Tag Archive for: Challenges

How to face the new challenges in an ever-expanding – and risky – internet environment


Two decades ago, we kept everything relatively simple by containing our organization’s technology footprint within the closed fortress that was the corporate network. The IT staff determined which tools to deploy, and the security team figured out how to best protect them and the network.

This seems a distant memory now, thanks to modern innovation: Work-from-home (WFH) arrangements continue to transform the traditional office culture, with spikes in cloud adoption, shadow IT, and Bring Your Own … Everything. The resulting widespread connectivity has boosted productivity. But it has also ushered in a new era of exposure because of a vastly increased attack surface.

Subsequently, chief information security officers (CISOs) and their teams can no longer afford to view their roles as an “after the fact,” reactive responsibility. They must instead take proactive steps to identify all internet-facing assets from the very beginning and protect them. With improved visibility and a “security first” commitment, companies can operate with peace of mind.

To illustrate this, we recently published research in which we evaluated the presence of a variety of risks and vulnerabilities in random samples of 2.2 million hosts in our Universal Internet Dataset (UIDS). Here’s what we found:

  • WFH brings new challenges. Connecting remotely, employee-users are expanding the attack surface, although it’s an unintended result of their actions in most cases. Post-pandemic remote work has driven a 59%  increase in the use of tools and devices not approved by IT (commonly called shadow IT), leading to unmanaged devices/services because IT and security teams are left out of the conversation. What’s more, we have found that organizations now use an average of 44 different domain registrars and 17 hosting providers – another likely outcome of shadow IT that further contributes to visibility issues.
  • Misconfigurations and exposures create the most risks. Misconfigurations – such as unencrypted services, insufficient or missing security controls, and self-signed certificates – account for about 60% of internet risks. Exposures of services, devices and information represent 28%.
  • Exposures are not…

Source…

Over 1,500 cybersecurity experts will discuss challenges and trends at DefCamp


After two years of exclusive online activity, the most important annual hacking and cybersecurity conference in Central and Eastern Europe returns onsite in Bucharest, on 10th-11th November 2022, to bring together the infosec expert community in the region.

 

In recent years, companies have focused heavily on the rapid adoption of digitization to enable them to continue working remotely as a result of the pandemic. This has opened the door for cybercriminals to launch their attacks more easily given the increased number of vulnerabilities in company infrastructures. In addition, recent geopolitical events have also put pressure on companies’ capabilities to defend themselves against cyber attacks. Attack methods are becoming more sophisticated and the need for security solutions and strategies is growing. DefCamp will be the right environment to discuss today’s cybersecurity challenges, and experts on stage will address topics such as critical infrastructure security, building a company-wide security strategy and incident management, ransomware, malware, device tracking threats in 5G networks and more.

„Cybersecurity is undoubtedly the biggest challenge of the digital age. For this reason, companies, regardless of their employee numbers or industry, must prioritize defense solutions for their business. The pandemic has increased  the need for digitization, which has brought both opportunities for growth and risks for users and companies with low security. In addition, the conflict in Ukraine has exposed technological vulnerabilities behind some large companies and, along with online misinformation, it has increased distrust in storing personal data on the internet“, said Andrei Avădănei, founder of DefCamp.

Since its first edition in 2011, DefCamp has brought together the region’s community of security experts to showcase current solutions for effective and lasting protection against increasingly agile cybercriminals. This year’s edition will focus on creating opportunities to reconnect and develop members’ skills, after two years of being exclusively online. The event is physically expected to attract more than 1500 participants from around the world,…

Source…

Opinion: Meeting the new challenges of EnemyBot head-on


Maher Jadallah, Senior Director Middle East & North Africa at Tenable

Botnets first gained widespread notoriety in the early 2000s and continue to be a common and disruptive source of trouble around the globe. Since the start of the COVID-19 pandemic, cybercriminals have stepped up their attacks against individuals and institutions alike, spurred on by increasing digitalisation, according to the Global Cybersecurity Outlook 2022 published by the World Economic Forum [1].

Proof of this unfortunate trend reared its head in May this year, when research by AT&T Alien Labs™ found that EnemyBot operators were exploiting recently identified vulnerabilities across content management system servers, Android and other IoT devices [2]. What this means in plain English is that the gap between a vulnerability being discovered and it being exploited is shrinking.

EnemyBot was first discovered in March 2022 and is actually the sum of code taken from other disruptive botnets including Mirai, Qbot and Zbot. Some experts describe it as an updated version of Gafgyt_tor, as it leverages a number of botnet functions sourced from the Gafgyt codebase. What makes Enemybot a bigger concern is that its code can be easily found online, which makes it a do-it-yourself botnet for nefarious individuals to bend to their needs.

Trouble Compounded

In today’s digital world, securing devices and networks has become challenging due to several issues. Coming back to EnemyBot, threat actors are actively developing this botnet, meaning the criticality of a vulnerability can change from one moment to the next.

Since this botnet is modified regularly to take advantage of new vulnerabilities, it is difficult to protect against; each time threat actors hear of a vulnerability and realise they stand to benefit from exploiting it, it’s a given that they will rapidly tweak the botnet to achieve their goals. In some cases, vulnerabilities don’t even have CVE numbers by the time they are exploited by EnemyBot or other such attacks.

Another unfortunate issue complicating the security landscape is that it is now easier to launch a cyberattack today than in years gone by. The result of this is…

Source…

Mobile Application Security Testing Market 2028 Overall View of Opportunities, Challenges, Key Players, Growth Rate



https://www.newsorigins.com/mobile-application-security-testing-market-49945/Mobile Application Security Testing  Market 2028 Overall View of Opportunities, Challenges, Key Players, Growth Rate