Tag Archive for: largest

In A Historic First, Ukraine To Join NATO’s Largest Cyber Security Exercise, Locked Shields 2024




For the very first time, Ukraine will debut in NATO’s flagship cybersecurity exercise, Locked Shields 2024, announced by the National Cyber Security Coordination Center (the first working body of Ukraine’s National Security and Defense Council). 

China Threat Pushes US To Accelerate Next-Gen Interceptor Program; Expert Finds THAAD, Patriot & SM-3 ‘Ineffective’

Locked Shields, organized by the NATO Cooperative Cyber Defense Centre of Excellence (CCDCOE), is the world’s largest cybersecurity exercise. It will take place between April 22 and April 26.

The exercise serves as a crucible for honing cyber defense capabilities, fostering an environment where participants leverage their collective expertise to develop robust defense strategies. 

Since its inception in 2010, the exercise has evolved into the world’s largest and most realistic cyber defense drill, setting the standard for comprehensive cyber readiness.

This annual event convenes experts from diverse backgrounds to tackle cyber threats through realistic scenarios, emphasizing the importance of international cooperation in defending against cyber-attacks.

The National Cyber Security Coordination Center of Ukraine stressed the growing importance of Locked Shields in strengthening international collaboration in cyber defense, which is evident from the increasing number of participating countries each year. 

In its previous iteration in 2023, Locked Shields saw the participation of 33 countries forming 24 different teams. This year’s exercise, hosted in Estonia, is expected to draw around 4,000 experts from over 40 nations tasked with safeguarding a fictional nation’s critical infrastructure from cyber threats.

According to the National Cyber Security Coordination Center, Kyiv is forming a joint team with the Czech Republic for the exercises. The goal is to cultivate skills, share experiences, and foster cooperation in countering modern cyber threats. 

In March 2022, Ukraine became a member of the NATO Cyber Center in response to Russia’s large-scale invasion. 

Serhiy Demedyuk, Deputy Secretary of Ukraine’s National Security and Defense…

Source…

Largest navigation device maker combats bots with Cequence’s API Spartan


The world’s largest navigation device manufacturer has opted to secure its eCommerce experience and combat bot attacks with the bot detection and mitigation solution API Spartan, created by Cequence and part of the overarching Unified API Protection platform.

This decision was made in response to significant financial risks exposed by bot attacks. The company encountered approximately 100 million SSO login requests monthly, with 15 to 20 percent of these identified as malicious. They also revealed that account takeovers could result in costs ranging from $50 (40) to $12,000 (9,500) each. If left unchecked, these costs could culminate in billions potentially lost, spelling out disaster for the business.

Previously, the company had struggled with substandard bot protection from another internet security provider, who used rudimentary techniques reliant on identifying bad IP addresses. However, this method proved insufficient in detecting advanced malicious bots given its lack of behavioural analysis, leading to unresolved bot attacks and difficulties in ensuring business continuity and customer experience.

In searching for a more proactive solution to this predicament, the company turned to Cequence’s API Spartan. Cequence’s capabilities to discern genuine users from bots in real-time and adapt to evolving bot tactics appealed to the company, offering a reliable and future-proof answer to their bot issue.

“Bots aren’t just a technical nuisance; they’re customer experience assassins,” stated Ameya Talwalkar, CEO of Cequence. “Imagine loyal customers, eager to purchase your products, locked out by an army of automated bad actors. The frustration, lost sales, and reputational damage are a nightmare scenario no business can afford. That’s why Cequence is dedicated to providing solutions that go beyond simple bot detection. We empower companies to proactively safeguard their legitimate customers and foster a thriving online environment where trust and genuine interactions flourish.”

The OWASP API Security Top 10 highlights the vulnerability of poorly secured APIs to automated bot attacks, blurring the line between traditional API and bot attacks with unified security solutions…

Source…

Government facilities were third largest ransomware target in 2023, FBI says


Government facilities were the third largest critical infrastructure sector targeted by ransomware attacks in 2023, according to cybercrime statistics released Wednesday by the FBI.

The agency’s Internet Crime Complaint Center, or IC3, unveiled the findings in its annual report that unpacks complaints, financial losses and other metrics used to determine the severity of cybercrime activities reported to federal authorities.

Of the 1,193 complaints IC3 received from organizations belonging to U.S.-designated critical infrastructure sectors, government facilities came in third place with 156 complaints, while critical manufacturing and healthcare centers took the second and top spots, respectively.

“Of the 16 critical infrastructure sectors, IC3 reporting indicated 14 sectors had at least 1 member that fell to a ransomware attack in 2023,” the report adds.

LockBit, ALPHV/BlackCat, Akira, Royal and Black Basta were the top ransomware gangs tied to those critical infrastructure complaints, the report added. ALPHV, which recently claimed responsibility for its attack on Change Healthcare that has caused widespread logjams in the prescription drug market, reportedly staged a takedown after hauling away a $22 million ransom payment from the company.

Ransomware operatives targeted companies around the world last year, with the number of firms targeted reaching an all-time high compared to findings in previous years, according to a January Check Point analysis.

The U.S. has been working with international partners to take a firm stance against ransom payments, though experts have not agreed on a single policy.

“The FBI does not encourage paying a ransom to criminal actors. Paying a ransom may embolden adversaries to target additional organizations, encourage other criminal actors to engage in the distribution of ransomware, and/or fund illicit activities. Paying the ransom also does not guarantee that an entity’s files will be recovered,” IC3 says.

The IC3 report also found $350 million were lost from scams in which hackers impersonated government officials attempting to collect money. Older adults are overwhelmingly targeted in such scams, according to the data.

A total of 14,190…

Source…

teiss – News – Ukraine’s largest mobile-only bank, Monobank, faces severe DDoS cyberattacks


Monobank, Ukraine’s leading mobile-only bank, encountered a relentless wave of denial of service (DDoS) attacks on January 21, severely disrupting its operations and causing widespread chaos.

 

Please take 30 seconds to register


or if you have an account please login

Source…