News from 'Help Net Security'

Syndicate content
Daily information security news with a focus on enterprise security.
Updated: 16 hours 19 min ago

US sets up dedicated office for energy infrastructure cybersecurity

Tue, 20/Feb/2018 - 01:14
The US government is setting up a new Office of Cybersecurity, Energy Security, and Emergency Response (CESER) at the US Department of Energy. The CESER office will focus on energy infrastructure security and enable more coordinated preparedness and response to natural and man-made threats. “$96 million in funding for the office was included in President Trump’s FY19 budget request to bolster DOE’s efforts in cybersecurity and energy security,” the Department of Energy announced. According to … More →
Categories: Cyber India

Russian, Indian banks lose millions to hackers

Mon, 19/Feb/2018 - 22:41
The Russian central bank’s Financial Sector Computer Emergency Response Team (FinCERT) disclosed on Friday that hackers compromised a computer at a Russian bank and used the SWIFT system to transfer 339.5 million roubles (around $6 million) to accounts they controlled. No details about the heist have been shared, so we don’t know which bank has been hit, or when. Going just on the stolen amount disclosed, it is not the Russian state bank Globex, which … More →
Categories: Cyber India

Discover hidden cybersecurity talent to solve your hiring crisis

Mon, 19/Feb/2018 - 18:30
Not having access to technical talent is a common complaint in the cybersecurity world. Folks with security experience on their resumes are in such high demand, CISOs need to hunt beyond the fields we know. To borrow a phrase from the ever-logical Mr. Spock, CISOs need to embrace Infinite Diversity in Infinite Combinations. By this I mean embracing diversity not only of bodies but of talents and experiences. First, focus on acquiring the key cybersecurity … More →
Categories: Cyber India

Global cyber risk perception: Highest management priorities

Mon, 19/Feb/2018 - 18:00
Few organizations are highly confident in their ability to manage the risk of a cyber-attack, despite viewing cybersecurity as a top risk management priority, according to a survey conducted by Marsh and Microsoft. Cybersecurity confidence In the global survey of more than 1,300 senior executives, two-thirds ranked cybersecurity among their organizations’ top five risk management priorities – approximately double the response to a similar question Marsh asked in 2016. The survey also found that a … More →
Categories: Cyber India

Week in review: Vulnerability tracking, GDPR quick guide, tackling the insider threat

Mon, 19/Feb/2018 - 08:26
Here’s an overview of some of last week’s most interesting news and articles: Intel offers to pay for Spectre-like side channel vulnerabilities Intel is expanding the bug bounty program it started last March, and is raising considerably the awards it plans to give out for helpful vulnerability information. The company is, simultaneously, starting a new bug bounty program focused specifically on side channel vulnerabilities, i.e., vulnerabilities that are rooted in Intel hardware but can be … More →
Categories: Cyber India

Dell EMC plugs critical bugs in VMAX enterprise storage offerings

Sat, 17/Feb/2018 - 00:02
Dell EMC has patched two critical flaws in vApp Manager, the management interface for its VMAX enterprise storage systems, and is urging all customers to implement fixes as soon as possible. About the VMAX enterprise storage vulnerabilities The flaws were discovered and reported by Tenable’s director of reverse engineering Carlos Perez. The graver of the two is CVE-2018-1216, which marks the existence of a hard-coded password vulnerability. “The vApp Manager contains an undocumented default account … More →
Categories: Cyber India

Scanned IDs of 119,000 FedEx customers exposed online

Fri, 16/Feb/2018 - 21:43
An unsecured Amazon Web Services bucket holding personal information and scans of IDs of some 119,000 US and international citizens has been found sitting online by Kromtech security researchers earlier this month. The stored data had been stockpiled by Bongo International, a company that specialized in helping North American retailers and brands sell online to consumers in other countries. Bongo was acquired by FedEx in 2014, relaunched as FedEx Cross-Border International, and ultimately shuttered in … More →
Categories: Cyber India

GDPR quick guide: Why non-compliance could cost you big

Fri, 16/Feb/2018 - 19:30
If you conduct business in the EU, offer goods or services to, or monitor the online behavior of EU citizens, then the clock is ticking. You only have a few more months – until May – to make sure your organization complies with GDPR data privacy regulations. Failure to abide by GDPR means you could get hit with huge fines. Finding and investigating data breaches: Why it’s always too little, too late Personal data protection … More →
Categories: Cyber India

New infosec products of the week​: February 16, 2018

Fri, 16/Feb/2018 - 19:00
ScramFS: Encryption system for safeguarding cloud data Scram Software has announced that ScramFS – an internationally peer-reviewed encryption system for safeguarding cloud data – is now available globally to SMEs, government and not-for-profit organizations, enabling encryption of sensitive data to reduce breaches and assist in ensuring legal, HIPPA and GDPR compliance. Dtex Systems updates its Advanced User Behavior Intelligence Platform Dtex Systems announced innovations to its Advanced User Behavior Intelligence Platform, designed to meet the … More →
Categories: Cyber India

Intel offers to pay for Spectre-like side channel vulnerabilities

Fri, 16/Feb/2018 - 18:30
Intel is expanding the bug bounty program it started last March, and is raising considerably the awards it plans to give out for helpful vulnerability information. Where information about critical vulnerabilities in Intel software, firmware and hardware could have previously been rewarded with up to $7,500, $10,000 and $30,000, respectively, now the bounties in those same categories go up to $10,000, $30,000 and $100,000. A new bug bounty program for side channel vulnerabilities The company … More →
Categories: Cyber India

Still relying solely on CVE and NVD for vulnerability tracking? Bad idea

Fri, 16/Feb/2018 - 18:00
2017 broke the previous all-time record for the highest number of reported vulnerabilities. The 20,832 vulnerabilities cataloged during 2017 by Risk Based Security (VulnDB) eclipsed the total covered by MITRE’s Common Vulnerability Enumeration (CVE) and the National Vulnerability Database (NVD) by more than 7,900. “Incredibly, we see too many companies still relying on CVE and NVD for vulnerability tracking, despite the US government funded organization falling short year after year. While some argue that the … More →
Categories: Cyber India

UK government officially blames Russia for NotPetya attack

Fri, 16/Feb/2018 - 01:52
The UK government has officially attributed the June 2017 NotPetya cyber attack to the Russian government. The statement is backed by an assessment of the UK’s National Cyber Security Centre, which has found that the Russian military was “almost certainly” responsible for it. The NotPetya attack “The NotPetya attack saw a malicious data encryption tool inserted into a legitimate a piece of software used by most of Ukraine’s financial and government institutions,” the NCSC noted. … More →
Categories: Cyber India

IoT botnet bypasses firewalls to get to ZyXEL modems

Thu, 15/Feb/2018 - 21:06
NewSky Security’s honeypots have detected a new IoT botnet in the making. The botnet was named DoubleDoor, as it leverages two distinct backdoors to get to the target: ZyXEL PK5001Z modems. The DoubleDoor attacks What’s interesting about this particular botnet is that it’s ready to pass an extra layer of security to get to the modem: Juniper Networks’ NetScreen hardware firewall devices. To pull off the attack, it employs exploits for two vulnerabilities: CVE-2015–7755, which … More →
Categories: Cyber India

7 steps security leaders can take to deal with Spectre and Meltdown

Thu, 15/Feb/2018 - 20:51
Security and risk management leaders must take a pragmatic and risk-based approach to the ongoing threats posed by an entirely new class of vulnerabilities, according to Gartner. Spectre and Meltdown are the code names given to different strains of a new class of attacks that target an underlying exploitable design implementation inside the majority of computer chips manufactured over the last 20 years. Security researchers revealed three major variants of attacks in January 2018. The … More →
Categories: Cyber India

Why do we need a risk-based approach to authentication?

Thu, 15/Feb/2018 - 19:00
20 years ago, everyone worked at a desktop workstation hardwired into an office building. This made network security simple and organizations felt they could depend on the time-tested method of the trusted perimeter. Firewalls were relied on to keep out external threats, and anything within the network was considered secure and safe. Today, however, the number of variables has skyrocketed. The move to the cloud, BYOD, and increased use of outside contractors means a legitimate … More →
Categories: Cyber India

A five-year analysis of reported Windows vulnerabilities

Thu, 15/Feb/2018 - 18:30
Based on analysis of all disclosed Microsoft vulnerabilities in 2017, a new Avecto report shows a significant rise in the number of reported vulnerabilities. Last year, 685 vulnerabilities were found versus 325 vulnerabilities that were found in 2013. The removal of admin rights could mitigate 80% of all critical Microsoft vulnerabilities reported in 2017. Nearly all (95%) of critical vulnerabilities in Microsoft browsers could be mitigated by the removal of admin rights. The rise of … More →
Categories: Cyber India

Cryptomining malware continues to drain enterprise CPU power

Thu, 15/Feb/2018 - 18:00
Cryptomining malware continues to impact organizations globally as 23% were affected by the Coinhive variant during January 2018, according to Check Point’s latest Global Threat Impact Index. Researchers discovered three different variants of cryptomining malware in its Top 10 most prevalent ranking, with Coinhive ranking first, impacting more than one-in-five organizations. Coinhive performs online mining of Monero cryptocurrency when a user visits a web page without the user’s approval. The implanted JavaScript then uses the … More →
Categories: Cyber India

Microsoft boosts Windows Analytics to help squash Meltdown and Spectre bugs

Thu, 15/Feb/2018 - 02:50
A day after Microsoft announced it will be adding Windows Defender ATP down-level support for older OSes comes the news that its Windows Analytics service is getting new capabilities aimed at helping businesses tackle Meltdown and Spectre vulnerabilities on machines in their fleet. What is Windows Analytics? Windows Analytics is a free telemetry analysis tool for business administrators. It is meant for guiding organizations through upgrading to and staying current on Windows 10 by providing … More →
Categories: Cyber India

How cybercriminals exploited Telegram flaw to deliver malware

Thu, 15/Feb/2018 - 01:00
A “vulnerability” in Telegram’s desktop instant messaging client for Windows was exploited for months by Russian cybercriminals to deliver malware to users. Kaspersky Lab researchers discovered in October 2017 that the flaw – which is actually more of a loophole, really – was being actively exploited. They notified Telegram about the issue, and sometime between then and now the loophole was closed by the developers. “We don’t have exact information about how long and which … More →
Categories: Cyber India

Microsoft, Adobe February 2018 security updates: An overview

Wed, 14/Feb/2018 - 22:35
The Microsoft February 2018 security updates are for Internet Explorer, Edge, Windows, Office, Office Services and Web Apps, Adobe Flash, and ChakraCore (the core part of the Chakra Javascript engine that powers Microsoft Edge). Jimmy Graham, director of product management at Qualys, considers the Adobe Flash update and that for StructuredQuery in Windows servers and workstations to be the most critical and best implemented as soon as possible. The former plugs the Flash zero-day bug … More →
Categories: Cyber India