Posts

Multi-Factor Authentication is Not Foolproof Protection

Protect yourself from online attacks that threaten your identity, your files, your system, and your financial well-being.


Multi-Factor Authentication (MFA) has become increasingly common both in business and personal use. Yet, despite MFA providing increased security, threat actors are using the availability of sophisticated technology and even legitimate infrastructure to bypass this and access corporate networks and personal data.

To the uninitiated, MFA is when a user is required to provide two or more verification factors. The most typical type of MFA employed is Two Factor Authentication (2FA), when a user signs on to a site with their username and password and receives a code sent to a secondary device such as a mobile phone, email, or authenticator app. Once this code is entered into the site, it grants access. Until now, this security has been reasonably effective, and therefore users feel assured that it is entirely tamper-proof if the attacker does not have access to the secondary device which receives the code.

However, the bad actors have found ways to bypass MFA, putting network security at risk.

Man-in-the-Middle or Web Proxy Attack
The first technique bad actors employ is a man-in-the-middle (MitM) or reverse web proxy attack. This is when an attacker sends the user a link either through email or SMS that directs them to a phishing website. The link leads the user to a fake replica of a legitimate site – one that is nearly impossible to recognize as not legitimate for the average user.

For example, assume a Chase bank login page employs 2FA (Example 1). The attacker knows that even if they get the username and password, they still cannot access the site. And so, they use a reverse Web proxy between the phishing page and the actual service i.e., the man-in-the-middle.

Once the user enters the credentials, the phishing page will ‘talk’ to the original service, which will send the user the token or code to enter. At this point, the phishing page gets the code because the user enters it assuming s/he is on the official site. This gives the attacker the username, password, and code to authenticate with the real service and compromise the account.

 

Example 1: A phishing site using reverse web proxy to hijack session cookies

Even more troubling, this type of attack is…

Source…

Microsoft and Intel Enable AI-Backed Protection Against CPU Cryptocoin Mining

Protect yourself from online attacks that threaten your identity, your files, your system, and your financial well-being.


The fervor of cryptocoin mining has consumed a large part of the semiconductor industry of late. The demands for high performance silicon to mine these virtual assets with value is one factor in a global shortage of available parts for computers, automobiles, defense, research, and other industries. One consistent element to cryptocoin mining over the last decade is the prevalence of hijacked machines and devices through malware, commonly known as botnets. Previously these armies of machines were co-opted to perform bandwidth attacks against various targets, but they have also been used for their compute resources – mining coins that have value for those that control the botnet. This week Intel and Microsoft are announcing an additional layer of protection against these sorts of attacks.

Commercial machines running Microsoft Windows, and managed through Microsoft Defender for Endpoint, can now be protected against CPU cryptocoin mining through an AI-backed protection mechanism. The security layer requires an Intel processor with Intel’s Hardware Shield (a vPro technology) and Threat Detection Technology enabled, which was introduced in 2018, and uses a combination of tools (such as CPU and GPU) to analyze the code being processed at a low level.

By performing consistent heuristic analysis through the CPU performance monitoring unit at a low level, the system can detect if it is mining without the owner’s consent. This can be detected either through a compromised hypervisor, virtual machine, or in the OS directly hidden as a separate process. If a threat is detected, an Endpoint detection and response solution is implemented to neutralize the mining utility, or quarantine it, and prevent the code from spreading across a network or fleet of managed systems.

Intel lists that over a billion CPUs can enable its Threat Detection Technology, from its 6th Generation processors onwards – Microsoft also highlights that Defender for Endpoint with TDT is supported on these systems. However both companies hide the fact in a footnote that the specific Cryptomining detection implementation is only possible on 10th Generation and newer platforms. It is also worth…

Source…

Anti-malware Protection market share to record robust growth through 2026

Protect yourself from online attacks that threaten your identity, your files, your system, and your financial well-being.


Anti-malware Protection market share to record robust growth through 2026

Anti-malware Protection  market share to record robust growth through 2026

The research document on Anti-malware Protection market comprises of key trends that define the industry growth in terms of the regional landscape and competitive outlook. It highlights the limitations & restraints as well as the growth avenues impacting the overall market dynamics. Apart from this, the report provides with significant information regarding the effect of Coronavirus pandemic on the industry remuneration.

Key insights from COVID-19 impact analysis:

  • Worldwide COVID-19 status alongside the economic overview.
  • Changes in demand and supply in this industry vertical owing to the pandemic.
  • Long term and short term impact of COVID-19 on the market development.

An overview of the regional landscape:

  • The document divides the the regional terrain of the Anti-malware Protection market into North America, Europe, Asia-Pacific, South America, Middle East & Africa, South East Asia.
  • Market share held and growth rate predictions of every region over the forecast period is offered.
  • Information such as revenues and sales generated by all the topographies is also highlighted.

Request Sample Copy of this Report @ https://www.business-newsupdate.com/request-sample/82298

Additional information from the Anti-malware Protection market report:

  • The leading companies operating in Anti-malware Protection market are McAfee,Fortinet,NortonLifeLock,Avast,Comodo,Kaspersky Lab,Bitdefender,ESET,Trend Micro andF-Secure.
  • Crucial insights pertaining to the production patterns, market remuneration, manufactured products and company overview is offered.
  • Also, the gross margins, pricing patterns and market share captured by each company is specified.
  • Based on product type, the Anti-malware Protection market is split into Software andService.
  • Information such as volume and revenue prospects for every product type is presented.
  • Production patterns, market share and estimated growth rate of all the product fragments over the study duration is also emphasized in the research report.
  • The application scope of the Anti-malware Protection market comprises of For Business andFor Consumers.
  • Market…

Source…

Ransomware: Looking beyond endpoint protection


The last year has been one of the most active in the previous decade in cybersecurity. More than 1,000 data breaches took place in the United States alone, with a total of 155 million individuals impacted by data exposures, according to Statista. But when it comes to ransomware, the data on this insidious type of cyberattack is even more alarming.

 

Botnet attacks once ruled the threat landscape as the preferred method for threat actors to cash in, but ransomware quickly took its place. Data from Bitdefender’s Mid-Year Threat Landscape Report 2020 points to a 715 percent increase in ransomware attacks in 2020 globally. Email phishing campaigns, remote desktop protocol vulnerabilities, and software flaws are the most common means of infection.

 

What’s led to this distressing increase, and what can modern-day security professionals do to protect the business? The answer isn’t found on the endpoint.

 

The perfect storm: The 2020 threat landscape

First, let’s put the threat landscape into context when it comes to the events of the last 15 months. Yes, 2019 was a year for the record books regarding ransomware, especially considering that more than 900 U.S. government agencies fell victim to attacks. But the COVID-19 pandemic is what really put organizations into a tailspin in 2020, says Vinay Pidathala, director of security research at Menlo Labs.

 

“The rise of ransomware in 2020 can really be attributed to a culmination of things,” Pidathala says. “You have a sudden change in which organizations moved to remote workforces worldwide. Employees are also adjusting to working from home while balancing other duties at the same time, like taking care of their kids and household chores.”

 

These abrupt changes had a pretty significant impact on employee awareness related to remote work, leading to careless use of the Internet and not paying close enough attention to the barrage of emails that are coming in—resulting in risky behavior that could be costly for businesses.

 

“User awareness really took a hit,” Pidathala says. “Challenges were also presented when it comes to endpoints. In many cases, personal laptops are being used to conduct work, and…

Source…