Home / Archives For Security

Security

What Qualifications Do You Need For A Job In Cyber Security?

Cyber security is still a relatively new specialism and one that is changing all the time in response to the constantly evolving threat of cybercrime and cyber terrorism. Yet already there is a huge shortage of sufficiently skilled IT security professional, with around one million unfulfilled positions in the IT security sector (according to a report by Frost and Sullivan, this figure will reach 1.5m by 2020). There are many reasons that individuals looking for a career in IT, might want to focus on going down the cyber career path. As well as an abundance of opportunities, salaries in cyber security roles are rising faster than those in traditional IT roles. Cyber Security Jobs & Roles Cyber security is a multidisciplinary field and knowing where to start can be daunting with so numer......

What Does The Adoption Of Cyberposture Intelligence Mean For The Hybrid Cloud?

Organisations are pressed into needing a way to gain visibility and control across their hybrid infrastructures – an approach that provides the CISO with actionable insights to minimise the attack surface while meeting the reporting requirements of the boardroom. The hybrid cloud is real, and in fact, 81% of enterprises are adopting a multi-cloud architecture, spanning on-premise and one or more public cloud providers. And this won’t go away anytime soon, with about 1/3 of workloads remaining on-premise in 2025, sometimes the most critical, according to 250 CISOs and team members polled in March. But there is a problem. A good 77% of IT personnel identify security as still a barrier to adoption, and almost the same number of people cited a lack visibility across their hybrid cloud. T......

It’s Good To Talk: Key Takeaways From RSA Conference 2018

Every year the cybersecurity community gathers to share its collective wisdom on the threats we face and the innovative ways that we’re trying to get ahead of them. RSA Conference is an intense experience but – just like with endpoint security – once you analyse all the unfiltered data coming at you, you get a great insight into where security is headed and what your priorities as a network defender should be. So now that we’re coming down off the high of spending five days with 40,000 people who live and breathe security, what were the key themes and what should we be expecting over the next 12 months? First is an observation about the way the sector is maturing. Back in the early days, and for a long time after that, security people were paid to not take risks. They were expe......

‘Rubella Macro Builder’ Crimeware Kit Emerges On Underground

A crimeware kit dubbed the Rubella Macro Builder has recently been gaining popularity among members of a top-tier Russian hacking forum. Despite being relatively new and unsophisticated, the kit has a clear appeal for cybercriminals: it’s cheap, fast, and can defeat basic static antivirus detection. First offered for sale in late February for the relatively low price of $500 USD per month, the Rubella Macro Builder has since undergone various updates, additions, and pricing changes. While newer versions of the builder are significantly cheaper—as of April, a three-month license is $120 USD—they also come with enhanced features including various encryption algorithm choices ( XOR and Base64), download methods (PowerShell, Bitsadmin, Microsoft.XMLHTTP, MSXML2.XMLHTTP, custom PowerShell paylo......

The Digital Gold Rush: The Dark Side Of Cryptocurrency Adds To The Infosec Challenge

As the general public tried to get its head around the concept of cryptocurrency and blockchain at the back-end of 2017, infosecurity professionals were facing one of the universal truths of our industry: whenever there is an innovation in technology or society, those who want to exploit it for illicit gain are never far behind. In the case of cryptocurrency, its current high profile is legitimising a means of exchange that, until recently, was mostly the preserve of the deep and dark web as the preferred payment method from victims of ransomware attacks. So, while Joe Public began a twenty-first century gold rush to try and make a killing in the fluctuating cryptocurrency markets, the cybercriminal community started putting its own ideas of how to get its hands on the digital gold into ac......

Choose Action Over Panic

This week, the UK’s National Cyber Security Centre (NCSC), the FBI and the U.S. Department of Homeland Security issued a joint alert warning of a global campaign by Russian state-sponsored cyber actors. While the alert focused on network infrastructure devices, threats apply to all internet connected devices, especially IoT devices, of which Gartner estimates there will be 25.1 billion connected to the internet by 2021. So, while panic is not necessary, CIOs and business leaders should take notice and action to ensure they’re not allowing a backdoor to their company’s data and information. What Is The Threat? It’s important to note that while there may be an uptick in activity, the threat itself and the techniques are not new. Nation-states and malicious groups have long used IoT device vu......

5 Ways To Protect Your Company’s Hashtags

Hashtags are a great way to promote your brand on social media. They create buzz, help fans follow your company’s activity, and encourage engagement. But brand hashtags can also put your organisation at risk. No company can own or control the hashtags it promotes and bad actors take advantage of that. Once your social media team invests in making a hashtag popular, cybercriminals can hijack it to target your fans and followers with malware and phishing links. And these types of attacks are on the rise. Social media phishing links grew 70% and fake customer-support accounts used for phishing jumped 30% from Q3–Q4 in 2017. Here are five ways to reduce the risk of hashtag hijacking. 1. Align Teams & Assign Roles To Mitigate Social Media Risk Align stakeholders across marketing, IT Securit......

RAT Gone Rogue: Meet ARS VBS Loader

Malicious VBScript has long been a fixture of spam and phishing campaigns, but until recently its functionality has been limited to downloading malware from an attacker-controlled server and executing it on a compromised computer. Researchers at Flashpoint have seen and analysed a unique departure from this norm in ARS VBS Loader, a spin-off of a popular downloader called SafeLoader VBS that was sold and eventually leaked in 2015 on Russian crimeware forums. ARS VBS Loader not only downloads and executes malicious code, but also includes a command and control application written in PHP that allows a botmaster to issue commands to a victim’s machine. This behaviour likens ARS VBS Loader to a remote access Trojan (RAT), giving it behaviour and capabilities rarely seen in malicious “loaders”,......

4 Ways To Jump The Barriers To Profitability In Managed Security

Given the growing list of online security threats, managed service providers (MSPs) are naturally looking to leverage intensifying demand for cybersecurity. But how straightforward is it for traditional MSPs to add security to their offering?  To become a Managed Security Services Provider (MSSP), MSPs typically have three options: DIY their own branded service, partner with an established player, or resell a vendor’s white-label. Whatever the chosen mode, there are significant hurdles to profitability.  The core of any managed security service is the security operations centre or SOC. Setting up and sustaining a 24/7 operations centre however is expensive. The capex and staffing issues are enough to stop some MSPs from adding that extra ‘S’ to their acronym. Many of those that have find t......

Top 3 Pressing Cyber Threats For IoT In 2018

Every year we see new pressing cyber threats, from new targets for hackers to new issues cropping up in the cybersecurity space. 2018 will be no different. One area that has recently got a lot of attention is IoT devices, as the use of such devices has increased in both the public and private sectors. Here at Silobreaker we are keen to highlight three pressing cyber threats to IoT devices that we believe enterprises need to be aware of: 1. Industrial Take-Downs By 2020 it is expected that 25% of cyber-attacks will target IoT devices, many of which will be deployed in industrial environments. Infection and covert usage of IoT devices to mine cryptocurrencies or conduct DDoS attacks is a trend that isn’t slowing down, and one that is especially problematic in the industrial space because Ind......

Navigating The Security Obstacle Course Of 2018

The last few years have seen a veritable explosion in the gruelling fitness obstacle courses such as Tough Mudder. During these events, participants push themselves to their physical limits in the hope of reigning supreme against their friends or co-workers. The consequences of failure? A wasted entry fee, loss of time and, of course, the associated reputational damage and no bragging rights. The popularity of obstacle races such as these is mirrored in security and IT departments. Today, these teams face an unforgiving and obstacle-filled cybersecurity landscape, full of increasingly sophisticated challenges. A significant difference is that they are unwilling participants and the consequences of failure, in terms of financial and reputational damage, are far more severe. With 2017 record......

Everything You Need To Know About Hypervisor Attacks

I mentioned in one of my previous blog posts that the number one argument against cloud adoption is that of data security. When you have your own data centre or an on-premises machine, you know exactly where the data is residing and you are completely in control of protecting it. When you go the multi-cloud route, you are sharing resources with other users and the cloud provider shares the responsibility of data protection with you. For a number of people, storing (and/or processing) data on a virtual machine has the same risks as swimming in a public pool. We have discussed the benefits of virtual machines a number of times in the past, so let’s focus on the risks in this blog post. Hypervisor Attacks A hypervisor or a virtual machine monitor is software or hardware used to create one or ......

Skip to toolbar