{"id":1223,"date":"2016-09-11T00:00:00","date_gmt":"2016-09-11T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2016\/09\/11\/fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail47-atl71-mcdlv-net\/"},"modified":"2021-12-30T11:38:59","modified_gmt":"2021-12-30T11:38:59","slug":"fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail47-atl71-mcdlv-net","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2016\/09\/11\/fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail47-atl71-mcdlv-net\/","title":{"rendered":"From:Reply-To:To:Date:Message-ID:List-ID:List-Unsubscribe:Sender:Content-Type:MIME-Version; i=mail=3Dpaulgdavis.com@mail47.atl71.mcdlv.net;"},"content":{"rendered":"<p>[From the desk of Paul Davis &#8211; his opinions and no-one else&#8217;s,  apart from the reporter&#8217;s opinions ]<\/p>\n<p>* Threats on the Horizon for Tomorrow\u2019s Global Security Landscape<br \/>\n* The Next Frontier of Malware &#8211; Hardware<br \/>\n* Swift warns banks of malware threat<br \/>\n* Survey: Retail IT Professionals Confidence in Cyber Security Capabilities Increase as Data Breaches Rise<br \/>\n* Verizon: Bad Guys Still Phishing for Data<br \/>\n* Email &#8216;most popular phishing tool&#8217;<br \/>\n* Investment grows as DDoS attacks become sophisticated<br \/>\n* MSSPs: The Pros and Cons of Outsourcing Network Security<br \/>\n* Multi-Factor Authentication Heads PCI&#8217;s List of Changes<br \/>\n* Jones Day, K&#038;L Gates Bulk Up Cybersecurity Practices<br \/>\n* Be Prepared: How Proactivity Improves Cybersecurity Defense<br \/>\n* What did we learn from BT\u2019s 2016 CIO Report?<br \/>\n* Top 10 web hacking techniques of 2015<\/p>\n<p>Threats on the Horizon for Tomorrow\u2019s Global Security Landscape<br \/>\nAt the Information Security Forum, we recently released Threat Horizon 2018, the latest in our annual series of reports which provide businesses a forward-looking view of the increasing threats in today\u2019s always-on, interconnected world.<br \/>\nIn Threat Horizon 2018, we highlighted the top three emerging threat themes, as determined by our research, to information security over the next two years.<br \/>\nOver the next two years, technology will increasingly become an integral part of everyday life in modern society, both at a business and a personal level.<br \/>\nOrganizations will seek to maximize efficiency and effectiveness through improved connectivity.<br \/>\nHowever, with these benefits will come associated threats in an expanded and more complex security threat landscape highlighted by the growth of the Internet of Things (IoT).<br \/>\nDealing with cyber-attacks and avoiding data breaches is enough to keep most organizations busy, but this will become even more challenging as established methods of information risk management are eroded or compromised by a variety of (usually non-malicious) actors.<br \/>\nGovernments around the world will take an even greater interest in scrutinizing both new and existing technology products and services used by their citizens.<br \/>\nThey will begin to adopt a more intrusive approach in dealing with organizations that handle personal information, especially major technology companies.<br \/>\nThese governments will justify their activities on the grounds of regulating disruptive business models and organized crime.<br \/>\nHowever, their efforts in combating international crime \u2013 where many think they should be concentrating their resources \u2013 will fall significantly short of the expectation of many organizations.<br \/>\nInformation security professionals are facing increasingly complex threats, some new and others familiar but evolving.<br \/>\nTheir primary challenge remains unchanged; to help their organizations navigate mazes of uncertainty where, at any moment, they could turn a corner and encounter information security threats that inflict severe business impact.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage2.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=ba11989fd2&#038;e=20056c7556<\/p>\n<p>The Next Frontier of Malware &#8211; Hardware<br \/>\nAs recently as two years ago, there has been some rumoured issues related to malware and viruses that get into USB-based hardware devices and can possibly be running from those devices to either steal data or become a launching pad once connected to a device to penetrate deeper that system or the network that it is connected to.<br \/>\nThe most dangerous part about this flavour of Malware is that it likely cannot be detected.<br \/>\nLikely can\u2019t be put there except through some physical means of implantation and would be equally difficult to remove from the device once it is infected \u2013 if it is even possible to remove at all.<br \/>\nThe reality is that this exploit works exceeding well and is nearly impossible to detect or thwart through our current set of tools.<br \/>\nAnti-malware products will need to re-think some of their approaches to detecting hardware embedded malware.<br \/>\nPayloads for these exploits could be adapted to much more damaging variants beyond just data siphoning.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=4fff80c6a8&#038;e=20056c7556<\/p>\n<p>Swift warns banks of malware threat<br \/>\nInterbank payment network Swift is warning banks to beware of a new breed of malware that acts to hide fraudulent transactions on local client interface devices and may have been successfully exploited by the unknown hackers who recently stole $81 million from Bangladesh Bank.<br \/>\nResearchers at BAE System now claim that after gaining administrative rights at Bangladesh Bank, the hackers installed a piece of malware named evtdiag.exe which shielded the attackers by changing information on transfer requests made via Swift on the client interface used by the bank to track information about transfer requests.<br \/>\nWhile the malware appears to have compromised code on a Swift-supplied interface device, Swift maintains that banks&#8217; must take all necessary precautions to lock down their own systems.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=d4e9924424&#038;e=20056c7556<\/p>\n<p>Survey: Retail IT Professionals Confidence in Cyber Security Capabilities Increase as Data Breaches Rise<br \/>\nTripwire, Inc., a leading global provider of end point protection, security and compliance solutions, today announced the results of its 2016 retail cyber security survey.<br \/>\nConducted by Dimensional Research, the survey evaluated the attitudes of over 200 IT professionals in the retail sector and compared their responses to a similar survey Tripwire conducted in 2014.<br \/>\n\u201cUnfortunately, these results indicate that we can expect retail breach activity to continue in the future,\u201d said Tim Erlin, director of IT security and risk strategy. \u201cThe increase in confidence connected with speed of breach detection is particularly surprising, especially in combination with partial implementation of detection tools.<br \/>\nTogether these results indicate while retail organizations might feel better about their cyber security capabilities, there\u2019s still a long way to go to close the gap between initial compromise and detection.\u201d<br \/>\nSeventy-five percent of the 2016 respondents believed they could detect a breach within 48 hours, compared with forty-two percent in 2014.<br \/>\nRetail data breaches involving personally identifiable information (PII) have more than doubled since 2014.<br \/>\nWhen asked if a data breach occurred at their organization where PII was stolen or accessed by intruders, one-third (thirty-three percent) of the respondents said, \u201cyes,\u201d compared with fourteen percent in 2014.<br \/>\nImplementation of breach detection technology has remained flat.<br \/>\nIn both 2014 and 2016, fifty-nine percent of the respondents said their breach detection products were only partially or marginally implemented.<br \/>\nCompanies with larger revenues monitor configuration parameters on critical payment assets less frequently.<br \/>\nSixty-five percent of respondents working for organizations with revenues of less than $100 million check their compliance at least weekly, and only fifty-five percent of respondents with revenues of more than $100 million answered similarly.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=97884ae52b&#038;e=20056c7556<\/p>\n<p>Verizon: Bad Guys Still Phishing for Data<br \/>\nMarc Pitler, principal author of the 2016 DBIR, Verizon&#8217;s annual look at the global landscape of security threats, points to one stark statistic: More than 63% of all data breaches involved weak, lost or stolen credentials.<br \/>\nThat&#8217;s one of the main reasons Verizon Communications Inc. (NYSE: VZ) continues to tout multi-factor authentication as a key to lowering security risks.<br \/>\nPitler authored this year&#8217;s report with considerable humor &#8212; and you can check it out here &#8212; and refers to it as a &#8220;scouting report&#8221; for those attempting to thwart attacks.<br \/>\nHe calls things such as phishing emails &#8220;the number one play in the bad guy&#8217;s playbook,&#8221; because they lead to significant data breaches.<br \/>\nThe percentage of users clicking on the corrupted links in phishing emails actually rose slightly from 11% to 13% and while that is not a statistically significant increase, it is a reflection of why phishing remains a tried and true method of attacking networks.<br \/>\nOnce an individual takes the bait, things happen quickly.<br \/>\nInfiltration of a network happens in minutes more than 80% of the time, but often discovery of the breach is measured in days, and that detection deficit is getting worse. &#8220;If &#8212; and some have called &#8216;if&#8217; the biggest word in the language &#8212; there\u2019s any good news, it&#8217;s that the number of breaches staying open months or more continues to decline slightly,&#8221; Pitler writes in the report.<br \/>\nThis year&#8217;s numbers were influenced by one large attack, known as Dridex, which was a very large botnet targeting bank credentials, he notes.<br \/>\nIt produced a treasure trove of information.<br \/>\n&#8220;With better network segmentation and stronger authentication through your internal network, we can limit damage,&#8221; Pitler says. &#8220;Now we can click in a response plan &#8212; who clicked, let&#8217;s quarantine that device, find out exactly what has been done, what communications inbound and outbound have happened, and really try to break the chain before the real impact occurs where significant data is exfiltrated from the organization.&#8221;<br \/>\nPitler says mobile devices are not yet a major source of threats, but are still something being watched carefully.<br \/>\nAnd as the Internet of Things brings many low-level devices onto the network, those are also being scrutinized.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=bf1f5d2158&#038;e=20056c7556<\/p>\n<p>Email &#8216;most popular phishing tool&#8217;<br \/>\nThe online crime groups were shunning mobiles and newer technologies in favour of phishing campaigns, said the report from Verizon.<br \/>\nAlmost 90% of the incidents involved attempts to steal cash, it said.<br \/>\nAbout 30% of phishing emails had been opened by people in targeted organisations in 2015, said the report, up from 23% in 2014.<br \/>\nAnd, of the scam emails opened, about 13% had been able to launch malware because staff had run the attachments they had carried.<br \/>\nStatistics gathered for the Verizon report suggest 84% of the organisations questioned took weeks to spot that criminals had won access to internal systems.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=ec5d008fb3&#038;e=20056c7556<\/p>\n<p>Investment grows as DDoS attacks become sophisticated<br \/>\nA new report by real-time information services provider Neustar, entitled The Threatscape Widens: DDoS Aggression and the Evolution of IoT Risks, released this month, says it\u2019s no longer the question \u2018if\u2019 or \u2018when\u2019 a company will be DDoSed \u2013 it\u2019s how often and how long will it last.<br \/>\nAccording to the report, 73 per cent of companies were attacked in 2015, with 82 per cent of those attacked suffering multiple attacks.<br \/>\nOut of that number, 45 per cent said they were attacked six times, or more.<br \/>\nIn EMEA, 47 per cent of companies were attacked at least five times.<br \/>\nIt also suggests that DDoSing is not its own purpose \u2013 it\u2019s a means to an end, in many cases.<br \/>\nMore than half of companies (57 per cent) said a DDoS attack is usually followed by data theft, which can be customer data, financial or intellectual property.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=a3a6f2a6c3&#038;e=20056c7556<\/p>\n<p>MSSPs: The Pros and Cons of Outsourcing Network Security<br \/>\nIf you\u2019re already outsourcing functions such as customer support, web design, or manufacturing, the advantages of outsourcing security might seem familiar to you.<br \/>\nThese are some of the key benefits to having a managed provider take care of your cyber security needs:<br \/>\n&#8211; Cost Savings<br \/>\n&#8211; Security Expertise<br \/>\n&#8211; All-Encompassing Customer Support<br \/>\nMSSP Disadvantages Boil Down to Increased Risk<br \/>\n&#8211; Before diving into the risks associated with hiring an MSSP, it\u2019s important to understand that MSSPs do not completely eliminate your security costs\u2014for example, you\u2019ll still need an in-house CISO for the MSSP to report to and coordinate with.<br \/>\nMSSPs offer security expertise; but they are meant to supplement your own security team, not replace it.<br \/>\n&#8211; One disadvantage that keeps companies from outsourcing their security functions is the risk of letting someone take care of their sensitive data.<br \/>\n&#8211; At least when security is in-house, you can take it on yourself to guarantee customer data protection, which leads to another risk-related MSSP disadvantage\u2014a lack of control.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage2.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=d972c43789&#038;e=20056c7556<\/p>\n<p>Multi-Factor Authentication Heads PCI&#8217;s List of Changes<br \/>\nThe PCI Security Standards council will deliver its 3.2 data security standard version, effective April 28, strengthening rules for data access, providing criteria for ongoing compliance programs, and reminding merchants and network operators to continue to migrate to a more secure Web protocol, or Transport Layer Security.<br \/>\nThe multi-factor requirement is the biggest change in the PCI DSS 3.2, said PCI chief technology officer Troy Leach.<br \/>\nPCI recommends that organizations review how they manage access to their cardholder data environment and review the current administrator roles to identify where the new requirement will require changes to authentication.<br \/>\nVersion 3.2 also calls for new criteria titled Designated Entities Supplemental Validation, designed to help service providers maintain security programs through effective compliance oversight, proper scoping of an environment, and assuring effective alerts are in place in critical security controls.<br \/>\nAn organization is required to undergo an assessment of these validation processes only if instructed to do so by an acquirer or payment brand.<br \/>\nEven if not mandatory, the PCI council suggests organizations study these security practices, especially new requirements for service providers.<br \/>\nThose requirements include a third party provider maintaining a documented description of the cryptographic architecture and reporting on failures of critical security control systems.<br \/>\nIn addition, a new requirement calls for executive management to establish responsibility for protection of cardholder data and the PCI compliance program.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=41e264bb5c&#038;e=20056c7556<\/p>\n<p>Jones Day, K&#038;L Gates Bulk Up Cybersecurity Practices<br \/>\nAs cyberthreats and data protection settle into the forefront of general counsel minds, two leading Am Law 100 firms are bolstering their cybersecurity practices with a pair of recent hires.<br \/>\nOn Monday, Jones Day announced its addition of former Hunton &#038; Williams counsel J\u00f6rg Hladjk in Brussels, where he will lead his new firm\u2019s cybersecurity, privacy and data protection practice.<br \/>\nAlso switching shingles this month is Steven Caponi, the former head of Blank Rome\u2019s cybersecurity and data privacy group, who has joined K&#038;L Gates as a partner in Wilmington, Delaware.<br \/>\nCaponi, who advises executives and boards of directors on corporate governance issues related to cyberthreats, previously served as administrative partner for Blank Rome\u2019s operations in Delaware.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=cb9e22a18f&#038;e=20056c7556<\/p>\n<p>Be Prepared: How Proactivity Improves Cybersecurity Defense<br \/>\nWhen responding to an incident, there is always extreme pressure to gather and process digital evidence before it is no longer available or has been modified.<br \/>\nAs illustrated in the KPMG 2015 Global CEO Outlook report, half of chief executive officers polled said their organizations are either not prepared or only partially prepared to deal with a major cyber-attack.<br \/>\nOne reason these executives gave for this lack of preparedness was because too much attention is being spent on preventing attacks, and not enough on protection and response actions.<br \/>\nHere are five examples of how to shift from a reactive to proactive cyber preparedness model through the process of Digital Forensic Readiness.<br \/>\n-Maintain a business-centric focus<br \/>\n-Don\u2019t reinvent the wheel<br \/>\n-Security intelligence goes beyond threats<br \/>\n-Keep tabs on external relationships<br \/>\n-Understand costs and benefits<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=f23a31bf8e&#038;e=20056c7556<\/p>\n<p>What did we learn from BT\u2019s 2016 CIO Report?<br \/>\nOffice worker sitting on rooftop in cityBT has recently released its 2016\u2019s CIO report, dissecting the challenges and opportunities available for enterprise organizations, and the CIO, following the mainstream adoption of disruptive digital technologies.<br \/>\nHere, we\u2019ve detailed a few of the lessons learnt from the 2016 report:<br \/>\n&#8211; Security is now being dealt with<br \/>\nThe report highlights 33% of respondents believe the transition through to cloud computing will act as a catalyst to improve security throughout the organization.<br \/>\nIt would appear the implementation of cloud is forcing enterprise to deal with security \u2013 it is no longer a subject which can be put off for another day.<br \/>\n&#8211; Cloud is no longer a choice<br \/>\n65% of respondents stated their current infrastructures are struggling to deal with the rapid adoption of digital technologies.<br \/>\nThere are still challenges to the adoption of a cloud model (security, legacy systems, time constraints and budget), though the CIO\u2019s in questions realize cloud is no longer an option to become more successful, but a necessity to remain relevant.<br \/>\n&#8211; The CIO role has changed and there\u2019s no going back<br \/>\nA successful CIO will be able to bridge the gap between IT and the rest of the business, becoming more of a businessman as opposed to a technologist.<br \/>\nThe disruptive nature of digital technologies ensure CIO\u2019s now have to be driven by flexibility, adaptive to new ideas, understanding of agile models and more receptive to alternative trends.<br \/>\nThis could be seen as quite a shift in what would be the current perception of a CIO.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=089aeefe1b&#038;e=20056c7556<\/p>\n<p>Top 10 web hacking techniques of 2015<br \/>\nAfter receiving 39 submissions detailing hacking techniques discovered in 2015, the following hacks were voted into the top 10 spaces:<\/p>\n<p>FREAK (Factoring Attack on RSA-Export Keys)<br \/>\nLogJam<br \/>\nWeb Timing Attacks Made Practical<br \/>\nEvading All* WAF XSS Filters<br \/>\nAbusing CDN\u2019s with SSRF Flash and DNS<br \/>\nIllusoryTLS<br \/>\nExploiting XXE in File Parsing Functionality<br \/>\nAbusing XLST for Practical Attacks<br \/>\nMagic Hashes<br \/>\nHunting Asynchronous Vulnerabilities<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=d5adcea7e7&#038;e=20056c7556<\/p>\n<p>============================================================<br \/>\nFeedback, questions? Our mailing address is:  dailynews@paulgdavis.com (mailto:dailynews@paulgdavis.com)<\/p>\n<p>If you know someone else who would be interested in this Newsalert, please forwarded this email.<br \/>\nIf you want to be added to the distribution list, please click this:    Subscribe to this list (http:\/\/paulgdavis.us3.list-manage.com\/subscribe?u=45bf3caf699abf9904ddc00e3&#038;id=e09452545a)<\/p>\n<p> Unsubscribe from this list (http:\/\/paulgdavis.us3.list-manage.com\/unsubscribe?u=45bf3caf699abf9904ddc00e3&#038;id=e09452545a&#038;e=20056c7556&#038;c=e00a959b29)<\/p>\n<p> Update subscription preferences (http:\/\/paulgdavis.us3.list-manage.com\/profile?u=45bf3caf699abf9904ddc00e3&#038;id=e09452545a&#038;e=20056c7556)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[From the desk of Paul Davis &#8211; his opinions and no-one else&#8217;s, apart from the reporter&#8217;s opinions ] * Threats on the Horizon for Tomorrow\u2019s Global Security Landscape * The Next Frontier of Malware &#8211; Hardware * Swift warns banks of malware threat * Survey: Retail IT Professionals Confidence in&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-1223","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1223","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1223"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1223\/revisions"}],"predecessor-version":[{"id":3710,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1223\/revisions\/3710"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1223"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1223"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1223"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}