Tag Archive for: business

MOVEit hackers may have found simpler business model beyond ransomware


A notorious cyber extortion gang’s latest plot is fueling concern that ransomware actors may have hit upon a simpler and just-as-lucrative business model than their traditional methods of demanding payment from victims in exchange for the release of their computer systems.

The Russian-speaking hacker group Cl0p confirmed it exploited a zero-day vulnerability in the popular MOVEit file transfer program and stole data from a growing number of victims, exposing the personal information of many millions of people worldwide.

It’s Cl0p’s third and largest hack of file-transfer software, which is designed to securely facilitate an organization’s transmission of sensitive data. More alarmingly, it’s also the third time it has simply demanded payment not to release data rather than demanding a ransom to decrypt a victim’s system.

“It’s sort of a new business model for them,” said Huntress senior researcher John Hammond, who helped find the backdoor zero-day exploit Cl0p used to trick MOVEit’s database to execute the gang’s commands. Hammond said the latest extortion method is easier to implement.

“You don’t need to encrypt the hard drive,” he said. 

Hammond and others warn that we should expect to see additional attacks in the future targeting file-transfer software in particular, as well as other data-rich tools such as document management programs.

“It’s been quite productive,” said Bert Kondruss, founder of cybersecurity firm Kon Briefing. “I’m pretty sure they will concentrate on this.” 

Scouring regulatory filings, public statements and other sources, Kondruss has compiled an unofficial list of 128 victims so far. Hammond, Kondruss and others expect many more. 

Analysts say the bulk of the attacks occurred over the Memorial Day weekend in the United States when staffing was minimal.  

The hacking group began publishing the names of its victims earlier this month after demanding payments from them, including the University of California, Los Angeles, Siemens Energy and three others reported on Monday. Cl0p continues to post updates that claim to detail new victims on a daily basis.

“The company doesn’t care about its customers, it ignored their security!!!” the hackers wrote on their…

Source…

Is your computer really clean? | Business


The war against malware (short for “malicious software”) like viruses, spyware and rootkits is a constant cat-and-mouse game between malware writers and distributors (the “bad guys”) and those who write, update and use antivirus and antispyware protection tools (the “good guys”).

Thousands of new viruses and virus variants are released onto the Internet every day. Companies like Avira, Avast, AVG, ESET, Trend Micro, McAfee and Symantec employ thousands of researchers and software programmers who work all day long, every day doing nothing but trying to figure out ways to fight new and existing malware. They’ve got their hands full. 

Computer security practitioners like myself, who are “out in the field,” and end-users like you, are on the front lines of the malware war. Having antimalware programs is wonderful, but unless they are properly installed, updated and used, they are almost worse than having nothing at all. It’s sort of like having a fancy, complicated, high-security lock on the front door of your house. If you don’t learn how to use that lock, then you might as well leave the front door wide open. Simply closing the door without using the lock is giving you a false sense of security.

There are many computer experts who contend that a false sense of security is exactly what we have in our computer/Internet-dominated world. People have their fancy-schmancy security “suites” installed, and, having been assured by the manufacturers that they are “protected,” they think they are safe to continue opening questionable email attachments, downloading shady programs, visiting bogus websites and clicking on sketchy popup ads.

The hard truth is that there is no single antimalware program that catches all computer viruses. There is no single antispyware program that stops all spyware. There is no magic all-in-one anti-everything Internet security “suite” that does an excellent job in all of its functions. It simply doesn’t exist. They all miss something and they all fall short when trying to stop the most pernicious malware threat in town: the rootkit.

Rootkits are…

Source…

Computer Security Market Business Growth and Industry Development by 2030 |NortonLifeLock, Fortinet, McAfee


The MarketWatch News Department was not involved in the creation of this content.

Jun 22, 2023 (Heraldkeepers) —
The Computer Security Market study orders market information in view of market improvement and development boundaries, permitting the development way to be enhanced. It likewise stresses the principal sellers’ methodologies and piece of the pie in the particular market. The review follows a sound exploration strategic worldview that helps direction. It accumulates subjective and quantitative market information, as well as essential examination.

Download FREE Sample PDF of Computer Security Report:
https://www.infinitybusinessinsights.com/request_sample.php?id=797541&Mode=AC99

The Computer Security Market concentrate on report recognizes and gathers fundamental and fluctuated kinds of market systems being developed. Besides, the examination report effectively combines acquisition by isolating center parts from the most encouraging business area. Also, the information figures huge contender information, assessment, and pieces of information to additional form R&D techniques. It additionally underlines significant factors like open doors, drive, item broadness, market outline, and main impetus.

This report centers about the top players in global Computer Security marketplace:

NortonLifeLock, Fortinet, McAfee, Avast, Trend Micro, Bitdefender, ESET, Kaspersky Lab, Comodo, F-Secure, AHNLAB

Computer Security Market Classifies into Types:
Network Security
Identity Theft
Endpoint Security
Antivirus Software
Others

Computer Security Market Segmented into Application:
Consumer
Business

During the projection time frame, the Asia Pacific market is supposed to develop at the quickest rate. The rising use and expanding number of offices in Asian nations are driving business sector extension in the Asia Pacific district.

Get Sample Copy of this Report:

https://www.infinitybusinessinsights.com/request_sample.php?id=797541&Mode=AC99

Reasons Why You Should Buy This Report:

1. To gain an in-depth understanding of Computer Security Market
2. To obtain research-based business decisions and add weight to presentations and marketing strategies
3….

Source…

Gigamon Announces Deep Observability Integration with Amazon Security Lake | National Business


SANTA CLARA, Calif.–(BUSINESS WIRE)–Jun 8, 2023–

Gigamon, the leading deep observability company, today announced that its Deep Observability Pipeline now efficiently delivers network-derived application metadata intelligence (AMI) into Amazon Security Lake from Amazon Web Services (AWS). Amazon Security Lake automatically centralizes an organization’s security data from across their AWS environments, leading SaaS providers, on-premises environments, and cloud sources into a purpose-built data lake, so customers can act on security data faster and simplify security data management across hybrid and multicloud environments. This integration provides organizations the ability to access and analyze data-in-motion across hybrid cloud infrastructure to more efficiently and effectively secure and manage workloads, applications, and data.

The integration of network-derived intelligence with Amazon Security Lake supports important use cases for organizations seeking both completeness and efficiency across their security tools stack. With Amazon Security Lake, Gigamon can provide:

  • Security analytics based on actual data communications to completely and correctly identify any usage of vulnerable protocols, deprecated ciphers, and expired certificates
  • Forensics that compare what applications actually did with what logs report
  • A richer and deeper data set on which to base new AI-driven security analytics via tools like NDR or XDR

Gigamon uniquely leverages deep packet inspection (DPI) to extract more than 7,500 application-related metadata attributes derived from network packets. With Amazon Security Lake integration, users can centralize and gain deep observability into security data across their entire organization. The new integration helps organizations to:

  • Efficiently deliver AWS traffic to multiple security tools without installing individual agents for each tool
  • Contain excessive tool and transit costs by filtering unnecessary traffic and deduplicating redundant traffic
  • Generate NetFlow for SIEMs and raw packets for NPMs and packet sniffer tools

Gigamon is also a launch…

Source…