Skip to content

CyberSecurity Institute

Security News Curated from across the world

Menu
Menu

From:Reply-To:To:Date:Message-ID:List-ID:List-Unsubscribe:Sender:Content-Type:MIME-Version; i=mail=3Dpaulgdavis.com@mail36.suw15.mcsv.net;

Posted on September 11, 2016December 30, 2021 by admini

[From the desk of Paul Davis – his opinions and no-one else’s, apart from the reporter’s opinions ]
I had a request to change the format of the date in the Subject line to make it easier to sort. So I made the change.

* How Many Layers Does Your Email Security Need?
* Why Boards Need To Get Smart About Cyber Innovation — Now
* Move over Healthcare, Ransomware Has Manufacturing In Its Sights
* Nearly Half of Organizations Unsure if Cyber Insurance will Payout for Evolving Email Attacks
* Anonymous Targets London Stock Exchange as #OpIcarus Advances

How Many Layers Does Your Email Security Need?
Cyber criminals have realized that email gateways are quite capable of blocking generic spam and have moved to different techniques, including targeted attacks.
Targeted attacks have adapted precisely to evade traditional methods most email gateways use to try to block unknown malware, such as the following techniques:
First off, techniques like Sender Protection Framework (SPF), Domain Keys Identified Mail (DKIM), and Domain-based Message Authentication Reporting and Conformance (DMARC) are designed to validate the identity of the sender, protecting against spoofed emails that appear to come from a friendly sender.
However, very few organizations bother to turn these capabilities on.
Be sure to use the same technologies when sending your own email.

Secondly, your gateway needs to extract and explode all the elements of an email attachment to be able to deeply analyze it for malicious intent.
Finally, it is essential to ensure URLs are scanned at time of click.
In practical terms, this means that URLs contained in emails must be rewritten with pointers that force them to go through a cloud-based web gateway whenever they are clicked upon.
So, how many layers does your email security need?
You always need at least one more layer of email security than the attacker can defeat.
Link: http://paulgdavis.us3.list-manage.com/track/click?u=45bf3caf699abf9904ddc00e3&id=807b0e2484&e=20056c7556

Why Boards Need To Get Smart About Cyber Innovation — Now
Ariel Evans is an American Israeli cybersecurity expert, entrepreneur and business developer.
Evans is the go-to person in Israel that connects cyber startup companies to funding and business development opportunities.
Today she manages over Israeli 30 companies, secures them venture funding, M&A opportunities, and channel sales.
She has raised over $200 million in the U.S. with private equity and venture capital firms.

What are the biggest trends that you have seen in cybersecurity over the past five years?
Cybersecurity has become a boardroom conversation.
It is no longer adequate to speak solely in terms of technological vulnerabilities such as insufficient patching of servers and network specific devices.
Instead, organizations have begun to appraise the value of their assets and calculate how secure they are against a cyber-attack.

How has the role of the chief information security officer (CISO) changed?
The CISO is no longer a network guru, but instead a risk manager.

What does an organization need to know in order to understand how effective their cybersecurity program is?
Lots.
Again, cybersecurity is a compilation of people, processes, and tools.
If just one leg of that three-legged stool is broken, the stool fails.

What are the most common issues that organizations face in cybersecurity?
The most common issue is the lack of skilled people.
Link: http://paulgdavis.us3.list-manage.com/track/click?u=45bf3caf699abf9904ddc00e3&id=871d9a04b3&e=20056c7556

Move over Healthcare, Ransomware Has Manufacturing In Its Sights
Fortinet research conducted over the past several months shows that manufacturing is likely to be the next industry specifically targeted by ransomware.
In our latest report we detail two specific trends that support this conclusion.
The first is an alarming spike in custom ransomware attacks targeted at the manufacturing industry, and the second is the development of a new generation of ransomware that is especially devastating.
Between October 1, 2015 and April 30, 2016, Fortinet monitored and collated network traffic for 59 mid-sized to large manufacturers, spread out over 9 countries in key markets across the Americas, EMEA, and APAC.
During those seven months, we recorded 8.63 million attempted attacks on those 59 manufacturers.
And 78% of this malicious activity was targeted at large manufacturers with 1000 or more employees.
That is a lot of attacks.
With downtime and losses often calculated by the minute, manufacturers infected with ransomware would be highly motivated to pay a ransom in order to get their production floor back up and running.
And this wasn’t your average ransomware.
This new ransomware had undergone significant enhancements.
Recent variants of the Locky ransomware that we saw, for example, had traded custom encryption algorithms for much more solid and robust Windows APIs and RSA encryption.
This seems to have clearly been an attempt to thwart organizations that try to decrypt their files without paying the ransom.
Another ransomware variant we have been tracking is DMA Locker.
Once it infects an organization, DMA Locker uses remote command-and-control servers to generate unique encryption keys.
Because these encryption keys are generated off-site, reverse engineering the encryption is not currently possible.
Which also means that if DMA Locker isn’t entirely removed from an infected network, repeat flare-ups by the exact same ransomware can generate additional ransom demands.
Link: http://paulgdavis.us3.list-manage.com/track/click?u=45bf3caf699abf9904ddc00e3&id=b469b254c6&e=20056c7556

Nearly Half of Organizations Unsure if Cyber Insurance will Payout for Evolving Email Attacks
LONDON, Jun 07, 2016 (BUSINESS WIRE) — Mimecast Limited, a leading email and data security company, today issued a warning to organizations relying on cyber insurance: your policies may not be fully up-to-date in covering new social engineering email attacks, leaving firms at risk for taking the full financial brunt of these attacks.
New Mimecast research* into the growing cyber insurance industry and evolving email attack techniques reveals that almost half (45%) of firms with cyber insurance are unsure if their policy is up-to-date for covering new cyber social engineering attacks, and only 10% believe it is completely up-to-date.
Just 43% of firms with cyber insurance are confident that their policies would pay out for whaling financial transactions.
Nearly two-thirds (64%) of firms don’t have any cyber insurance at all.
With the cybersecurity landscape constantly evolving, cyber insurers will have great difficulty keeping their coverage up-to-date.
A comprehensive cyber resilience strategy is only effective alongside regular employee training on the latest threats combined with appropriate technology fail-safes.”
Link: http://paulgdavis.us3.list-manage.com/track/click?u=45bf3caf699abf9904ddc00e3&id=0895c864b3&e=20056c7556

Anonymous Targets London Stock Exchange as #OpIcarus Advances
The LSE website went offline at 9AM (08:00 GMT) local time, at the beginning of working hours, last Thursday, and was inaccessible for two hours.
LSE representatives have refused to comment on the issue, and kept the hack secret, but experts believe the site was exposed to a distributed denial of service (DDoS) attack, suggesting that no critical information was compromised.
The attack was carried out within a framework called Operation Icarus, a stated effort by hackers to battle injustice by compromising banking sites around the globe.
​ Confirmed hacks include those on the Bank of Greece, the Central Bank of the Dominican Republic, the Dutch Central Bank, the Swiss National Bank, the Central Bank of Venezuela and the Federal Reserve Bank of San Francisco.
Link: http://paulgdavis.us3.list-manage.com/track/click?u=45bf3caf699abf9904ddc00e3&id=68108d7b00&e=20056c7556

============================================================
Feedback, questions? Our mailing address is: dailynews@paulgdavis.com (mailto:dailynews@paulgdavis.com)

If you know someone else who would be interested in this Newsalert, please forwarded this email.
If you want to be added to the distribution list, please click this: Subscribe to this list (http://paulgdavis.us3.list-manage.com/subscribe?u=45bf3caf699abf9904ddc00e3&id=e09452545a)

Unsubscribe from this list (http://paulgdavis.us3.list-manage1.com/unsubscribe?u=45bf3caf699abf9904ddc00e3&id=e09452545a&e=20056c7556&c=d2f96da285)

Update subscription preferences (http://paulgdavis.us3.list-manage.com/profile?u=45bf3caf699abf9904ddc00e3&id=e09452545a&e=20056c7556)

Leave a Reply

You must be logged in to post a comment.

Recent Posts

  • AI/ML News – 2024-04-14
  • Incident Response and Security Operations -2024-04-14
  • CSO News – 2024-04-15
  • IT Security News – 2023-09-25
  • IT Security News – 2023-09-20

Archives

  • April 2024
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • April 2023
  • March 2023
  • February 2022
  • January 2022
  • December 2021
  • September 2020
  • October 2019
  • August 2019
  • July 2019
  • December 2018
  • April 2018
  • December 2016
  • September 2016
  • August 2016
  • July 2016
  • April 2015
  • March 2015
  • August 2014
  • March 2014
  • August 2013
  • July 2013
  • June 2013
  • May 2013
  • April 2013
  • March 2013
  • February 2013
  • January 2013
  • October 2012
  • September 2012
  • August 2012
  • February 2012
  • October 2011
  • August 2011
  • June 2011
  • May 2011
  • April 2011
  • February 2011
  • January 2011
  • December 2010
  • November 2010
  • October 2010
  • August 2010
  • July 2010
  • June 2010
  • May 2010
  • April 2010
  • March 2010
  • February 2010
  • January 2010
  • December 2009
  • November 2009
  • October 2009
  • September 2009
  • June 2009
  • May 2009
  • March 2009
  • February 2009
  • January 2009
  • December 2008
  • November 2008
  • October 2008
  • September 2008
  • August 2008
  • July 2008
  • June 2008
  • May 2008
  • April 2008
  • March 2008
  • February 2008
  • January 2008
  • December 2007
  • November 2007
  • October 2007
  • September 2007
  • August 2007
  • July 2007
  • June 2007
  • May 2007
  • April 2007
  • March 2007
  • February 2007
  • January 2007
  • December 2006
  • November 2006
  • October 2006
  • September 2006
  • August 2006
  • July 2006
  • June 2006
  • May 2006
  • April 2006
  • March 2006
  • February 2006
  • January 2006
  • December 2005
  • November 2005
  • October 2005
  • September 2005
  • August 2005
  • July 2005
  • June 2005
  • May 2005
  • April 2005
  • March 2005
  • February 2005
  • January 2005
  • December 2004
  • November 2004
  • October 2004
  • September 2004
  • August 2004
  • July 2004
  • June 2004
  • May 2004
  • April 2004
  • March 2004
  • February 2004
  • January 2004
  • December 2003
  • November 2003
  • October 2003
  • September 2003

Categories

  • AI-ML
  • Augment / Virtual Reality
  • Blogging
  • Cloud
  • DR/Crisis Response/Crisis Management
  • Editorial
  • Financial
  • Make You Smile
  • Malware
  • Mobility
  • Motor Industry
  • News
  • OTT Video
  • Pending Review
  • Personal
  • Product
  • Regulations
  • Secure
  • Security Industry News
  • Security Operations
  • Statistics
  • Threat Intel
  • Trends
  • Uncategorized
  • Warnings
  • WebSite News
  • Zero Trust

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org
© 2025 CyberSecurity Institute | Powered by Superbs Personal Blog theme