background preloader

Cyber Security

Facebook Twitter

Windows has a new wormable vulnerability, and there’s no patch in sight. Word leaked out on Tuesday of a new vulnerability in recent versions of Windows that has the potential to unleash the kind of self-replicating attacks that allowed the WannaCry and NotPetya worms to cripple business networks around the world.

Windows has a new wormable vulnerability, and there’s no patch in sight

The vulnerability exists in version 3.1.1 of the Server Message Block 3.1.1 that’s used to share files, printers, and other resources on local networks and over the Internet. Attackers who successfully exploit the flaw can execute code of their choice on both servers and end-user computers that use the vulnerable protocol, Microsoft said in this bare-bones advisory. The flaw, which is tracked as CVE-2020-0796, affects Windows 10 and Windows Server 2019, which are relatively new releases that Microsoft has invested huge amounts of resources hardening against precisely these types of attacks. Check Point chap: Small firms don't invest in infosec then hope they won't ge... Interview "I don't want to have a job any more," said Check Point's Dan Wiley, sitting in a fashionably nondescript London coffee shop.

Check Point chap: Small firms don't invest in infosec then hope they won't ge...

"I don't want to have to do my job. It means that we failed. " Far from being depressed, Wiley was expressing the forlorn hope that infosec as a field would be less dominated by malicious persons trying to make a fast buck by scamming honest folk and businesses out of their hard-earned money. As Check Point's incident response head honcho, Wiley has full visibility into what the infosec company's operations involve.

Increasingly, he said, it's turning into staving off more of the same attacks against Check Point's customers. "Same attacks as 2019," he said, referring to what he's seen so far this year, "but the volume and the aggressiveness is increasing.

Mainframe Security Companies

Most Companies Overestimate Their Cybersecurity, but Resilience Is Possible. Few executives need to be told that cybersecurity is a critical issue, one that is central to protecting an organization’s assets and reputation.

Most Companies Overestimate Their Cybersecurity, but Resilience Is Possible

Companies are spending more than ever to learn where they are vulnerable, to deploy the latest security solutions and to hire the talent necessary for a strong cyber defense. Are Cybercriminals Winning the Mainframe Security Cat-and-Mouse Game? Just as mainframes are seeing a resurgence in usage, a recent poll revealed that multiple factors are converging to make it harder to secure the mission-critical data they contain and, increasingly, share with cloud-based systems and applications.

Are Cybercriminals Winning the Mainframe Security Cat-and-Mouse Game?

Respondents cited new types of attacks as a top challenge and indicated that simple security measures are not yet widely adopted. Chronicle Releases Chapter One: Backstory. Google spin-off Alphabet rolls out a new cloud-based security data platform that ultimately could displace some security tools in organizations.

Chronicle Releases Chapter One: Backstory

RSA CONFERENCE 2019 – San Francisco – Chronicle, the division that spun out of Alphabet's X, rocked the cybersecurity industry today with a new security data platform that ultimately could whittle down the number of security tools organizations run today to monitor and manage incidents. The new Backstory cloud-based service works with Chronicle's VirusTotal malware intelligence platform and lets organizations view previous security data over time and more quickly spot and pinpoint details on malicious activity.

"It gives security teams insight into what's happening in the enterprise right now, with the same level of visibility into what happened yesterday, a month ago, even a year ago," for example, Stephen Gillett, Chronicle's CEO and co-founder said today in a media event for the rollout. The SOC Gets a Makeover. The 11 Best Cyber Security Books — Recommendations from the Experts - Hashed Out by The SSL Store™ We asked cybersecurity pros for their favorite cybersecurity books — here’s what they recommend Criminals.

The 11 Best Cyber Security Books — Recommendations from the Experts - Hashed Out by The SSL Store™

Mystery. Danger. Money. #Privacy: Mainframe shops prefer single authentication, survey finds - PrivSec Report. 15 Cybersecurity Conferences in 2020 You Won't Want to Miss. As we look toward a new decade of cyberthreats, it’s clear that ongoing education isn’t optional for security professionals — it’s mandatory.

15 Cybersecurity Conferences in 2020 You Won't Want to Miss

In a recent Fortinet survey, chief information security officers (CISOs) cited a need for learning and development among security teams, including greater awareness of threats and tactics to respond to the latest risks. The top cybersecurity conferences in 2020 offer unique opportunities for security professionals to learn directly from industry experts, researchers and their peers. Mitigating mainframe cyber blind spots through IT modernization. Twice now the Government Accountability Office has reviewed agency systems and found they are old.

Mitigating mainframe cyber blind spots through IT modernization

Maybe old isn’t the best description. Maybe it’s better to say ancient. Or maybe it’s better to say decades since they were installed. Auditors say it’s not the age these systems that’s the biggest concern as many have been upgraded with new hardware or expanded with more modern software. GAO says these older systems that are no longer supported by vendors creating critical cybersecurity problems. Syncsort Survey Finds Disconnect Between Confidence in IT Security Programs and Data Breaches. PEARL RIVER, N.Y.

Syncsort Survey Finds Disconnect Between Confidence in IT Security Programs and Data Breaches

--(BUSINESS WIRE)--Syncsort, the global leader in Big Iron to Big Data software, today announced results from a survey exploring companies’ top IT security investments and challenges. The Truth About Mainframe Security - And Where You Should Be Focusing. Have you ever noticed that technology is the only industry where the term “legacy” carries a negative connotation?

The Truth About Mainframe Security - And Where You Should Be Focusing

In recent months, so-called legacy systems – most notably the mainframe – have drawn much unwarranted ire, particularly in the government sector. Mainframe technologies are outdated, not compatible with modern security approaches and represent a major risk, critics argue. But the facts tell a different story. Mainframe security is top priority for 85% of IT pros yet few are adequately protecting their systems.

While 85 percent of companies say mainframe security is a top priority, just 33 percent always or often make mainframe decisions based on security. The “Don’t Let Mainframe Security Complacency Leave Your Critical Customer Data At Risk” study commissioned by Key Resources and conducted by Forrester Consulting, surveyed 225 IT management and security decision makers at North American companies with $500 million or more in annual revenue. “Despite widespread awareness concerning the stakes, enterprises simply aren’t devoting enough attention and resources to mainframe security,” said Ray Overby, president and co-founder of Key Resources Inc.

“All it takes is one mainframe data breach to bring an organization to its knees. But, many organizations lack the tools, personnel, and in some cases, knowledge, they need to protect their mainframes and all the mission-critical data they hold.” Cyber Threat Source Descriptions. Cyber threats to a control system refer to persons who attempt unauthorized access to a control system device and/or network using a data communications pathway. This access can be directed from within an organization by trusted users or from remote locations by unknown persons using the Internet. Threats to control systems can come from numerous sources, including hostile governments, terrorist groups, disgruntled employees, and malicious intruders. To protect against these threats, it is necessary to create a secure cyber-barrier around the Industrial Control System (ICS). Though other threats exist, including natural disasters, environmental, mechanical failure, and inadvertent actions of an authorized user, this discussion will focus on the deliberate threats mentioned above.

For the purpose of this discussion, deliberate threats will be categorized consistent with the remarks in the Statement for the Record to the Joint Economic Committee by Lawrence K. National Governments Hackers. Cyber Security Degrees & Careers. We Hacked the Gibson! Now what? - Philip Young (BSides Las Vegas 2014) (Hacking Illustrated Series InfoSec Tutorial Videos) We Hacked the Gibson! Now what? Philip Young IBM has been touting the security of the mainframe for over 30 years. So much so, that the cult of mainframers believes that the platform is impenetrable. Establishing a Quality Vulnerability Management Program without Wasting Time or Money - Zee Abdelnabi Converge 2016. To Catch a Penetration Tester: Top SIEM Use Cases - Ryan Voloch and Peter Giannoutsos Derbycon 2016.

Welcome to SecurityTube.net. Hacking Mainframes; Vulnerabilities in applications exposed over TN3270 - Dominic White Derbycon 2014. Mainframes - Mopeds and Mischief; A PenTesters Year in Review - Tyler Wrightson Derbycon 2014. Irongeek.com. How TJX Became a Lesson In Proper Security. The TJX security breach is threatening to rank as one of the most expensive lessons in corporate data security policies. With the retailer facing anywhere from $500 million to nearly $1 billion in expenses, not to mention a black eye with the public over how their credit card data is secured, this experience should serve as a lesson to other retail outlets on securing their networks. How well they are learning is the question.