Security News > 2022 > June

What if ransomware evolved to hit IoT in the enterprise?
2022-06-01 06:34

The security firm's Vedere Labs team said it developed a proof-of-concept strain of this type of next-generation malware, which they called R4IoT. After gaining initial access via IoT devices, the malware moves laterally through the IT network, deploying ransomware and cryptocurrency miners while also exfiltrating data, before taking advantage of operational technology systems to potentially physically disrupt critical business operations, such as pipelines or manufacturing equipment. These types of increasingly destructive attacks, combined with the growing number of internet-connected devices led the researchers to consider: what if ransomware exploited IoT gear to get into a corporate network.

Paving your path to SASE: 4 tips for achieving connectivity and security
2022-06-01 05:00

SASE helps by teaming cloud-based SD-WAN with cloud-delivered secure service edge security services - including access control, threat defense, data protection, security monitoring and more - to deliver a boundless security perimeter while radically increasing performance. Using SD-WAN as your SASE starting point and launchpad to SSE. Without laying the proper connectivity foundation with reliable SD-WAN, implementing SSE will be difficult.

How cybercriminals are targeting executives at home and their families
2022-06-01 04:30

Top executives and their families are increasingly being targeted on their personal devices and home networks, as sophisticated threat actors look for new ways to bypass corporate security and get direct access to highly sensitive data. In this video for Help Net Security, Chris Pierson, CEO at BlackCloak, shares on these issues and emerging areas of risk for executives.

DDoS threats growing in sophistication, size, and frequency
2022-06-01 04:00

Corero Network Security has published the latest edition of its annual DDoS Threat Intelligence Report that compiles the trends, observations, predictions, and recommendations based on DDoS attacks against Corero customers during 2021. Stephenson adds, "Combined with the 82% share of short duration DDoS attacks, the intention is that these stealthier transient attacks will appear as legitimate traffic, bypassing simple security measures and succeeding in choking access to important downstream services or connections." Frequency of repeat attacks also grew with a 29% increase in organizations who experienced a second attack within a week.

EnemyBot malware adds enterprise flaws to exploit arsenal
2022-06-01 03:47

The botnet malware EnemyBot has added exploits to its arsenal, allowing it to infect and spread from enterprise-grade gear. "The threat group behind EnemyBot, Keksec, is well-resourced and has the ability to update and add new capabilities to its arsenal of malware on a daily basis," Ofer Caspi, a security researcher with Alien Labs, wrote in a blog post this month.

Contactless is reigning: Consumers can’t even remember their PIN
2022-06-01 03:30

The company surveyed of 4,000 consumers across three continents, including 1,000 UK respondents, showed that 61% of consumers feel confident enough with contactless payments to leave their wallet at home and just take their phone - a figure that rises to over three quarters for UK Gen Z respondents. The research shows that contactless payments are becoming increasingly prevalent in the UK: 96% of UK consumers surveyed have used contactless in the last year.

New XLoader Botnet Version Using Probability Theory to Hide its C&C Servers
2022-06-01 03:16

"Now it is significantly harder to separate the wheat from the chaff and discover the real C&C servers among thousands of legitimate domains used by Xloader as a smokescreen," Israeli cybersecurity company Check Point said. The latest findings from Check Point build on a previous report from Zscaler in January 2022, which revealed the inner workings of the malware's C&C network encryption and communication protocol, noting its use of decoy servers to conceal the legitimate server and evade malware analysis systems.

Infosec products of the month: May 2022
2022-06-01 03:00

These features combine automation with scalability to accelerate security compliance programs with automated framework mapping, evidence collection, and continuous monitoring, as well as providing the ability for teams to leverage applications and data sources. Orca Security unveils Shift Left Security capabilities to prevent cloud application issues.

Chinese Hackers Begin Exploiting Latest Microsoft Office Zero-Day Vulnerability
2022-06-01 03:00

An advanced persistent threat actor aligned with Chinese state interests has been observed weaponizing the new zero-day flaw in Microsoft Office to achieve code execution on affected systems. "TA413 CN APT spotted exploiting the Follina zero-day using URLs to deliver ZIP archives which contain Word Documents that use the technique," enterprise security firm Proofpoint said in a tweet.

Using Wi-Fi 6 to Power Hyper-Aware Healthcare Facilities
2022-06-01 00:00

The medical internet of things market is expected to reach $158 billion in valuation in 2022, up from its 2017 value of $41 billion. As healthcare facilities continue to add IoT devices, this article discusses the necessity of Wi-Fi 6 for providing contextual health data to improve patient outcomes in modern healthcare facilities.