Yesterday, US-CERT posted a bulletin about Russian State-Sponsored Cyber Actors Targeting Network Infrastructure Devices ( https://www.us-cert.gov/ncas/alerts/TA18-106A ). Our take on this is that this is something one must always assume to be happening, and if the bulletin is accurate then it’s not something Russia is alone in doing: https://arstechnica.com/tech-policy/2014/05/photos-of-an-nsa-upgrade-factory-show-cisco-router-getting-implant/ https://www.engadget.com/2016/08/21/nsa-technique-for-cisco-spying/ It is vital to have critical controls in place to protect against these types of attacks, and to be prepared to take action based on concrete Indicators of Compromise provided in alerts and threat intelligence. Basefarm is a member of FIRST.org, TF-CSIRT and Swedish CERT-Forum, which helps us gather intelligence such as this in a timely manner.
Have you opened the front door for anyone who came knocking or made way for an unknown contractor? If so, you might have been victim of social manipulation-based hacking. Training, exercise and countermeasures can help, and this also applies to the Next Big Corporate hack which surely can strike even you.
How can you protect yourself from hackers and more specifically, DDOS attacks?
Remember when several massive ransomware attacks went global and hit many big businesses? Fredrik Svantes, Senior Information Security Manager at Basefarm, discussed with us the latest developments that keep the cybersecurity community busy.
10. august marks the formal publication of an overhaul of the Transport Layer Security (TLS) protocol. TLS is an Internet standard used to prevent eavesdropping, tampering, and message forgery for various Internet applications. It is probably the most widely deployed network security standard in the world. Often indicated by the small green padlock in a web browser’s address bar1, TLS is used in financial transactions, by medical institutions, and to ensure secure connections in a wide variety of other applications.
TLS 1.3 represents a significant security win for the Internet and its users. We look forward to using it and tracking its adoption on the Internet.
Top 5 Security links
- Foreshadow Attacks — 3 New Intel CPU Side-Channel Flaws Discovered
- Google Tracks Android, iPhone Users Even With ‘Location History’ Turned Off
- The Norwegian National Security Authority (NSM) establishes the National Cyber Security Center
- Google Chrome Bug Opens Access to Private Facebook Information
- Patch Tuesday: Microsoft Addresses Two Zero-Days in 60-Flaw Roundup
“Security is not a one-person job. It can’t be accomplished with one person, it can’t be accomplished with one company,” says Walls. “So we need partners, and we need friends in the industry to work together.” No statement could better summarize what building a culture of security looks like. Learn more about how Walls and Prime Therapeutics implemented DLP to protect highly sensitive data for millions of people.
Top 5 Security links
- New Apache Struts Vulnerability Leaves Major Websites Exposed
- Vulnerability in OpenSSH “for two decades” (no, the sky isn’t falling!)
- Intel rips up microcode security fix license that banned benchmarking
- $1.1M is Lost to Cybercrime Every Minute of Every Day
- Evolution of Android Security Updates
Cyber security is increasingly important to companies. We went to DEF CON to see what the hackers were doing.