Category: Uncategorized

  • US Departments of Labor, Commerce announce 120-Day … – US Department of Labor

    An official website of the United States government.
    Here’s how you know
    The .gov means it’s official.
    Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.
    The site is secure.
    The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.
    Back
    Key Topics
    Back
    Back
    Back


    News Release
    WASHINGTON – At today’s National Cyber Workforce and Education Summit at the White House, Secretary of Labor Marty Walsh and Secretary of Commerce Gina Raimondo announced the 120-Day Cybersecurity Apprenticeship Sprint, an effort to support numerous industries’ use of Registered Apprenticeships to develop and train a skilled and diverse cybersecurity workforce.
    The 120-Day Cybersecurity Apprenticeship Sprint supports the Biden-Harris administration’s commitment to expand Registered Apprenticeships to meet industry’s need for talent and to connect underserved communities to good jobs. Improving the nation’s cybersecurity apparatus is critical to the nation’s economic and national security, and today’s announcement will ensure enough qualified applicants are prepared for these careers.
    “The 120-Day Cybersecurity Apprenticeship Sprint will increase awareness of current successful cybersecurity-related Registered Apprenticeship programs while recruiting employers and industry associations to expand and promote Registered Apprenticeships as a means to provide workers with high-quality, earn-as-you-learn training for good-paying cybersecurity jobs,” said Secretary of Labor Marty Walsh. “These newly trained workers will help protect our critical infrastructure, advance our digital way of life, strengthen our economy and improve access to cybersecurity career paths for underrepresented communities, especially women, people of color, veterans and people with disabilities.”
    “Right now, we have hundreds of thousands of critical cybersecurity jobs open, and Registered Apprenticeships are key to training new workers and connecting them to these opportunities,” said Secretary of Commerce Gina Raimondo. “The Cybersecurity Apprenticeship Sprint will help build employer-led partnerships that will meet the industry’s need for talent and allow Americans to access quality, high-paying jobs. By using the National Initiative for Cybersecurity Education Workforce Framework for Cybersecurity, employers will ensure that all apprentices benefit from a standardized approach to cybersecurity education and training.”
    The partnership between the departments of Labor, Commerce, other federal agencies and the White House Office of the National Cyber Director seeks to recruit employers, industry associations, labor unions, educational providers, community-based organizations and others to establish Registered Apprenticeship programs or to join existing programs to ensure the nation’s economic sectors have greater numbers of qualified cybersecurity workers. The sprint will continue until National Apprenticeship Week, Nov. 14-20, 2022.
    There are currently 714 registered apprenticeship programs and 42,260 apprentices in cybersecurity-related occupations. Since Jan. 20, 2021, 199 new programs have been created – a 28 percent increase during the Biden-Harris administration. The 120-Day Cybersecurity Apprenticeship Sprint will build upon this progress and focus on creating new pathways for workers in cybersecurity or a related field through partnerships with K-12, higher education, workforce partners and training programs. Introducing more employers to the potential of cybersecurity Registered Apprenticeships is essential to fill the nearly 700,000 open cybersecurity jobs, which span all industries.
    Registered Apprenticeship is an industry-driven, high-quality career pathway where employers can develop and prepare their future workforce, and individuals can obtain paid work experience with a mentor, classroom instruction and a portable, nationally recognized credential. Registered Apprenticeships are an effective recruitment, retention and training strategy to build a skilled and diverse workforce. 
    Learn more about the Cybersecurity Apprenticeship Sprint and Registered Apprenticeships.
    200 Constitution Ave NW
    Washington, DC 20210
    1-866-4-USA-DOL
    1-866-487-2365

    www.dol.gov
    Connect With DOL source

  • Weee! grocery startup says customer data stolen in data breach – TechCrunch

    Weee!, a U.S. online grocery delivery startup that specializes in Asian and Hispanic foods, says it was hacked and that a year’s worth of customer data was stolen.
    In a brief statement published this week, the company said that cybercriminals stole the name, address, email address, phone number, order number and order comments — such as where to drop off or leave orders — of customers who placed orders between July 12, 2021 and July 12, 2022.
    The statement said that the company does not retain customer payment information and as such was unaffected.
    It’s not clear who was behind the breach, but a person on a known cybercrime forum claims to be offering information on 11.3 million orders and 1.1 million customer accounts stolen from Weee! earlier in February. Troy Hunt, who runs breach notification site Have I Been Pwned, obtained a copy of the 1.1 million customer email addresses, allowing affected individuals to check if their information was compromised.
    The seller also says that the type of device used by customers to place orders, such as iPhone or Android, was taken in the breach.
    As of February 2022, Weee! was valued at $4.1 billion following a monster $425 million Series E raise, and has more than 1,500 employees.
    A Weee! spokesperson did not immediately respond to a request for comment and questions about the breach.
    What grocery startup Weee! learned from China’s tech giants

    source

  • Former Uber Security Chief Found Guilty of Data Breach Coverup – The Hacker News

    A U.S. federal court jury has found former Uber Chief Security Officer Joseph Sullivan guilty of not disclosing a 2016 breach of customer and driver records to regulators and attempting to cover up the incident.
    Sullivan has been convicted on two counts: One for obstructing justice by not reporting the incident and another for misprision. He faces a maximum of five years in prison for the obstruction charge, and a maximum of three years for the latter.
    “Technology companies in the Northern District of California collect and store vast amounts of data from users,” U.S. Attorney Stephanie M. Hinds said in a press statement.
    “We expect those companies to protect that data and to alert customers and appropriate authorities when such data is stolen by hackers. Sullivan affirmatively worked to hide the data breach from the Federal Trade Commission and took steps to prevent the hackers from being caught.”
    The 2016 breach of Uber occurred as a result of two hackers gaining unauthorized access to the company’s database backups, prompting the ride-hailing firm to secretly pay a $100,000 ransom in December 2016 in exchange for deleting the stolen information.
    Uber also had the extortionists sign a non-disclosure agreement in an attempt to pass-off the break-in as a bug bounty reward. The backups contained data belonging to 50 million Uber riders and seven million drivers.
    Complicating things further, the incident occurred when the U.S. Justice Department and the Federal Trade Commission (FTC) were already probing the company for another data breach that took place on May 13, 2014.
    In February 2015, Uber revealed that one of its databases had been improperly accessed following a potential compromise of one of the encryption keys, resulting in the exposure of names and license numbers of about 50,000 drivers. The incident was discovered on September 14, 2016.
    “After misleading consumers about its privacy and security practices, Uber compounded its misconduct by failing to inform the Commission that it suffered another data breach in 2016 while the Commission was investigating the company’s strikingly similar 2014 breach,” the FTC noted in 2018.
    The DoJ said that Sullivan played a crucial role in shaping Uber’s response to FTC regarding the 2014 breach, with the defendant testifying under oath on November 4, 2016, about the number of steps that he claimed the company had taken to secure user data.
    But upon learning that Uber was compromised again, that too merely ten days after his FTC testimony, the agency said “Sullivan executed a scheme to prevent any knowledge of the breach from reaching the FTC” instead of opting to divulge the matter to the authorities and its users.
    Federal prosecutors also accused Sullivan of lying to Uber’s chief executive Dara Khosrowshahi as well as the company’s outside lawyers investigating the 2016 incident, stating the “truth about the breach” finally came to light in November 2017.
    What’s more, Travis Kalanick, Uber’s co-founder and then CEO, who resigned from the company in June 2017, is said to have approved Sullivan’s strategy for handling the unauthorized intrusion. Kalanick has not been charged.
    In a statement shared with The New York Times, Sullivan’s legal team said his only focus during the course of the incident and his professional career has been to ensure the “safety of people’s personal data on the internet.”
    The development, which marks the first time a senior company executive has faced criminal charges over a data breach, comes as the two hackers involved in the 2016 incident await sentencing for their fraud conspiracy charges after pleading guilty to the crime in October 2019.
    “The separate guilty pleas entered by the hackers demonstrate that after Sullivan assisted in covering up the hack of Uber, the hackers were able to commit an additional intrusion at another corporate entity — Lynda.com — and attempt to ransom that data as well,” the DoJ pointed out.
    The fact that the 2014 and 2016 security lapses mirrored each other notwithstanding, Uber came under spotlight last month for the wrong reasons when its systems were breached a third time in a hack that it has since linked to the LAPSUS$ cybercrime group.
    This past July, Uber also settled with the DoJ to pay $148 million and agreed to “implement a corporate integrity program, specific data security safeguards, and incident response and data breach notification plans, along with biennial assessments.”
    “The message in today’s guilty verdict is clear: companies storing their customers’ data have a responsibility to protect that data and do the right thing when breaches occur,” FBI San Francisco Special Agent in Charge Robert K. Tripp said.
    Sign up for free and start receiving your daily dose of cybersecurity news, insights and tips.

    source

  • Telstra Telecom Suffers Data Breach Potentially Exposing Employee Information – The Hacker News

    Australia’s largest telecommunications company Telstra disclosed that it was the victim of a data breach through a third-party, nearly two weeks after Optus reported a breach of its own.
    “There has been no breach of Telstra’s systems,” Narelle Devine, the company’s chief information security officer for the Asia Pacific region, said. “And no customer account data was involved.”
    It said the breach targeted a third-party platform called Work Life NAB that’s no longer actively used by the company, and that the leaked data posted on the internet concerned a “now-obsolete Telstra employee rewards program.”
    Telstra also noted it became aware of the breach last week, adding the information included first and last names and the email addresses used to sign up for the program. It further clarified that the data posted was from 2017.
    The data was “basic in nature,” Devine said.
    The company did not reveal how many employees were affected, but a Reuters report pegged the number at 30,000, citing internal staff email sent by Telstra.
    The revelation comes a day after its rival Optus confirmed that nearly 2.1 million of its current and former customers suffered a leak of their personal information in the aftermath of a massive hack.
    Sign up for free and start receiving your daily dose of cybersecurity news, insights and tips.

    source

  • Cyber Security Today, Week in Review for Friday, February 17, 2023 – IT World Canada

    Welcome to Cyber Security Today. This is the Week in Review edition for the week ending Friday, February 17th, 2023. I’m Howard Solomon, contributing reporter on cybersecurity for ITWorldCanada.com and TechNewsday.com in the U.S.

    In a few minutes David Shipley of New Brunswick’s Beauceron Security will be here to discuss some recent cybersecurity news. One is that Canadian government and hospital leaders got a shellacking on a webinar for not putting enough funds into healthcare cybersecurity. David will have thoughts on that.
    We’ll also talk about the compromise of the GoAnywhere MFT managed file transfer service, whether cyber threat intelligence is used well and why corporate managers and IT security staff don’t communicate better. But first a look back at some of the headlines from the past seven days:
    A variant of the Mirai botnet is being used to infect a number of internet-connected devices with old and unpatched vulnerabilities. These include Atlassian’s Confluence collaboration suite, the FreePBX telephony management suite, the Mitel AWC audio conferencing platform, the DrayTek Vigor router, surveillance cameras and more. According to researchers at Palo Alto Networks, infected devices create a new botnet for spreading malware or to launch denial of service attacks. These device are being compromised by brute force credential attacks. IT administrators of any device that connects to the internet must make sure they have secure passwords.
    Attackers are still exploiting unpatched versions of Windows Exchange. According to researchers at Morphisec the latest campaign installs cryptomining software on computers. By stealing computing power attackers get to mine for cryptocurrency faster — and slow computers from doing company business. IT departments that for some reason haven’t installed two-year-old patches to close the Exchange vulnerabilities need to scan systems for compromise, then install the patches.
    Atlassian is the latest company to be a victim of a successful cyber attack on an outside service provider. According to Cyberscoop, Atlassian initially acknowledged the theft of company data held by a service called Envoy. Envoy is used to co-ordinate in-office resources. A hacking group called SiegedSec posted what appears to be the names and email addresses of Atlassian employees. Atlassian makes the Confluence, Jira and Trello project management and collaboration suites. The company says no customer data was stolen.
    UPDATE: Atlassian now says the data theft wasn’t from Envoy but from one of its own employees. TechCrunch says an Atlassian official told it that after closer investigation the attacker had actually compromised Atlassian data from the Envoy app “using an Atlassian employee’s credentials that had been mistakenly posted in a public repository by the employee … The compromised employee’s account was promptly disabled eliminating any further threat to Atlassian’s Envoy data.”
    Washington is bringing its talent together to better protect American technology. The new Disruptive Technology Strike Force will include experts from the FBI, Homeland Security and federal prosecutors to strengthen supply chains and protect critical technology from being stolen or illegally exported. This includes knowledge about supercomputers, quantum computers, artificial intelligence, advanced manufacturing and biosciences.
    And a Russian man was convicted this week by a Boston jury for his part in a scam that used inside knowledge of the finances of publicly-traded companies to get rich. The man and other co-conspirators hacked into and stole about-to-be published earnings information of companies from two corporate filing firms. How did they do it? By stealing employees’ passwords. It is alleged the group netted US$90 million. The man, who was arrested in Switzerland and extradited to the U.S., will be sentenced in May. His alleged accomplices are at large.
    (The following transcript is part of the discussion. To hear the full conversation play the podcast.)
    Howard: Let’s start with the state of cybersecurity in the healthcare care sector. Participants on a Globe and Mail webinar this week had a lot to say about the poor state of cybersecurity at Canadian hospitals. They blame small budgets for hospitals having outdated IT equipment. And the lack of support from hospital executives in Canada. Provincial governments supply most of the budgets of hospitals. COVID didn’t help, the panelists said, because hospitals had to scramble to buy solutions in the short term so that administrative staff could work from home, and that opened up cybersecurity risk. David, who’s to blame?
    David Shipley: I’m going to be controversial and say we are. And by that I mean those of us in Canada that consistently picture health care as being doctors, nurses and sometimes allied Health care workers. But if our conversation consistently is about lack of doctors, nurses or staff and not about the tools that they need to enable them we miss the story. The one silver lining to IT disasters and ransomware at hospitals is that they have categorically demonstrated the value of IT: When you don’t have IT working properly in a modern Canadian or an American hospital your capacity is reduced by 75 to 90 per cent. That’s massive. Yet we consistently underinvest — not just in security tools, because this isn’t just a story about not having antivirus or SOCs [security operations centres] or all these things, but even in the basics. Patient record systems are massively outdated. They don’t even necessarily have encryption enabled. We are in a health IT Code Red and it still can’t get the attention of policymakers. Why? because we’re not taking it seriously as Canadians.
    Howard: Well, the federal government has just offered billions of dollars to the provinces and territories for health care. Some of it can go to modernizing IT systems but to my knowledge none of is dedicated to cyber. That doesn’t mean that upgrading systems and policies won’t be cyber-related, but there’s that huge chunk of money that we’ve been talking about in Canada in the past week and no conversation about that relating to cyber.
    The other thing is I can’t help but notice that Newfoundland, Nova Scotia and New Brunswick — to name three of the smaller provinces in Canada — all have budget surpluses. I just have to wonder with the money sloshing around, the provinces have money to spend on hospital cybersecurity if they want to.
    David: I don’t know if they have the money that’s needed for not just cybersecurity but the overhaul of IT. The fact is that is going to be a decade-long adventure. New Brunswick, where I live, is also a province where their debt has doubled in the last decade. We’re not fiscally healthy. We’ve shown a few signs of life, and particularly with the influx of Ontarians to our province as a result of the pandemic. That’s been a net benefit from an income tax point of view. But it’s not a long-term good health indicator. That being said, the provinces do own the delivery of health care, they do own the underinvestment in it. But at the end of the day politicians put the money where people ask them to. And until we evolve the conversation to be about more than staffing, to be about the actual IT equipment that’s required which is so fundamental to changing the equation [nothing will change]. This also speaks to the executives who are terrible at understanding risk. We will go with the stuff that we have the greatest handle on. Until the eruption of ransomware gangs into health care — which is even worse now that North Korea is getting more serious about it — we didn’t take it seriously as a risk. And, unfortunately, you can’t have downtime in a hospital There’s never a good time to plan a rip-and-replace of IT equipment. But that’s exactly the kind of effort we have to pour into this. We missed a freight train-size opportunity to tie IT modernization and cybersecurity outcomes into the health care story, and that’s on everybody: The federal government, the provinces and us as Canadians, for not demanding it …
    I briefly participated on the board of one of Canada’s healthcare corporations, so I got a small insight into this. And their struggles are so enormous in terms of staffing challenges, the physical infrastructure that they’re trying to run, trying to keep things modernized. Keep in mind that many hospitals in this country still have to fundraise to get necessary medical capital equipment. We still have to hit the streets with a tin can to get new CT scanners in some hospitals in Canada. It’s really hard to make a compelling case for spending multimillions of dollars upgrading our patient information system which you [taxpayers and patients] will never see. You will never understand how that [positively] impacts the patient flow. And I think the challenge is we haven’t necessarily spoken the language of capacity and impact on patients of IT. The translation issue is that their [poliitcians and hospital executives] focus has always been patient outcomes. We probably haven’t been as clear about how vital IT is to patient outcomes.
    ©
    IT World Canada. All Rights Reserved.

    source

  • 10 biggest financial data breaches of 2022 – American Banker

    Criminals have many means of stealing money and information from consumers, from scamming consumers directly to stealing their information from companies that hold it for them. For many cybercriminals, the quickest way to get a massive amount of valuable data is by targeting financial institutions.
    Cybersecurity firm Flashpoint said in recently released data that the financial sector experienced the second highest number of data breaches in 2022, globally, behind government. U.S. banks were hit hardest, followed by institutions in Argentina, Brazil, and China.
    This year, the number of consumer records leaked in breaches globally exceeded 254 million, according to Flashpoint. In the U.S. alone, data from the Maine attorney general indicates that around 9.4 million consumers across the country were affected by data breaches against financial companies.
    At least 79 U.S. financial services companies reported data breaches affecting 1,000 or more consumers in 2022, and the largest breaches affect millions of consumers each. Here are some of the biggest data breaches affecting financial services companies this year.
    The top five have more than $2.5 million in first mortgage loans as of September 30, 2022.
    The abrupt downfall of Silicon Valley Bank prompted investors to question whether other banks that hold tech-related deposits could also be at risk. But one analyst said there could be opportunities for banks to add deposits from customers of the failed bank.
    This week in banking news: Discover EVP Diane Offereins is retiring, Worldline enters the metaverse, SNAP pilots mobile payments and more.
    A $13.5 billion advance to Silicon Valley Bank months before its collapse is another sign that the Home Loan banks encourage risk-taking that can burden the Federal Deposit Insurance Corp. or even the system itself, critics say.
    The Philadelphia bank’s new CEO says a planned infusion would let it update its branch footprint, technology and other resources as part of a turnaround.
    Old-fashioned check fraud is growing, and fraudsters find people to cash their checks — and tell them what to wear while doing it — through a popular messaging service.
    Wells Fargo’s asset cap has been in place for fi ve years, and there’s no end in sight. Where does the bank — and the Fed — go from here?

    source

  • Check Point Offers New Cybersecurity Training Programs for Partners and Customers – Check Point Blog

    Check Point is proud to offer new cybersecurity training courses from Offensive Security to partners and customers, as a part of MIND – Check Point’s Learning and Training organization. As a leading provider of continuous workforce development, training and education, Offensive Security’s hands-on training and certification programs, virtual labs, and open source projects provide practitioners with highly-desired offensive skills to advance their careers and better protect their organizations.
    The courses that will be offered through Check Point are:
    Learn Fundamentals Subscription- OffSec’s entry-level, or beginner, training plan. Learn Fundamentals is designed to help students learn basic technical adjacent concepts, cultivate the mindset necessary for a successful cybersecurity career, and provide the prerequisites for advanced courses. Learn Fundamentals includes access to: PEN-100, SOC-100, WEB-100, CLD-100 and EXP-100. Assessments and Badges are available upon successful completion.
    Learn One Subscription – includes one year of lab access plus two exam attempts for one of the following advanced cybersecurity courses: PEN-200, PEN-300, SOC-200, WEB-200, WEB-300, EXP-301, EXP-312 + access to all Learn Fundamentals courses.
    Learn Unlimited Subscription – With a Learn Unlimited subscription, the learner can unlock all topics and courses in OffSec’s Training Library for 100, 200 and 300 level-training, access to Proving Grounds Practice + unlimited exam attempts for one year.
    Learners in the platforms testify:
    “As a Learn One student, I gained extremely robust knowledge after finishing the 100-levels; this level’s benefits are countless. It’s recommended to everyone. Thanks to Offensive Security for this gamify fun course.”
    Practitioners can now access three Offensive Security courses to stay up to date on the newest and most relevant cybersecurity topics, while testing their skills in a hands-on environment. All subscriptions are open to use for a period of one year.
    Bonus part: OffSec’s CEO, Ning Wang was a guest on Check Point’s CISO’s Secrets podcast in 2021. Tune in to learn more of her vision and the company.
    Check Point’s MIND program provides training and certification for students, early and mid-career professionals in cybersecurity topics. Since its inception, MIND has provided training to 50,000 learners around the world.
    Learn more here: https://training-certifications.checkpoint.com/#/
     
     

    source

  • Engage your employees with better cybersecurity training – Help Net Security

    Cybercriminals use a variety of tactics all at once and are constantly innovating. Organizations need to do the same and take a multidimensional approach to cybersecurity because biannual training videos aren’t enough to engage employees or protect your business.
    cybersecurity training employees
    A bad actor stole $540 million from an NFT gaming company in July, an attack that started with a fake job offer on LinkedIn. In cases like these, social engineering doesn’t look like a fear-based phishing email demanding bank account information in a 24-hour turnaround. Instead, these attacks prey on people’s ambitions as they seek new opportunities.
    Social engineering attacks can present as emails from (what appear to be) friends, asking you for credit card information, or they can be hyper-personal attacks in which fraudsters clone family members’ social media accounts and use personal photos and location information to convince you they’re real.
    Social engineering attacks can be financially and emotionally devastating. But your organization isn’t defenseless — the best protection against them is to create a culture of digital literacy that scales with your organization.
    Unfortunately, many cybersecurity training strategies don’t prepare employees for scenarios like these.
    For example, cybersecurity training programs consisting of biannual training videos often promote content that’s uniform and limited in scope. These videos tend to deliver the same message every six months, with the same rotation of quiz questions.
    While these programs are easy to implement, they’re usually dry, and the repetitive nature of the material demotivates employees, making it difficult for them to internalize or deploy training.
    Cybercrime is evolving and your organization’s cybersecurity training strategy needs to evolve, too. It’s important to identify training opportunities that not only engage your employees, but better protect your business from social engineering and other attack strategies.
    Here are five things to keep in mind as you expand your training strategy.
    1. Starting is the hardest part — don’t let it stand in your way
    The good news is that you don’t need to begin with a full rollout of new policies and strategies — take it one step at a time and build on your progress.
    For example, one starting point could involve the distribution of a security reminder on the first Friday of the month, asking employees to update their devices. As this process becomes routine, add another step: a backup reminder at the end of the month.
    Continue developing your cybersecurity strategy, adding new elements that address social engineering and other types of attacks. Before you know it, your organization’s digital literacy will improve as you establish a more robust and comprehensive training cycle.
    2. Create clear and specific cybersecurity policies
    When organizations draft their cybersecurity policies, they often apply a one-size-fits-all approach. But since your organization consists of a variety of teams and roles, a monolithic approach to cybersecurity policies probably won’t cover the security concerns associated with every role. For example, the cyber threats your finance department faces may differ from the ones faced by HR or the IT team — an HR employee is likely more susceptible to a phishing scam than an IT employee, so they need different training emphases.
    Cybersecurity policies require a degree of customization for specific roles and departments. Start by asking questions like: What are the security needs of each department? And how is each department most susceptible to cybersecurity attacks?
    3. Acknowledge and address (fear) fatigue
    Cybersecurity works like insurance — you don’t see the reward because your actions are often proactive rather than reactive. Employees can get frustrated by a process that doesn’t demonstrate an immediate payoff, so it’s important to emphasize the value of ongoing training in preventing attacks before they occur.
    Be careful not to give rise to fear fatigue, which occurs when employees are constantly exposed to bad news or messages that focus on negative outcomes. Cybersecurity training that only plays to fear, like constant alerts to threats, demotivates employees.
    When providing training related to social engineering or other types of attacks, strike a balance between communicating the very real consequences of cyber-attacks and more positive messaging, like best practices and cyber hygiene routines.
    4. Gamify your training
    Gamification presents a significant opportunity for improving digital literacy, because it improves engagement. Instead of watching a video and taking a routine quiz, cybersecurity training happens on a competitive, point-earning platform where employees grow their skills alongside each other. Gamification ultimately makes learning fun, and the lessons are more likely to stick.
    Just make sure that as you gamify cybersecurity training, you’re still strategizing. And keep context in mind — while it can be fun to create themed training exercises around celebrations like Halloween, an April Fool’s phishing scheme can come off as tacky or cruel.
    5. Empower your employees
    Your primary goal is to empower your employees through training and resources. When it comes to cybersecurity, one of the resources your organization should be fully utilizing is your IT team.
    Your IT team is most knowledgeable about cybersecurity and cyber-attacks, and they’re best equipped to communicate best practices to your workforce. But communication is a two-way street — IT teams rely on employees to contact them when unusual phishing attacks or cybersecurity issues occur.
    Employees are your first line of defense. It’s important to prioritize their role in cybersecurity and preventing breaches caused by social engineering or other types of attacks. The most effective cyber-attacks and social engineers use the full arsenal of tools at their disposal — and you need to do the same. Empower your workforce with diverse and ongoing training opportunities and implement cybersecurity practices that turn your teams into your best defense.

    source

  • #StopRansomware: Royal Ransomware – CISA

    An official website of the United States government
    Here’s how you know
    Official websites use .gov
    A .gov website belongs to an official government organization in the United States.
    Secure .gov websites use HTTPS
    A lock () or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
    Search
    Note: This joint Cybersecurity Advisory (CSA) is part of an ongoing #StopRansomware effort to publish advisories for network defenders that detail various ransomware variants and ransomware threat actors. These #StopRansomware advisories include recently and historically observed tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) to help organizations protect against ransomware. Visit stopransomware.gov to see all #StopRansomware advisories and to learn more about other ransomware threats and no-cost resources.
    Actions to take today to mitigate cyber threats from ransomware:
    The Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) are releasing this joint CSA to disseminate known Royal ransomware IOCs and TTPs identified through FBI threat response activities as recently as January 2023.
    Since approximately September 2022, cyber criminals have compromised U.S. and international organizations with a Royal ransomware variant. FBI and CISA believe this variant, which uses its own custom-made file encryption program, evolved from earlier iterations that used “Zeon” as a loader. After gaining access to victims’ networks, Royal actors disable antivirus software and exfiltrate large amounts of data before ultimately deploying the ransomware and encrypting the systems. Royal actors have made ransom demands ranging from approximately $1 million to $11 million USD in Bitcoin. In observed incidents, Royal actors do not include ransom amounts and payment instructions as part of the initial ransom note. Instead, the note, which appears after encryption, requires victims to directly interact with the threat actor via a .onion URL (reachable through the Tor browser). Royal actors have targeted numerous critical infrastructure sectors including, but not limited to, Manufacturing, Communications, Healthcare and Public Healthcare (HPH), and Education.
    FBI and CISA encourage organizations to implement the recommendations in the Mitigations section of this CSA to reduce the likelihood and impact of ransomware incidents.
    Download the PDF version of this report:
    For a downloadable copy of IOCs, see
    Note: This advisory uses the MITRE ATT&CK® for Enterprise framework, version 12. See MITRE ATT&CK for Enterprise for all referenced tactics and techniques.
    Royal ransomware uses a unique partial encryption approach that allows the threat actor to choose a specific percentage of data in a file to encrypt. This approach allows the actor to lower the encryption percentage for larger files, which helps evade detection.[1] In addition to encrypting files, Royal actors also engage in double extortion tactics in which they threaten to publicly release the encrypted data if the victim does not pay the ransom.
    Royal actors gain initial access to victim networks in a number of ways including: 
    Once Royal actors gain access to the network, they communicate with command and control (C2) infrastructure and download multiple tools [T1105]. Legitimate Windows software is repurposed by Royal operators to strengthen their foothold in the victim’s network. Ransomware operators often use open-source projects to aid their intrusion activities; Royal operators have recently been observed using Chisel, a tunneling tool transported over HTTP and secured via SSH [T1572], to communicate with their C2 infrastructure. FBI has observed multiple Qakbot C2s used in Royal ransomware attacks, but has not yet determined if Royal ransomware exclusively uses Qakbot C2s.
    Royal actors often use RDP to move laterally across the network [T1021.001]. Microsoft Sysinternals tool PsExec has also been used to aid lateral movement. FBI has observed Royal actors using remote monitoring and management (RMM) software, such as AnyDesk, LogMeIn, and Atera, for persistence in the victim’s network [T1133]. In some instances, the actors moved laterally to the domain controller. In one confirmed case, the actors used a legitimate admin account to remotely log on to the domain controller [T1078]. Once on the domain controller, the threat actor deactivated antivirus protocols [T1562.001] by modifying Group Policy Objects [T1484.001].
    Royal actors exfiltrate data from victim networks by repurposing legitimate cyber pentesting tools, such as Cobalt Strike, and malware tools and derivatives, such as Ursnif/Gozi, for data aggregation and exfiltration. According to third-party reporting, Royal actors’ first hop in exfiltration and other operations is usually a U.S. IP address.
    Note: In reference to Cobalt Strike and other tools mentioned above, a tool repository used by Royal was identified at IP: 94.232.41[.]105 in December 2022.
    Before starting the encryption process, Royal actors: 
    FBI has found numerous batch (.bat) files on impacted systems which are typically transferred as an encrypted 7zip file. Batch files create a new admin user [T1078.002], force a group policy update, set pertinent registry keys to auto-extract [T1119] and execute the ransomware, monitor the encryption process, and delete files upon completion—including Application, System, and Security event logs [T1070.001].
    Malicious files have been found in victim networks in the following directories:
    See table 1 and 2 for Royal ransomware IOCs that FBI obtained during threat response activities as of January 2023. Note: Some of the observed IP addresses are several months old. FBI and CISA recommend vetting or investigating these IP addresses prior to taking forward-looking action, such as blocking.
    IOC
    Description
    .royal
    Encrypted file extension
    README.TXT
    Ransom note
    Malicious IP
    Last Activity
    102.157.44[.]105
    November 2022
    105.158.118[.]241
    November 2022
    105.69.155[.]85
    November 2022
    113.169.187[.]159
    November 2022
    134.35.9[.]209
    November 2022
    139.195.43[.]166
    November 2022
    139.60.161[.]213
    November 2022
    148.213.109[.]165
    November 2022
    163.182.177[.]80
    November 2022
    181.141.3[.]126
    November 2022
    181.164.194[.]228
    November 2022
    185.143.223[.]69
    November 2022
    186.64.67[.]6
    November 2022
    186.86.212[.]138
    November 2022
    190.193.180[.]228
    November 2022
    196.70.77[.]11
    November 2022
    197.11.134[.]255
    November 2022
    197.158.89[.]85
    November 2022
    197.204.247[.]7
    November 2022
    197.207.181[.]147
    November 2022
    197.207.218[.]27
    November 2022
    197.94.67[.]207
    November 2022
    23.111.114[.]52
    November 2022
    41.100.55[.]97
    November 2022
    41.107.77[.]67
    November 2022
    41.109.11[.]80
    November 2022
    41.251.121[.]35
    November 2022
    41.97.65[.]51
    November 2022
    42.189.12[.]36
    November 2022
    45.227.251[.]167
    November 2022
    5.44.42[.]20
    November 2022
    61.166.221[.]46
    November 2022
    68.83.169[.]91
    November 2022
    81.184.181[.]215
    November 2022
    82.12.196[.]197
    November 2022
    98.143.70[.]147
    November 2022
    140.82.48[.]158
    December 2022
    147.135.36[.]162
    December 2022
    147.135.11[.]223
    December 2022
    152.89.247[.]50
    December 2022
    179.43.167[.]10
    December 2022
    185.7.214[.]218
    December 2022
    193.149.176[.]157
    December 2022
    193.235.146[.]104
    December 2022
    209.141.36[.]116
    December 2022
    45.61.136[.]47
    December 2022
    45.8.158[.]104
    December 2022
    5.181.234[.]58
    December 2022
    5.188.86[.]195
    December 2022
    77.73.133[.]84
    December 2022
    89.108.65[.]136
    December 2022
    94.232.41[.]105
    December 2022
    47.87.229[.]39
    January 2023
    Malicious Domain
    Last Observed
    ciborkumari[.]xyz
    October 2022
    sombrat[.]com
    October 2022
    gororama[.]com
    November 2022
    softeruplive[.]com
    November 2022
    altocloudzone[.]live
    December 2022
    ciborkumari[.]xyz
    December 2022
    myappearinc[.]com
    December 2022
    parkerpublic[.]com
    December 2022
    pastebin.mozilla[.]org/Z54Vudf9/raw
    December 2022
    tumbleproperty[.]com
    December 2022
    myappearinc[.]com/acquire/draft/c7lh0s5jv
    January 2023
    Tool
    SHA256
    AV tamper
    8A983042278BC5897DBCDD54D1D7E3143F8B7EAD553B5A4713E30DEFFDA16375
    TCP/UDP Tunnel over HTTP (Chisel)
    8a99353662ccae117d2bb22efd8c43d7169060450be413af763e8ad7522d2451
    Ursnif/Gozi
    be030e685536eb38ba1fec1c90e90a4165f6641c8dc39291db1d23f4ee9fa0b1
    Exfil
    B8C4AEC31C134ADBDBE8AAD65D2BCB21CFE62D299696A23ADD9AA1DE082C6E20
    Remote Access (AnyDesk)
    4a9dde3979c2343c024c6eeeddff7639be301826dd637c006074e04a1e4e9fe7
    PowerShell Toolkit Downloader
    4cd00234b18e04dcd745cc81bb928c8451f6601affb5fa45f20bb11bfb5383ce
    PsExec (Microsoft Sysinternals)
    08c6e20b1785d4ec4e3f9956931d992377963580b4b2c6579fd9930e08882b1c
    Keep Host Unlocked (Don’t Sleep)
    f8cff7082a936912baf2124d42ed82403c75c87cb160553a7df862f8d81809ee
    Ransomware Executable
    d47d4b52e75e8cf3b11ea171163a66c06d1792227c1cf7ca49d7df60804a1681
    Windows Command Line (NirCmd)
    216047C048BF1DCBF031CF24BD5E0F263994A5DF60B23089E393033D17257CB5
    System Management (NSudo)
    19896A23D7B054625C2F6B1EE1551A0DA68AD25CDDBB24510A3B74578418E618
    Batch Scripts
    Filename
    Hash Value
    2.bat
    585b05b290d241a249af93b1896a9474128da969
    3.bat
    41a79f83f8b00ac7a9dd06e1e225d64d95d29b1d
    4.bat
    a84ed0f3c46b01d66510ccc9b1fc1e07af005c60
    8.bat
    c96154690f60a8e1f2271242e458029014ffe30a
    kl.bat
    65dc04f3f75deb3b287cca3138d9d0ec36b8bea0
    gp.bat
    82f1f72f4b1bfd7cc8afbe6d170686b1066049bc7e5863b51aa15ccc5c841f58
    r.bat
    74d81ef0be02899a177d7ff6374d699b634c70275b3292dbc67e577b5f6a3f3c
    runanddelete.bat
    342B398647073159DFA8A7D36510171F731B760089A546E96FBB8A292791EFEE
    See table 3 for all referenced threat actor tactics and techniques included in this advisory.
    Initial Access
    Technique Title
    ID
    Use
    Exploit Public Facing Application
    T1190
    The actors gain initial access through public-facing applications.
    Phishing: Spear phishing Attachment
    T1566.001
    The actors gain initial access through malicious PDF attachments sent via email.
    Phishing: Spearphishing Link
    T1566.002
    The actors gain initial access using malvertising links via emails and public-facing sites.
    External Remote Services
    T1133
    The actors gain initial access through a variety of RMM software.
    Command and Control
    Technique Title
    ID
    Use
    Ingress Tool Transfer
    T1105
    The actors used C2 infrastructure to download multiple tools.
    Protocol Tunneling
    T1572
    The actors used an encrypted SSH tunnel to communicate within C2 infrastructure.
                                                                  Privilege Escalation
    Technique Title
    ID
    Use
    Valid Accounts: Domain Accounts
    T1078.002
    The actors used encrypted files to create new admin user accounts.
    Defense Evasion
    Technique Title
    ID
    Use
    Impair Defenses: Disable or Modify Tools
    T1562.001
    The actors deactivated antivirus protocols.
    Domain Policy Modification: Group Policy Modification
    T1484.001
    The actors modified Group Policy Objects to subvert antivirus protocols.
    Indicator Removal: Clear Windows Event Logs
    T1070.001
    The actors deleted shadow files and system and security logs after exfiltration.
    Remote Desktop Protocol
    T1021.001
    The actors used valid accounts to move laterally through the domain controller using RDP.
    Automated Collection
    T1119
    The actors used registry keys to auto-extract and collect files.
                                                                             Impact  
    Technique Title
    ID
    Use
    Data Encrypted for Impact
    T1486
    The actors encrypted data to determine which files were being used or blocked by other applications.
    FBI and CISA recommend network defenders apply the following mitigations to limit potential adversarial use of common system and network discovery techniques and to reduce the risk of compromise by Royal ransomware. These mitigations follow CISA’s Cybersecurity Performance Goals (CPGs), which provide a minimum set of practices and protections that are informed by the most common and impactful threats, tactics, techniques, and procedures, and which yield goals that all organizations across critical infrastructure sectors should implement:
    FBI is seeking any information that can be shared, to include boundary logs showing communication to and from foreign IP addresses, a sample ransom note, communications with Royal actors, Bitcoin wallet information, decryptor files, and/or a benign sample of an encrypted file.
    Additional details requested include: a targeted company Point of Contact, status and scope of infection, estimated loss, operational impact, transaction IDs, date of infection, date detected, initial attack vector, host and network based indicators.
    FBI and CISA do not encourage paying ransom as payment does not guarantee victim files will be recovered. Furthermore, payment may also embolden adversaries to target additional organizations, encourage other criminal actors to engage in the distribution of ransomware, and/or fund illicit activities. Regardless of whether you or your organization have decided to pay the ransom, FBI and CISA urge you to promptly report ransomware incidents to a local FBI Field Office, or CISA at https://www.cisa.gov/report.
    The information in this report is being provided “as is” for informational purposes only. CISA and FBI do not endorse any commercial product or service, including any subjects of analysis. Any reference to specific commercial products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring by CISA or the FBI.
    [1] Royal Rumble: Analysis of Royal Ransomware (cybereason.com)
    [2] DEV-0569 finds new ways to deliver Royal ransomware, various payloads – Microsoft Security Blog
    [3] 2023-01: ACSC Ransomware Profile – Royal | Cyber.gov.au
    Recorded Future, Coveware, Digital Asset Redemption, Q6, and RedSense contributed to this CSA.
    Please share your thoughts. We recently updated our anonymous Product Feedback Survey and we’d welcome your feedback.

    source

  • Experts predict how AI will energize cybersecurity in 2023 and beyond – VentureBeat

    AI and machine learning (ML) are becoming attackers’ preferred technologies, from designing malicious payloads that defy detection to writing customized phishing emails. The recent GoDaddy multiyear breach has all the signs of an AI-driven cyberattack designed to evade detection and reside in the company’s infrastructure for years. 
    Cybercriminal gangs and sophisticated advanced persistent threat (APT) groups actively recruit AI and ML specialists who design malware that can evade current-generation threat detection systems. What attackers lack in size and scale, they more than make up for in ingenuity, speed and stealth.
    “I’ve been amazed at the ingenuity when someone has six months to plan their attack on your company — so always be vigilant,” Kevin Mandia, CEO of Mandiant, said during a fireside chat with George Kurtz at CrowdStrike’s Fal.Con conference last year. 
    Nearly three-quarters (71%) of all detections indexed by CrowdStrike Threat Graph were malware-free intrusions. CrowdStrike’s Falcon OverWatch Threat Hunting Report illustrates how advanced attackers use valid credentials to facilitate access and persistence in victim environments.
    Another contributing factor is the rate at which new vulnerabilities are disclosed and the speed with which adversaries can operationalize exploits using AI and ML. 
    Attackers are using ChatGPT to refine malware, personalize phishing emails and fine-tune algorithms designed to steal privileged access credentials.
    As Shishir Singh, CTO of cybersecurity at BlackBerry notes: “It’s been well documented that people with malicious intent are testing the waters, but over this year, we expect to see hackers get a much better handle on how to use ChatGPT successfully for nefarious purposes; whether as a tool to write better mutable malware or as an enabler to bolster their ‘skillset.’ Both cyber pros and hackers will continue to look into how they can utilize it best. Time will tell who’s more effective.”
    In fact, a recent survey by BlackBerry found that 51% of IT decision-makers believe there will be a successful cyberattack credited to ChatGPT within the year. 
    Amazon Web Services, CrowdStrike, Google, IBM, Microsoft, Palo Alto Networks and other leading cybersecurity vendors are prioritizing investment in AI and ML research and development (R&D) in response to increasingly complex threats and requests from enterprise customers for new features.
    Charlie Bell, Microsoft’s EVP for security, compliance and identity and management said of AI’s role in cybersecurity: “It’s basically having the machinery to just continuously go fast, especially in ML. All the model training, data stuff and everything else is a super-high priority. Microsoft has a tremendous amount of technology in the AI space.”  
    CrowdStrike’s many new announcements at Fal.Con last year, along with Palo Alto Networks’ Ignite ’22, illustrate how effective their DevOps and engineering teams are at translating R&D investment into new products.
    Amazon Web Services’ hundreds of cybersecurity services and Microsoft Azure’s zero trust developments reflect how R&D spending on AI and ML is a high priority in two of the largest cloud platform providers. Microsoft sunk $1 billion in cybersecurity R&D last year and committed to spending $20 billion over the next five years on cybersecurity R&D (beginning in 2021). Microsoft’s security business generates $15 billion annually.
    Ivanti’s continual stream of new announcements, including those at RSA and many successful acquisitions followed by rapid advances in AI development, are cases in point. Each of these cybersecurity vendors knows how to translate AI and ML expertise into cyber-resilient systems and solutions faster than competitors while fine-tuning the UX aspects of their platforms.
    AI and ML are defining the future of e-crime, with cybercriminal gangs and APT groups ramping up AI hacker-for-hire programs and ransomware-as-a-service while expanding their base of AI-enabled cloaking techniques — and more. It’s why security teams are losing the AI war
    These factors, combined with the continued resiliency of cybersecurity spending, lead to optimistic forecasts about investment in AI. VentureBeat has curated the most interesting forecasts, noted below:
    Core to the zero trust frameworks that organizations are standardizing today is real-time visibility and monitoring of all activity across a network.
    AI-based behavioral analytics provides real-time data on potentially malicious activity by identifying and acting on anomalies. It’s proving effective in allowing CISOs and their teams to set baselines for normal behavior by analyzing and understanding past behavior and then identifying anomalies in the data. 
    Leading cybersecurity vendors rely on AI and ML algorithms to personalize security roles or profiles for each user in real time based on their behavior and patterns. By analyzing several variables, including where and when users attempt to log in, device type, and configuration, among others, these systems can detect anomalies and identify potential threats in real time.
    Leading providers include Blackberry Persona, Broadcom, CrowdStrike, CyberArk, Cybereason, Ivanti, SentinelOne, Microsoft, McAfee, Sophos and VMWare Carbon Black.
    CISOs and CIOs tell VentureBeat that this approach to AI-based endpoint management decreases the risk of lost or stolen devices, protecting against device and app cloning and user impersonation. With these techniques, enterprises can analyze endpoint protection platforms (EPPs), endpoint detection and response (EDR), unified endpoint management (UEM) and transaction fraud detection to improve authentication accuracy.
    IBM’s Institute for Business Value study of AI and automation in cybersecurity finds that enterprises that are using AI as part of their broader strategy are concentrating on gaining a more holistic view of their digital landscapes. Thirty-five percent are applying AI and automation to discover endpoints and improve how they manage assets, a use case they predict will increase by 50% in three years. 
    Vulnerability and patch management is the second most popular use case (34%), predicted to increase to more than 40% adoption in 3 years.
    These findings indicate that more AI adopters are looking to the technology to help them achieve their zero trust initiatives.
    In an Ivanti survey on patch management, 71% of IT and security professionals said they see patching as overly complex and taking too much time away from urgent projects. Just over half (53%) say that organizing and prioritizing critical vulnerabilities takes up most of their time.
    Leading vendors with AI-based patch management solutions include Blackberry, CrowdStrike Falcon, Ivanti Neurons for Patch Intelligence and Microsoft.  
    “Patching is not nearly as simple as it sounds,” said Srinivas Mukkamala, chief product officer at Ivanti. “Even well-staffed, well-funded IT and security teams experience prioritization challenges amidst other pressing demands. To reduce risk without increasing workload, organizations must implement a risk-based patch management solution and leverage automation to identify, prioritize and even address vulnerabilities without excess manual intervention.”
    Ivanti’s approach uniquely uses contextual intelligence derived from ML to streamline patch deployments. Ivanti Neurons Agents run independently on a set schedule, eliminating the need for time-consuming inventory techniques that waste IT teams’ time. Ivanti Neurons for Patch Intelligence helps enterprises reduce the time-to-patch, offloading manually-intensive tasks that IT teams would otherwise have to do.
    Gartner categorized AI use cases by comparing their business value and feasibility. Transaction fraud detection is the most feasible use case, and it delivers high business value. File-based malware detection is considered nearly as feasible and also delivers strong business value.
    Process behavioral analysis also delivers substantial business value, with a medium feasibility level to implement. Finally, abnormal system behavior detection delivers high business value and feasibility; Gartner believes this solution can be successfully implemented in enterprises. (Source: Gartner, Infographic: AI Use-Case Prism for Sourcing and Procurement, Refreshed October 14, 2022, Published March 30, 2021.)
    The market size for AI in cybersecurity is predicted to be $22.4 billion in 2023 and is anticipated to reach $60.6 billion by 2028, reflecting a compound annual growth rate (CAGR) of 21.9%. Increasing the contextual intelligence of IOAs with AI is one of the core catalysts driving the rapid growth of AI in the broader cybersecurity market.
    By definition, IOAs focus on detecting an attacker’s intent and trying to identify their goals, regardless of the malware or exploit used in an attack.
    Conversely, an indicator of compromise (IOC) provides the forensics needed as evidence of a breach occurring on a network. IOAs must be automated to deliver accurate, real-time data on attack attempts to understand attackers’ intent and kill any intrusion attempt. 
    CrowdStrike, ThreatConnect, Deep Instinct and Orca Security are leaders in using AI and ML to streamline IOCs.
    CrowdStrike is the first and only provider of AI-based IOAs. According to the company, the technology works in conjunction with existing layers of sensor defense, including sensor-based ML and existing IOAs, asynchronously.
    The company’s AI-based IOAs combine cloud-native ML and human expertise on a common platform, which was invented by the company more than a decade ago. CrowdStrike’s approach to AI-based IOAs correlates the AI-generated IOAs (behavioral event data) with local events and file data to assess maliciousness.
    “CrowdStrike leads the way in stopping the most sophisticated attacks with our industry-leading indicators of attack capability, which revolutionized how security teams prevent threats based on adversary behavior, not easily changed indicators,” said Amol Kulkarni, chief product and engineering officer at CrowdStrike. 
    One notable achievement of CrowdStrike’s AI-powered IOAs is their identification of more than 20 adversary patterns that had never been seen before. These patterns were discovered during testing and implemented into the Falcon platform for automated detection and prevention.
    AI-based Indicators of Attack (IOAs) fortify existing defenses using cloud-based ML and real-time threat intelligence to analyze events at runtime and dynamically issue IOAs to the sensor. The sensor then correlates the AI-generated IOAs (behavioral event data) with local and file data to assess maliciousness.
    Another IDC survey found that cybersecurity is a top investment area across all regions; however, demand varies. Forty-six percent of North American respondents identified cybersecurity as a priority, driven by high levels of investment in cloud applications and infrastructure. In contrast, only 28% and 32% of EMEA and Asia/Pacific respondents, respectively, identified cybersecurity as a top investment area.
    Precedence Research found that fraud detection and the anti-fraud segment of the cybersecurity AI market accounted for 22% of global revenues in 2022. The research firm predicts AI’s fastest-growing areas will include battling fraud, identifying phishing emails and malicious links, and identifying privileged access credential abuse. Its study also found that increasingly complex cloud infrastructures comprised of multicloud and hybrid cloud configurations drive the need for AI-based cybersecurity solutions to protect them.
    AI delivers its potential when integrated into a broader zero trust security framework designed to treat every identity as a new security perimeter. The most robust use cases for AI and ML in cybersecurity began with a clear vision of what the technology and its solution protect. AI and ML-based technologies are proving effective at scaling to secure each use case when it’s an identity, either as a privileged access credential, container, device or a supplier or contractor’s laptop. 
    Detection dominates use cases because more CISOs and leading enterprises know that becoming cyber-resilient is the best way to scale cybersecurity strategies. And with the C-suite expecting risk management reductions to be measured financially, cyber-resilience is the best direction forward. 
    Additional sources of information:
    Bloomberg, Microsoft’s New Security Chief Looks to AI to Fight Hackers: Q&A, September 23. 2022
    Capgemini, Reinventing Cybersecurity with Artificial Intelligence: The new frontier in digital security podcast 
    Gartner’s Market Guide for AI Trust, Risk and Security Management, January 2023
    IBM, AI Guide for CISOs, Artificial intelligence (AI) for cybersecurity
    McKinsey & Company, The unsolved opportunities for cybersecurity providers, January 5, 2022
    VentureBeat’s mission is to be a digital town square for technical decision-makers to gain knowledge about transformative enterprise technology and transact. Discover our Briefings.
    Want must read news straight to your inbox?
    © 2023 VentureBeat. All rights reserved.

    source