason, all states have an obligation to give effect to the well-established rules of international law requiring them to adopt protective measures against the harm caused by ransomware operations which are carried out by others. Those impose obligations not only to take feasible measures to put an end to harm caused to the rights of other states but also to take measures to prevent the infringement of the human rights of persons within the state in question. Duties to protect against ransomware may be complied with in several ways, ranging from the investigation and punishment of those responsible for ransomware and the training of specialized cybersecurity personnel, to the adoption of technical measures to strengthen cyber infrastructure, international cooperation and information-sharing. We very much hope that the adoption of these and other measures against ransomware will constitute an effective remedy, if not a cure against the particularly pernicious form of cyber operation that ransomware embodies.

Our survey of existing international law whose results are enshrined in the Statement reproduced below reveals that there is no space for ransomware in a healthy, peaceful, and prosperous international community. All states are called upon to fully commit to this vision.

The Fifth Statement and its current signatories are reproduced below. As with other Statements, we seek the broadest possible support within the profession from across the globe. International lawyers who wish to append their name to the statement are invited to express their interest via email tooxfordcyberstatement {at} gmail(.)com.

The Oxford Process is convened under the auspices of the Oxford Institute for Ethics, Law and Armed Conflict whose work on international law in cyberspace is supported by funding from Microsoft and the Government of Japan.

THE OXFORD STATEMENT ON INTERNATIONAL LAW PROTECTIONS IN CYBERSPACE: THE REGULATION OF RANSOMWARE OPERATIONS

Reiterating the commitment expressed in the First, Second, Third and Fourth Oxford Statements to clarify rules of international law applicable in the use of information and communications technologies;

Noting that ransomware (i.e. malware designed to encrypt data and render it unavailable unless a demand is met) is a global threat, having been employed at an escalating pace by a growing number of malicious actors, including states and non-state groups for financial or political purposes, often connected to criminal and other unlawful activities such as terrorism, human and drug trafficking, money laundering, sanctions evasion, and the proliferation of weapons of mass destruction;

Stressing that the COVID-19 pandemic and our increased dependency on the Internet and other information and communications technologies have enhanced vulnerabilities to and opportunities for ransomware and other types of malware that facilitate its distribution, including the targeting of remote control or monitoring systems and the use of phishing emails, malicious websites or false notifications;

Considering that ransomware has, in the vast majority of cases where it has been employed, caused significant and widespread harm to public and private institutions, as well as individuals, such as financial loss, reputational damage, breach of confidentiality, and the significant disruption of critical infrastructure, including healthcare and education, while posing an imminent risk of destructive harm to industrial control systems such as electric grids, water distribution systems and nuclear power plants;

Bearing in mind that ransomware can take increasingly varied and sophisticated forms, including targeted and indiscriminate operations, and lead to the denial of access to and/or the unauthorized release of data if demands are not met;

We agree that:

Read the original:
Oxford Statement on International Law Protections in Cyberspace: The Regulation of Ransomware Operations - Just Security

Read More..

Experts working to restore access to IT systems at NUIG – RTE.ie

Internet access at NUI Galway is still down following an attempted cyberattack a week ago.

All on-campus web traffic has been disabled, on both wired and wireless connections.

As a result, online activity has been severely impacted, with just some access possible via cloud-based services.

The university says external cyber security experts are working to analyse the attack, contain its impact and safely restore access to systems.

It has described the attack as "sophisticated and human directed".

So far, no evidence has been found to suggest a data breach occurred or that any material has been encrypted.

NUI Galway says it has not received any ransomware request.

The university is liaising with the National Cyber Security Centre, An Garda Sochna and the Department of Higher Education.

There is no timeframe for when full access to IT systems will be restored.

In the meantime, a temporary on-campus wi-fi network will be provided from this evening to allow internet access for students and staff.

The university says the analysis being carried out on its IT network is "an extremely complex and painstaking process".

In a statement this evening, it said it was acutely aware of the disruption being caused by the shutdown.

The President of the NUI Galway Students' Union says the shutdown has caused chaos for all aspects of college life.

Risn Nic Lochlainn said that as well as disrupting lectures and study plans, problems with the IT system were impacting applications for financial aid and laptop loans for students.

She said this was the last thing her members needed as they tried to negotiate a return to college after the difficulties caused by the pandemic.

Ms Nic Lochlainn said lecturers needed to be mindful of the additional pressures on students and to consider this when it came to assignment or project deadlines.

Here is the original post:
Experts working to restore access to IT systems at NUIG - RTE.ie

Read More..

More than half of state-backed cyberattacks have come from Russia, according to Microsoft – Euronews

Russia accounted for more than half of all cyberattacks observed by Microsoft over the past year, the company said.

The software giant released its annual Digital Defence Report on Thursday, which covers the period between July 2020 to June 2021.

The main highlight of the study is that attacks from Russian state actors account for 58 per cent of all cyber intrusions.

The success rate of hackers in the country saw a rise from 21 per cent last year to 32 per cent in 2021.

The top three countries targeted by these attacks were the United States, Ukraine and the United Kingdom.

Their main targets were government agencies for intelligence gathering, the study shows, jumping from 3 per cent of attacks in 2020 to 53 per cent in 2021.

Hackers are mainly focusing on agencies involved in foreign policy, national security or defence, such as US-based network-monitoring software company Solar Winds.

The report is a 134 pages-long compilation of data and insights collected and observed by Microsoft.

Its main purpose is to help businesses, organisations and governments around the globe better understand the cyberworld and protect themselves in the wide cybersecurity landscape.

During the pandemic, Microsoft has noticed a surge in cyberattacks and explains it as an increased reliance on telecommunications, giving malicious actors new vectors to gain access to targeted private networks that were scrambling to support new ways of doing business.

When a customer, being an organisation or an individual account holder, is targeted by state-sanctioned activities that Microsoft tracks, it delivers a nation-state notification (NSN).

Over the past three years, it has delivered over 20,5000 NSNs.

These cyberattacks were made by state actors who work for a government to disrupt or compromise targets and breach their security to access valuable data. In other words, they have a license to hack.

The victims of attacks often have information relevant to an adversary governments intelligence needs, which is why so many government agencies and think tanks are attacked, the report highlighted.

However, private industrys role in supporting remote workers, increased healthcare services, COVID-19 vaccine research, and COVID-19 vaccine distribution have also made them more common targets for these sophisticated actors seeking information for their governments national security or intelligence purposes.

Russia is not the only country on Microsofts radar, according to the report. The highest volume of attacks recorded originated from North Korea, Iran and China.

For the first time, South Korea and Turkey made an entry in Microsofts annual report.

Most sectors attacked showed that nearly 80 per cent of those targeted were either in government, NGOs or think tanks.

Microsoft has witnessed a surge in cybercrimes, in particular in ransomware attacks, which were already an issue flagged in the 2020 survey.

Cybercriminals are targeting and attacking all sectors of critical infrastructure, including healthcare and public health, information technology (IT), financial services, and energy sectors, this years report said.

For example, identity and password as well as phishing attacks, are on the rise.

Why would an attacker break in when they can log in? the report asks. More than 15,000 phishing sites were neutralised within three months, according to Microsoft.

The survey also looked at distributed denial of service (DDoS) attacks. These types of attacks hamper or completely prevent users from accessing websites by sending multiple requests at the same time so as to overload them and making the users navigation extremely slow.

The Internet of Things (IoT) also appears to be one of the biggest targets, with the multiplication of connected devices. With such multiplication, Microsoft points out a certain lack of rigour in terms of security, as 20 million devices were found to use the default password admin in just 45 days of signals.

How can the user prevent such breaches? At the end of the report, Microsoft offers some general guidelines, gathered under the cybersecurity bell curve, a reminder of basic security hygiene.

If correctly applied, these habits can protect against 98 per cent of attacks, the web giant assures.

As we increasingly do more of our work online, so do criminals and nation state attackers.

Doing basics well, such as enabling multifactor authentication, applying least privilege access, using antimalware or keeping versions up to date, is often the best way to disrupt and prevent their attacks.

Read the original:
More than half of state-backed cyberattacks have come from Russia, according to Microsoft - Euronews

Read More..

Huge Demand of DDoS Protection and Mitigation Market by 2028 with Top Key Players Neustar Inc, F5 Networks, DOSarrest Internet Security, Radware Ltd,…

DDoS mitigation may be a set of methods or devices utilized for combating the influence of distribution denial-of-service attacks on the network attached to the web by preserving the target and relay networks. The DDoS protection and mitigation solutions and services help to offer protection and mitigation on endpoints from advanced and sophisticated DDoS attacks. The tremendous demand for DDoS prevention solutions from SMEs has inspired vendors to propose, cost-effective cloud-based, and hybrid solutions. However, on-premises hardware, software, and integrated solutions continue to see enhanced traction among large enterprises.

DDoS Protection and Mitigation Market report focused on the comprehensive analysis of current and future prospects of the DDoS Protection and Mitigation industry. It describes the optimal or favourable fit for the vendors to adopt successive merger and acquisition strategies, geography expansion, research & development, and new product introduction strategies to execute further business expansion and growth during a forecast period. An in-depth analysis of past trends, future trends, demographics, technological advancements, and regulatory requirements for the DDoS Protection and Mitigation market has been done in order to calculate the growth rates for each segment and sub-segments.

Get Sample Copy (Including FULL TOC, Graphs and Tables) of this report: https://www.a2zmarketresearch.com/sample-request/562504

Note In order to provide more accurate market forecast, all our reports will be updated before delivery by considering the impact of COVID-19.

Top Key Vendors of this Market are:

Neustar Inc, F5 Networks, DOSarrest Internet Security, Radware Ltd, Imperva, Cloudflare Inc, Akamai Technologies Inc, Arbor Networks Inc, Corero Network Security, Nexusguard Ltd.

Global DDoS Protection and Mitigation Market Segmentation:

Product Type Segmentation:

Network, Application, Database, Endpoint

Industry Segmentation:

Network, Application, Database, Endpoint

Various factors are responsible for the markets growth trajectory, which are studied at length in the report. In addition, the report lists down the restraints that are posing threat to the global DDoS Protection and Mitigation market. This report is a consolidation of primary and secondary research, which provides market size, share, dynamics, and forecast for various segments and sub-segments considering the macro and micro environmental factors. It also gauges the bargaining power of suppliers and buyers, threat from new entrants and product substitute, and the degree of competition prevailing in the market.

The influence of the latest government guidelines is also analysed in detail in the report. It studies the DDoS Protection and Mitigation markets trajectory between forecast periods. The cost analysis of the Global DDoS Protection and Mitigation Market has been performed while keeping in view manufacturing expenses, labour cost, and raw materials and their market concentration rate, suppliers, and price trend.

Get Special Pricing on this Premium Report:

https://www.a2zmarketresearch.com/discount/562504

The report provides insights on the following pointers:

Market Penetration: Comprehensive information on the product portfolios of the top players in the DDoS Protection and Mitigation market.

Competitive Assessment: In-depth assessment of the market strategies, geographic and business segments of the leading players in the market.

Product Development/Innovation: Detailed insights on the upcoming technologies, R&D activities, and product launches in the market.

Market Development: Comprehensive information about emerging markets. This report analyzes the market for various segments across geographies.

Market Diversification: Exhaustive information about new products, untapped geographies, recent developments, and investments in the DDoS Protection and Mitigation market.

Regions Covered in the Global DDoS Protection and Mitigation Market Report 2021: The Middle East and Africa (GCC Countries and Egypt) North America (the United States, Mexico, and Canada) South America (Brazil etc.) Europe (Turkey, Germany, Russia UK, Italy, France, etc.) Asia-Pacific (Vietnam, China, Malaysia, Japan, Philippines, Korea, Thailand, India, Indonesia, and Australia)

Reasons for buying this report:

Table of Contents

Global DDoS Protection and Mitigation Market Research Report 2021 2027

Chapter 1 DDoS Protection and Mitigation Market Overview

Chapter 2 Global Economic Impact on Industry

Chapter 3 Global Market Competition by Manufacturers

Chapter 4 Global Production, Revenue (Value) by Region

Chapter 5 Global Supply (Production), Consumption, Export, Import by Regions

Chapter 6 Global Production, Revenue (Value), Price Trend by Type

Chapter 7 Global Market Analysis by Application

Chapter 8 Manufacturing Cost Analysis

Chapter 9 Industrial Chain, Sourcing Strategy and Downstream Buyers

Chapter 10 Marketing Strategy Analysis, Distributors/Traders

Chapter 11 Market Effect Factors Analysis

Chapter 12 Global DDoS Protection and Mitigation Market Forecast

Buy Exclusive Report: https://www.a2zmarketresearch.com/checkout

If you have any special requirements, please let us know and we will offer you the report as you want.

About A2Z Market Research:

The A2Z Market Research library provides syndication reports from market researchers around the world. Ready-to-buy syndication Market research studies will help you find the most relevant business intelligence.

Our Research Analyst Provides business insights and market research reports for large and small businesses.

The company helps clients build business policies and grow in that market area. A2Z Market Research is not only interested in industry reports dealing with telecommunications, healthcare, pharmaceuticals, financial services, energy, technology, real estate, logistics, F & B, media, etc. but also your company data, country profiles, trends, information and analysis on the sector of your interest.

Contact Us:

Roger Smith

1887 WHITNEY MESA DR HENDERSON, NV 89014

sales@a2zmarketresearch.com

+1 775 237 4147

See more here:
Huge Demand of DDoS Protection and Mitigation Market by 2028 with Top Key Players Neustar Inc, F5 Networks, DOSarrest Internet Security, Radware Ltd,...

Read More..