January 2020 AccumeView: Executive Cybersecurity Pulse Newsletter
With tension rising between Iran and the United States, cyber warfare is on the rise. Many government agencies are releasing statements advising company’s and governments to stay protected and aware of potential threats. This past week we have seen pro Iran targets deface government websites and launch multiple attacks. Some of these are effecting entire cities and states. Both the state of Texas and the city of Las Vegas were targets for cyber attacks that believe to either be initiated by Iran or Pro Iran attackers. Thankfully, some of these attacks have been prevented but it is expected that these attacks will continue to rise in numbers. Texas Governor Greg Abbott warned Texans to be vigilant regarding cyberterrorism from Iran. The Texas Department of Information Resources released a statement advising that as many as 10,000 attempted attacks per minute from Iran had been detected over the past 48 hours on state agency networks. This number is especially startling when considering the normal occurrence of these attacks, about 420.Download
September 2019 AccumeView: Executive Cybersecurity Pulse Newsletter
This month we have seen mobile and smart devices become a key topic of discussion. With the Chinese company Tencent exposing flaws in the Qualcomm chipsets found in most android devices today, we must remember to stay vigilant in monitoring who and what our devices are connected to. The QualPwn bugs flaws, as they are known collectively, allow hackers to compromise these devices remotely by sending malicious packets over-the-air with no user interaction required.Download
May 2019 AccumeView: Executive Cybersecurity Pulse Newsletter
April 2019 AccumeView: Executive Cybersecurity Pulse Newsletter
Computer hardware manufacturer ASUS was the victim of a sophisticated attack that left backdoor malware embedded in their update software. The researchers estimate half a million Windows machines received the malicious backdoor through the ASUS update server, although the attackers appear to have been targeting only about 600 of those systems. The malware searched for targeted systems through their unique MAC addresses, reached out to a command-and-control server the attackers operated, and installed additional malware on those machines. Supply-chain attacks are starting to grow in number and complexity – make sure that you have a plan to address them.
A recent survey of the 22,000 new vulnerabilities that were discovered in 2018 indicates that 1/3 have public exploits and 50% can be exploited remotely. Ensure that you have total visibility into all of your endpoints and that they are patched and up to date.
March AccumeView: Executive Cybersecurity Pulse Newsletter
California is proposing an update to their data breach notification law. When California State Bill 1386 went into effect in 2003, it was country’s first data breach notification legislation. California’s data breach notification rules continue to be among the strongest in the U.S. New changes proposed will include notification if passport numbers were exposed as well as government-issued identification numbers and biometric data. The bill would update California state’s definition of personal information as constituting “an individual’s first name or first initial and last name” in combination with any of the following, when either the name or these data elements have not been encrypted.Download
February AccumeView: Executive Cybersecurity Pulse Newsletter
Perspective: Time for a Better Mouse Trap
If your institution uses Microsoft Exchange 2013 or newer, be aware that there is a new vulnerability that requires attention. Hackers have been able to leverage an NTLM authentication function to perform relay attacks using the Exchange Web Services (EWS) interface. A successful attack could gain domain user administrator privileges. There is NO PATCH, but Microsoft does have some work-arounds.Download
January AccumeView: Executive Cybersecurity Pulse Newsletter
Automation is constantly evolving, and recent advancements in attack tools and methods are demonstrating that malicious automation can be expected to have significant ramifications. Researchers have proven that automated tools can successfully predict a user’s new password based on analyzing older stolen passwords, which makes the probability of a data breach infinitely higher. A recent test had a malicious bot infiltrate a network, scan all systems and exfiltrate all of the available data within 15 seconds. There is a good chance that 2019 will be the year that these types of attacks become real. Make sure that your protections are in place.Download
December Accumeview: Executive Cybersecurity Pulse Newsletter
At least eight Eastern European banks were hacked using rogue devices planted inside the network. These devices included cheap laptops, homemade network appliances and usb “Bash Bunnies” to intercept data and provide remote access. Most institutions are not capable of detecting rogue devices and specialized tools such as the bash bunnies, which are usb devices are designed to emulate trusted USB devices so that they can bypass USB port restrictions that many companies use. Once installed, they discretely exfiltrate documents, Install backdoors and perform a variety of exploits.Download
October AccumeView: Executive Cybersecurity Pulse Newsletter
What is Threat Intelligence?
Threat Intelligence is a commonly misunderstood security term. In general terms, it is information gathered from internal and external sources that is used to inform the organization about risks to their information systems and business operations. Information is gathered from external sources such as new articles, vendor and security organization alerts and reports from your SEIM. Information gathered from these sources are analyzed for content and possible risks, determining what actions, if any need to be taken by the institution and its users.Download
September AccumeView: Executive Cybersecurity Pulse
India’s Cosmos Bank was hit with a coordinated attack using cloned ATM cards and an attack against the SWIFT system. Of note, the attack involved money mules in 28 different countries and 15,000 transactions over a seven-hour window of opportunity. The SWIFT transaction involved moving $1.93m to an account at a bank in Hong Kong. While analysis is still underway, a group linked to North Korea is the current suspect.Download
To AccumeView: Executive Cybersecurity Pulse