Category: Uncategorized

  • Exclusive: Alphabet spinoff Sandbox AQ raises $500 mln for cyber … – Reuters.com

    OAKLAND, Calif., Feb 14 (Reuters) – Sandbox AQ, a startup spun off from Alphabet Inc (GOOGL.O) last year, said on Tuesday it raised $500 million as it helps customers prepare for a quantum computing future.
    Quantum computers, whose processors run based on quantum physics, could one day carry out certain calculations millions of times quicker than today's fastest super computers, yet they remain years away from making a big change, such as breaking encryption.
    But as hackers can harvest data today and wait to decrypt them when the quantum computers are ready, the National Institute of Standards and Technology under the U.S. Commerce Department selected new cryptography standards last year that could better withstand quantum computers.
    The U.S. government has set quantum computing as one of the key technologies important for national security.
    Sandbox AQ's software scans companies' systems to identify which parts use the old cryptography, identifies which need to be replaced urgently, and sets out to fortify the encryption of the enterprise, said CEO Jack Hidary.
    View 2 more stories
    "Right now you have a lot of banks and pharma companies and governments still using these old protocols," said Hidary. "The average bank takes five to seven years to migrate over. … Now, hopefully they'll do their important customer private information first."
    Sandbox also has a business selling powerful simulation software to accelerate development of drugs and materials.
    The simulation does not currently need quantum computers to work, said Hidary. He said in the last 18 months chips that do artificial intelligence work have become powerful enough to run some of the math for quantum physics. When quantum computers are ready, that work would speed up even further.
    Sandbox AQ is also using existing types of sensors based on quantum physics. These have long been MRI machines, for instance, and Sandbox has created a prototype machine to monitor the heart. It can also be used to monitor slight local changes in the earth's magnetic field, making navigation systems much more precise, he said.
    Last month Sandbox AQ said it won a contract with the U.S. Air Force to research these quantum navigation technologies
    Former Google Chief Executive Eric Schmidt is the startup's chairman as well as investor. Other investors include Breyer Capital, T. Rowe Price funds and Salesforce.com Inc (CRM.N) founder Marc Benioff's TIME Ventures.
    Schmidt in a statement said Sandbox AQ has already signed up more than 15 enterprise and government customers and is partnering with 30 universities to train PhDs and other talent needed.
    Some of the team and inspiration for Sandbox originated at Alphabet in 2016. But the Google parent is not a shareholder as Hidary said he wanted the company to be independent to work with the other major cloud companies as well.
    Our Standards: The Thomson Reuters Trust Principles.
    Tesla Inc's quest to build its first factory in Mexico reveals some of the shaky underpinnings of the country's rise as a nearshoring darling, with proximity to U.S. buyers weighed down by concerns over power supply and political interference.
    Reuters, the news and media division of Thomson Reuters, is the world’s largest multimedia news provider, reaching billions of people worldwide every day. Reuters provides business, financial, national and international news to professionals via desktop terminals, the world's media organizations, industry events and directly to consumers.
    Build the strongest argument relying on authoritative content, attorney-editor expertise, and industry defining technology.
    The most comprehensive solution to manage all your complex and ever-expanding tax and compliance needs.
    The industry leader for online information for tax, accounting and finance professionals.
    Access unmatched financial data, news and content in a highly-customised workflow experience on desktop, web and mobile.
    Browse an unrivalled portfolio of real-time and historical market data and insights from worldwide sources and experts.
    Screen for heightened risk individual and entities globally to help uncover hidden risks in business relationships and human networks.
    All quotes delayed a minimum of 15 minutes. See here for a complete list of exchanges and delays.
    © 2023 Reuters. All rights reserved

    source

  • Accenture Acquires Morphus, Brazil-Based Cybersecurity Company – Newsroom | Accenture

    Contact Us
    Sign In

    We were unable to find a match for “$searchstring.” Try searching again by using different or more general keywords and check for spelling errors.
    You must be logged in to view this item.

    source

  • Cyber security training: How to be as secure as is practicably possible – ComputerWeekly.com

    momius – stock.adobe.com
    In the summer of 2021, analyst Gartner published its Market guide for security awareness computer-based training. It reported that the human element (85%) continues to be a primary catalyst for data breaches, with phishing accounting for 36% of breaches.
    One recent attack that made the headlines occurred at Intuit Mailchimp, the marketing automation platform provider, in January 2023.
    Discussing the challenges in training and protecting users, the company’s chief technology officer (CTO), Eric Muntz, says: “It is really tough protecting people against social engineering attacks. I would encourage other leaders to, first and foremost, talk about it and make it part of onboarding and training.”
    Mailchimp runs demonstrations during “coffee hour”, where speakers are invited in to demonstrate styles of attack. “It’s about education,” says Muntz.
    The growth of post-pandemic remote working practices has exacerbated the risks of organisations being compromised by social engineering attacks. 
    Despite bringing a multitude of benefits, including improved motivation and greater flexibility, nearly a fifth of IT professionals say workers aren’t secure when working remotely. People tend to work in isolation, and while they may use collaboration tools for communicating with colleagues, email is also still used for internal communications. Data from Statista shows the number of email messages is set to rise to 376 billion globally by 2025.
    It’s important, therefore, to understand the current security risks facing remote workers, and how organisations can educate staff to reduce them.
    IT security expert Jamal Bihya, who is the author of GigaOm’s latest Security awareness and training report, believes business leaders need to assess how much security is required in their “human firewall”.
    “The idea is that security warrants training, which targets the general employee,” he says.
    While it is highly unlikely organisations can provide sufficient training to remove 100% of those attack vectors that target users, Bihya believes organisations need to aim to make IT security awareness among their staff a “reflex action”. 
    But according to William Candrick, director analyst at Gartner, the challenge with traditional training is that it attempts to address perennial issues, such as email phishing and social engineering attacks.
    Research from Gartner shows that while 82% of data breaches involve human error, 69% of employees bypass cyber security guidance. Moreover, 93% of them know their actions create cyber risk.
    Candrick argues that their actions are not malicious, with 29% citing speed and convenience as the reason for working around the cyber security measures their organisations have in place. Gartner’s research shows that 18% of these people believe business objectives outweigh the impact to cyber security.
    “The motto is to make the easy way the secure way and use security by design to embed security principles into existing workflows,” says Candrick.
    Gartner’s research is reflected in a survey from HornetSecurity, which found that 74% of remote staff have access to critical data when working remotely. On top of this, work is no longer limited to one device, with cloud systems allowing employees to log into work accounts on personal computers, tablets and smartphones. According to HornetSecurity, 15% of employees use their own devices to carry out work-related tasks.
    Daniel Hofmann, CEO of HornetSecurity, warns that this blurring of work and personal life makes it easy for confidential documents to be saved and shared on unprotected networks. As an example, he says: “Last year, Suella Braverman resigned from her position as home secretary after admitting to sending an official document to a fellow MP from her personal email address.”
    Hofmann points out that private chat services like WhatsApp are often used for business communications, with confidential documents frequently being shared via such applications.
    In Hofmann’s experience, file sharing has quickly become a common source of cyber security incidents. “It is posing a unique risk to organisations as they commonly don’t have any control over the security of personal or external networks,” he says.
    Education holds a significant role in the creation of a robust and resilient cyber security ecosystem. Hofmann believes that by implementing a more comprehensive and inclusive level of cyber security training, remote employees will be more aware of the current threat landscape and how their actions may put the organisation at risk of a breach.
    “Tackling the cyber security knowledge gap among employees is essential to the creation of a robust security system,” he says. “However, increased education isn’t enough. Better awareness needs to be backed up with a security solution that includes robust email security functionality for prevention, as well backup capabilities for recovery.”
    Another report, Forrester Wave: Security awareness and training solutions, Q1 2022, also reported a change in training providers’ approach to IT security training and awareness. With employees operating remotely or physically, security awareness is now borderless. The analyst firm recommended that IT security leaders instil a “security everywhere” culture across their organisation.
    The Forrester report found that many IT security training providers have risen to the challenge, creating what its authors describe as “solutions that no longer function solely to train people for the sake of it”. According to the report, behaviour and culture change became a reality in the IT security training market. This, it noted, is a far cry from 2020’s market, which was full of legacy providers that were out of date and out of touch with users.
    While preparing the report, Forrester found the conversations its analysts had with training providers were “full of vendors paying lip service to awareness, behaviour and culture change”. The analysts reported that many had a limited vision of how to change behaviour or instil a culture, and quickly reverted to describing their content and quizzes as ways to measure employee engagement and behaviour.
    To achieve an improvement in awareness, behaviour and culture change, Forrester urges chief information security officers (CISOs) to make reducing human risk their goal. “Look for vendors that offer human risk quantification and calculate risk based on actual user behaviour, not quiz and simulation scores,” the report noted.
    Forrester warned that traditional metrics like training completion rates, quiz performance and engagement metrics are fundamentally flawed: “At best, these input metrics only tell you how to improve training, ignoring how you can improve behaviour, instil culture, or bolster your cyber security posture.”
    Choose suppliers that can help measure your employees’ human risk score. Once you know the risk profile of an individual or department, you can adjust your training and gain valuable insights about where to improve your security programme.
    When looking at how best to improve cyber security training and education, the authors of Gartner’s Market guide for security awareness computer-based training urged CISOs to avoid limiting security awareness to phishing simulation and computer-based training. The report found that the leading training platforms augment the execution of a multichannel, context-specific and employee-centric approach to educate employees and change behaviours.
    According to Gartner, the success of security awareness programmes depends on having clearly defined objectives, sustained executive sponsorship and collective organisation-wide involvement. Gartner’s research found that IT security training providers are increasingly using scoring methodologies with the intent of helping organisations quantify the human risk element and deliver more personalised security awareness programme content.
    There is also growing interest in managed service providers of security awareness training, which assist organisations in orchestrating many elements of training in the absence of employees dedicated to security awareness programmes.
    Finally, looking at some of the new technologies appearing in cyber security training platforms, Gartner’s Candrick says behavioural science is an emerging area of training. This starts the training from a psychology and academic perspective rather than starting with security. It uses techniques like “nudge theory” and behavioural economics to improve employees’ cyber security awareness.
    Candrick says automation can be combined with monitoring tools to train users dynamically when they try to do something that breaches the corporate security policy. What is clear from the research, and the experts Computer Weekly spoke to, is there is a gap in existing cyber security training that ignores the changes in working practices that have occurred over the past few years.
    Nudge theory may seem novel, and the style of cyber security integration Gartner’s Candrick describes could be deemed too intrusive. Nevertheless, these may offer CISOs a way forward in cyber security training to equip employees with the best set of security skills for hybrid work patterns.
    Technology products remain a mixed inflationary bag as server prices increase, storage costs decline and equipment delivery lead …
    In its pursuit of big tech companies, the FTC theorizes their dominance is based on acquisition of nascent companies — a theory …
    Two upcoming Supreme Court cases could significantly change how Section 230, which protects social media platforms from liability…
    A new report from Google’s Threat Analysis Group shed light on Russia’s efforts to conduct malicious cyber campaigns not only …
    Despite being off limits for some hackers, hospitals continue to be lucrative targets for ransomware groups because of their …
    A new report from Cyber Security Works shows that 76% of all ransomware-associated vulnerabilities tracked in 2022 were old flaws…
    Cisco Viptela SD-WAN integration with Cisco+ Secure Connect brings cloud-based security to remote workers and easier …
    Extreme Networks extends its SD-WAN network fabric to the edge to unify wired, wireless and WAN networking for simpler network …
    Hybrid access as a service from a startup helped a global company secure optimized connectivity over home broadband connections. …
    IBM lost its title as patent king to Samsung, which had more than 8,500 patents approved in 2022. One reason cited is IBM’s …
    Organizations stand to benefit from the compute power of quantum computing as it develops. The tech has potential uses in supply …
    When organizations go green in their data center, they will have to measure the facility’s efficiency and environmental impact. …
    Enterprise Strategy Group research shows organizations are struggling with real-time data insights. A single source of truth can …
    The vendor is the creator and lead sponsor of the open source InfluxDB database and plans to use the new funding to further …
    Organizations are using cloud technologies and DataOps to access real-time data insights and decision-making in 2023, according …
    All Rights Reserved, Copyright 2000 – 2023, TechTarget

    Privacy Policy
    Cookie Preferences
    Do Not Sell or Share My Personal Information

    source

  • The Majority of Business Cyber Security Decisions are Made … – Mandiant

    Mandiant is now part of Google Cloud. Learn More.
    Explore our multi-vendor XDR platform, delivering Mandiant products and integrating with a range of leading security operations technology.
    Explore the platformarrow_forward
    Solve your toughest cyber security challenges with combinations of products and services.
    Mitigate threats, reduce risk, and get back to business with the help of leading experts.
    Learn morearrow_forward
    View all services (47)arrow_forward
    Mandiant specializes in cyber threat intelligence, offering products, services, and more to support our mission to defend against cyber crime.
    Get the latest insights from cyber security experts at the frontlines of threat intelligence and incident response
    M-Trends 2022 reportarrow_forward
    mWISEarrow_forward
    Learn more about us and our mission to help organizations defend against cyber crime.
    Learn morearrow_forward
    Start for Free
     
    Global survey of cyber security decision makers finds that while nearly all respondents are satisfied with the quality of their threat intelligence, nearly half struggle with effectively applying it
    RESTON, Va., February 13, 2023Mandiant Inc. today unveiled the findings of its “Global Perspectives on Threat Intelligence” report, which provides new insight into how organizations navigate the increasingly complex threat landscape. The report is based on a global survey of 1,350 cyber security decision makers across 13 countries and 18 sectors – including financial services, healthcare and government. 
    Despite the widespread belief that understanding the cyber threat actors who could be targeting their organization is important, 79% of respondents stated that their organizations make the majority of cyber security decisions without insights into the threat actor that is targeting them. 
    While the report found that nearly all respondents (96%) were satisfied with the quality of threat intelligence their organization is using, respondents declared effectively applying that intelligence throughout the security organization to be one of their greatest challenges (47%). Further, almost all (98%) of those surveyed said they need to be faster at implementing changes to their cyber security strategy based on available threat intelligence. 
    According to the survey, 67% of cyber security decision makers believe senior leadership teams still underestimate the cyber threat posed to their organizations, while more than two-thirds (68%) agree their organization needs to improve its understanding of the threat landscape. 
    However, despite these concerns, security decision makers remain optimistic regarding the effectiveness of their cyber defenses. When asked about confidence in whether their organization is fully prepared to defend itself against different cyber security events, respondents felt most confident in tackling financially motivated threats, such as ransomware (91%), followed by those conducted by a hacktivist actor (89%) and nation-state actor (83%). When asked to rank which countries their organization would be unable to fully defend itself against, more than half of respondents (57%) said Russia, followed by China (53%), North Korea (52%) and Iran (44%).
    Further, just over half of respondents (53%) felt they could prove to their senior leadership team that their organization has a highly effective cyber security program. 
    Access the full “Global Perspectives on Threat Intelligence” report and analysis here: https://www.mandiant.com/global-perspectives-on-threat-intelligence
    Sandra Joyce, Vice President, Mandiant Intelligence at Google Cloud comments: “A conventional, check-the-box mindset isn’t enough to defend against today’s well-resourced and dynamic adversaries. Security teams are outwardly confident, but often struggle to keep pace with the rapidly changing threat landscape. They crave actionable information that can be applied throughout their organization.”
    Joyce continued, “As our ‘Global Perspectives on Threat Intelligence’ report demonstrates, security teams are concerned that senior leaders don’t fully grasp the nature of the threat. This means that critical cyber security decisions are being made without insights into the adversary and their tactics.”
    Commissioned by Mandiant, the “Global Perspectives on Threat Intelligence” survey was conducted by Vanson Bourne, a global market research firm, between August and September 2022. Feedback was obtained from 1,350 IT security decision makers across EMEA, North America and JAPAC at organizations with 1,000+ employees. 
    Mandiant is a recognized leader in dynamic cyber defense, threat intelligence and incident response services. By scaling decades of frontline experience, Mandiant helps organizations to be confident in their readiness to defend against and respond to cyber threats. Mandiant is now part of Google Cloud. 
    Google Cloud accelerates every organization’s ability to digitally transform its business. We deliver enterprise-grade solutions that leverage Google’s cutting-edge technology – all on the cleanest cloud in the industry. Customers in more than 200 countries and territories turn to Google Cloud as their trusted partner to enable growth and solve their most critical business problems.
    Mandiant-PR@google.com





    © Copyright 2023 Mandiant. All rights reserved.

    source

  • Global Cyber Security Market to Generate USD 657.02 billion by … – GlobeNewswire

    | Source: Next Move Strategy Consulting Next Move Strategy Consulting
    Newton, Connecticut, UNITED STATES
    New York, Jan. 30, 2023 (GLOBE NEWSWIRE) — According to a report published by Next Move Strategy Consulting, the global Cyber Security Market size generated USD 197.44 billion in 2021, and is projected to generate USD 657.02 billion by 2030, witnessing a CAGR of 12.8% from 2022 to 2030. The research offers a detailed analysis regarding drivers, restraints, and opportunities to highlight changing market dynamics of the industry. Moreover, the research provides an extensive analysis of major segments and their sub-segments to determine fastest-growing and highest revenue-generating segments.
    Equipping the extensive analysis of each and every aspect of the market in 326 pages, accompanied by 238 tables and 202 figures, the report aims to become a source of guidance for market players, investors, and startups as they device strategies for next few years to achieve sustainable growth. Moreover, the research outlines the COVID-19 analysis to highlight impact on the global cyber security market analysis.
    Request a free sample: https://www.nextmsc.com/cyber-security-market/request-sample
    The report offers a comprehensive analysis of the cyber security industry dynamics based on drivers, restraining factors, and opportunities. Malware including viruses and trojan horses has significantly increased the capacity of cybercrimes to infiltrate, take over, and damage entire electronic information networks, which in turn drive growth of the cyber security insurance. However, high cost and lack of cyber security experts restrains the market growth.
    Lead Analyst for ICT & Media at Next Move Strategy Consulting, stated “Introduction of blockchain technology along with AI is expected to create new opportunities for the market in the coming years.”
    Buy this report directly from here: https://www.nextmsc.com/report/cyber-security-market
    Need a customized report, get in touch with us here: https://www.nextmsc.com/contact
    North America accounted for the highest cyber security market share in 2021, and is expected to dominate the market, throughout the forecast period. This is attributed to factors such as increase in usage of cloud-based solutions by various industries including defence and healthcare, owing to technological advancements and high expenditure of governments, which drive the market growth. On the other hand, Asia pacific is estimated to grow steadily in cyber security market trends during the forecast period, due to growing external threats including malware activities and phishing from various neighboring countries.
    The cyber security market analysis offers an analysis of each region and its countries based on segments and their sub-segments to outline steps to be taken to consolidate presence in the cyber security industry. This analysis is also helpful in determining highest-revenue generating and fastest-growing segments and taking the next steps accordingly.
    If you have any queries, you can enquire before purchasing:  https://www.nextmsc.com/cyber-security-market/inquire-before-buying
    The report offers an extensive analysis of competitive landscape of the global cyber security industry. Some of the major market players in the manufacturing of cyber security industry are IBM, Cisco Systems Ltd., Norton Lifelock, Fortinet Inc., Check Point Software Technologies Ltd., Trend Micro, Amazon Web Services, Microsoft, Proofpoint Inc, Trellix and Palo Alto Networks.
    Also, Browse Related Reports:
    Cyber Insurance Market by Company Size (Small and Medium Enterprises & Large Enterprises), by Industry Vertical (Healthcare, Retail, Financial Services (BFSI), Information Technology and Services, and Others) – Global Opportunity Analysis and Industry Forecast, 2020 – 2030.
    Healthcare Cyber Security Market by Type (Identity and Access Management, Risk and Compliance Management, Antivirus and Antimalware, Distributed Denial of Service (DDoS) Mitigation, Security Information and Event Management (SIEM), Intrusion Detection System/Intrusion Prevention System), by End User (Pharmaceutical and Biotechnology Companies, Insurance Agencies, Medical Devices Companies, Hospitals)
    About Us:
    Next Move Strategy Consulting is a premier market research and management consulting firm that has been committed to provide strategically analyzed well documented latest research reports to its clients. The research industry is flooded with many firms to choose from, what makes Next Move different from the rest is its top-quality research and the obsession of turning data into knowledge by dissecting every bit of it and providing fact-based research recommendation that is supported by information collected from over 500 million websites, paid databases, industry journals and one on one consultations with industry experts across a diverse range of industry sectors. The high-quality customized research reports with actionable insights and excellent end-to-end customer service help our clients to take critical business decisions that enable them to move beyond time and have competitive edge in the industry.
    We have been servicing over 1,000 customers globally that includes 90% of the Fortune 500 companies over a decade. Our analysts are constantly tracking various high growth markets and identifying hidden opportunities in each sector or the industry. We provide one of the industry’s best quality syndicate as well as custom research reports across 10 different industry verticals. We are committed to deliver high quality research solutions in accordance to your business needs. Our industry standard delivery solutions that range from the pre consultation to after-sales services, provide an excellent client experience and ensure right strategic decision making for businesses.

    source

  • IOTW: LastPass facing class action lawsuit following data breach | Cyber Security Hub – Cyber Security Hub

    An anonymous plaintiff has filed a class action lawsuit against password management company LastPass after the company suffered two data breaches within four months in 2022.
    The suit, which was filed by an anonymous plaintiff referred to as ‘John Doe’ with the United States District Court of Massachusetts, alleges that LastPass failed to “exercise reasonable care in securing and safeguarding highly sensitive consumer data”.
    The lawsuit also alleges that bad actors could “wreak financial havoc on the lives of LastPass users” affected by the breach. The plaintiff has accused LastPass of “likely stor[ing]” the master passwords of users – the sole way of unlocking users’ password vaults and accessing their login information – meaning users’ passwords would have been accessed during the breach. This would allow malicious parties access to any number of users’ accounts, including those that store banking or payment information. However, according to LastPass, “master password[s] [are] never known to LastPass and [are] not stored or maintained by LastPass”, meaning they could not have been accessed in the breaches.
    The lawsuit goes on to accuse LastPass of “failing to invest in adequate data security measures that would protect Plaintiff and the Class from the unauthorized access to, and copying of, their private information”, meaning that those affected by the breach are at an “especially high risk of ransom threats and blackmail attempts” due to the information exposed. This information includes company names, end-user names, billing addresses, email addresses, telephone numbers and the IP addresses used to access LastPass services. 
    It also states that the personal data of victims is “no longer hidden but is, instead, in the hands of cybercriminals who have already fraudulently misused such data”. The evidence for this is stated to be that in November 2022, Doe had around US$53,000 worth of Bitcoin stolen from his blockchain wallet, allegedly via the use of private keys he had stored using LastPass.
    The lawsuit goes on to allege that Doe has “never knowingly transmitted unencrypted sensitive personally identifiable information or information that is otherwise confidential over any unsecured source” and is “thoroughly diligent” with securing his personal information. For this reason, the only way his Bitcoin could have been stolen is if malicious parties gained access to his master password and therefore the private keys for his Bitcoin vault.
    LastPass maintained, however, that it would be “extremely difficult to attempt to brute force master passwords” due to the hashing and encryption methods used to protect customers. The company also noted that it would take “millions of years to guess [a] master password using generally-available password-cracking technology” if customers followed its best-practice guidelines for creating master passwords.
    The password management company also stated that “sensitive vault data, such as usernames and passwords, secure notes, attachments and form-fill fields” had remained safely encrypted due to LastPass’ zero knowledge architecture.
    In August and November 2022, LastPass suffered two connected data breaches that resulted in confidential customer information to be compromised.
    The August breach saw a malicious actor steal source code and technical information from LastPass’ development environment that was then used to target an employee. This allowed the hacker to gain access to credentials and keys, which they then used to access LastPass’ third-party cloud storage service in November 2022. Using the keys, the malicious party was able to decrypt some storage volumes within the storage service.
    After the information was decrypted, the hacker accessed and copied information stored on a cloud backup that included “basic customer account information and related metadata”. The number of customers affected has not yet been shared.
    LastPass explained that the hacker was also able to “copy a backup of customer vault data from the encrypted storage container which is stored in a proprietary binary format that contains both unencrypted data, such as website URLs”, as well as “fully-encrypted sensitive fields such as website usernames and passwords, secure notes and form-filled data”.
    The password management company reassured its customers about the safety of their encrypted data, noting that all encrypted files remain “secured with 256-bit AES encryption”, meaning they need a unique encryption key derived from each user’s password to decrypt it. As LastPass does not know, store or maintain user master passwords, this reduces the chance of compromise.  
    Despite this, LastPass still warned its customers to be wary of social engineering or phishing attacks in the wake of the attack. 
    The cyber attack has reportedly affected NATOs response to the recent earthquakes affecting Syria an…
    Two separate lawsuits have been filed against the company for allegedly failing to protect customer…
    This marks the second social engineering attack the company has suffered in less than a year
    This data breach marks the second cyber attack the company has suffered this year, both allegedly by…
    Malicious actors have been posing as the band in an attempt to defraud fans by selling fake Metallic…
    Reach Cyber Security professionals through cost-effective marketing opportunities to deliver your message, position yourself as a thought leader, and introduce new products, techniques and strategies to the market.
    Join CSHUB today and interact with a vibrant network of professionals, keeping up to date with the industry by accessing our wealth of articles, videos, live conferences and more.
    Cyber Security Hub, a division of IQPC

    Careers With IQPC| Contact Us | About Us | Cookie Policy
    Become a Member today!

    We respect your privacy, by clicking ‘Subscribe’ you will receive our e-newsletter, including information on Podcasts, Webinars, event discounts, online learning opportunities and agree to our User Agreement. You have the right to object. For further information on how we process and monitor your personal data click here. You can unsubscribe at any time.

    source

  • IOTW: Over 77,000 Uber employee details leaked in data breach | Cyber Security Hub – Cyber Security Hub

    Rideshare company Uber has suffered a data breach after Teqtivity, a software company which provides asset management and tracking service for Uber, was targeted in a cyber attack.  
    The malicious party responsible for the breach posted confidential company information they claimed to have stolen in the breach to hacking forum BreachForums under the pseudonym ‘UberLeaks’.
    According to cyber security news site BleepingComputer, the leaked information includes “source code, IT asset management reports, data destruction reports, Windows domain login names and email addresses and other corporate information” as well as the “email addresses and Windows Active Directory information for over 77,000 Uber employees”. No user information was accessed or shared as a result of the breach.
    In a statement to BleepingComputer, an Uber spokesperson said that the leaked files are “related to an incident at a third-party vendor” and are “unrelated” to a cyber security incident the company suffered in September 2022. The spokesperson said that based on a review of the information leaked on BreachForums, the code is “not owned by Uber”, but affirmed that the company is “continuing to look into this matter”.
    This was corroborated by Teqtivity who said in a statement that the information was “compromised due to unauthorized access to [its] systems by a malicious third party”, who “was able to gain access to [the] Teqtivity AWS backup server that housed Teqtivity code and data files related to Teqtivity customers” including Uber.
    UberLeaks posted four separate batches of data to Breach Forums, which they alleged contained source code information for mobile device management (MDM) platforms linked to Uber. The alleged source code was for the MDM platforms for Uber, Uber Eats  as well as its third-party vendor services, namely IT asset management company Teqtivity and travel, corporate card and expense management platform TripActions.  
    Uber has since denied that the hackers gained any access to the company’s internal systems. Likewise, TripActions told BleepingComputer that “no TripActions data was exposed…nor were TripActions’ customers impacted as part of this security incident” as “TripActions does not maintain an MDM”.
    In the posts on BreachedForums, UberLeaks alleged that those responsible for the breach belonged to hacking gang Lapsus$, who orchestrated a hack into Uber’s internal systems in September. Uber has denied this allegation.
    Lapsus$ is a malicious hacking group that has been classified as DEV-0537 by Microsoft. The group is known for gaining access to companies by targeting employees with social engineering attacks.  
    According to Microsoft, Lapsus$ frequently “announc[e] their attacks on social media or advertis[e] their intent to buy credentials from employees of target organizations”.
    Lapsus$ have been linked to a number of high-profile hacking cases, including one in March 2022 where the group hacked both Okta and Microsoft within a week. In both cases, companies’ internal servers were accessed through the compromise of a single employee’s account.
    On September 15, 2022, a hacker used a compromised Uber EXT account to access the company’s internal systems after an employee’s personal device became infected with malware and their login credentials posted to the dark web.
    According to the rideshare company, the hacker then “accessed several other employee accounts which ultimately gave the attacker elevated permissions to a number of tools, including G-Suite and Slack”, then “posted a message to a company-wide Slack channel…and reconfigured Uber’s OpenDNS to display a graphic image to employees on some internal sites”.
    The hack was linked to the Lapsus$ hacking group by Uber, as the group “typically uses similar techniques to target technology companies” and suggested that the group were responsible for a hack into video game company Rockstar Games that occurred just days later on September 19.
    Uber previously came under fire for covering up a data breach that occurred in November 2016 that exposed the data of 57 million employees and users. 
    The data exposed included the full names, email addresses, telephone and driver’s license numbers for customers and drivers alike. It was accessed after hackers used stolen credentials to obtain an access key from a source code repository. This then allowed the malicious actors to gain access to the personal information.
    The company admitted to covering up the breach in July 2022 as part of a non-prosecution agreement with the US Department of Justice and Uber paid US$148,000 to settle a civil litigation.
    Additionally, former cyber security officer (CSO) of Uber, Joe Sullivan was convicted on October 5, 2022, of obstruction of proceedings of the Federal Trade Commission (FTC) and misprision of felony in connection with attempting to cover up the hack.
    Sullivan was charged after failing to alert the FTC of the data breach while Uber was under investigation by the commission in relation to a breach in November 2014. The breach saw the details of 50,000 customers leaked online.
    Sullivan was alerted to the existence of the data breach on November 14, 2016, after being directly contacted by the hackers responsible. Following contact with the hackers, Sullivan attempted to pay them $100,000 to sign a non-disclosure agreement which, according to the DOJ, “contained the false representation that the hackers did not take or store any data”, and eventually paid them the sum in Bitcoin in December 2016, despite not knowing their true identities.
    In January 2017, Uber discovered their identities and the hackers signed a new version of the original non-disclosure agreement which contained their true names. Both hackers were prosecuted and pleaded guilty in October 2019 to charges of computer fraud conspiracy.
    Evidence showed that Sullivan did not disclose any information about the cyber security incident to Uber’s lawyers who were handling the investigation, nor to the General Counsel of Uber. The initial investigation was settled in summer of 2016, without Sullivan mentioning the breach.
    In 2017, Uber began investigating the 2016 breach and revealed it both to the FTC and the general public. During the investigation, Sullivan falsely told the new CEO of Uber, Dara Khosrowshahi, that the hackers were only paid after their identities were revealed. He also deleted information from a draft of a report on the breach that involved the exposure of a large amount of personal information of many Uber customers.  
    At the trial in 2022, the jury found Sullivan guilty of obstruction of justice and misprision of felony. He faces a maximum of five years in prison for obstruction and a maximum of three years for misprision. He remains free on bond and will be sentenced at a later date, yet to be set. 
    The cyber attack has reportedly affected NATOs response to the recent earthquakes affecting Syria an…
    Two separate lawsuits have been filed against the company for allegedly failing to protect customer…
    This marks the second social engineering attack the company has suffered in less than a year
    The lawsuit alleges that LastPass stored crucial information that allowed hackers access to victims’…
    Malicious actors have been posing as the band in an attempt to defraud fans by selling fake Metallic…
    Reach Cyber Security professionals through cost-effective marketing opportunities to deliver your message, position yourself as a thought leader, and introduce new products, techniques and strategies to the market.
    Join CSHUB today and interact with a vibrant network of professionals, keeping up to date with the industry by accessing our wealth of articles, videos, live conferences and more.
    Cyber Security Hub, a division of IQPC

    Careers With IQPC| Contact Us | About Us | Cookie Policy
    Become a Member today!

    We respect your privacy, by clicking ‘Subscribe’ you will receive our e-newsletter, including information on Podcasts, Webinars, event discounts, online learning opportunities and agree to our User Agreement. You have the right to object. For further information on how we process and monitor your personal data click here. You can unsubscribe at any time.

    source

  • Revolut data breach exposes information for more than 50,000 customers | Cyber Security Hub – Cyber Security Hub

    Fintech start-up Revolut has confirmed the personal information of more than 50,000 users was accessed during a data breach.
    The breach, which took place on September 11, involved a third party gaining access to Revolut’s database and the personal information of 50,150 users.
    The State Data Protection Inspectorate in Lithuania, where Revolut has a banking license, explained in a statement that the breach was due to a social engineering attack. It went on to say that the data accessed includes names, addresses, email addresses and partial payment card information, although Revolut has stated that card details were masked.
    Revolut is currently investigating the attack and is communicating with those customers whose data was accessed during the breach. The Lithuanian government said that Revolut had taken “prompt action to eliminate the attacker’s access to the company’s customer data and stop the incident” once it was discovered.
    News of the hack has made it onto Reddit. One user, who claimed to have been affected by the incident, shared details of an email they received from the fintech, which stated the “isolated incident” saw Revolut take “immediate action to properly manage…and protect [its] customers”. 
    The email also reassured its recipient that their data, money and account were all safe and further advised them to be “especially vigilant for any suspicious activity, including suspicious emails, phone calls or messages”.
    In comments on the post, however, another Reddit user criticized Revolut for only emailing its affected customers rather than making a public statement. Others criticized the non-specific language used in the email, saying that they “just want to know what data was leaked”. 
    February 21 – 22, 2023
    Free CS Hub Online Event
    22 February, 2023
    Online
    01 March, 2023
    Online
    08 – 09 March 2023
    Free CS Hub Online Event
    08 March, 2023
    Online
    15 March, 2023
    Online
    Insights from the world’s foremost thought leaders delivered to your inbox.
    2023-04-12
    10:00 AM – 11:00 AM EST
    2023-03-15
    10:00 AM – 11:00 AM EST
    2023-03-15
    10:00 AM – 11:00 AM SGT
    Reach Cyber Security professionals through cost-effective marketing opportunities to deliver your message, position yourself as a thought leader, and introduce new products, techniques and strategies to the market.
    Join CSHUB today and interact with a vibrant network of professionals, keeping up to date with the industry by accessing our wealth of articles, videos, live conferences and more.
    Cyber Security Hub, a division of IQPC

    Careers With IQPC| Contact Us | About Us | Cookie Policy
    Become a Member today!

    We respect your privacy, by clicking ‘Subscribe’ you will receive our e-newsletter, including information on Podcasts, Webinars, event discounts, online learning opportunities and agree to our User Agreement. You have the right to object. For further information on how we process and monitor your personal data click here. You can unsubscribe at any time.

    source

  • CISA Releases Report for K-12 Schools to Help Address Evolving … – CISA

    An official website of the United States government
    US-CERT Report Cyber Issues Subscribe
    Report and Corresponding Toolkit Provides Simple and Prioritized Recommendations for the K-12 Community 
     
    WASHINGTON – Today, the Cybersecurity and Infrastructure Security Agency (CISA) released its report and toolkit for K-12 institutions to help them better protect against cybersecurity threats. The report, “Partnering to Safeguard K-12 Organizations from Cybersecurity Threats,” provides recommendations and resources to help K-12 schools and school districts address systemic cybersecurity risk. It also provides insight into the current threat landscape specific to the K-12 community and offers simple steps school leaders can take to strengthen their cybersecurity efforts.

    The report’s findings highlight the importance of resources, simplicity and prioritization to effectively reduce cybersecurity risk. To address these issues, CISA provides three recommendations in the report to help K-12 leaders build, operate, and maintain resilient cybersecurity programs: 
    “We must ensure that our K-12 schools are better prepared to confront a complex threat environment,” said CISA Director Jen Easterly. “As K-12 institutions employ technology to make education more accessible and effective, malicious cyber actors are hard at work trying to exploit vulnerabilities in these systems, threatening our nation’s ability to educate our children. Today’s report serves as an initial step towards a stronger and more secure cyber future for our nation’s schools, with a focus on simple, prioritized actions schools can take to measurably reduce cyber risk.”

    The release of today’s report serves as an initial step towards a stronger and more secure cyber future for our nation’s schools. CISA continues to engage with federal partners, including the U.S. Department of Education, and work closely with stakeholders to identify opportunities for progress and provide meaningful support that measurably reduces risk. 

    Along with the report, we are providing an online toolkit which aligns resources and materials to each of CISA’s three recommendations along with guidance on how stakeholders can implement each recommendation based on their current needs. To read the full report and to access the toolkit, visit here.
     
    About CISA 
    As the nation’s cyber defense agency and national coordinator for critical infrastructure security, the Cybersecurity and Infrastructure Security Agency leads the national effort to understand, manage, and reduce risk to the digital and physical infrastructure Americans rely on every hour of every day.
    Visit CISA.gov for more information and follow us on TwitterFacebookLinkedIn, Instagram
    Need CISA’s help but don’t know where to start? Contact the CISA Service desk.

    source