Tag Archive for: Trust

Why CISOs need zero trust as a ransomware shield


Head over to our on-demand library to view sessions from VB Transform 2023. Register Here


This year is on pace to be the second-costliest for ransomware attacks ever, with threat actors relying on new deceptive approaches to social engineering combined with weaponized AI. The recent MGM breach began with attackers studying the social media profiles of help desk employees, then calling the help desk and impersonating them to get privileged access credentials and logins.

Zero trust security needs to be a mindset that pervades everything from consolidating tech stacks to managing identities at scale. CISOs and their teams must start with the assumption that a breach has already happened, and an organization’s network needs to be designed to limit an intrusion’s blast radius and depth.

“Zero trust requires protection everywhere — and that means ensuring some of the biggest vulnerabilities like endpoints and cloud environments are automatically and always protected,” said Kapil Raina, VP of zero trust marketing and evangelist for identity, cloud and observability) at CrowdStrike. “Since most threats will enter into an enterprise environment either via the endpoint or a workload, protection must start there and then mature to protect the rest of the IT stack.”

Gartner introduces a new Hype Cycle for Zero Trust Networking

Gartner’s inaugural Hype Cycle for Zero Trust Networking comes at a time when CISOs and the organizations they serve are under siege from near-record ransomware attacks. All hype cycles and market frameworks have limitations, yet they do help to filter out vendor noise and those overstating their zero trust capabilities. The Hype Cycle examines 19 key technologies — including microsegmentation, Kubernetes networking, secure access service edge (SASE) and security service edge (SSE) — and maps their maturity level and hype cycle position. 

Event

VB Transform 2023 On-Demand

Did you miss a session from VB Transform 2023? Register to access the on-demand library for all of our featured sessions.

 


Source…

Guarding Patient Trust: Healthcare’s Battle Against Ransomware Threats


The global healthcare industry has more to worry about than just treating patients. The ever-growing risk of ransomware is a major threat currently facing the entire sector, compromising confidential patient data, and disrupting the crucial services it provides.

“With ransomware accounting for 54% of all cybersecurity threats in the healthcare industry, the chances of a successful breach are higher than ever,” explains Andrew Hollister, Chief Information Security Officer (CISO), LogRhythm. “A recent example of how threat actors are targeting the industry can be seen in the attack on Barts Health NHS Trust. The Trust, which runs five London-based hospitals and serves more than 2.5m patients, was breached by the ALPHV ransomware gang. This resulted in it compromising 70 terabytes of sensitive data, including National Insurance numbers, financial data, and insurance agreements.”

Healthcare security teams are faced with a challenging, but vital role. There is a growing need for comprehensive detection and response solutions within healthcare to overcome the threats posed by ransomware attacks. 

Here, Hollister tells us more. 

 

Healthcare under attack

The healthcare industry is a top target for hackers due to the vast amount of people that rely on its services on a global scale. Threat actors can hold healthcare service providers at ransom for large pay-outs leaving them with little other option than to give in to their demands. 

“The introduction of more connected Internet of Things (IoT) medical devices plays a part in advancing the patient experience, but also broadens the attack surface for cybercriminals. With access to hospital IT systems, threat actors can easily steal a huge range of important personal data from patients and employees alike,” Hollister explains. “Further to this, the challenges caused by the expanding threat landscape are amplified by tight budgetary constraints within the public sector. Funding limitations leave many healthcare institutions in the difficult position of having to juggle their investment priorities between cybersecurity and direct healthcare provisions.”

The level of data that some criminals can access has the…

Source…

How Zero Trust Mitigates Zero-Day Attacks  


Zero-day attacks can be mitigated with zero trust (least privilege access) best practices 

Zero-day attacks, fueled by their stealthy nature and unknown vulnerabilities, pose a significant threat to organizations, worldwide and across all sectors. Attacks like WannCry, Stuxnet, Peta/NotPeta, and the Equifax Breach made major news publications headlines and are a part of the public consciousness. These sophisticated cyber threats can bypass traditional security defenses, making them difficult to detect and mitigate. However, implementing a zero trust security model is an effective approach to combat zero-day attacks.  

We will investigate how zero trust mitigates zero-day attacks by redefining the security perimeter, adopting a proactive defense strategy, enforcing strict access controls, leveraging continuous monitoring, and integrating advanced threat intelligence. Here’s how organizations can fortify their security posture by adopting zero trust principles and effectively safeguarding against the ever-evolving – and ever-current – attacks by nation-state bad actors, hacktivists, and financial opportunists.

AWS Builder Community Hub

Zero-Day Back on the Radar 

Recent weeks have seen a worrying wave of cyberattacks c/o MOVEit, a widely used file transfer application from Progress, which has again raised the ever-worrying issue of zero-day attacks. Bad actors have exploited its vulnerabilities, successfully deployed ransomware, and stolen data via vulnerable MOVEit deployments worldwide.

This situation isn’t just about the scale of the issue; it’s also about the complexity and sophistication of these threats. This new type of cyberattack involves remote code execution, a step beyond the typical “man in the middle” or “dependency tampering” tactics that have been all too common in the past. This is a calculated, tactical intrusion that marks a shift in the cybercriminal playbook of Russian-backed Clop, also known as Lace Tempest, TA505, and FIN11, who have claimed responsibility for this (and many other zero-day exploits) in order to deploy ransomware 

Progress has been quick to address the vulnerabilities in MOVEit, offering patches to mitigate the identified threats, but…

Source…

I’m a security expert – Android, iPhone users warned they ‘can’t trust their ears’ as eerie AI call raids bank accounts


CYBERSECURITY experts have warned billions of Android and iPhone users that they might not be able to trust their own ears from scammers looking to raid their banks. 

As artificial intelligence continues to develop, cybersecurity and anti-virus software provider Kaspersky Lab is warning people of scammers using deep-fake technology in phone calls. 

Cybersecurity experts are warning smartphone users of scammers using voice deepfakesCredit: Getty
The scams use fake audio recordings in an attempt to steal money and personal dataCredit: Getty
The technology compresses two recordings togetherCredit: Niral Shah/Stanford/K. Qian, Y. Zhang, S. Chang, et al

Also known as voice cloning or voice conversion, the cyber security company highlighted voice deep fakes in a recent blog post. 

According to the company, this technology is based on autoencoders, which compresses input data into a compact internal representation before learning to decompress it back, restoring the original data. 

In other words, the AI program will first be given data such as two audio recordings – one with the original audio and words, and the other with the voice it wants to use instead. 

Next, the system determines what was said in the first recording and how the voice in the second recording speaks – such as various inflections or accents. 

Read More on Artificial Intelligence

Then, the system will combine these two compressed representations together to then generate the voice in the second recording saying the words from the first. 

While this technology might seem harmless to some – or the foundations of a good prank – it can be very dangerous when put in the wrong hands. 

Kaspersky Lab detailed that scammers have been using this technology for years to target companies and individuals worldwide. 

In 2019, for example, criminals used AI software to create fraudulent money transfer requests supposedly from the chief executive officers of an energy firm in the United Kingdom. 

Not only did the scammers use the technology to make the initial request over the phone, they also falsified two additional phone calls to confirm the first transfer and request a second. 

Because the AI program had used a…

Source…