Security News > 2021 > May
Designed to support modern security organizations increasingly delegating malware analysis to specific security operations or development security operations experts, the ReversingLabs Malware Lab solution equips these teams with a unified threat analysis engine and console to rapidly detect, classify, analyze, and respond to malicious files and associated Indicators of Compromise. "At its heart, all SOC workflows, no matter how automated, require human analysis to provide context and inform their final decision. ReversingLabs Malware Lab is uniquely positioned as a commercial solution to give the highest quality of insight and decision support. Moreover, it is easy to deploy and integrate, while providing the industry's most advanced file analysis and indicator enrichment across a wide span of threat vectors."
In this Help Net Security podcast, Brandon Hoffman, CISO at Intel 471, discusses about the increased collaboration between network access brokers and ransomware operators, and how they funcion it today's threat landscape. I'm excited to join the podcast today, and I was planning to talk a little bit about the increased cooperation between what's commonly referred to as access brokers or network access brokers and ransomware operators.
With passwordless authentication, users are presented with one or multiple methods of signing into an application or device without the need to enter a password. With these emerging passwordless authentication solutions, passwords are frequently the fallback or fail-safe if the system denies access to a valid user.
Begging the question, how can we reconcile the comfort of users with the practices of businesses? Recognizing the humanity behind these data points requires us to bring ethics into these data conversations and analytic processes. The mass condoning of data harvesting coupled with the intrinsic value of user data-including sensitive information-has resulted in companies collecting as much data as they can without considering first how to use it or how to manage it securely.
Many companies do not address data protection in the applications they control, instead relying on data-at-rest encryption techniques which generally do not protect data-in-use. Companies broadly concerned with application level data protection.
3 years since rolling out in May 2018, there have been 661 GDPR fines issued by European data protection authorities. Spain issued the largest number of GDPR fines by far - totaling 222 fines during the last 3 years since the GDPR is in effect.
Glass and metal packaging giant Ardagh Group this week disclosed a cyberattack that forced it to shut down certain systems and applications. The Luxembourg-based company, one of the largest producers of glass and metal packaging products, says it was able to safely continue operations at its facilities despite the incident.
Even though the number of organizations with some level of cloud adoption remained steady year-over-year, the percentage of organizations that are moving advanced workloads to the cloud has increased by 25 percent. While security and skills are still major concerns for organizations, the statistics clearly indicate that businesses are becoming more confident about moving their important workloads to the cloud and embracing cloud more than ever.
Real-Life Risks Involved in SSO. While SSO facilitates ease of access to a great extent, it also comes with some amount of imminent risk. Security researchers from Micro Focus Fortify showcased in 2019 the dangers associated with SSO vulnerabilities in Microsoft's authentication mechanism.
Akamai published a report that provides an analysis of both global and financial services-specific web application and credential stuffing attack traffic, revealing significant increases across the attack surfaces year over year from 2019 to 2020. In 2020, there were 193 billion credential stuffing attacks globally, with 3.4 billion hitting financial services organizations specifically - an increase of more than 45% year-over-year in the sector.