Author: rescue@crimefire.in

  • The dangerous vulnerabilities caused by weak email security | Cyber Security Hub – Cyber Security Hub

    Threats to email security are on the rise. Research conducted for Cyber Security Hub’s Mid-Year Market Report 2022 found that 75 percent of cyber security practitioners think that email-based attacks such as phishing and social engineering are the ‘most dangerous’ cyber security threat to their organizations. Companies must protect this vulnerable asset without compromising its efficiency in communication.
    Email security is integral to protecting companies from external threats but also essential to protecting a brand’s customers from outbound threats such as phishing, data breaches and business email compromise (BEC). Without sufficient email security strategies, companies open themselves, their clients, and their customers to the consequences of cyber security incidents.
    Threats to email security not only encompass attacks from bad actors but the internal function of the company. Research from Stanford University found that 88 percent of all data breaches are due to an employee mistake, meaning companies must be hypervigilant when training their employees. This training should take place in an easily accessible format so that information is easily retained by employees and future mistakes are avoided.
    This threat to the internal workings of a company can also led to further damage to its brand if not dealt with swiftly and effectively. Even long-time customers may lose faith in organizations if they feel they are unable to trust in their cyber security strategy, especially when their personal data is on the line.
    In this article, Cyber Security Hub provides guidance on how to implement excellent email security and make sure your employees understand its importance.
    Also read: Report on cyber security challenges and spends
    Overlooking email as a security risk is a dangerous oversight for any organization. In 2020, professional services network Deloitte reported that 91 percent of all cyber-attacks began with a phishing email.
    There are a number of threats poor email security present, ranging from social engineering attacks, phishing and account compromise to takeover and data theft. Phishing attacks can target users’ passwords and accounts that could contain sensitive and valuable customer information. Credential theft is also a risk as employees may reuse passwords for multiple different platforms across their business and personal life, weakening a business’s security if any of these accounts are compromised or exposed during a data breach.
    Djon Ly, digital marketing manager at money service operator Statrys, says that there is no reliable way for businesses to manage passwords or ensure that employees regularly change their passwords. Social engineering and sophisticated hacking techniques can make it difficult for employees to correctly identify fraudulent emails, Ly notes, even if an organization has email protection or holds regular security training.
    “Frequently, phishing emails will ask recipients to reset passwords or log in to a fraudulent account website in order to harvest credentials. Even if an organization has email protection and regular security training, it can be very difficult for users to determine whether or not an email is fraudulent,” she explains.
    Muhammad Babamia, IT internal audit specialist for cyber security and data and analytics at South African investment holding company Transaction Capital, agrees, stating: “The greatest risk to email security are careless employees.
    “People are the weakest link from a cyber security perspective,” he adds. “This is especially true in terms of email security. While email configuration and security layers aid in reducing email-related breaches, they remain in place in some form of reliance on diligence of humans.”
    When it comes to email security, while the best software measure may be put in place, true email security also hinges on employees’ abilities to understand why and how the company may be attacked via email, and what to do in the case of a compromise.
    “People are the weakest link from a cyber security perspective – this is especially true in terms of email security.”
    Muhammad Babamia, IT internal audit specialist at Transaction Capital
    The consequences of phishing campaigns can be devastating for businesses. In 2014, Sony Pictures’ employees, including system engineering and network administrators, were targeted with fake emails that looked like legitimate communications from Apple, asking them to verify their Apple ID credentials.
    By clicking on the link provided, employees were taken to a legitimate-seeming webpage that required them to input their login details. As these emails were targeted at those who would most likely have access to Sony’s network, these details were then used to hack into its network.
    The spear phishing campaign led to multiple gigabytes of data being stolen including business-related content, financial records, customer-facing projects, and digital copies of recently released films. The hack cost Sony an estimated US$15mn.
    Kym Welsby, regional director for APAC at Clearswift, a HelpSystems company, notes that one of the main issues with ensuring email security is that email was designed with no security functionality from its outset.
    “[Email having no security] was the secret of its success. This was fine when relatively fewer people were using it to contact people they knew only, but with its expansion people no longer know who is contacting them,” Welsby explains.
    As employees within a business will be used to people from outside the company contacting them, as well as speaking to people they do not know in a business capacity, this can make them less wary of potentially dangerous or fraudulent emails. There are a number of threats when it comes to email security, from direct attacks on employees through phishing campaigns or social engineering to a lack of security functionality in email.
    In the next section of this report, we will explore how to combat these threats.
    “[Email having no security] was the secret of its success. This was fine when relatively fewer people were using it to contact people they knew only, but with its expansion people no longer know who is contacting them,”
    Kym Welsby, Regional director for APAC at Clearswift, a HelpSystems company
    Email-based attacks like phishing and social engineering that directly target employees within a business can have devastating consequences for businesses, with three in four cyber security professionals surveyed for Cyber Security Hub’s Mid-Year Market Report 2022 stating these attacks are the ‘most dangerous’ threat to cyber security.
    These attacks directly target employees inside a business, placing the responsibility for ensuring the attack does not progress in their hands. Additionally, these attacks often rely on psychologically manipulating employees. They can be very effective in convincing employees to act in ways they would not usually, even if they have had security training.
    The effectiveness of phishing attacks may rely on how effectively employees can evaluate whether an email is safe. This can be an issue if employees do not pay attention to cyber security training. Clearswift’s Welsby explains that this complacency in this task may be due to a misconception from those within a business that their antivirus or antimalware software is sufficient to block any and all threats. As antivirus software can only stop and prevent known threats such as malware or ransomware, however, if a breach attempt involves a new, unknown file or URL, it may not be able to block an attack.
    Ensuring good cyber security within businesses requires employees to be engaged with their training so they are better able to retain the information and use it at a later date when they do come across cyber security threats.
    In a discussion between Cyber Security Hub’s Advisory Board, one member suggested that linking email security to a company’s universal goals was very beneficial. This involves conducting multiple phishing tests throughout the year, with the score of said tests affecting a businesses’ bottom line. This is because phishing attacks have an indirect influence on a company’s bottom line. Cyber-attacks cost a lot of money, meaning if a cyber-attack occurs, companies will lose money in operations costs. Additionally, cyber-attacks may lead customers to lose trust in a company and take their business elsewhere, leading to an overall drop in revenue. With bonuses directly linked to profit, financially motivated employees should be more diligent in not clicking on potentially dangerous links, as their good behavior is reinforced and rewarded.
    Also read: Strenghthen email security & protection against ransomware attacks
    Jorel Van Os, chief information security officer at insurance company Acrisure, suggests companies can better engage their employees by employing the use of short-form video content using real-life case studies as examples.
    “[The videos are] a testimonial, with an actor reenacting real case studies,” Van Os remarks. “I think that’s a good, compelling way to [train employees].
    “They are one to two minutes each, he explains. “We did a micro-survey on the videos in terms of length of content, effectiveness of content and delivery of content, and we got 4.8 out of five stars out on across hundreds or thousands of people that rated it.”
    One such example is a testimonial from an actor posted on LinkedIn entitled ‘My LinkedIn post cost my company a fortune’. In the testimonial, the actor explains that someone posing as a recruiter enticed him into communicating with them first through comments on his LinkedIn posts, then via messages with a lucrative job offer.
    The faux recruiter built a relationship with him, and finally sent him a PDF which, supposedly, contained the job offer. Instead, it contained only a cover letter and two blank pages. When the actor reached out to the supposed recruiter, they explained that it was a secure file, and prompted him to download and install a secure PDF reader. When this still did not work, the actor contacted the recruiter again, but the recruiter did not respond to any of his messages. He dismissed this, but weeks later there was a data breach at his company that cost the company millions of dollars. The breach was traced back to him, as the PDF reader had actually contained malware that was used to level an attack against the company.
    The actor explains that job scam attacks are becoming more prevalent as people are expected to communicate with strangers, and download the attachments sent to them.
    Van Os says that by doing this companies can help employees realize that they are involved with the email security of a business, as well as offering them a framework of what to do during a cyber security incident. It can also provide them with tips of what to look for in potentially malicious communications.
    Companies can employ other tactics to keep employees engaged, says Transaction Capital’s Babamia.
    “Traditional ‘death by PowerPoint’ presentation styles often lead to bored and inattentive learners,” Babamia remarks. “Organizations need to ensure that participants are engaged through various means of learning such as gamified learning and the use of incentives to promulgate better learning.
    “Simulated phishing attacks are a great way to pick out unaware employees. With scare tactics in mind, employees should be more focused to ensure that the consequences of their actions do not lead to a severe breach of the organization’s information security,” he notes.
    In terms of ensuring email security beyond training, Clearswift’s Welsby notes that a layered solution is best, as there will need to be different controls to respond to different threats. He recommends combining content protection like structural sanitization – removal of active content within the email body and attachments and removal or rewriting URLs to go through a different web browser. Identity protection is particularly important, as social engineering and phishing attacks often rely on posing as someone with authority within the business. By looking for the good senders rather than preventing the bad, this allows software to identify and block bad actors post-delivery, preventing the spread.
    Kemas Ohale, head of global information security operations at manufacturer of pneumatic control devices SMC Corporation, notes that using an email security solution that combines the power of threat detection artificial intelligence (AI) or machine learning (ML) with the power of the human to form a complete solution can be “highly effective” in keeping organizations safe.
    “AI or ML cannot do it alone and neither can humans,” Ohale remarks. “Combining the two into a single solution and reducing the load on our security team through extensive automation is the optimal way to ensure inboxes are as secure as they can be.”
    Email security can be ensured by engaging with employees and showing them how cyber security is inherently tied into their job. Beyond this, companies must engage defense strategies including email authentication protocols such as DMARC, structural sanitization and the use of AI or ML to help detect and neutralize threats to protect the email system. In the next section, this report will discuss the importance of email security in protecting your brand.
    Email security is not just important for internal data safety, but for a company’s external brand. Bad email security can affect customers in multiple ways, from exposing their personal information to causing them to see a brand as less secure or trustworthy.
    Clearswift’s Welsby notes that while most people think email security is about protecting their organization from threats, companies also need to protect their outbound emails and tell customers and clients to reject messages that are not from the company.
    Welsby explains that while using DMARC authentication to detect and prevent email spoofing techniques used in phishing, business email compromise (BEC) and other email-based attacks seems easy in principle, it can be complicated – especially for large organizations.
    Also read: 5 steps guide to build email security strategy
    “We have had clients use applications to allow others to send emails on their behalf and had one organization that found it was using 200 more email applications than it realized it was using,” says Welsby. “As it was a big retail brand with many custom-built applications and service providers sending emails on its behalf, it took two years to establish the use cases [for email applications to send emails on their behalf].
    “Brand protection makes it easier for brands to establish who they are and what services they use,” he adds.
    Transaction Capital’s Babamia notes that as largerscale attacks may lead to high-sensitivity email disclosure, should attackers leak highly confidential information to the public, which can affect trust in a company. If this trust is broken, customers may leave the company and use a competitor instead, leading to a potential drop in revenue.
    Customers can lose trust in brands when they believe they are not appropriately securing their data, leading to concerned customers to switch to different brands. By ensuring that both employees are fully engaged with and retain information from training, and that there is a robust email security solution in place, companies can put themselves in a better place to identify and mitigate cyber security incidents.
    “Brand protection makes it easier for brands to establish who they are and what services they use.”
    Muhammad Babamia, IT internal audit specialist at Transaction Capital
    There are a number of threats to email security that employees must face. The most dangerous of these are social engineering and phishing attacks, as they directly target employees and can have potentially devastating consequences for their company.
    Email security is fundamentally reliant on employees being vigilant against potential inbound attacks. In order to ensure all employees are in the best place to recognize and not engage with malicious emails, companies must take into consideration the way they are educating their employees in regard to cyber security. Using more engaging techniques like shorter videos, relating the content to themselves as employees or using a rewards-based system can help engage employees better, meaning they are in a better position to ensure email security.
    Additionally, companies should ensure that they have robust security in place, including the use of structural sensitization and identity protection like DMARC. By using these methods, companies can ensure that phishing attacks are less successful, as URLs can be deemed as safe before they are clicked on, and malicious actors who attempt to pose as higher-ups in the company during social engineering or phishing attacks will be less likely to succeed.
    By doing this, companies can protect their employees and the business itself from cyber criminals and in bound threats, while protecting clients and customers from outbound threats. By communicating these efforts with clients and customers, they can build trust in their cyber security, and prevent a loss of trust if a cyber security incident happens as if customers feel their data is not adequately protected, they may leave a business and take their custom elsewhere.
    Read a PDF of the Report Here
    How do you maintain good email security to strengthen your business model? Please let us know in the comments section below.
    Reach Cyber Security professionals through cost-effective marketing opportunities to deliver your message, position yourself as a thought leader, and introduce new products, techniques and strategies to the market.
    Join CSHUB today and interact with a vibrant network of professionals, keeping up to date with the industry by accessing our wealth of articles, videos, live conferences and more.
    Cyber Security Hub, a division of IQPC

    Careers With IQPC| Contact Us | About Us | Cookie Policy
    Become a Member today!

    We respect your privacy, by clicking ‘Subscribe’ you will receive our e-newsletter, including information on Podcasts, Webinars, event discounts, online learning opportunities and agree to our User Agreement. You have the right to object. For further information on how we process and monitor your personal data click here. You can unsubscribe at any time.

    source

  • Corporate boards struggle to understand cybersecurity and digital … – Cybersecurity Dive

    Let Cybersecurity Dive’s free newsletter keep you informed, straight from your inbox.

    The report underscores how the surge in sophisticated cyberthreats – including ransomware – in recent years has challenged traditional corporate governance. Cybersecurity and business interruption are now considered the top corporate risks, according to research from Allianz Group. 
    Data security is a priority issue at the most senior levels of U.S. corporations.  Business leaders are now facing requirements to rapidly share intelligence with industry partners while remaining upfront with customers and transparent with investors and government regulators. 
    “Overseeing cyber risk is incredibly challenging,” Dottie Schindlinger, executive director of Diligent Institute, said via email. “With the global cost of cybercrime expected to reach $10.5 trillion by 2025, cybersecurity has become a board-level imperative.” Cybersecurity Ventures originally forecast the total cost of cybercrime by 2025. 
    However, cyber risk oversight and the technical concepts and vocabulary that goes with it, can feel foreign to board directors, Schindlinger said. 
    Less than 9% of an average board has technical expertise, research from Diligent Institute found. Even worse, half of the companies surveyed have no technical expertise on the board at all. 
    “The role of the board is to monitor the long-term health of the company, so when directors lack fluency in the language of cyber risk, they are ill equipped to oversee one of the most severe areas of enterprise risk facing their organizations,” Schindlinger said. 
    Clarification: This article has been updated to include citation information for data discussed by Dottie Schindlinger.
     
    Get the free daily newsletter read by industry experts
    Enterprise cybersecurity is navigating market turmoil and vendor consolidation. Here’s what experts expect to happen to the industry in 2023.
    CISOs are up against talent shortages and retention concerns amid an increasingly sophisticated threat landscape.
    Subscribe to Cybersecurity Dive for top news, trends & analysis
    Get the free daily newsletter read by industry experts
    Enterprise cybersecurity is navigating market turmoil and vendor consolidation. Here’s what experts expect to happen to the industry in 2023.
    CISOs are up against talent shortages and retention concerns amid an increasingly sophisticated threat landscape.
    The free newsletter covering the top industry headlines

    source

  • FIU awarded over $2M to prepare students for careers in cybersecurity – FIU News

    By
    August 24, 2022 at 10:52am
    Cyber Florida has awarded FIU more than $2 million to fund four projects focused on educating and preparing students for careers in cybersecurity and information technology.  
    These grants, funded by the Cybersecurity and Information Technology Pathways (Cyber/IT Pathways) program, will help expand FIU-led programs meant to address the national skills shortage in cybersecurity and information technology by providing research, professional development for students, K-12 outreach, and upskilling public and nonprofit organizations.  
    “FIU is extremely proud to have four programs selected as a part of this grant,” said Elizabeth Béjar, interim provost of FIU. “The outcomes of these funded projects will further the impact of the Cybersecurity@FIU emerging preeminent program and highlight our ongoing commitment to research and development of best practices in this field.”  
    According to the U.S. Bureau of Labor Statistics, cybersecurity jobs are projected to grow 33 percent from 2020 to 2030, which is significantly faster than the average of all other occupations. The CyberSeek Cybersecurity Supply/Demand Heat Map indicates that there are currently over 700,000 total cybersecurity job openings in the U.S. alone. Florida is the 4th state with the most job openings.  
    The Cyber/IT Pathways program is a joint endeavor of the Florida Department of Education and the Florida Center for Cybersecurity (Cyber Florida) to inspire and prepare more students to pursue fulfilling and lucrative careers in cybersecurity/information technology (IT) while helping address the national skills shortage in these areas.   
    “Cyber/IT Pathways represents a major investment in improving the readiness of Floridians to fill essential jobs in cybersecurity and IT,” said James Welsh, director of the Florida Center for Instructional Technology and Principal Investigator of the Florida Cyber/IT Pathways Program. “We are delighted to have Florida International University as a regional partner supporting this vital initiative and helping to ensure that Florida’s K-16 community is being well served by this grant opportunity.”  
    As part of the Cyber/IT Pathways program’s $15.6 million initiative, the following FIU-led programs were selected for funding:  
    Project HaHa” (Hands-on Hardware Security Education) was awarded $1.2 million in funding. The project, led by Professor Christian Poellabauer of the FIU Knight Foundation School of Computing and Information Sciences at the College of Engineering and Computing, focuses on broadening and diversifying hardware security education to meet the increasing cybersecurity needs across the state and the nation.  
    The FIU Minecraft-based Cybersecurity Professional Development for K12 Teachers program was awarded $250,000 in funding. Led by Kemal Akkaya, a professor in the Department of Electrical and Computer Engineering with a joint courtesy appointment in the Knight Foundation School of Computing and Information Sciences at the College of Engineering and Computing, the program aims to pursue a game-based approach to cybersecurity education by building on one of the most popular games amongst teenagers, Minecraft.  
    The Cybersecurity Pathway for Public and Nonprofit Organizations program, led by Professor Sukumar Ganapati of the Steven J. Green School of International and Public Affairs, earned $680,000 in funding. This program will provide special online training and in-person workshops on cybersecurity and IT to professionals in public and nonprofit organizations to bolster their offerings in their curriculum for disadvantaged students.  
    The FIU Cyber Threat Intelligence (CTI) Fellowship program earned over $280,000 in funding and is led by Hector Cadavid, deputy director of the Jack D. Gordon Institute for Public Policy. The CTI Fellowship program provides undergraduate and graduate students with a yearlong cybersecurity workforce pathway program that includes interdisciplinary academic training, mentorship, professional development, and guaranteed internships after the program. The program will also provide students with Security+ certification training and cover the costs of examinations.
    This funding will further boost FIU’s quickly expanding cybersecurity programs and comes shortly after being awarded $2 million to develop artificial intelligence cybersecurity tools and leading the sold-out 2022 National Initiative for Cybersecurity Education (NICE) Conference, which focuses on exploring ways to develop a skilled cybersecurity workforce. 
    Search
    Submit a story or give us feedback, we want to hear from you.
    Looking for some FIU history? Find stories from the vault at newsarchives.fiu.edu.

    source

  • Australian organisations underinvesting in cyber security – ComputerWeekly.com

    ra2 studio – stock.adobe.com
    Over half of Australian organisations have not invested enough in cyber security in the past three years, with nearly one in five believing it was not a priority, a new study has found.
    The underinvestment was more stark among small companies, of which 69% had not invested enough in cyber security, according to the study conducted by Netskope, a supplier of secure access service edge (SASE) services.
    Major data breaches over the past year, however, have cast the spotlight on cyber security, with over three-quarters (77%) of 300 respondents who participated in the study noting that their leadership’s awareness of cyber threats had increased.
    Some 70% also noted an increase in their leadership’s willingness to bolster investments – the proportion of organisations that are planning bigger cyber security budgets between 2022 and 2023 jumped to 63%, compared with 45% that saw increases between 2020 and 2022.
    This increase is most pronounced among larger organisations with over 200 employees, where over 80% are increasing cyber security budgets. Among small firms with fewer than 20 employees, 41% planned to spend more on cyber security between 2022 and 2023, up from just 23% between 2020 and 2022.
    “The data breaches that occurred last year deeply impacted the Australian community, but it seems there are some positives to draw from those events,” said David Fairman, chief information officer and chief security officer for Asia-Pacific at Netskope.
    “In the last decade, attitudinal gaps between technology and business leaders regarding cyber security have been a key factor slowing down cyber security improvements, and it seems that both teams are now – at last – on the same page, ready to bolster cyber defences for their organisation and customers.
    “Even though no organisation is ever fully protected from cyber threats, we need this united front to show cyber criminals that we won’t make it easy for them and Australia won’t be an easy target anymore,” he added.
    How well an organisation responds to cyber security incidents is an indicator of its cyber resilience. According to Netskope’s research, just 27% of Australian tech leaders today have well-defined and stringent incident response plans to face a variety of scenarios, and regularly exercise them.
    Furthermore, there is no consensus on how to handle an incident. The survey respondents were divided, with just half (51%) stating they would be unlikely to pay if they were victims of ransomware.
    They also pointed out other impediments, with 17% of tech leaders noting that the lack of prioritisation of cyber security among business and technology leadership was the biggest obstacle to cyber security improvements.
    Fairman also noted the lack of “financial or human resources to bring their plans to fruition, especially in a challenging economic environment with ongoing geopolitical instability”.
    “As a country, we need to do what we can to accelerate the production of industry professionals and graduates, making use of both public and private initiatives,” he said.
    The Australia government plans to develop a new cyber security strategy that aims to strengthen the country’s critical infrastructure, among other goals, following a spate of high-profile cyber attacks against Australian companies including Optus and Medibank in 2022.
    The strategy will be led by Cyber Security Cooperative Research Centre CEO Rachael Falk, former Telstra CEO Andy Penn, and former chief of air force Mel Hupfeld. There will also be an expert panel drawn from around the world, led by former UK National Cyber Security Centre CEO and Oxford University professor Ciaran Martin.
    Technology products remain a mixed inflationary bag as server prices increase, storage costs decline and equipment delivery lead …
    In its pursuit of big tech companies, the FTC theorizes their dominance is based on acquisition of nascent companies — a theory …
    Two upcoming Supreme Court cases could significantly change how Section 230, which protects social media platforms from liability…
    GoDaddy took nearly three months to disclose that attackers breached the company in a multi-year campaign, and customers are …
    A new report from Google’s Threat Analysis Group shed light on Russia’s efforts to conduct malicious cyber campaigns not only …
    A new report from Cyber Security Works shows that 76% of all ransomware-associated vulnerabilities tracked in 2022 were old flaws…
    SDN controller features include modularity, APIs, clustering and GUIs. Read more in this chapter excerpt from ‘SDN-Supported …
    Cisco and Arista’s latest earnings reports show that companies are upgrading campus networks and distributing more applications …
    Cisco Viptela SD-WAN integration with Cisco+ Secure Connect brings cloud-based security to remote workers and easier …
    Organizations that build 5G data centers may need to upgrade their infrastructure. These 5G providers offer products like virtual…
    IBM lost its title as patent king to Samsung, which had more than 8,500 patents approved in 2022. One reason cited is IBM’s …
    Organizations stand to benefit from the compute power of quantum computing as it develops. The tech has potential uses in supply …
    Enterprise Strategy Group research shows organizations are struggling with real-time data insights. A single source of truth can …
    The vendor is the creator and lead sponsor of the open source InfluxDB database and plans to use the new funding to further …
    Organizations are using cloud technologies and DataOps to access real-time data insights and decision-making in 2023, according …
    All Rights Reserved, Copyright 2000 – 2023, TechTarget

    Privacy Policy
    Cookie Preferences
    Do Not Sell or Share My Personal Information

    source

  • JD Sports data breach affects 10 million customers | Cyber Security Hub – Cyber Security Hub

    British sports clothing retailer JD Sports has reported a data breach that has affected more than 10 million customers.
    The retailer said on January 30 that the data breach occurred after a malicious party gained unauthorized access to a system containing customer data relating to orders placed between November 2018 and October 2020. This included orders from other JD Sports group companies including JD, Blacks, Size?, Scotts, Millets and MilletSport.
    JD Sports told the London Stock Exchange the data accessed was “limited” as the retailer “does not believe passwords were accessed” and does not save payment information. Information accessed during the breach may include names, email addresses, the last four digits of payment cards, delivery addresses, phone numbers, billing addresses and order details.
    The company said it was “proactively contacting” those affected by the breach and urged all customers to remain vigilant for phishing attacks and fraud attempts following the breach. 
    Chief financial officer at JD Sports, Neil Greenhalgh, said: “We want to apologize to those customers who may have been affected by this incident…We are continuing with a full review of our cyber security in partnership with external specialists following this incident. Protecting the data of our customers is an absolute priority for JD.”
    The sports fashion retailer said that it will be working with the relevant authorities including the UK Information Commissioner’s Office (ICO) to investigate the incident. 

    Join the global cyber security online community

    With more than 140,000 members, Cyber Security Hub is the vibrant community connecting cyber security professionals around the world.

    With more than 140,000 members, Cyber Security Hub is the vibrant community connecting cyber security professionals around the world.
    Join Now
    February 21 – 22, 2023
    Free CS Hub Online Event
    22 February, 2023
    Online
    01 March, 2023
    Online
    08 – 09 March 2023
    Free CS Hub Online Event
    08 March, 2023
    Online
    15 March, 2023
    Online
    Insights from the world’s foremost thought leaders delivered to your inbox.
    2023-04-12
    10:00 AM – 11:00 AM EST
    2023-03-15
    10:00 AM – 11:00 AM EST
    2023-03-15
    10:00 AM – 11:00 AM SGT
    Reach Cyber Security professionals through cost-effective marketing opportunities to deliver your message, position yourself as a thought leader, and introduce new products, techniques and strategies to the market.
    Join CSHUB today and interact with a vibrant network of professionals, keeping up to date with the industry by accessing our wealth of articles, videos, live conferences and more.
    Cyber Security Hub, a division of IQPC

    Careers With IQPC| Contact Us | About Us | Cookie Policy
    Become a Member today!

    We respect your privacy, by clicking ‘Subscribe’ you will receive our e-newsletter, including information on Podcasts, Webinars, event discounts, online learning opportunities and agree to our User Agreement. You have the right to object. For further information on how we process and monitor your personal data click here. You can unsubscribe at any time.

    source

  • T-Mobile CEO spins recent breach, says its cybersecurity chops … – Cybersecurity Dive

    Let Cybersecurity Dive’s free newsletter keep you informed, straight from your inbox.

    “Our systems and policies protected the most sensitive kinds of customer data,” Mike Sievert said on an earnings call. “We take this issue very seriously.”
    Top brass at T-Mobile, despite a string of security incidents, insist the company’s investments in cybersecurity are paying off.
    “The investments we’ve made in 2022, including in our cybersecurity capabilities, showed up in a critical way a few weeks ago,” CEO Mike Sievert said Wednesday during the company’s 2022 Q4 earnings call.
    “After identifying a criminal attempt to access our data through an API, we shut it down within 24 hours. And more importantly, our systems and policies protected the most sensitive kinds of customer data from being accessed,” Sievert told analysts.
    The recent breach, the second of two major attacks in the last 15 months, began on or around Nov. 25 and went undetected for almost six weeks, exposing personal data on about 37 million customers.
    A massive data breach in August 2021 ultimately exposed personal data of at least 76.6 million people.
    The Black Friday attack against the wireless operator exposed roughly half as many people and did not comprise more sensitive PII.
    “While I’m disappointed that the criminal actor was able to obtain any customer information, we are confident that our aggressive cybersecurity plan, working with the support of some of the world’s experts, will allow us to achieve our goal of becoming second to none in this area,” Sievert said.
    After the earnings call, T-Mobile declined to answer questions about its ongoing investigation and specific areas of investment in cybersecurity. The company pledged to invest $150 million in data security and cybersecurity technology in 2022 and 2023 as part of a $500 million class-action lawsuit settlement it reached last summer.
    The latest incident marks T-Mobile’s eighth publicly acknowledged data breach since 2018, and damage is spreading. Google Fi, a virtual network that primarily uses T-Mobile’s infrastructure, earlier this week notified some customers their personal data was also compromised as a result of the attack.
    The repeated attacks underscore unresolved challenges for T-Mobile and make it a high-profile target for threat actors, according to analysts.
    “Every single communications service provider in this world is the subject of relentless cyberattacks 24 hours a day, 365 days a year,” Stéphane Téral, chief analyst at LightCounting, said via email.
    The bigger the target — and T-Mobile, among the world’s 20 largest network operators by market cap, is a top target — the bigger the cyber results, he said. T-Mobile “seems more affected than its peers, but we don’t know the full story.”
    The lack of visibility and controls, highlighted by the gap between the threat actor’s initial intrusion and T-Mobile’s detection, is unacceptable, Téral said. It “suggests that something is wrong internally and needs an urgent fix.”
    Get the free daily newsletter read by industry experts
    The agency placed a premium on low cost, high impact security efforts, which account for more than 40% of the goals.
    Physical keys with cryptographic protocols can deliver higher levels of assurance, but organizations shouldn’t conflate resistance with infallibility.
    Keep up with the story. Subscribe to the Cybersecurity Dive free daily newsletter
    Keep up with the story. Subscribe to the Cybersecurity Dive free daily newsletter
    Subscribe to Cybersecurity Dive for top news, trends & analysis
    Get the free daily newsletter read by industry experts
    The agency placed a premium on low cost, high impact security efforts, which account for more than 40% of the goals.
    Physical keys with cryptographic protocols can deliver higher levels of assurance, but organizations shouldn’t conflate resistance with infallibility.
    The free newsletter covering the top industry headlines

    source

  • Royal Mail ransomware attackers threaten to publish stolen data – The Guardian

    Postal service has been unable to send letters and parcels overseas since Wednesday due to hacking
    Royal Mail has been hit by a ransomware attack by a criminal group, which has threatened to publish the stolen information online.
    The postal service has received a ransom note purporting to be from LockBit, a hacker group widely thought to have close links to Russia.
    Royal Mail revealed that it had been hit by a “cyber incident” on Wednesday, and said it was unable to send parcels or letters abroad. The company asked customers to refrain from submitting new items for international delivery, although domestic services and imports were unaffected.
    Ransomware attackers exploit gaps in organisations’ security to install their own software and encrypt files so they are unusable. They then ask for a ransom, often in cryptocurrency, which can be harder to trace because it is not reliant on the banking system.
    Printers at a Royal Mail distribution site near Belfast in Northern Ireland started printing ransom notes, according to the Telegraph. The note said: “Lockbit Black Ransomware. Your data are stolen and encrypted.”
    Online security researchers posted photographs purporting to show the ransom note on social media.
    Royal Mail has reported the incident to the UK’s government-run National Cyber Security Centre, the National Crime Agency and the Information Commissioner’s Office. It has not publicly revealed any details regarding the nature of the incident.
    Organisations that have been hit by ransomware range from the National Health Service to businesses of almost every size. The Guardian was hit by a ransomware attack last month.
    Andrew Brandt, a principal researcher at Sophos, a cyber security company, said the Lockbit ransomware software is thought to have been developed by criminals mainly from Russia and other former Soviet republics. It gives criminal affiliates access to the software in exchange for a cut of any ransoms.
    Ransom demands against organisations listed on a publicly available website ranged from around $200,000 (£165,000) to almost $1.5m, Brandt said.
    “Something Royal Mail is going to have to consider is whether or not they are going to pay a ransom,” Brandt said. “I’m a bit of a purist and [say] they should never pay these people anything.”
    Sign up to First Edition
    Archie Bland and Nimo Omer take you through the top stories and what they mean, free every weekday morning
    after newsletter promotion
    However, it can be a “delicate balance” for organisations depending on the severity of the attack and what data has been taken, he said.
    Royal Mail has not indicated when it expects to be able to resume international deliveries. The company has already been heavily affected by workers’ recent strike action, and a new ballot is planned this month to approve further industrial action in the dispute over pay and changes to working conditions.
    Smaller exporting companies are thought to be the most affected by the delays. Tina McKenzie, policy chair of the Federation of Small Businesses, said companies had already been through “a tumultuous Christmas period after postal strikes, and this latest cyber incident is the last thing they need”.
    It is “an already challenging time” for smaller exporters, she said. “In the context of global supply chain disruption, rising shipping costs and more paperwork, this creates a very worrying picture.”
    Royal Mail declined to comment further.

    source

  • Satellite Healthcare Files Official Notice of Data Breach – JD Supra

    On January 20, 2023, Satellite Healthcare filed notice of a data breach with the Texas Attorney General after learning that an unauthorized party was able to access—and potentially steal—confidential patient information that had been entrusted to the company. Based on the company’s official filing, the incident resulted in an unauthorized party gaining access to consumers’ names, financial account information and protected health information. After confirming that consumer data was leaked, Satellite Healthcare began sending out data breach notification letters to all individuals who were impacted by the recent data security incident.
    If you are a current or former patient of one of the many Satellite Healthcare providers, your information may no longer be secure. As we’ve discussed in previous posts, cybercriminals have recently shown an increased interest in targeting healthcare providers. In large part, this is due to the fact that these companies often possess incredibly sensitive information that hackers can easily use to commit identity theft and other frauds. Therefore, if you received a data breach letter from Satellite Healthcare, it is imperative that you take a few minutes to learn what you can do to protect yourself and what your legal options are in the wake of the breach.
    The available information regarding the Satellite Healthcare breach comes from the company’s filing with the Texas Attorney General’s office. However, information on the Texas AG’s site is limited, so there is still much to be learned about the Satellite Healthcare data breach.
    However, what we do know is that after discovering that sensitive consumer data was accessible by an unauthorized party, Satellite Healthcare began to review the affected files to determine what information was compromised and which consumers were impacted. While the breached information varies depending on the individual, it may include your name, financial account information and protected health information. Protected health information, or PHI, is demographic information, test and laboratory results, medical history information, insurance information, mental health information or any other data that healthcare providers collect during the course of a patient’s treatment.
    On January 20, 2023, Satellite Healthcare sent out data breach letters to all individuals whose information was compromised as a result of the recent data security incident.
    Founded in 1974, Satellite Healthcare is a healthcare provider based in San Jose, California. The company focuses on providing kidney dialysis and related services through over 100 centers across the United States. Satellite Healthcare’s affiliated services include Satellite WellBound, Satellite Dialysis, and Satellite Research. Through its Satellite WellBound Centers, the company also provides diabetes and dialysis education to patients interested in performing dialysis at home. Satellite Healthcare employs more than 862 people and generates approximately $157 million in annual revenue.
    See more »
    DISCLAIMER: Because of the generality of this update, the information provided herein may not be applicable in all situations and should not be acted upon without specific legal advice based on particular situations.
    © Console and Associates, P.C. | Attorney Advertising
    Refine your interests »
    Back to Top
    Explore 2022 Readers’ Choice Awards
    Copyright © JD Supra, LLC

    source

  • Arnold Clark blackmailed by hackers following cyber attack data … – AM

    Arnold Clark customers have had their addresses, passports and national insurance numbers leaked on the dark web following a cyber-attack on the car retail giant over the festive period.
    AM reported earlier this month that the AM100 business was still battling the impacts of disconnected systems after pulling the plug on its internet connection as part of a bid to protect customers and business partners from data theft just before Christmas.
    But the Mail on Sunday has reported that the international hacking ring Play is now threatening the business with a huge dump of customer data onto the Dark Web after leaking some of the details taken in the raid.
    The newspaper reported that the hackers have already posted 15 gigabytes of data and intend to upload a further 467 gigabytes unless a multi-million-pound ransom is paid in cryptocurrency.
    The incident comes three months after Pendragon refused to pay a $60 million (£53m) ransom demand after becoming motor retail's latest victim to hackers.
    In a statement issued to AM, Arnold Clark declined the opportunity to comment on the alleged ransom demand, but said that it was continuing investigations into the incident “as a priority” alongside its external cyber security partners.  
    It added: “We take the security and safety of our customer data very seriously and accurate identification of any potential compromise of that data remains our primary focus.
    “Once we have a full picture of all the data that is potentially compromised, we will be contacting our customers to make them aware.
    “We will continue to take all necessary actions to minimise any impact to our customers and third-party partners. We are liaising with the relevant regulatory authorities over this incident, especially the ICO and the police.”
    One Arnold Clark customer, who contacted AM after her data was apparently shared online, described how she had received a message from an unknown mailbox containing a link to her personal data.
    She claimed that efforts to contact Arnold Clark about the issue had failed, adding that the branch from which she bought her car had told her that they “did not have information about this incident”.
    A spokesperson for Arnold Clark told AM that affected customers should contact the group’s customer service department at customerservice@arnoldclark.com.
    The Mail on Sunday reported that the Play hacking ring linked to the attack on Arnold Clark had risen to prominence following a series of attacks on government websites in Latin America last year.
    It also highlighted that companies caught up in data breaches can be hit with large fines from the Information Commissioner’s Office (ICO).
    In 2020 it fined British Airways a record £20 million after the personal data of more than 400,000 customers and staff, with Marriott International hotels also fined £18.4m after hackers stole millions of its guests’ records.

     
     
     
     
     
     
    The UK's leading event for motor retailers – November 2023.
    ​Automotive Management Live welcomes motor retail managers from across the UK to shape the future of the industry and network with peers and suppliers.
    Venue: NEC, Birmingham
    REGISTER YOUR INTEREST
    A multi-award-winning news journalist, Tom is news and features editor for Bauer Media’s AM brand. His role demands he keep abreast of all industry and business news to provide coverage of the franchised automotive retail sector and the wider automotive industry, while assisting in the management of the magazine’s production and AM events.
    If you are not a registered user your comment will go to AM for approval before publishing. To avoid this requirement please register or login.
    No comments have been made yet.
    24/10/2022
    03/01/2023
    16/01/2023
    The UK’s leading event for motor retailers.
    A day of insightful, engaging content that Automotive Management LIVE is known for whilst enabling our audience to connect with the full range of suppliers to motor retail, learn and share industry best practice, and discuss how to prepare for the future of motor retail.
    When: November 10, 2022
    Where: NEC, Birmingham

    ​Find out what features are in this month's, and future, issues
    © Bauer Consumer Media Ltd
    Media House, Lynch Wood, Peterborough, PE2 6EA – Registered number 01176085
    AM magazine: Newspress Awards' Automotive Business Publication of the Year 2020

    Please note:

    source

  • Cybercrime groups offer six-figure salaries, bonuses, paid time off to attract talent on dark web – CyberScoop

    By

    Cybercrime is a booming business. So, like any other thriving market, the masterminds behind ransomware syndicates or online scam operations need workers, too. And they aren’t just looking for other criminal hackers. Developers, administrators and designers are in high demand.
    And just as the cybersecurity market is competing for the best talent, cybercriminals are also offering high salaries and perks to attract the best. Some ads boasted annual salaries as high as $1.2 million for the skilled hackers.
    According to new analysis from the cybersecurity firm Kaspersky, it appears that developers are the most sought after within the cybercrime ecosystem. The company’s researchers reviewed roughly 200,000 employment-related messages posted on 155 dark web forums between January 2020 and June 2022. The number of posts peaked in March 2022, possibly because of COVID-19-related lockdowns and income reductions in multiple countries. Nevertheless, job posts — both seeking employment and listing jobs — have exceeded 10,000 per quarter, the analysis found.
    Other in-demand positions included attack specialists, reverse engineers, testers, analysts, administrators and designers. Even the most sophisticated hacking crews still need help, the researchers said.
    Not all job listings are for roles performing illegal work — in fact, one “well-known Russian bank” sought to hire developers while others sought candidates to develop legal IT learning courses — but even the criminal work had the mundane sort of feel of typical employment ads. Test assignments were common, the researchers said, and included steps such as encrypting files, evading anti-virus detection and being generally professional and available online.
    Other parts of the listings would be familiar to normal tech job seekers, such as incentives — “with each successful assignment, you get a raise and an instant bonus” — employee referral bonuses and paid time off, and drug-free requirements. High salaries for the right candidates were available, $100,000 per month in one listing, $20,000 per month in another, but the median salary, depending on the role, ranged between $1,300 and $4,000.
    Some arrangements seemed more informal: “Want a long term cooperation, hack some Chinese websites and dump the DBs for me, lets talk on xmpp,” one message read, referring to a widespread internet messaging platform.
    The analysis found that some people seeking jobs seemed to simply need the money, but for others the reasons may be harder to pin down. Either way, people seeking out this kind of work may not fully understand who they’re getting involved with. “People may have several reasons for going to a dark web site to look for a job,” the researchers wrote. “Many are drawn by expectations of easy money and large financial gain. Most times, this is only an illusion.”
    Additionally, the salaries are “seldom significantly higher than those you can earn legally,” the researchers wrote. “Nevertheless, unhappy with their pay, a substantial percentage of employees in the legitimate economy quit their jobs to find similar employment on the dark web market,” they wrote. “Changes on the market, layoffs, and pay cuts, too, often prompt them to look for a job on cybercrime websites.”

    source