April 2019 AccumeView: Executive Cybersecurity Pulse Newsletter
Computer hardware manufacturer ASUS was the victim of a sophisticated attack that left backdoor malware embedded in their update software. The researchers estimate half a million Windows machines received the malicious backdoor through the ASUS update server, although the attackers appear to have been targeting only about 600 of those systems. The malware searched for targeted systems through their unique MAC addresses, reached out to a command-and-control server the attackers operated, and installed additional malware on those machines. Supply-chain attacks are starting to grow in number and complexity – make sure that you have a plan to address them.
A recent survey of the 22,000 new vulnerabilities that were discovered in 2018 indicates that 1/3 have public exploits and 50% can be exploited remotely. Ensure that you have total visibility into all of your endpoints and that they are patched and up to date.
March AccumeView: Executive Cybersecurity Pulse Newsletter
California is proposing an update to their data breach notification law. When California State Bill 1386 went into effect in 2003, it was country’s first data breach notification legislation. California’s data breach notification rules continue to be among the strongest in the U.S. New changes proposed will include notification if passport numbers were exposed as well as government-issued identification numbers and biometric data. The bill would update California state’s definition of personal information as constituting “an individual’s first name or first initial and last name” in combination with any of the following, when either the name or these data elements have not been encrypted.Download
February AccumeView: Executive Cybersecurity Pulse Newsletter
Perspective: Time for a Better Mouse Trap
If your institution uses Microsoft Exchange 2013 or newer, be aware that there is a new vulnerability that requires attention. Hackers have been able to leverage an NTLM authentication function to perform relay attacks using the Exchange Web Services (EWS) interface. A successful attack could gain domain user administrator privileges. There is NO PATCH, but Microsoft does have some work-arounds.Download
January AccumeView: Executive Cybersecurity Pulse Newsletter
Automation is constantly evolving, and recent advancements in attack tools and methods are demonstrating that malicious automation can be expected to have significant ramifications. Researchers have proven that automated tools can successfully predict a user’s new password based on analyzing older stolen passwords, which makes the probability of a data breach infinitely higher. A recent test had a malicious bot infiltrate a network, scan all systems and exfiltrate all of the available data within 15 seconds. There is a good chance that 2019 will be the year that these types of attacks become real. Make sure that your protections are in place.Download
December Accumeview: Executive Cybersecurity Pulse Newsletter
At least eight Eastern European banks were hacked using rogue devices planted inside the network. These devices included cheap laptops, homemade network appliances and usb “Bash Bunnies” to intercept data and provide remote access. Most institutions are not capable of detecting rogue devices and specialized tools such as the bash bunnies, which are usb devices are designed to emulate trusted USB devices so that they can bypass USB port restrictions that many companies use. Once installed, they discretely exfiltrate documents, Install backdoors and perform a variety of exploits.Download
October AccumeView: Executive Cybersecurity Pulse Newsletter
What is Threat Intelligence?
Threat Intelligence is a commonly misunderstood security term. In general terms, it is information gathered from internal and external sources that is used to inform the organization about risks to their information systems and business operations. Information is gathered from external sources such as new articles, vendor and security organization alerts and reports from your SEIM. Information gathered from these sources are analyzed for content and possible risks, determining what actions, if any need to be taken by the institution and its users.Download
September AccumeView: Executive Cybersecurity Pulse
India’s Cosmos Bank was hit with a coordinated attack using cloned ATM cards and an attack against the SWIFT system. Of note, the attack involved money mules in 28 different countries and 15,000 transactions over a seven-hour window of opportunity. The SWIFT transaction involved moving $1.93m to an account at a bank in Hong Kong. While analysis is still underway, a group linked to North Korea is the current suspect.Download
July AccumeView: Executive Cybersecurity Pulse Newsletter
On June 28, 2018, California enacted the California Consumer Privacy Act of 2018 (CCPA), which provides what is arguably the most restrictive privacy law in the U.S. and would likely have some effect on most businesses across the country. The CCPA, which shares many common requirements as the new European Union General Data Protection Regulation (GDPR), will take effect on January 1, 2020. The time to prepare is now. Accume is developing a white paper on this topic, and developing solutions based on what we have learned through GDPR project implementations.Download
June AccumeView: Executive Cybersecurity Pulse Newsletter
In April, the Federal Financial Institutions Examination Council (FFIEC) published a joint statement on the potential role of cyber insurance in financial institutions’ risk management programs. It is important to note that the FFIEC pointed out that the statement does not contain any new regulatory expectations and, therefore, there is no requirement to purchase cyber insurance.Download
May AccumeView: Executive Cybersecurity Pulse Newsletter
In a recent survey, Nearly Half of IT Execs interviewed stated that they don’t rethink or retool their approach to security after an attack, almost ensuring another attack in the near future. A critical step in the remediation of a security incident is determining what elements require change so that the incident won’t repeat itself. A mature IT organization will ensure that this step is never skipped: immature organizations are destined to have history repeat itself.Download
To AccumeView: Executive Cybersecurity Pulse