Malware Devil

Wednesday, February 24, 2021

Cybersecurity Threats on the Rise

Cybersecurity Threats on the Rise

The cyber world has faced unprecedented challenges and changes within the last year. It has shown a need for increased visibility within the cybersecurity landscape as blended threats and vulnerabilities become the new normal for threat responders to combat.  In the interview below, Myla Pilao, head of security research communications for TrendLabs at Trend Micro,..

The post Cybersecurity Threats on the Rise appeared first on Security Boulevard.

Read More

The post Cybersecurity Threats on the Rise appeared first on Malware Devil.



https://malwaredevil.com/2021/02/24/cybersecurity-threats-on-the-rise-7/?utm_source=rss&utm_medium=rss&utm_campaign=cybersecurity-threats-on-the-rise-7

Cybersecurity Threats on the Rise

Cybersecurity Threats on the Rise

The cyber world has faced unprecedented challenges and changes within the last year. It has shown a need for increased visibility within the cybersecurity landscape as blended threats and vulnerabilities become the new normal for threat responders to combat.  In the interview below, Myla Pilao, head of security research communications for TrendLabs at Trend Micro,..

The post Cybersecurity Threats on the Rise appeared first on Security Boulevard.

Read More

The post Cybersecurity Threats on the Rise appeared first on Malware Devil.



https://malwaredevil.com/2021/02/24/cybersecurity-threats-on-the-rise-6/?utm_source=rss&utm_medium=rss&utm_campaign=cybersecurity-threats-on-the-rise-6

Tax Season Ushers in Quickbooks Data-Theft Spike

Quickbooks malware targets tax data for attackers to sell and use in phishing scams.
Read More

The post Tax Season Ushers in Quickbooks Data-Theft Spike appeared first on Malware Devil.



https://malwaredevil.com/2021/02/24/tax-season-ushers-in-quickbooks-data-theft-spike/?utm_source=rss&utm_medium=rss&utm_campaign=tax-season-ushers-in-quickbooks-data-theft-spike

Cybersecurity Threats on the Rise

Cybersecurity Threats on the Rise

The cyber world has faced unprecedented challenges and changes within the last year. It has shown a need for increased visibility within the cybersecurity landscape as blended threats and vulnerabilities become the new normal for threat responders to combat.  In the interview below, Myla Pilao, head of security research communications for TrendLabs at Trend Micro,..

The post Cybersecurity Threats on the Rise appeared first on Security Boulevard.

Read More

The post Cybersecurity Threats on the Rise appeared first on Malware Devil.



https://malwaredevil.com/2021/02/24/cybersecurity-threats-on-the-rise-5/?utm_source=rss&utm_medium=rss&utm_campaign=cybersecurity-threats-on-the-rise-5

Cybersecurity Threats on the Rise

Cybersecurity Threats on the Rise

The cyber world has faced unprecedented challenges and changes within the last year. It has shown a need for increased visibility within the cybersecurity landscape as blended threats and vulnerabilities become the new normal for threat responders to combat.  In the interview below, Myla Pilao, head of security research communications for TrendLabs at Trend Micro,..

The post Cybersecurity Threats on the Rise appeared first on Security Boulevard.

Read More

The post Cybersecurity Threats on the Rise appeared first on Malware Devil.



https://malwaredevil.com/2021/02/24/cybersecurity-threats-on-the-rise-4/?utm_source=rss&utm_medium=rss&utm_campaign=cybersecurity-threats-on-the-rise-4

Cybersecurity Threats on the Rise

Cybersecurity Threats on the Rise

The cyber world has faced unprecedented challenges and changes within the last year. It has shown a need for increased visibility within the cybersecurity landscape as blended threats and vulnerabilities become the new normal for threat responders to combat.  In the interview below, Myla Pilao, head of security research communications for TrendLabs at Trend Micro,..

The post Cybersecurity Threats on the Rise appeared first on Security Boulevard.

Read More

The post Cybersecurity Threats on the Rise appeared first on Malware Devil.



https://malwaredevil.com/2021/02/24/cybersecurity-threats-on-the-rise-3/?utm_source=rss&utm_medium=rss&utm_campaign=cybersecurity-threats-on-the-rise-3

Cybersecurity Threats on the Rise

Cybersecurity Threats on the Rise

The cyber world has faced unprecedented challenges and changes within the last year. It has shown a need for increased visibility within the cybersecurity landscape as blended threats and vulnerabilities become the new normal for threat responders to combat.  In the interview below, Myla Pilao, head of security research communications for TrendLabs at Trend Micro,..

The post Cybersecurity Threats on the Rise appeared first on Security Boulevard.

Read More

The post Cybersecurity Threats on the Rise appeared first on Malware Devil.



https://malwaredevil.com/2021/02/24/cybersecurity-threats-on-the-rise-2/?utm_source=rss&utm_medium=rss&utm_campaign=cybersecurity-threats-on-the-rise-2

Cybersecurity Threats on the Rise

Cybersecurity Threats on the Rise

The cyber world has faced unprecedented challenges and changes within the last year. It has shown a need for increased visibility within the cybersecurity landscape as blended threats and vulnerabilities become the new normal for threat responders to combat.  In the interview below, Myla Pilao, head of security research communications for TrendLabs at Trend Micro,..

The post Cybersecurity Threats on the Rise appeared first on Security Boulevard.

Read More

The post Cybersecurity Threats on the Rise appeared first on Malware Devil.



https://malwaredevil.com/2021/02/24/cybersecurity-threats-on-the-rise/?utm_source=rss&utm_medium=rss&utm_campaign=cybersecurity-threats-on-the-rise

The Traditional SOC Is Dead, Long Live the Remote SOC

If you haven’t read our 2021 Cybersecurity predictions blog and whitepaper, I recommend that you do. In it, you’ll find one prediction that might be somewhat controversial—the death of the Security Operations Center (SOC).

I wanted to delve a little deeper into this particular prediction, as it is pretty close to my heart. I run IntelliGO’s Threat Hunting team and what would historically have been called our SOC.

The concept of the traditional SOC is dying off, and in 2021 we will see the broader acceptance and adoption of the idea of a remote SOC driven by the realities of technological development and the necessities imposed by the pandemic. 

This change has implications for what makes up the SOC as well as the capabilities of threat hunters. And it’s a change that IntelliGO is uniquely prepared not just to embrace but to lead, given the unique situation we found ourselves in with adopting early disparate geographic distribution of our SOC.

The post The Traditional SOC Is Dead, Long Live the Remote SOC appeared first on Security Boulevard.

Read More

The post The Traditional SOC Is Dead, Long Live the Remote SOC appeared first on Malware Devil.



https://malwaredevil.com/2021/02/24/the-traditional-soc-is-dead-long-live-the-remote-soc-5/?utm_source=rss&utm_medium=rss&utm_campaign=the-traditional-soc-is-dead-long-live-the-remote-soc-5

Evaluating the MITRE ATT&CK Evaluations in their Third Year – ESW #217

The latest MITRE ATT&CK vendor evaluations are due out soon. In advance of the new round, Uptycs’ Ganesh Pai and Amit Malik will discuss this evaluation round, which focuses on the threat groups Carbanak and FIN7. They’ll also talk about how organizations are translating endpoint and cloud workload telemetry to most effectively support MITRE ATT&CK detections and investigations.

This segment is sponsored by Uptycs.

Visit https://securityweekly.com/uptycs to learn more about them!

Visit https://www.securityweekly.com/esw for all the latest episodes!

Show Notes: https://securityweekly.com/esw217

The post Evaluating the MITRE ATT&CK Evaluations in their Third Year – ESW #217 appeared first on Malware Devil.



https://malwaredevil.com/2021/02/24/evaluating-the-mitre-attck-evaluations-in-their-third-year-esw-217/?utm_source=rss&utm_medium=rss&utm_campaign=evaluating-the-mitre-attck-evaluations-in-their-third-year-esw-217

Mozilla Patches Bugs in Firefox, Now Blocks Cross-Site Cookie Tracking

Mozilla said its Total Cookie Protection feature in Firefox 86 prevents invasive, cross-site cookie tracking.
Read More

The post Mozilla Patches Bugs in Firefox, Now Blocks Cross-Site Cookie Tracking appeared first on Malware Devil.



https://malwaredevil.com/2021/02/24/mozilla-patches-bugs-in-firefox-now-blocks-cross-site-cookie-tracking/?utm_source=rss&utm_medium=rss&utm_campaign=mozilla-patches-bugs-in-firefox-now-blocks-cross-site-cookie-tracking

Google Invests in Linux Kernel Developers to Focus on Security

Google will fund two full-time Linux kernel developers to maintain and improve Linux security in the long term.

Google and the Linux Foundation have announced plans to fund two full-time maintainers to exclusively focus on Linux kernel security development. Gustavo Silva and Nathan Chancellor, both active Linux contributors, will work to strengthen kernel security and associated projects.

Their goal is to make the pervasive operating system more sustainable as research indicates a need to improve open source software security, specifically in Linux. A report from the Linux Foundation’s Open Source Security Foundation (OpenSSF) and the Laboratory for Innovation Science at Harvard University (LISH) found a lack of security efforts in open source software.

It’s worth noting Linux has more than 20,000 contributors and 1 million commits as of August 2020. But while there are thousands of Linux developers, Google’s contribution to underwrite two full-time Linux security maintainers indicates the greater role security will play in its future. The company also hopes this initiative will motivate other organizations to contribute.

“Supply chain security and open source security are critical,” says Google software engineer Dan Lorenc. “A lot of companies know that now and want to help but don’t really know how to … we’re trying to talk about it now and show people how we’re doing it, so that they can get encouraged and get inspired and come up with other ways they can help out, too.”

Lorenc sees two key components in the issue of open source software security. One is the fact that it comes from people all over the world, some of whom might be malicious or have bad intentions – an inherent problem to open source security. The other is it’s software, and all software has flaws, whether intentional or not, that need to be fixed.

“Just because that’s not your code doesn’t mean there aren’t bugs,” Lorenc adds. “That’s kind of a misconception that a lot of companies are now starting to realize.” These two factors, combined with the rise of people using open source software, is driving security as a priority.

Linux, which has become a bigger part of the supply chain and key enterprise systems, has also become an appealing target to advanced attackers. Strengthening the Linux kernel will be a key step in protecting open source software from both cybercriminals and advanced threats.

Chancellor, one of the two developers taking on this role, has been working on the Linux kernel for four-and-a-half years. Two years back, he began contributing to mainline Linux under the ClangBuiltLinux project, an initiative to get the Linux kernel building with the Clang and LLVM compiler tools. Chancellor hopes more people start to use the LLVM compiler infrastructure project and contribute fixes to both that and the kernel, as “it will go a long way towards improving Linux security for everyone,” he said in a statement.

Silva began working on the kernel as part of the Linux Foundation’s Core Infrastructure Initiative, a program in which younger developers are mentored by engineers who work on the kernel. Now his full-time security work focuses on removing several classes of buffer overflows. He’s also working on fixing vulnerabilities before they hit the mainline and developing defense mechanisms that cut off whole classes of vulnerabilities. Silva submitted his first kernel patch in 2010 and has consistently been among the top five most active kernel developers since 2017.

Both Chancellor and Silva report to David Wheeler, director of open source supply chain security at the Linux Foundation.

Today’s news is the result of several challenging pieces fitting into place. It can be tough, Lorenc says, to find adequate funding, to find people who can take on projects like these, and to find projects like the Linux kernel, which does a good job of onboarding new contributors and getting patches in so that developers have actionable things to do, he explains.

“It’s really a matter of finding people willing to do the work, with people willing to mentor them and accept the work, and then [there’s] important work to be done,” he continues, noting that “matching everything up can be challenging.” In this case, Google is providing the funding, but many people working on this already have full-time jobs and can’t take on these side projects.

On that note, it can also be difficult to find projects willing to accept contributions, he adds. Many open source projects, especially some of the neglected ones, don’t have people available to merge code and onboard new maintainers. Matching all these factors up can be a challenge.

While there are no concrete plans to add more maintainers, Lorenc says they’re open to it.

“We see this as a great use of investment, so these are the types of things where we love to scale up where we can,” he adds.

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance & Technology, where she covered financial … View Full Bio

Recommended Reading:

Comment |

Email This |

Print |

RSS

More Insights

Webcasts
More Webcasts

The post Google Invests in Linux Kernel Developers to Focus on Security appeared first on Malware Devil.



https://malwaredevil.com/2021/02/24/google-invests-in-linux-kernel-developers-to-focus-on-security/?utm_source=rss&utm_medium=rss&utm_campaign=google-invests-in-linux-kernel-developers-to-focus-on-security

The Traditional SOC Is Dead, Long Live the Remote SOC

If you haven’t read our 2021 Cybersecurity predictions blog and whitepaper, I recommend that you do. In it, you’ll find one prediction that might be somewhat controversial—the death of the Security Operations Center (SOC).

I wanted to delve a little deeper into this particular prediction, as it is pretty close to my heart. I run IntelliGO’s Threat Hunting team and what would historically have been called our SOC.

The concept of the traditional SOC is dying off, and in 2021 we will see the broader acceptance and adoption of the idea of a remote SOC driven by the realities of technological development and the necessities imposed by the pandemic. 

This change has implications for what makes up the SOC as well as the capabilities of threat hunters. And it’s a change that IntelliGO is uniquely prepared not just to embrace but to lead, given the unique situation we found ourselves in with adopting early disparate geographic distribution of our SOC.

The post The Traditional SOC Is Dead, Long Live the Remote SOC appeared first on Security Boulevard.

Read More

The post The Traditional SOC Is Dead, Long Live the Remote SOC appeared first on Malware Devil.



https://malwaredevil.com/2021/02/24/the-traditional-soc-is-dead-long-live-the-remote-soc-4/?utm_source=rss&utm_medium=rss&utm_campaign=the-traditional-soc-is-dead-long-live-the-remote-soc-4

The Traditional SOC Is Dead, Long Live the Remote SOC

If you haven’t read our 2021 Cybersecurity predictions blog and whitepaper, I recommend that you do. In it, you’ll find one prediction that might be somewhat controversial—the death of the Security Operations Center (SOC).

I wanted to delve a little deeper into this particular prediction, as it is pretty close to my heart. I run IntelliGO’s Threat Hunting team and what would historically have been called our SOC.

The concept of the traditional SOC is dying off, and in 2021 we will see the broader acceptance and adoption of the idea of a remote SOC driven by the realities of technological development and the necessities imposed by the pandemic. 

This change has implications for what makes up the SOC as well as the capabilities of threat hunters. And it’s a change that IntelliGO is uniquely prepared not just to embrace but to lead, given the unique situation we found ourselves in with adopting early disparate geographic distribution of our SOC.

The post The Traditional SOC Is Dead, Long Live the Remote SOC appeared first on Security Boulevard.

Read More

The post The Traditional SOC Is Dead, Long Live the Remote SOC appeared first on Malware Devil.



https://malwaredevil.com/2021/02/24/the-traditional-soc-is-dead-long-live-the-remote-soc-3/?utm_source=rss&utm_medium=rss&utm_campaign=the-traditional-soc-is-dead-long-live-the-remote-soc-3

The Traditional SOC Is Dead, Long Live the Remote SOC

If you haven’t read our 2021 Cybersecurity predictions blog and whitepaper, I recommend that you do. In it, you’ll find one prediction that might be somewhat controversial—the death of the Security Operations Center (SOC).

I wanted to delve a little deeper into this particular prediction, as it is pretty close to my heart. I run IntelliGO’s Threat Hunting team and what would historically have been called our SOC.

The concept of the traditional SOC is dying off, and in 2021 we will see the broader acceptance and adoption of the idea of a remote SOC driven by the realities of technological development and the necessities imposed by the pandemic. 

This change has implications for what makes up the SOC as well as the capabilities of threat hunters. And it’s a change that IntelliGO is uniquely prepared not just to embrace but to lead, given the unique situation we found ourselves in with adopting early disparate geographic distribution of our SOC.

The post The Traditional SOC Is Dead, Long Live the Remote SOC appeared first on Security Boulevard.

Read More

The post The Traditional SOC Is Dead, Long Live the Remote SOC appeared first on Malware Devil.



https://malwaredevil.com/2021/02/24/the-traditional-soc-is-dead-long-live-the-remote-soc-2/?utm_source=rss&utm_medium=rss&utm_campaign=the-traditional-soc-is-dead-long-live-the-remote-soc-2

The Traditional SOC Is Dead, Long Live the Remote SOC

If you haven’t read our 2021 Cybersecurity predictions blog and whitepaper, I recommend that you do. In it, you’ll find one prediction that might be somewhat controversial—the death of the Security Operations Center (SOC).

I wanted to delve a little deeper into this particular prediction, as it is pretty close to my heart. I run IntelliGO’s Threat Hunting team and what would historically have been called our SOC.

The concept of the traditional SOC is dying off, and in 2021 we will see the broader acceptance and adoption of the idea of a remote SOC driven by the realities of technological development and the necessities imposed by the pandemic. 

This change has implications for what makes up the SOC as well as the capabilities of threat hunters. And it’s a change that IntelliGO is uniquely prepared not just to embrace but to lead, given the unique situation we found ourselves in with adopting early disparate geographic distribution of our SOC.

The post The Traditional SOC Is Dead, Long Live the Remote SOC appeared first on Security Boulevard.

Read More

The post The Traditional SOC Is Dead, Long Live the Remote SOC appeared first on Malware Devil.



https://malwaredevil.com/2021/02/24/the-traditional-soc-is-dead-long-live-the-remote-soc/?utm_source=rss&utm_medium=rss&utm_campaign=the-traditional-soc-is-dead-long-live-the-remote-soc

2020 Security Operations Survey – Christopher Crowley – ESW #217

The 2020 SOC Survey results are in and the author, Chris Crowley, will discuss the detailed results in the report and how they can help individuals and organizations reduce the drag on our global community due to insecure information systems. Effective security operations rely on monitoring your data and being prepared to defend yourself and your organization. Chris will explain why he believes that the classic SOC will move, over the next few years, to MSSPs and how to be ready when threats are detected.

Download the report: https://soc-survey.com/

Visit https://www.securityweekly.com/esw for all the latest episodes!

Show Notes: https://securityweekly.com/esw217

The post 2020 Security Operations Survey – Christopher Crowley – ESW #217 appeared first on Malware Devil.



https://malwaredevil.com/2021/02/24/2020-security-operations-survey-christopher-crowley-esw-217/?utm_source=rss&utm_medium=rss&utm_campaign=2020-security-operations-survey-christopher-crowley-esw-217

Kaseya Buys Managed SOC Provider

Register for Dark Reading Newsletters

Subscribe to Newsletters

White Papers

Video

Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
image
Latest Comment: This comment is waiting for review by our moderators.
image

Current Issue

image2021 Top Enterprise IT TrendsWe’ve identified the key trends that are poised to impact the IT landscape in 2021. Find out why they’re important and how they will affect you today!
image

Flash Poll

Building the SOC of the Future
Building the SOC of the Future
Digital transformation, cloud-focused attacks, and a worldwide pandemic. The past year has changed the way business works and the way security teams operate. There is no going back.
image

Twitter Feed

Dark Reading - Bug Report

Bug Report

Enterprise Vulnerabilities
From DHS/US-CERT’s National Vulnerability Database
CVE-2020-4931
PUBLISHED: 2021-02-24

IBM MQ 9.1 LTS, 9.2 LTS, and 9.1 CD AMQP Channels could allow an authenticated user to cause a denial of service due to an issue processing messages. IBM X-Force ID: 191747.

CVE-2020-11987
PUBLISHED: 2021-02-24

Apache Batik 1.13 is vulnerable to server-side request forgery, caused by improper input validation by the NodePickerPanel. By using a specially-crafted argument, an attacker could exploit this vulnerability to cause the underlying server to make arbitrary GET requests.

CVE-2020-11988
PUBLISHED: 2021-02-24

Apache XmlGraphics Commons 2.4 is vulnerable to server-side request forgery, caused by improper input validation by the XMPParser. By using a specially-crafted argument, an attacker could exploit this vulnerability to cause the underlying server to make arbitrary GET requests.

CVE-2021-21974
PUBLISHED: 2021-02-24

OpenSLP as used in ESXi (7.0 before ESXi70U1c-17325551, 6.7 before ESXi670-202102401-SG, 6.5 before ESXi650-202102101-SG) has a heap-overflow vulnerability. A malicious actor residing within the same network segment as ESXi who has access to port 427 may be able to trigger the heap-overflow issue in…

CVE-2021-22667
PUBLISHED: 2021-02-24

BB-ESWGP506-2SFP-T versions 1.01.09 and prior is vulnerable due to the use of hard-coded credentials, which may allow an attacker to gain unauthorized access and permit the execution of arbitrary code on the BB-ESWGP506-2SFP-T (versions 1.01.01 and prior).

The post Kaseya Buys Managed SOC Provider appeared first on Malware Devil.



https://malwaredevil.com/2021/02/24/kaseya-buys-managed-soc-provider/?utm_source=rss&utm_medium=rss&utm_campaign=kaseya-buys-managed-soc-provider

Red Canary, Imperva Sonar, Data Breaches & Share Prices, & TrendMicro XDR – ESW #217

This week in the Enterprise News: LasPass is no longer free, Tenable helps with dynamic assets, Security Scorecard and the Score Planner, Trend Micro XDR, & Imperva launches sonar! Funding announcements from: PerimeterX, SPHERE, Red Canary, 1Kosmos, & Strata Identity! In the Acquisition news: Sailpoint to Acquire Intello, Crowdstrike to Acquire Humio, Palo Alto to acquire Bridgecrew, Kaseya to Acquire Rocket Cyber, & more!

Visit https://www.securityweekly.com/esw for all the latest episodes!

Show Notes: https://securityweekly.com/esw217

The post Red Canary, Imperva Sonar, Data Breaches & Share Prices, & TrendMicro XDR – ESW #217 appeared first on Malware Devil.



https://malwaredevil.com/2021/02/24/red-canary-imperva-sonar-data-breaches-share-prices-trendmicro-xdr-esw-217/?utm_source=rss&utm_medium=rss&utm_campaign=red-canary-imperva-sonar-data-breaches-share-prices-trendmicro-xdr-esw-217

Barbary Pirates and Russian Cybercrime

In 1801, the United States had a small Navy. Thomas Jefferson deployed almost half that Navy—three frigates and a schooner—to the Barbary C...