{"id":1234,"date":"2016-09-11T00:00:00","date_gmt":"2016-09-11T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2016\/09\/11\/fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail36-suw15-mcsv-net\/"},"modified":"2021-12-30T11:39:00","modified_gmt":"2021-12-30T11:39:00","slug":"fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail36-suw15-mcsv-net","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2016\/09\/11\/fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail36-suw15-mcsv-net\/","title":{"rendered":"From:Reply-To:To:Date:Message-ID:List-ID:List-Unsubscribe:Sender:Content-Type:MIME-Version; i=mail=3Dpaulgdavis.com@mail36.suw15.mcsv.net;"},"content":{"rendered":"<p>[From the desk of Paul Davis &#8211; his opinions and no-one else&#8217;s,  apart from the reporter&#8217;s opinions ]<br \/>\nI had a request to change the format of the date in the Subject line to make it easier to sort.  So I made the change.<\/p>\n<p>* How Many Layers Does Your Email Security Need?<br \/>\n* Why Boards Need To Get Smart About Cyber Innovation &#8212; Now<br \/>\n* Move over Healthcare, Ransomware Has Manufacturing In Its Sights<br \/>\n* Nearly Half of Organizations Unsure if Cyber Insurance will Payout for Evolving Email Attacks<br \/>\n* Anonymous Targets London Stock Exchange as #OpIcarus Advances<\/p>\n<p>How Many Layers Does Your Email Security Need?<br \/>\nCyber criminals have realized that email gateways are quite capable of blocking generic spam and have moved to different techniques, including targeted attacks.<br \/>\nTargeted attacks have adapted precisely to evade traditional methods most email gateways use to try to block unknown malware, such as the following techniques:<br \/>\nFirst off, techniques like Sender Protection Framework (SPF), Domain Keys Identified Mail (DKIM), and Domain-based Message Authentication Reporting and Conformance (DMARC) are designed to validate the identity of the sender, protecting against spoofed emails that appear to come from a friendly sender.<br \/>\nHowever, very few organizations bother to turn these capabilities on.<br \/>\nBe sure to use the same technologies when sending your own email.<\/p>\n<p>Secondly, your gateway needs to extract and explode all the elements of an email attachment to be able to deeply analyze it for malicious intent.<br \/>\nFinally, it is essential to ensure URLs are scanned at time of click.<br \/>\nIn practical terms, this means that URLs contained in emails must be rewritten with pointers that force them to go through a cloud-based web gateway whenever they are clicked upon.<br \/>\nSo, how many layers does your email security need?<br \/>\nYou always need at least one more layer of email security than the attacker can defeat.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=807b0e2484&#038;e=20056c7556<\/p>\n<p>Why Boards Need To Get Smart About Cyber Innovation &#8212; Now<br \/>\nAriel Evans is an American Israeli cybersecurity expert, entrepreneur and business developer.<br \/>\nEvans is the go-to person in Israel that connects cyber startup companies to funding and business development opportunities.<br \/>\nToday she manages over Israeli 30 companies, secures them venture funding, M&#038;A opportunities, and channel sales.<br \/>\nShe has raised over $200 million in the U.S. with private equity and venture capital firms.<\/p>\n<p>What are the biggest trends that you have seen in cybersecurity over the past five years?<br \/>\nCybersecurity has become a boardroom conversation.<br \/>\nIt is no longer adequate to speak solely in terms of technological vulnerabilities such as insufficient patching of servers and network specific devices.<br \/>\nInstead, organizations have begun to appraise the value of their assets and calculate how secure they are against a cyber-attack.<\/p>\n<p>How has the role of the chief information security officer (CISO) changed?<br \/>\nThe CISO is no longer a network guru, but instead a risk manager.<\/p>\n<p>What does an organization need to know in order to understand how effective their cybersecurity program is?<br \/>\nLots.<br \/>\nAgain, cybersecurity is a compilation of people, processes, and tools.<br \/>\nIf just one leg of that three-legged stool is broken, the stool fails.<\/p>\n<p>What are the most common issues that organizations face in cybersecurity?<br \/>\nThe most common issue is the lack of skilled people.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=871d9a04b3&#038;e=20056c7556<\/p>\n<p>Move over Healthcare, Ransomware Has Manufacturing In Its Sights<br \/>\nFortinet research conducted over the past several months shows that manufacturing is likely to be the next industry specifically targeted by ransomware.<br \/>\nIn our latest report we detail two specific trends that support this conclusion.<br \/>\nThe first is an alarming spike in custom ransomware attacks targeted at the manufacturing industry, and the second is the development of a new generation of ransomware that is especially devastating.<br \/>\nBetween October 1, 2015 and April 30, 2016, Fortinet monitored and collated network traffic for 59 mid-sized to large manufacturers, spread out over 9 countries in key markets across the Americas, EMEA, and APAC.<br \/>\nDuring those seven months, we recorded 8.63 million attempted attacks on those 59 manufacturers.<br \/>\nAnd 78% of this malicious activity was targeted at large manufacturers with 1000 or more employees.<br \/>\nThat is a lot of attacks.<br \/>\nWith downtime and losses often calculated by the minute, manufacturers infected with ransomware would be highly motivated to pay a ransom in order to get their production floor back up and running.<br \/>\nAnd this wasn\u2019t your average ransomware.<br \/>\nThis new ransomware had undergone significant enhancements.<br \/>\nRecent variants of the Locky ransomware that we saw, for example, had traded custom encryption algorithms for much more solid and robust Windows APIs and RSA encryption.<br \/>\nThis seems to have clearly been an attempt to thwart organizations that try to decrypt their files without paying the ransom.<br \/>\nAnother ransomware variant we have been tracking is DMA Locker.<br \/>\nOnce it infects an organization, DMA Locker uses remote command-and-control servers to generate unique encryption keys.<br \/>\nBecause these encryption keys are generated off-site, reverse engineering the encryption is not currently possible.<br \/>\nWhich also means that if DMA Locker isn\u2019t entirely removed from an infected network, repeat flare-ups by the exact same ransomware can generate additional ransom demands.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=b469b254c6&#038;e=20056c7556<\/p>\n<p>Nearly Half of Organizations Unsure if Cyber Insurance will Payout for Evolving Email Attacks<br \/>\nLONDON, Jun 07, 2016 (BUSINESS WIRE) &#8212; Mimecast Limited, a leading email and data security company, today issued a warning to organizations relying on cyber insurance: your policies may not be fully up-to-date in covering new social engineering email attacks, leaving firms at risk for taking the full financial brunt of these attacks.<br \/>\nNew Mimecast research* into the growing cyber insurance industry and evolving email attack techniques reveals that almost half (45%) of firms with cyber insurance are unsure if their policy is up-to-date for covering new cyber social engineering attacks, and only 10% believe it is completely up-to-date.<br \/>\nJust 43% of firms with cyber insurance are confident that their policies would pay out for whaling financial transactions.<br \/>\nNearly two-thirds (64%) of firms don\u2019t have any cyber insurance at all.<br \/>\nWith the cybersecurity landscape constantly evolving, cyber insurers will have great difficulty keeping their coverage up-to-date.<br \/>\nA comprehensive cyber resilience strategy is only effective alongside regular employee training on the latest threats combined with appropriate technology fail-safes.\u201d<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=0895c864b3&#038;e=20056c7556<\/p>\n<p>Anonymous Targets London Stock Exchange as #OpIcarus Advances<br \/>\nThe LSE website went offline at 9AM (08:00 GMT) local time, at the beginning of working hours, last Thursday, and was inaccessible for two hours.<br \/>\nLSE representatives have refused to comment on the issue, and kept the hack secret, but experts believe the site was exposed to a distributed denial of service (DDoS) attack, suggesting that no critical information was compromised.<br \/>\nThe attack was carried out within a framework called Operation Icarus, a stated effort by hackers to battle injustice by compromising banking sites around the globe.<br \/>\n\u200b Confirmed hacks include those on the Bank of Greece, the Central Bank of the Dominican Republic, the Dutch Central Bank, the Swiss National Bank, the Central Bank of Venezuela and the Federal Reserve Bank of San Francisco.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=68108d7b00&#038;e=20056c7556<\/p>\n<p>============================================================<br \/>\nFeedback, questions? Our mailing address is:  dailynews@paulgdavis.com (mailto:dailynews@paulgdavis.com)<\/p>\n<p>If you know someone else who would be interested in this Newsalert, please forwarded this email.<br \/>\nIf you want to be added to the distribution list, please click this:    Subscribe to this list (http:\/\/paulgdavis.us3.list-manage.com\/subscribe?u=45bf3caf699abf9904ddc00e3&#038;id=e09452545a)<\/p>\n<p> Unsubscribe from this list (http:\/\/paulgdavis.us3.list-manage1.com\/unsubscribe?u=45bf3caf699abf9904ddc00e3&#038;id=e09452545a&#038;e=20056c7556&#038;c=d2f96da285)<\/p>\n<p> Update subscription preferences (http:\/\/paulgdavis.us3.list-manage.com\/profile?u=45bf3caf699abf9904ddc00e3&#038;id=e09452545a&#038;e=20056c7556)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[From the desk of Paul Davis &#8211; his opinions and no-one else&#8217;s, apart from the reporter&#8217;s opinions ] I had a request to change the format of the date in the Subject line to make it easier to sort. So I made the change. * How Many Layers Does Your&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-1234","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1234","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1234"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1234\/revisions"}],"predecessor-version":[{"id":3721,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1234\/revisions\/3721"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1234"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1234"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1234"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}