1.Cybersecurity: 67 per cent organisations in India hit by ransomware last year: survey
Nearly a year after the first major ransomware attack crippled systems across the globe, problems due to malicious software affecting networks continued to be a major issue worldwide with 54 per cent of the organisations, which participated in a survey by cyber-security firm Sophos, hit in the past year and 31 per cent expecting to be victims of an attack in the future. In India, around 67 per cent of the surveyed entities were hit by ransomware last year.
“91 per cent Indian organisations claimed to running up-to-date endpoint protection when impacted by ransomware and 89 per cent India respondents stated that malware threats have got more complex over the last year,” as per the report. Globally, as per the survey, healthcare sector was most impacted by ransomware with 76 per cent of entities in the segment admitted to have been hit by the malicious software.
“The survey polled more than 2,700 IT decision makers across mid-sized businesses in 10 countries worldwide, including the US, Canada, Mexico, France, Germany, UK, Australia, Japan, South Africa and India. The survey concludes that despite the intensity and magnitude of attacks, Indian businesses are still not prepared to defend itself against determined attackers,” Sophos said in a statement.
2.Chinese cyber spy group targeting US engineering, maritime firms: Report
There has been a surge in cyber-attacks on the US engineering and maritime industries -- especially those connected to the South China Sea -- and a Chinese cyber espionage group TEMP.Periscope is behind this, US-based cybersecurity firm FireEye said on Friday.
Since early 2018, FireEye has observed an ongoing wave of intrusions, suspected to be from TEMP.Periscope, targeting engineering and maritime entities, especially those connected to South China Sea issues.
Active since 2013, TEMP.Periscope has primarily focused on maritime-related targets across multiple verticals including engineering firms, shipping and transportation, manufacturing, defence, government offices and research universities, FireEye s
3.Microsoft patches 15 critical bugs in March 2018’s update
In all 21 browser-related fixes were rolled out by Microsoft, 14 of which are rated critical and the remaining seven ranked important. Of the bugs, “scripting engine memory corruption vulnerabilities” represented 14 of the flaws.
4.Best Cybersecurity Practices to secure organizations
There are countless examples of major organizations who have fallen victim to online hackers and devastating leaks of information. Some examples of these, alongside best practices for business cybersecurity are:
a).Keeping Passwords Secure: The first piece of cybersecurity advice for organizations is an obvious one. Make sure passwords are strong, secure, and fully encrypted. Strong Passwords should be:
Many online compromises could be avoided if everyone followed best practices for passwords.
b.)Using strong encryption techniques:
While most website content management systems will automatically encrypt passwords when new users sign up, there are a number of useful add-ons and tools out there to help.
Encrypting passwords means that instead of a user’s password being saved in the database as:
Unencrypted Password: ThIsIsMyPaSsWoRd1994
It should look like:
Encrypted Password: 2cf24dba5fb0a30e26e83b2ac5b9e29e1b161e5c1fa7425e73043362938b9824
This is considered a basic way to store passwords so every business should be ensuring their passwords are encrypted and secure in order to avoid losing important customer information like credit card details.
c ).Using DDOS Protection
DDOS stands for Distributed Denial-of-Service and it’s an attack carried out by thousands of different computers on a single website. Each computer keeps requesting a webpage over and over again which, through time, overloads the server and brings the website offline.
This is one way in which an online company, often of an e-commerce nature, can lose thousands, sometimes millions, of dollars by not being able to serve potential customers. This is why many large corporations hire legal teams from firms like Goodwin, in order to prosecute those behind such devastating attacks.
There are a multitude of different tools and services out there which help protect against DDOS attacks.For example a company which primarily specialises in e-commerce or provides their services online, it may be worth paying the much smaller price of a DDOS protection service rather than risking an attack.Two of the most common DDOS protection services out there are Cloudflare and Nginx which prevent any one IP address from requesting a page too often. Many large businesses which have suffered DDOS attacks in the past now use such services to ensure they do not suffer the same fate again.
d).Keeping All Software Up-To-Date
Regular software updates are simple actions for businesses to take, though many neglect to do so. This makes life easier for hackers and those who are looking for easy cybercrime targets.
Much like Windows or Mac OS systems, it’s imperative that business owners keep all of their software up-to-date. Many of these updates are improvements to security protocols so that the latest malicious viruses and known hacking exploits can no longer be taken advantage of. It only takes one click in many instances to keep your website, plugins, and add-ons where they should be, so it is worth doing.
e).Put Good Cybersecurity Practices in Place
After this basic look over some poor cybersecurity practices, and the steps suggested to improve those practices, can help businesses out there ensure that they are protected against malicious attacks and breaches.
Staying safe online as a business is generally very straightforward, it’s just about making sure the core tenets of good cybersecurity practice are followed consistently.
5.Cybersecurity trends to watch this year
a).Artifical Intelligence & Machine Learning (A.I. & M.L.)
Though still a developing technology, emerging A.I. and M.L. software have the capacity to learn from previous events as well as predict and deter cyber instances in real-time. In a global survey by cybersecurity company Webroot, approximately 99% of U.S. cybersecurity professionals said they believed A.I. overall could improve their organization’s cybersecurity. Consequently, expect to see more cybersecurity products touting their A.I. and M.A. capabilities.
Blockchain is making headways in a variety of realms, including cybersecurity. The technology enables online transactions to be conducted in a distributed, decentralized way using a public ledger. With respect to cybersecurity, the blockchain ledger can be used to recognize suspicious online behaviour, spotting cases of fraud and error in the act. Moreover, a company’s security system can use a distributed public key infrastructure to authenticate devices and users.
Ashortage of skilled cybersecurity professionals is exacerbating data security threats as well. In a survey published last November by Enterprise Strategy Group (ESG) and Information Systems Security Association (ISSA) consisting of 343 IT and information security professionals and ISSA members, 70% of respondents said a shortage in cybersecurity skills had an impact on their organization. More specifically, 31% of respondents cited a shortage of security analysis and investigation, 31% cited a shortage in application security, while 29% cited a lack of cloud computing security.
Ransomware attacks have become increasingly problematic over the past few years. The technology acts as a kind of malicious malware that encrypts a user’s files and prevents them from accessing their computer system. Hackers use ransomware to hold a user’s system hostage until they pay a ransom. A ransomware attack to receive significant coverage occurred last May when the malicious malware WannaCry impacted approximately 200,000 people across 150 countries. Among the most heavily hit countries included Russia, Taiwan, Ukraine and India. It is unsure to what extent organizations have learned from previous malware attacks. These sorts of threats can be significantly reduced by abiding by security protocols, such as regularly applying patches and updating systems.
e).IoT and botnets
The Internet has become one of the most powerful tools for many tasks, such as searching for information, communicating with friends and co-workers, shopping online, and managing your finances. In almost all of these cases the primary tool is the browser, such as Internet Explorer, Chrome or Mozilla Firefox. The browser is in many ways your gateway to the Internet. Tips for keeping the browser safe are as follows:
Cyber security is not just an issue at work, but also an issue for you at home. Children are most likely using computers and actively online. In general there are three types of dangers that children face when online; strangers, friends and themselves. Following explains each of these risks and how you can protect your children against them.
8.US blames Russia for cyber-attacks on energy firms
According to a security alert issued via the US Computer Emergency Readiness Team (US-Cert), Russian government cyber attackers tried to penetrate US critical infrastructure providers, including energy, nuclear, water, aviation and manufacturing firms, to gain information about IT management and industrial control systems.
The alert, issued by US Department of Homeland Security and the FBI, said the attacks included the use of spear phishing and malware to gain remote access into US energy sector networks, and it urged organisations in the energy sector to review their cyber security defence capabilities.
“Russia’s behaviour continues to trouble us and we are continuing to push back in meaningful ways,” a US senior national security official is quoted as saying. But some US officials reportedly said the sanctions do not go far enough in view of the scale of the Russian attack on the 2016 election. The founding director of US-Cert and security firm Tenable CEO, Amit Yoran, has called the alert “unprecedented and extraordinary” and a wake-up call for the industry at large.
9.Iran's Cyber Security Threat Increases
Cyber security researchers have warned that Iranian-based cyber warfare group TEMP.Zagros, aka MuddyWater, is conducting the massive phishing campaign currently attacking both Asia and the Middle East.This group have also significantly improved their technique, notably by using new backdoor entry tools, making them an even greater danger.
In a blog on Tuesday, FireEye researchers Sudeep Singh, Dileep Kumar Jallepalli, Yogesh Londhe and Ben Read wrote: “We observed attackers leveraging the latest code execution and persistence techniques to distribute malicious macro-based documents to individuals in Asia and the Middle East. In this campaign, the threat actor’s tactics, techniques and procedures shifted after about a month, as did their targets.”
Cyber warfare is a key part of the Iranian Regime overall malign military plan. The Regime knows that it has neither the military nor economic power to take on other countries, especially the US and Saudi Arabia who have been frequent victims of Iran’s attacks in the past, and so it uses cyber warfare to gain information on their enemies capabilities, by targeting defence systems, or hamper their access to relevant data about Iran.
Warning of a lurking cyber-attack threat to India's critical infrastructure, Home Minister Rajnath Singh today asked those in the power, rail and nuclear energy sectors to conduct regular cyber-security audits against potential sabotage bids.
Addressing CISF jawans and officers on the 49th raising day of the paramilitary force at its camp here, Singh said a cyber-security plan against such new age threats should not only be prepared but also strengthened from time to time.
|Remote Code Execution Vulnerability in Samba 3.5.0 Onwards.|
|Petya Ransomware Variant June 2017.|