Malware Devil

Sunday, January 24, 2021

2020 Data Breaches Point to Cybersecurity Trends for 2021

Risk Based Security released their 2020 year-end data breach report this past week, and despite an overall decline in breach events (security incidents), the number of breached records grew dramatically. Other trends included a doubling of ransomware attacks from 2019 to 2020, and data breach severity rising. Here are some of the highlights from the..

The post 2020 Data Breaches Point to Cybersecurity Trends for 2021 appeared first on Security Boulevard.

Read More

The post 2020 Data Breaches Point to Cybersecurity Trends for 2021 appeared first on Malware Devil.



https://malwaredevil.com/2021/01/24/2020-data-breaches-point-to-cybersecurity-trends-for-2021/?utm_source=rss&utm_medium=rss&utm_campaign=2020-data-breaches-point-to-cybersecurity-trends-for-2021

Saturday, January 23, 2021

SwiftR Switcheroo: Calling [Compiled] Swift from R!

I’ve been on a Swift + R bender for a while now, but have been envious of the pure macOS/iOS (et al) folks who get to use Apple’s seriously ++good machine learning libraries, which are even more robust on the new M1 hardware (it’s cool having hardware components dedicated to improving the performance of built… Continue reading

The post SwiftR Switcheroo: Calling [Compiled] Swift from R! appeared first on Security Boulevard.

Read More

The post SwiftR Switcheroo: Calling [Compiled] Swift from R! appeared first on Malware Devil.



https://malwaredevil.com/2021/01/23/swiftr-switcheroo-calling-compiled-swift-from-r/?utm_source=rss&utm_medium=rss&utm_campaign=swiftr-switcheroo-calling-compiled-swift-from-r

DEF CON 28 Safe Mode IoT Village – Netspooky’s ‘Hella Booters, Why IoT Botnets Aren’t Going Anywhere’

Many thanks to DEF CON and Conference Speakers for publishing their outstanding presentations; of which, originally appeared at the organization’s DEFCON 28 SAFE MODE Conference, and on the DEF CON YouTube channel. Enjoy!

Permalink

The post DEF CON 28 Safe Mode IoT Village – Netspooky’s ‘Hella Booters, Why IoT Botnets Aren’t Going Anywhere’ appeared first on Security Boulevard.

Read More

The post DEF CON 28 Safe Mode IoT Village – Netspooky’s ‘Hella Booters, Why IoT Botnets Aren’t Going Anywhere’ appeared first on Malware Devil.



https://malwaredevil.com/2021/01/23/def-con-28-safe-mode-iot-village-netspookys-hella-booters-why-iot-botnets-arent-going-anywhere/?utm_source=rss&utm_medium=rss&utm_campaign=def-con-28-safe-mode-iot-village-netspookys-hella-booters-why-iot-botnets-arent-going-anywhere

Encoded Tyranny: Was Reagan’s “Shining City on a Hill” Intolerance for Dissent?

A while ago I wrote about Reagan’s use of racism to win elections. He was undeniably more racist than even Nixon, which is a remarkable achievement for a “popular” American President. Also I have written about Reagan’s attachment to dictatorships, such as his mass human rights violations in Guatemala (creating a massive refugee flow toward … Continue reading Encoded Tyranny: Was Reagan’s “Shining City on a Hill” Intolerance for Dissent?

The post Encoded Tyranny: Was Reagan’s “Shining City on a Hill” Intolerance for Dissent? appeared first on Security Boulevard.

Read More

The post Encoded Tyranny: Was Reagan’s “Shining City on a Hill” Intolerance for Dissent? appeared first on Malware Devil.



https://malwaredevil.com/2021/01/23/encoded-tyranny-was-reagans-shining-city-on-a-hill-intolerance-for-dissent/?utm_source=rss&utm_medium=rss&utm_campaign=encoded-tyranny-was-reagans-shining-city-on-a-hill-intolerance-for-dissent

Requiescat In Pacem, Henry Louis (Hank) Aaron 1934 – 2021

The post Requiescat In Pacem, Henry Louis (Hank) Aaron 1934 – 2021 appeared first on Security Boulevard.

Read More

The post Requiescat In Pacem, Henry Louis (Hank) Aaron 1934 – 2021 appeared first on Malware Devil.



https://malwaredevil.com/2021/01/23/requiescat-in-pacem-henry-louis-hank-aaron-1934-2021/?utm_source=rss&utm_medium=rss&utm_campaign=requiescat-in-pacem-henry-louis-hank-aaron-1934-2021

Friday, January 22, 2021

Microsoft Edge, Google Chrome Roll Out Password Protection Tools

The new tools on Chrome and Edge will make it easier for browser users to discover – and change – compromised passwords.
Read More

The post Microsoft Edge, Google Chrome Roll Out Password Protection Tools appeared first on Malware Devil.



https://malwaredevil.com/2021/01/22/microsoft-edge-google-chrome-roll-out-password-protection-tools/?utm_source=rss&utm_medium=rss&utm_campaign=microsoft-edge-google-chrome-roll-out-password-protection-tools

Amazon Kindle RCE Attack Starts with an Email

The “KindleDrip” attack would have allowed attackers to siphon money from unsuspecting victims.
Read More

The post Amazon Kindle RCE Attack Starts with an Email appeared first on Malware Devil.



https://malwaredevil.com/2021/01/22/amazon-kindle-rce-attack-starts-with-an-email/?utm_source=rss&utm_medium=rss&utm_campaign=amazon-kindle-rce-attack-starts-with-an-email

You’ll Be Shocked By The Percentage of Employees Clicking Phishing Emails

How many of your employees still clicking phishing emails are putting you at risk? Too many. Here are the numbers and what to do about it.

The post You’ll Be Shocked By The Percentage of Employees Clicking Phishing Emails appeared first on Security Boulevard.

Read More

The post You’ll Be Shocked By The Percentage of Employees Clicking Phishing Emails appeared first on Malware Devil.



https://malwaredevil.com/2021/01/22/youll-be-shocked-by-the-percentage-of-employees-clicking-phishing-emails/?utm_source=rss&utm_medium=rss&utm_campaign=youll-be-shocked-by-the-percentage-of-employees-clicking-phishing-emails

Speed of Digital Transformation May Lead to Greater App Vulnerabilities

The fastest-moving industries are struggling to produce secure code, according to AppSec experts.

Digital transformation initiatives have become a common way for companies to make their businesses more agile and to adapt quickly to market changes. But faster software development speeds and the greater number of applications may be causing vulnerabilities to be more common, application-security experts said this week.

Industries such as manufacturing, IT, and retail each have a large share of companies whose applications are always vulnerable, according to the AppSec Stats Flash monthly report from WhiteHat Security. Seventy percent of applications at manufacturing companies, 56% of IT applications, and 56% of retail applications have at least one serious vulnerability affecting the software for the entire year, the report stated.

Along with government agencies, healthcare, and real estate, these industries have the largest share of applications that have year-round vulnerabilities, the report states.

“These industries fall into a group of industries that have seen their number of applications per organization increase dramatically over the last several years as their business become increasingly digital,” says Zach Jones, senior director of detection research at WhiteHat Security. “For most organizations, achieving an average time to fix of less than 30 days on high- and critical-risk vulnerabilities is a policy that is rarely achieved.”

As more companies pursue digital transformation initiatives — a process to become more digitally native — the rate of software creation quickens and feature deployment increases.

WhiteHat Security’s data shows a significant gap between companies that typically have a large volume of applications and those industries that are pushing digital transformation initiatives. Industries that typically have fewer applications — such as agriculture, waste management, and construction — are much more likely to have shorter exposure windows.

Manufacturing, IT, and retail are some of the most enthusiastic supporters of digital transformation initiatives and among the industries dealing with a large share of eternally vulnerable applications.

“Organizations at large have increased the rate and volume of applications they are pushing into production while reducing the time to release these applications,” WhiteHat states in its report. “Consequently, the focus on fixing critical vulnerabilities and vulnerabilities has dropped, resulting in the rise in the time-to-fix for these vulnerabilities.”

Companies focused on fast DevOps-style development are more likely to use open source applications, and that means their development teams need to pay more attention to vulnerable components and not just to vulnerabilities in their own code, according to Veracode.

In the past year, 31% of applications have had more vulnerabilities in open source application components, rather than the custom-code components, says Chris Wysopal, co-founder and chief technology officer at Veracode.

“People want to use those environments because there is more open source available, but it is a double-edged sword,” he says. “More open source available means you can go faster, but there are often more of the vulnerabilities in the open source rather than the code that you have written.”

Some industries are becoming overwhelmed with vulnerabilities. Public administration, educational services, and utilities all take at least 365 days to fix the average vulnerability, according to the WhiteHat report. On average, critical- and high-severity vulnerabilities take less than 200 days to fix, while low-severity vulnerabilities take more than 320 days.

“Leaders and developers must be incentivized to care about building secure applications and remediating issues when they are found,” WhiteHat’s Jones says. “Typically, most engineering organizations are measured and compensated on feature delivery alone, and it is extremely uncommon to see a feature requirement contain any language around security requirements unless it is a specific security feature.”

Cybersecurity is the top investment priority for digitally mature companies, followed by cloud and data analytics, according to an annual survey by Deloitte.

Companies should not make unrealistic goals, and driving down the time from more than 200 days to under 30 days is not going to happen overnight, says Jones. In fact, many companies never fix vulnerabilities in less than a month.

“Setting an unrealistic policy is something we see occur very often, and it results in policy violations becoming normalized and thus ignored,” he says. “Set a threshold that will mean something and that you can act on. Then when you are achieving that threshold, tighten the policy.”

Veteran technology journalist of more than 20 years. Former research engineer. Written for more than two dozen publications, including CNET News.com, Dark Reading, MIT’s Technology Review, Popular Science, and Wired News. Five awards for journalism, including Best Deadline … View Full Bio

Recommended Reading:

Comment |

Email This |

Print |

RSS

More Insights

The post Speed of Digital Transformation May Lead to Greater App Vulnerabilities appeared first on Malware Devil.



https://malwaredevil.com/2021/01/22/speed-of-digital-transformation-may-lead-to-greater-app-vulnerabilities/?utm_source=rss&utm_medium=rss&utm_campaign=speed-of-digital-transformation-may-lead-to-greater-app-vulnerabilities

Gigante das telecomunicações revela uma violação no servidor Active Directory. O que podemos aprender com isso?

Sempre defendemos a ameaça iminente de violações e propagamos a mensagem de que, independentemente do tamanho do seu negócio, do setor em que você atua ou da sua localização geográfica, você pode estar sujeito a uma violação de segurança. E, …

The post Gigante das telecomunicações revela uma violação no servidor Active Directory. O que podemos aprender com isso? appeared first on ManageEngine Blog.

The post Gigante das telecomunicações revela uma violação no servidor Active Directory. O que podemos aprender com isso? appeared first on Security Boulevard.

Read More

The post Gigante das telecomunicações revela uma violação no servidor Active Directory. O que podemos aprender com isso? appeared first on Malware Devil.



https://malwaredevil.com/2021/01/22/gigante-das-telecomunicacoes-revela-uma-violacao-no-servidor-active-directory-o-que-podemos-aprender-com-isso/?utm_source=rss&utm_medium=rss&utm_campaign=gigante-das-telecomunicacoes-revela-uma-violacao-no-servidor-active-directory-o-que-podemos-aprender-com-isso

How Cybersecurity Newbs Can Start Out on the Right Foot

Cybersecurity experts share their savvy tips and useful resources for infosec hopefuls.

Rick Deacon is co-founder of Apozy, a cybersecurity tech company he launched in 2012 that specializes in browser defense. Prior to that, he worked as a pen tester for several years. But while Deacon’s background is now solidly in the “security veteran” category, the career actually began as a hobby for him years ago.

“I’m deeply familiar with how to go from nothing to something,” says Deacon. “My background involves very little schooling. I started hacking in the sixth grade, slowly working my way up through opportunities discovered and chances given.”

As Deacon’s experience can attest, there are multiple ways to get started in cybersecurity. And while the well-publicized skills gap means the cybersecurity jobs market is often described as hot, with 0% unemployment, one only has to check social media to find complaints from entry-level security professionals who are having a hard time getting started.

What are some best practices for newbies and hopefuls to consider as they start down the path of a security career?

Network with Experienced Security Pros
It’s tough right now with face-to-face opportunities off-limits and conferences on hold, but it is critical to find ways to interact with experienced security veterans who can offer advice and introduce you to opportunities. For now:

  • Attend online virtual events, conferences, and webinars. “Join these online events and take advantage of them to learn,” says Deral Heiland, IoT research lead at Rapid7. “Also, ask questions to the speakers and also take advantage of the network forums that are created to meet and interact with security professions.”
  • Use social networking services. Another avenue while we wait for COVID-19 restrictions to lift is with social networking. LinkedIn has many professional security groups, including the Information Security Community, Advanced Persistent Threats (APT) & Cyber Security, The Web Application Security Consortium, and the Information Systems Security Association (ISSA) Discussion Forum. All are worth joining to make connections.
  • Join online communities. “Newbies should also consider joining online communities such as WeAreHackerz, WoSec, etc.,” says Chloe Messdaghi, chief strategist at Point3 Security. “Having a good community to gain guidance from is so important.”

Once COVID-19 restrictions are lifted and conferences begin to start back up in person, be sure to attend and interact with people.

Find a Mentor
Those looking to get into the cybersecurity should seek mentorship from someone in the field with several years of experience, says Jon Helmus, manager of pentest community at Cobalt.io.

“With everything online, it is easier than ever to get mentorship from experts in the field who can help guide newcomers on a path to success,” says Helmus.

  • Think locally, act online. Much like with networking, SAS CISO Brian Wilson advises turning online to find mentorships given an invitation to grab coffee isn’t on the table right now. “Seek out mentorship opportunities via local security organizations, like regional ISC(2) chapters, or check out cybersecurity-focused Meetup.com groups,” he says. “Amid the pandemic, most have gone virtual and many of these are free.
  • Check out “Mentorship Monday.” The cybersecurity community is quitesocial on Twitter and Reddit at /r/cybersecurity, /r/netsec, or /r/netsecstudents. In fact, /r/cybersecurity recently started “Mentorship Monday,” where prospective security pros can ask questions or seek advice.

Volunteer
Hands-on experience is so important when applying for jobs in security, and the initial way to get it is often with volunteer work or an internship. It can be at your current place of work or at one of the many conferences that take place throughout the year.

  • At conferences: “I strongly recommend that people just starting out volunteering at and attending conferences such as BSides,” Point3 Security’s Messdaghi says. BSides events are a collection of loosely associated events in many cities, often held concurrently or near major security events — like BSides San Francisco and the RSAC conference. “It gets their feet into the hacker community and culture, which they need,” Messdaghi says. “I volunteered at BSides Las Vegas a few years back, and it changed my career and life.”
  • At cyber ranges: Another option is volunteering at a cyber range. “There are many virtual cyber ranges that simulate breaches and teach participants how to solve problems,” says Joe Vadakkan, global security services leader at Optiv Security.
  • To help not-for-profit organizations: Infosec pros can lend their expertise to organizations that don’t have the funds to pay for their own. Several new volunteer organizations have sprung up during the COVID-19 pandemic to help support the increasing needs of healthcare, first responders, and others. Learn more about some of these, like the Cyber Threat Intelligence League, here.

Get Certifications (They’re Not Essential, But They Help)
A perpetually controversial topic, certifications are an element of the professional that are endlessly debated.

“When you’re just getting started out with no prior experience, a certification can get you in the door,” says Dr. David Brumley, CEO and co-founder of ForAllSecure and a professor at Carnegie Mellon University.

  • Get a cert in a subject that matters today. Everyone knows about the CEH and the CISSP, but this very unique year has caused organizations to reconsider what security skills are most important. Check here for a list of brand new and red hot certifications.

And while many employers might not necessarily require them, they can’t hurt either.

“A mentor once told me about degrees and certifications, ‘While they might not open any doors, they will make sure none are closed,'” says Jerry Gamblin, director of security sesearch at Kenna Security.

Figure Out Your Focus and Make a Plan
If you think you really want to get into a security-specific career after some time in IT, it’s time to carve that down into a focus, SAS’s Wilson says.

“There are many different areas of cybersecurity – build it, break it, protect it. With a variety of paths to choose, take time to research what you want to do,” he says.

Deacon echoes Wilson. “In my opinion, people new to security need to understand the fundamentals of their particular niche – and pick one,” he says.

Once you have figured that out, design a plan for yourself that identifies goals for now, later, and several years from now, advises Helmus.

“Write out a short-term plan [one to two years], midterm plan [three years], and long-term plan [five to seven years],” he says.

Just Do It
The first step for those passionate about a career in security is to simply start working on it at home or current workplace, Deacon says.

“If you’re in an IT role that isn’t cybersecurity but is open to ideas, try shadowing the security folks and provide them with novel ideas where you can,” he says.

In fact, many of the security pros The Edge spoke to for advice on getting started in security touted the benefits of a general IT background before considering a security specialization.

“My strong-held personal belief is that great security professionals start in customer support or help desk roles,” says Gamblin. “It allows them to be hands-on with standard technology like desktop OSes, office tools, and helps them develop empathy for end users.”

Joan Goodchild is a veteran journalist, editor, and writer who has been covering security for more than a decade. She has written for several publications and previously served as editor-in-chief for CSO Online. View Full Bio

Recommended Reading:

Comment |

Email This |

Print |

RSS

More Insights

Webcasts
More Webcasts

The post How Cybersecurity Newbs Can Start Out on the Right Foot appeared first on Malware Devil.



https://malwaredevil.com/2021/01/22/how-cybersecurity-newbs-can-start-out-on-the-right-foot/?utm_source=rss&utm_medium=rss&utm_campaign=how-cybersecurity-newbs-can-start-out-on-the-right-foot

Uma inspeção minuciosa de suas conexões VPN: monitoramento com OpManager

Com o mercado em constante evolução, um número considerável de empresas começou a experimentar VPNs para ajudar seus funcionários a acessar dados confidenciais em casa ou em trânsito. Essas VPNs oferecem uma infinidade de funções, que pode ir desde servir …

The post Uma inspeção minuciosa de suas conexões VPN: monitoramento com OpManager appeared first on ManageEngine Blog.

The post Uma inspeção minuciosa de suas conexões VPN: monitoramento com OpManager appeared first on Security Boulevard.

Read More

The post Uma inspeção minuciosa de suas conexões VPN: monitoramento com OpManager appeared first on Malware Devil.



https://malwaredevil.com/2021/01/22/uma-inspecao-minuciosa-de-suas-conexoes-vpn-monitoramento-com-opmanager/?utm_source=rss&utm_medium=rss&utm_campaign=uma-inspecao-minuciosa-de-suas-conexoes-vpn-monitoramento-com-opmanager

Patches de janeiro de 2021 corrigem 83 vulnerabilidades

Enquanto os administradores de TI fazem o melhor para lidar com os planos de continuidade dos negócios, é fundamental que eles entendam e gerenciem as atualizações de patch. Com o aumento das ameaças à segurança cibernética graças à pandemia, é …

The post Patches de janeiro de 2021 corrigem 83 vulnerabilidades appeared first on ManageEngine Blog.

The post Patches de janeiro de 2021 corrigem 83 vulnerabilidades appeared first on Security Boulevard.

Read More

The post Patches de janeiro de 2021 corrigem 83 vulnerabilidades appeared first on Malware Devil.



https://malwaredevil.com/2021/01/22/patches-de-janeiro-de-2021-corrigem-83-vulnerabilidades/?utm_source=rss&utm_medium=rss&utm_campaign=patches-de-janeiro-de-2021-corrigem-83-vulnerabilidades

Remote Workforce Security a Top Priority for 2021

remote workforce security

Remote security is a top priority for most companies in 2021, as most organizations’ workforce continues to work remotely to help combat the spread of the COVID-19 pandemic. A survey of 100 security professionals conducted by Lumu, a provider of continuous compromise assessment solutions, finds 94% consider securing the remote workforce to be their biggest..

The post Remote Workforce Security a Top Priority for 2021 appeared first on Security Boulevard.

Read More

The post Remote Workforce Security a Top Priority for 2021 appeared first on Malware Devil.



https://malwaredevil.com/2021/01/22/remote-workforce-security-a-top-priority-for-2021/?utm_source=rss&utm_medium=rss&utm_campaign=remote-workforce-security-a-top-priority-for-2021

Protegendo o espaço de trabalho distribuído: segurança cibernética para trabalho remoto de longo prazo

Uma das mudanças duradouras provocadas pela pandemia é que ela forçou as organizações a repensarem o conceito de espaço de trabalho. Como o trabalho remoto se tornou inevitável, as equipes de TI tiveram que habilitar uma transição segura para o …

The post Protegendo o espaço de trabalho distribuído: segurança cibernética para trabalho remoto de longo prazo appeared first on ManageEngine Blog.

The post Protegendo o espaço de trabalho distribuído: segurança cibernética para trabalho remoto de longo prazo appeared first on Security Boulevard.

Read More

The post Protegendo o espaço de trabalho distribuído: segurança cibernética para trabalho remoto de longo prazo appeared first on Malware Devil.



https://malwaredevil.com/2021/01/22/protegendo-o-espaco-de-trabalho-distribuido-seguranca-cibernetica-para-trabalho-remoto-de-longo-prazo/?utm_source=rss&utm_medium=rss&utm_campaign=protegendo-o-espaco-de-trabalho-distribuido-seguranca-cibernetica-para-trabalho-remoto-de-longo-prazo

Building a Framework to Assess the Total Cost of Cloud IT Infrastructure

JumpCloud and MSP Altitude Integrations team up to help you understand the TCO of traditional directory infrastructure versus a cloud-forward directory.

The post Building a Framework to Assess the Total Cost of Cloud IT Infrastructure appeared first on JumpCloud.

The post Building a Framework to Assess the Total Cost of Cloud IT Infrastructure appeared first on Security Boulevard.

Read More

The post Building a Framework to Assess the Total Cost of Cloud IT Infrastructure appeared first on Malware Devil.



https://malwaredevil.com/2021/01/22/building-a-framework-to-assess-the-total-cost-of-cloud-it-infrastructure/?utm_source=rss&utm_medium=rss&utm_campaign=building-a-framework-to-assess-the-total-cost-of-cloud-it-infrastructure

ADT Tech Hacks Home-Security Cameras to Spy on Women

A former ADT employee pleads guilty of accessing customers’ cameras so he could spy on them.
Read More

The post ADT Tech Hacks Home-Security Cameras to Spy on Women appeared first on Malware Devil.



https://malwaredevil.com/2021/01/22/adt-tech-hacks-home-security-cameras-to-spy-on-women-4/?utm_source=rss&utm_medium=rss&utm_campaign=adt-tech-hacks-home-security-cameras-to-spy-on-women-4

ADT Tech Hacks Home-Security Cameras to Spy on Women

A former ADT employee pleads guilty of accessing customers’ cameras so he could spy on them.
Read More

The post ADT Tech Hacks Home-Security Cameras to Spy on Women appeared first on Malware Devil.



https://malwaredevil.com/2021/01/22/adt-tech-hacks-home-security-cameras-to-spy-on-women-3/?utm_source=rss&utm_medium=rss&utm_campaign=adt-tech-hacks-home-security-cameras-to-spy-on-women-3

ADT Tech Hacks Home-Security Cameras to Spy on Women

A former ADT employee pleads guilty of accessing customers’ cameras so he could spy on them.
Read More

The post ADT Tech Hacks Home-Security Cameras to Spy on Women appeared first on Malware Devil.



https://malwaredevil.com/2021/01/22/adt-tech-hacks-home-security-cameras-to-spy-on-women-2/?utm_source=rss&utm_medium=rss&utm_campaign=adt-tech-hacks-home-security-cameras-to-spy-on-women-2

ADT Tech Hacks Home-Security Cameras to Spy on Women

A former ADT employee pleads guilty of accessing customers’ cameras so he could spy on them.
Read More

The post ADT Tech Hacks Home-Security Cameras to Spy on Women appeared first on Malware Devil.



https://malwaredevil.com/2021/01/22/adt-tech-hacks-home-security-cameras-to-spy-on-women/?utm_source=rss&utm_medium=rss&utm_campaign=adt-tech-hacks-home-security-cameras-to-spy-on-women

Barbary Pirates and Russian Cybercrime

In 1801, the United States had a small Navy. Thomas Jefferson deployed almost half that Navy—three frigates and a schooner—to the Barbary C...