Thursday, April 5, 2018

Cybersecurity News CYBR650 Week 4

Coming into week 4, this class continues to be very interesting. Cybersecurity is definitely not a boring topic! The Microsoft STRIDE threat modeling tool was quite useful in this week’s assignments. This week I decided to take a closer look at some relevant cybersecurity news from various organizations.

McAfee Threat Intelligence: for latest in-depth security threat research reports, insights from security experts, and learning how to protect enterprise from malware, cybercrime, and other cybersecurity threats. The McAfee Labs Threats Report from March 2018 was quite informative, highlighting the switch from threats like ransomware, to newer tools and techniques like PowerShell malware and cryptocurrency mining. The report also stated that new malware has reached an all-time high of 63.4 million new samples, with PowerShell malware growing 267% in the fourth quarter. The report can be viewed here: https://www.mcafee.com/us/resources/reports/rp-quarterly-threats-mar-2018.pdf.

McAfee also had some good information on ransomware; this is a type of malware that uses asymmetric encryption to hold a victim’s information at ransom. In a ransomware attacker, the victim must pay up before the attacker will make the private key available to the victim; it is almost impossible to decrypt the files that are being held for ransom without access to the private key. The reality is that users and organizations can follow simple cyber security advice to avoid becoming a victim of ransomware. Sometimes victims can regain access to their encrypted files or locked systems, without having to pay. This is made possible by McAfee’s creation of a repository of keys and applications that can decrypt data locked by different types of ransomware.

One of my all time favorite cybersecurity report is the annual Verizon Data Breach Investigations Report. This report is an incredibly valuable tool to help any organization prepare themselves from being the next victim of a data breach. The 2017 report was no different. It reminded organizations they don’t have to be huge or well-known to become a target. As an example, the healthcare industry could be hit by both external and internal attackers. Many employees and others have access to valuable patient information that could result in identity theft and cloning of identities. Attackers can also use other organizations as a soft target useful as a stepping stone to their partners’ systems. You can download the 2017 report here: http://www.verizonenterprise.com/resources/reports/rp_DBIR_2017_Report_en_xg.pdf.

CNET Security and Privacy: And it’s time to report yet another data breach. This time it’s Delta, Sears, and Kmart who suffered a data breach, in which customers’ names, addresses and credit card numbers may have been stolen during September 26th and October 12th, 2017. However, this breach was a bit different from the others. None of these companies' internal databases were actually breached. Rather, a piece of malware temporarily residing in their online chat service possibly harvested customers’ payment information after they completed a transaction. While Delta reported that multiple hundreds of thousands of its customers could potentially have had data stolen, Sears believes fewer than 100,000 of its customers were affected by the breach. Read more about this at https://www.cnet.com/news/delta-sears-kmart-data-breach-credit-card-address/.

And finally! Some commonsense ruling: A judge allows Massachusetts to sue Equifax for data breach. I believe this was long overdue. Equifax has been entrusted with our most private and sensitive data and they should have been better prepared to deal with data security attacks. Not only that - it seemed, based on their response, that they were more interested in preserving their reputation and brand, rather than alerting consumers properly and thoroughly. Read about it here: https://www.cnet.com/news/massachusetts-judge-says-state-can-sue-equifax-for-data-breach/.

Here’s another data breach: Hackers steal data from 5 million Saks, Lord & Taylor customers. 

No comments:

Post a Comment