SlideShare uma empresa Scribd logo
1 de 3
The Dark Side of Cybersecurity
It’s that time of the year again. October is upon us, so get ready to spread some cybersecurity wisdom around
you and, of course, a few candies here and there for the occasional Halloween visitors.
Now, as much as we hate to admit it, there are spookier things out there than a 5-year-old poorly disguised
witch ringing at your door. The current state of the cybersecurity landscape leads us to believe that all sorts of
fictional boogeymen are real. Just last week we saw zombie botnets taking over IoT devices by the millions. A
while back, we even wrote about cybersecurity ghouls and how they haunt businesses all over the globe. If we’re
quiet enough, we might even hear how someone, somewhere, is clicking on a suspicious link and opening the
door to the dark side.
There is no end to this cyber-horror show.
And that’s not all. According to the National Institute of Standards and Technology (NIST), Internet users are
experiencing something that can only be expressed as being cyber-fatigue. Is this something we can blame
solely on the users? Or is it a sign that perhaps we should look in the mirror as well and concentrate our efforts
better? Make it so that cybersecurity comes across as a borderless, non-punitive practice? Whereas an event
such as the International Cybersecurity Awareness Month is a great initiative, one month of constantly repeating
‘you are not doing enough’ or ‘you are not protected enough’ is not the way to go. The issue has been
established a long time ago, there’s nothing new to add. What needs to be done now is for cyber-speakers to
all agree on the same policies and solutions. And this is a process that will require work around the clock, not
just for one month.
Seriously now, even Halloween ads last more than that.
All Malwares’ Eve: APTs strike again
All Hallows’ Eve might last just one day, but for malware, it’s an all-year-long holiday. This week only, Kaspersky
announced it detected another advanced persistent threat that, until now, took on your typical APT costume in
order to go trick-or-treating. Dubbed StrongPity, this particular threat managed to stay under the radar by only
going after 0-day vulnerabilities and employing stealthy modular attacks (read our article on Project Sauron).
Later this summer, though, its creators decided it was time for a make-over and started infecting WinRAR and
TrueCrypt versions on websites hosting these free encryption apps.
Note: For the reader’s information, WinRAR is a Windows data compression tool, encrypting files with AES-256
encryption algorithm. TrueCrypt is a full disk encryption tool that has not been updated since 2014, according
to public records. Even so, both tools are still consciously used by users concerned with security and, even more
so, with privacy. Cybercriminals love secrets, after all.
So what did this change of target mean for StrongPity? First of all, it implied a change of battle strategy: what
used to be a waiting game, now became a baiting one. Just like real trick-or-treaters, this APT now basically
comes knocking on your door, by using a technique called the ‘watering hole’. This method where hackers lace
legitimate apps with malware and then launch the booby trap is not at all an unusual thing for an APT. Remember
the Crouching Yeti that infected ICS and SCADA software in 2014?
Trick or treat: the battle for the front seat
Since beating around the bush never helped anyone, there’s one thing that we need to get right straight ahead:
behind these masked monsters are always people. People using machines to target other people using machines.
And in the middle, you have us – the people-as-shields, those that fight the battle for you. But that doesn’t
mean you are completely helpless without us.
This month, to stay safe against StrongPity, your best option is to make sure you’re always downloading apps
from their official website (and not from sourceforge.net, for instance). While this may reduce risks to a minimum,
you’re not out in the clear yet. What’s left to be done is signature verification. We took the liberty of linking here a
useful article on the topic that takes you step-by-step on how to check the integrity of your downloads. While
this is not an easy task for most users, there are awareness campaigns militating for a much simpler approach.
In the US, as in previous years, the main message circulating every October is one that might just save you from
falling in StrongPity’s trap: ‘Stop. Think. Connect’.
This short slogan makes up for some great advice for any type of online activity, whether it’s about clicking on
that suspicious attachment or downloading an encryption app. Sometimes, a few seconds of skepticism can
make a huge difference. After all, you don’t always immediately open the door on Halloween either.
As a bonus, instead of a conclusion, we took the liberty to gather a collection of Halloween-inspired sources to
help you keep cyber-horrors at bay:
1. Protect your goodies, strong passwords are a must:
https://www.reveelium.com/en/yahacking-the-last-straw/
https://www.reveelium.com/en/cyber-hygiene-social-networks/
https://www.reveelium.com/en/fbios-rabbit-hole/
2. Don’t take sweets just from anyone, it might be a bait:
https://www.reveelium.com/en/target-human-behind-machine/
https://www.reveelium.com/en/cybersecurity-during-the-summer/
https://www.reveelium.com/en/apple-and-its-vulnerabilities/
3. Beware of requests from strangers, the Big Bad Wolf also posed as a good guy:
https://www.reveelium.com/en/avoid-data-hostage-situation/
https://www.reveelium.com/en/locky-data-hijackers-strike/
https://www.reveelium.com/en/can-hospitals-stay-cyber-healthy/
https://www.reveelium.com/en/banking-malware-siege/
4. Prevent IoT devices from haunting your website:
https://www.reveelium.com/en/iot-rise-of-the-machines/
https://www.reveelium.com/en/iot-jeopardizes-business-security/
https://www.reveelium.com/en/ddos-attacks-the-cyber-boogeyman-part-i/
https://www.reveelium.com/en/ddos-attacks-the-cyber-boogeyman-part-ii/
While we take pride inthe articleswe write,it’sobviouswe cannotalwayscoverall topicsor go as much intodetailsas
we’dlike.Assuch,we’ve listedhere acouple of extra cybersecuritysources,areal treatfor all those interestedingoing
beyond just awareness campaigns and witty metaphors this Halloween:
1. SANS Institute’s CWE Top 25, a list of the easiest to exploit vulnerabilities
As one of the largest international informationsecurity organizations,SANS provides training to thousands of security
professionalsandethical hackers everyyear.AnotherexcellentplatformSANSprovidesisthe ReadingRoom,acollection
of papers in all cybersecurity topics which records over 75,000 unique visitors each months.
2. OWASP’s Secure Coding Practices, the monster-free coding guide for all developers
OWASP stands for Open Web Application Security Project and is a nonprofit organization, running though the will of
security expert volunteers all around the world. Through its ESAPI project, OWASP helpsdevelopers integrate security
into already existing apps, as well as create new ones from scratch, security centered this time.
3. ISACA’s Internet of Things research: infection risk considerations
Previously known as the Information Systems Audit and Control Association, ISACA covers todays many more topics,
counting over 140,000 members at a global level.
4. CERT’s secure coding resources or learning how to be a security ghostbuster
Working closely with the Department of Homeland Security, CERT is a renowned engine of the cybersecurity field.
5. NIST’s SAMATE standards, a business’s survival guide
The National Institute of Standardsand Technologyprovidesstandardsfororganizationstobe able to choose the right
cybersecurity tools for their environment.
Link:
https://www.reveelium.com/en/dark-side-of-cybersecurity-awareness-month/

Mais conteĂșdo relacionado

Mais procurados

Amateur Hour: Why APTs Are The Least Of Your Worries
Amateur Hour: Why APTs Are The Least Of Your WorriesAmateur Hour: Why APTs Are The Least Of Your Worries
Amateur Hour: Why APTs Are The Least Of Your Worries
Ed Bellis
 
Cyber Security Extortion: Defending Against Digital Shakedowns
Cyber Security Extortion: Defending Against Digital Shakedowns Cyber Security Extortion: Defending Against Digital Shakedowns
Cyber Security Extortion: Defending Against Digital Shakedowns
CrowdStrike
 

Mais procurados (20)

CrowdCast Monthly: Operationalizing Intelligence
CrowdCast Monthly: Operationalizing IntelligenceCrowdCast Monthly: Operationalizing Intelligence
CrowdCast Monthly: Operationalizing Intelligence
 
How to Knock Out Threats from Crypto-Style Viruses
How to Knock Out Threats from Crypto-Style VirusesHow to Knock Out Threats from Crypto-Style Viruses
How to Knock Out Threats from Crypto-Style Viruses
 
You Can't Stop The Breach Without Prevention And Detection
You Can't Stop The Breach Without Prevention And DetectionYou Can't Stop The Breach Without Prevention And Detection
You Can't Stop The Breach Without Prevention And Detection
 
How to Take the Ransom Out of Ransomware
How to Take the Ransom Out of RansomwareHow to Take the Ransom Out of Ransomware
How to Take the Ransom Out of Ransomware
 
CrowdCasts Monthly: When Pandas Attack
CrowdCasts Monthly: When Pandas AttackCrowdCasts Monthly: When Pandas Attack
CrowdCasts Monthly: When Pandas Attack
 
Wannacry | Technical Insight and Lessons Learned
Wannacry | Technical Insight and Lessons LearnedWannacry | Technical Insight and Lessons Learned
Wannacry | Technical Insight and Lessons Learned
 
Symantec Webinar | How to ï»żDetect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to ï»żDetect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to ï»żDetect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to ï»żDetect Targeted Ransomware with MITRE ATT&CK
 
Amateur Hour: Why APTs Are The Least Of Your Worries
Amateur Hour: Why APTs Are The Least Of Your WorriesAmateur Hour: Why APTs Are The Least Of Your Worries
Amateur Hour: Why APTs Are The Least Of Your Worries
 
Security is a process, not a plugin (WordCamp London 2018)
Security is a process, not a plugin  (WordCamp London 2018)Security is a process, not a plugin  (WordCamp London 2018)
Security is a process, not a plugin (WordCamp London 2018)
 
10 most important cyber security tips for your users
10 most important cyber security tips for your users10 most important cyber security tips for your users
10 most important cyber security tips for your users
 
Cloud-Enabled: The Future of Endpoint Security
Cloud-Enabled: The Future of Endpoint SecurityCloud-Enabled: The Future of Endpoint Security
Cloud-Enabled: The Future of Endpoint Security
 
Security is a process, not a plugin (WordCamp Torino 2018)
Security is a process, not a plugin (WordCamp Torino 2018)Security is a process, not a plugin (WordCamp Torino 2018)
Security is a process, not a plugin (WordCamp Torino 2018)
 
Cyber Security Extortion: Defending Against Digital Shakedowns
Cyber Security Extortion: Defending Against Digital Shakedowns Cyber Security Extortion: Defending Against Digital Shakedowns
Cyber Security Extortion: Defending Against Digital Shakedowns
 
"There's a pot of Bitcoins behind the ransomware rainbow"
"There's a pot of Bitcoins behind the ransomware rainbow""There's a pot of Bitcoins behind the ransomware rainbow"
"There's a pot of Bitcoins behind the ransomware rainbow"
 
NTXISSACSC3 - Sharing is Real! by Christy Coffey
NTXISSACSC3 - Sharing is Real! by Christy CoffeyNTXISSACSC3 - Sharing is Real! by Christy Coffey
NTXISSACSC3 - Sharing is Real! by Christy Coffey
 
Infosec Europe 2017 Highlights | Lastline, Inc.
Infosec Europe 2017 Highlights |  Lastline, Inc.Infosec Europe 2017 Highlights |  Lastline, Inc.
Infosec Europe 2017 Highlights | Lastline, Inc.
 
Security is a process, not a plugin (WordCamp Oslo 2018)
Security is a process, not a plugin (WordCamp Oslo 2018)Security is a process, not a plugin (WordCamp Oslo 2018)
Security is a process, not a plugin (WordCamp Oslo 2018)
 
Inside Attacker: An Overview
Inside Attacker: An OverviewInside Attacker: An Overview
Inside Attacker: An Overview
 
Bear Hunting: History and Attribution of Russian Intelligence Operations
Bear Hunting: History and Attribution of Russian Intelligence OperationsBear Hunting: History and Attribution of Russian Intelligence Operations
Bear Hunting: History and Attribution of Russian Intelligence Operations
 
Ransomware
Ransomware Ransomware
Ransomware
 

Destaque

ĐŽĐ”Ń†Đ”ĐœŃ‚Ń€Đ°Đ»Ń–Đ·Đ°Ń†Ń–Ń. Đ±ŃƒĐŽŃƒŃ”ĐŒĐŸ уĐșŃ€Đ°Ń—ĐœŃƒ Ń€Đ°Đ·ĐŸĐŒ
ĐŽĐ”Ń†Đ”ĐœŃ‚Ń€Đ°Đ»Ń–Đ·Đ°Ń†Ń–Ń. Đ±ŃƒĐŽŃƒŃ”ĐŒĐŸ уĐșŃ€Đ°Ń—ĐœŃƒ Ń€Đ°Đ·ĐŸĐŒĐŽĐ”Ń†Đ”ĐœŃ‚Ń€Đ°Đ»Ń–Đ·Đ°Ń†Ń–Ń. Đ±ŃƒĐŽŃƒŃ”ĐŒĐŸ уĐșŃ€Đ°Ń—ĐœŃƒ Ń€Đ°Đ·ĐŸĐŒ
ĐŽĐ”Ń†Đ”ĐœŃ‚Ń€Đ°Đ»Ń–Đ·Đ°Ń†Ń–Ń. Đ±ŃƒĐŽŃƒŃ”ĐŒĐŸ уĐșŃ€Đ°Ń—ĐœŃƒ Ń€Đ°Đ·ĐŸĐŒ
мроĐč НоĐșĐŸĐ»Đ°Đ”ĐČ
 
Tarea para Baraldo y Romero - FernĂĄn
Tarea para Baraldo y Romero - FernĂĄnTarea para Baraldo y Romero - FernĂĄn
Tarea para Baraldo y Romero - FernĂĄn
fernan1388
 
Health Impact Assessment: Healthier Places, Empowered People
Health Impact Assessment: Healthier Places, Empowered PeopleHealth Impact Assessment: Healthier Places, Empowered People
Health Impact Assessment: Healthier Places, Empowered People
Practical Playbook
 
Pasos de un Proyecto de Trabajo
Pasos de un Proyecto de TrabajoPasos de un Proyecto de Trabajo
Pasos de un Proyecto de Trabajo
susana
 
Pendidikan agama islam tahun 4
Pendidikan agama islam tahun 4Pendidikan agama islam tahun 4
Pendidikan agama islam tahun 4
Sharifah Che Husain
 

Destaque (12)

ĐŽĐ”Ń†Đ”ĐœŃ‚Ń€Đ°Đ»Ń–Đ·Đ°Ń†Ń–Ń. Đ±ŃƒĐŽŃƒŃ”ĐŒĐŸ уĐșŃ€Đ°Ń—ĐœŃƒ Ń€Đ°Đ·ĐŸĐŒ
ĐŽĐ”Ń†Đ”ĐœŃ‚Ń€Đ°Đ»Ń–Đ·Đ°Ń†Ń–Ń. Đ±ŃƒĐŽŃƒŃ”ĐŒĐŸ уĐșŃ€Đ°Ń—ĐœŃƒ Ń€Đ°Đ·ĐŸĐŒĐŽĐ”Ń†Đ”ĐœŃ‚Ń€Đ°Đ»Ń–Đ·Đ°Ń†Ń–Ń. Đ±ŃƒĐŽŃƒŃ”ĐŒĐŸ уĐșŃ€Đ°Ń—ĐœŃƒ Ń€Đ°Đ·ĐŸĐŒ
ĐŽĐ”Ń†Đ”ĐœŃ‚Ń€Đ°Đ»Ń–Đ·Đ°Ń†Ń–Ń. Đ±ŃƒĐŽŃƒŃ”ĐŒĐŸ уĐșŃ€Đ°Ń—ĐœŃƒ Ń€Đ°Đ·ĐŸĐŒ
 
Tarea para Baraldo y Romero - FernĂĄn
Tarea para Baraldo y Romero - FernĂĄnTarea para Baraldo y Romero - FernĂĄn
Tarea para Baraldo y Romero - FernĂĄn
 
Levi <3
Levi <3Levi <3
Levi <3
 
Health Impact Assessment: Healthier Places, Empowered People
Health Impact Assessment: Healthier Places, Empowered PeopleHealth Impact Assessment: Healthier Places, Empowered People
Health Impact Assessment: Healthier Places, Empowered People
 
1940's
1940's1940's
1940's
 
The other side of goa (1)
The other side of goa (1)The other side of goa (1)
The other side of goa (1)
 
Pasos de un Proyecto de Trabajo
Pasos de un Proyecto de TrabajoPasos de un Proyecto de Trabajo
Pasos de un Proyecto de Trabajo
 
Presentation1 edet family
Presentation1 edet familyPresentation1 edet family
Presentation1 edet family
 
TecnologĂ­a de los materiales
TecnologĂ­a de los materialesTecnologĂ­a de los materiales
TecnologĂ­a de los materiales
 
Curso bĂĄsico de jardinagem Parte 5/6.
Curso bĂĄsico de jardinagem   Parte 5/6.Curso bĂĄsico de jardinagem   Parte 5/6.
Curso bĂĄsico de jardinagem Parte 5/6.
 
Pendidikan agama islam tahun 4
Pendidikan agama islam tahun 4Pendidikan agama islam tahun 4
Pendidikan agama islam tahun 4
 
Build Community/Public Health Partner Call Summary
Build Community/Public Health Partner Call Summary Build Community/Public Health Partner Call Summary
Build Community/Public Health Partner Call Summary
 

Semelhante a The dark side of cybersecurity: International Awareness Cybersecurity Month

So... you want to be a security consultant
So... you want to be a security consultant So... you want to be a security consultant
So... you want to be a security consultant
abnmi
 
Whitepaper Avira about Artificial Intelligence to cyber security
Whitepaper Avira  about Artificial Intelligence to cyber securityWhitepaper Avira  about Artificial Intelligence to cyber security
Whitepaper Avira about Artificial Intelligence to cyber security
GopiRajan4
 

Semelhante a The dark side of cybersecurity: International Awareness Cybersecurity Month (20)

Cyber security-report-2017
Cyber security-report-2017Cyber security-report-2017
Cyber security-report-2017
 
So... you want to be a security consultant
So... you want to be a security consultant So... you want to be a security consultant
So... you want to be a security consultant
 
How to Migrate Your Organization to a More Security-Minded Culture – From Dev...
How to Migrate Your Organization to a More Security-Minded Culture – From Dev...How to Migrate Your Organization to a More Security-Minded Culture – From Dev...
How to Migrate Your Organization to a More Security-Minded Culture – From Dev...
 
Pentest trends 2017
Pentest trends 2017Pentest trends 2017
Pentest trends 2017
 
Whitepaper Avira about Artificial Intelligence to cyber security
Whitepaper Avira  about Artificial Intelligence to cyber securityWhitepaper Avira  about Artificial Intelligence to cyber security
Whitepaper Avira about Artificial Intelligence to cyber security
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security
 
Check point 2015-securityreport
Check point 2015-securityreportCheck point 2015-securityreport
Check point 2015-securityreport
 
PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018
PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018
PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018
 
Thane Barnier MACE 2016 presentation
Thane Barnier MACE 2016 presentationThane Barnier MACE 2016 presentation
Thane Barnier MACE 2016 presentation
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2
 
Open Source Insight: Security Breaches and Cryptocurrency Dominating News
Open Source Insight: Security Breaches and Cryptocurrency Dominating NewsOpen Source Insight: Security Breaches and Cryptocurrency Dominating News
Open Source Insight: Security Breaches and Cryptocurrency Dominating News
 
Security
SecuritySecurity
Security
 
Ransomware all locked up book
Ransomware all locked up bookRansomware all locked up book
Ransomware all locked up book
 
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
 
When it Comes to API Security, Expect the Whole World to Be Testing Your Mett...
When it Comes to API Security, Expect the Whole World to Be Testing Your Mett...When it Comes to API Security, Expect the Whole World to Be Testing Your Mett...
When it Comes to API Security, Expect the Whole World to Be Testing Your Mett...
 
2016 CYBERSECURITY PLAYBOOK
2016 CYBERSECURITY PLAYBOOK2016 CYBERSECURITY PLAYBOOK
2016 CYBERSECURITY PLAYBOOK
 
Mind the gap
Mind the gapMind the gap
Mind the gap
 
Champaign EDC Cybersecurity Seminar by John Bambenek - March 25, 2014
Champaign EDC Cybersecurity Seminar by John Bambenek - March 25, 2014Champaign EDC Cybersecurity Seminar by John Bambenek - March 25, 2014
Champaign EDC Cybersecurity Seminar by John Bambenek - March 25, 2014
 
Hacking 09 2010
Hacking 09 2010Hacking 09 2010
Hacking 09 2010
 
INTERNET
INTERNETINTERNET
INTERNET
 

Mais de ITrust - Cybersecurity as a Service

Mais de ITrust - Cybersecurity as a Service (20)

IT security : a five-legged sheep
IT security : a five-legged sheepIT security : a five-legged sheep
IT security : a five-legged sheep
 
Petya, pire que WannaCry ?
Petya, pire que WannaCry ?Petya, pire que WannaCry ?
Petya, pire que WannaCry ?
 
L’Intelligence Artificielle : un ‘booster’ pour la cybersĂ©curitĂ©
L’Intelligence Artificielle : un ‘booster’ pour la cybersĂ©curitĂ©L’Intelligence Artificielle : un ‘booster’ pour la cybersĂ©curitĂ©
L’Intelligence Artificielle : un ‘booster’ pour la cybersĂ©curitĂ©
 
Manifeste ResistanceCYBER 29.05.17
Manifeste ResistanceCYBER 29.05.17Manifeste ResistanceCYBER 29.05.17
Manifeste ResistanceCYBER 29.05.17
 
Advanced persistent threats, entre mythe et réalité
Advanced persistent threats, entre mythe et réalitéAdvanced persistent threats, entre mythe et réalité
Advanced persistent threats, entre mythe et réalité
 
Quand les cybercriminels n’ont plus besoin de fuir les logiciels de sécurité
Quand les cybercriminels n’ont plus besoin de fuir les logiciels de sécuritéQuand les cybercriminels n’ont plus besoin de fuir les logiciels de sécurité
Quand les cybercriminels n’ont plus besoin de fuir les logiciels de sécurité
 
Artificial intelligence and machine learning: ultimate game changers
Artificial intelligence and machine learning: ultimate game changersArtificial intelligence and machine learning: ultimate game changers
Artificial intelligence and machine learning: ultimate game changers
 
Manifeste ResistanceCYBER 19.05.17
Manifeste ResistanceCYBER 19.05.17Manifeste ResistanceCYBER 19.05.17
Manifeste ResistanceCYBER 19.05.17
 
Manifeste ResistanceCYBER 18.05.17
Manifeste ResistanceCYBER 18.05.17Manifeste ResistanceCYBER 18.05.17
Manifeste ResistanceCYBER 18.05.17
 
Manifeste ResistanceCYBER 17.05.17
Manifeste ResistanceCYBER 17.05.17Manifeste ResistanceCYBER 17.05.17
Manifeste ResistanceCYBER 17.05.17
 
Manifeste ResistanceCYBER 15.05.17
Manifeste ResistanceCYBER 15.05.17Manifeste ResistanceCYBER 15.05.17
Manifeste ResistanceCYBER 15.05.17
 
Passer de la détection d’anomalies à la détection de menaces
Passer de la détection d’anomalies à la détection de menacesPasser de la détection d’anomalies à la détection de menaces
Passer de la détection d’anomalies à la détection de menaces
 
Meet anomaly detection: a powerful cybersecurity defense mechanism when its w...
Meet anomaly detection: a powerful cybersecurity defense mechanism when its w...Meet anomaly detection: a powerful cybersecurity defense mechanism when its w...
Meet anomaly detection: a powerful cybersecurity defense mechanism when its w...
 
L’étrange histoire d’un piratage en Angleterre
L’étrange histoire d’un piratage en AngleterreL’étrange histoire d’un piratage en Angleterre
L’étrange histoire d’un piratage en Angleterre
 
Ignorance is bliss, but not for MongoDB
Ignorance is bliss, but not for MongoDBIgnorance is bliss, but not for MongoDB
Ignorance is bliss, but not for MongoDB
 
Cisco WebEx vulnerability: it’s a kind of magic
Cisco WebEx vulnerability: it’s a kind of magicCisco WebEx vulnerability: it’s a kind of magic
Cisco WebEx vulnerability: it’s a kind of magic
 
ITrust Company Overview FR
ITrust Company Overview FRITrust Company Overview FR
ITrust Company Overview FR
 
ITrust Company Overview EN
ITrust Company Overview ENITrust Company Overview EN
ITrust Company Overview EN
 
SOC OEM - Datasheet FR
SOC OEM - Datasheet FRSOC OEM - Datasheet FR
SOC OEM - Datasheet FR
 
SOC OEM - Datasheet EN
SOC OEM - Datasheet ENSOC OEM - Datasheet EN
SOC OEM - Datasheet EN
 

Último

%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
masabamasaba
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
masabamasaba
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
Health
 
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
masabamasaba
 
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
masabamasaba
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
masabamasaba
 
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
VictoriaMetrics
 
Abortion Pill Prices Tembisa [(+27832195400*)] đŸ„ Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] đŸ„ Women's Abortion Clinic in T...Abortion Pill Prices Tembisa [(+27832195400*)] đŸ„ Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] đŸ„ Women's Abortion Clinic in T...
Medical / Health Care (+971588192166) Mifepristone and Misoprostol tablets 200mg
 

Último (20)

Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
 
%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand
 
What Goes Wrong with Language Definitions and How to Improve the Situation
What Goes Wrong with Language Definitions and How to Improve the SituationWhat Goes Wrong with Language Definitions and How to Improve the Situation
What Goes Wrong with Language Definitions and How to Improve the Situation
 
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
 
tonesoftg
tonesoftgtonesoftg
tonesoftg
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
 
WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
 
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
 
WSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
WSO2Con2024 - Enabling Transactional System's Exponential Growth With SimplicityWSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
WSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
 
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
 
WSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security ProgramWSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security Program
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open SourceWSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learn
 
Artyushina_Guest lecture_YorkU CS May 2024.pptx
Artyushina_Guest lecture_YorkU CS May 2024.pptxArtyushina_Guest lecture_YorkU CS May 2024.pptx
Artyushina_Guest lecture_YorkU CS May 2024.pptx
 
Abortion Pill Prices Tembisa [(+27832195400*)] đŸ„ Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] đŸ„ Women's Abortion Clinic in T...Abortion Pill Prices Tembisa [(+27832195400*)] đŸ„ Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] đŸ„ Women's Abortion Clinic in T...
 

The dark side of cybersecurity: International Awareness Cybersecurity Month

  • 1. The Dark Side of Cybersecurity It’s that time of the year again. October is upon us, so get ready to spread some cybersecurity wisdom around you and, of course, a few candies here and there for the occasional Halloween visitors. Now, as much as we hate to admit it, there are spookier things out there than a 5-year-old poorly disguised witch ringing at your door. The current state of the cybersecurity landscape leads us to believe that all sorts of fictional boogeymen are real. Just last week we saw zombie botnets taking over IoT devices by the millions. A while back, we even wrote about cybersecurity ghouls and how they haunt businesses all over the globe. If we’re quiet enough, we might even hear how someone, somewhere, is clicking on a suspicious link and opening the door to the dark side. There is no end to this cyber-horror show. And that’s not all. According to the National Institute of Standards and Technology (NIST), Internet users are experiencing something that can only be expressed as being cyber-fatigue. Is this something we can blame solely on the users? Or is it a sign that perhaps we should look in the mirror as well and concentrate our efforts better? Make it so that cybersecurity comes across as a borderless, non-punitive practice? Whereas an event such as the International Cybersecurity Awareness Month is a great initiative, one month of constantly repeating ‘you are not doing enough’ or ‘you are not protected enough’ is not the way to go. The issue has been established a long time ago, there’s nothing new to add. What needs to be done now is for cyber-speakers to all agree on the same policies and solutions. And this is a process that will require work around the clock, not just for one month. Seriously now, even Halloween ads last more than that. All Malwares’ Eve: APTs strike again All Hallows’ Eve might last just one day, but for malware, it’s an all-year-long holiday. This week only, Kaspersky announced it detected another advanced persistent threat that, until now, took on your typical APT costume in order to go trick-or-treating. Dubbed StrongPity, this particular threat managed to stay under the radar by only going after 0-day vulnerabilities and employing stealthy modular attacks (read our article on Project Sauron). Later this summer, though, its creators decided it was time for a make-over and started infecting WinRAR and TrueCrypt versions on websites hosting these free encryption apps. Note: For the reader’s information, WinRAR is a Windows data compression tool, encrypting files with AES-256 encryption algorithm. TrueCrypt is a full disk encryption tool that has not been updated since 2014, according to public records. Even so, both tools are still consciously used by users concerned with security and, even more so, with privacy. Cybercriminals love secrets, after all. So what did this change of target mean for StrongPity? First of all, it implied a change of battle strategy: what used to be a waiting game, now became a baiting one. Just like real trick-or-treaters, this APT now basically comes knocking on your door, by using a technique called the ‘watering hole’. This method where hackers lace legitimate apps with malware and then launch the booby trap is not at all an unusual thing for an APT. Remember the Crouching Yeti that infected ICS and SCADA software in 2014?
  • 2. Trick or treat: the battle for the front seat Since beating around the bush never helped anyone, there’s one thing that we need to get right straight ahead: behind these masked monsters are always people. People using machines to target other people using machines. And in the middle, you have us – the people-as-shields, those that fight the battle for you. But that doesn’t mean you are completely helpless without us. This month, to stay safe against StrongPity, your best option is to make sure you’re always downloading apps from their official website (and not from sourceforge.net, for instance). While this may reduce risks to a minimum, you’re not out in the clear yet. What’s left to be done is signature verification. We took the liberty of linking here a useful article on the topic that takes you step-by-step on how to check the integrity of your downloads. While this is not an easy task for most users, there are awareness campaigns militating for a much simpler approach. In the US, as in previous years, the main message circulating every October is one that might just save you from falling in StrongPity’s trap: ‘Stop. Think. Connect’. This short slogan makes up for some great advice for any type of online activity, whether it’s about clicking on that suspicious attachment or downloading an encryption app. Sometimes, a few seconds of skepticism can make a huge difference. After all, you don’t always immediately open the door on Halloween either. As a bonus, instead of a conclusion, we took the liberty to gather a collection of Halloween-inspired sources to help you keep cyber-horrors at bay: 1. Protect your goodies, strong passwords are a must: https://www.reveelium.com/en/yahacking-the-last-straw/ https://www.reveelium.com/en/cyber-hygiene-social-networks/ https://www.reveelium.com/en/fbios-rabbit-hole/ 2. Don’t take sweets just from anyone, it might be a bait: https://www.reveelium.com/en/target-human-behind-machine/ https://www.reveelium.com/en/cybersecurity-during-the-summer/ https://www.reveelium.com/en/apple-and-its-vulnerabilities/ 3. Beware of requests from strangers, the Big Bad Wolf also posed as a good guy: https://www.reveelium.com/en/avoid-data-hostage-situation/ https://www.reveelium.com/en/locky-data-hijackers-strike/ https://www.reveelium.com/en/can-hospitals-stay-cyber-healthy/ https://www.reveelium.com/en/banking-malware-siege/ 4. Prevent IoT devices from haunting your website: https://www.reveelium.com/en/iot-rise-of-the-machines/ https://www.reveelium.com/en/iot-jeopardizes-business-security/ https://www.reveelium.com/en/ddos-attacks-the-cyber-boogeyman-part-i/ https://www.reveelium.com/en/ddos-attacks-the-cyber-boogeyman-part-ii/
  • 3. While we take pride inthe articleswe write,it’sobviouswe cannotalwayscoverall topicsor go as much intodetailsas we’dlike.Assuch,we’ve listedhere acouple of extra cybersecuritysources,areal treatfor all those interestedingoing beyond just awareness campaigns and witty metaphors this Halloween: 1. SANS Institute’s CWE Top 25, a list of the easiest to exploit vulnerabilities As one of the largest international informationsecurity organizations,SANS provides training to thousands of security professionalsandethical hackers everyyear.AnotherexcellentplatformSANSprovidesisthe ReadingRoom,acollection of papers in all cybersecurity topics which records over 75,000 unique visitors each months. 2. OWASP’s Secure Coding Practices, the monster-free coding guide for all developers OWASP stands for Open Web Application Security Project and is a nonprofit organization, running though the will of security expert volunteers all around the world. Through its ESAPI project, OWASP helpsdevelopers integrate security into already existing apps, as well as create new ones from scratch, security centered this time. 3. ISACA’s Internet of Things research: infection risk considerations Previously known as the Information Systems Audit and Control Association, ISACA covers todays many more topics, counting over 140,000 members at a global level. 4. CERT’s secure coding resources or learning how to be a security ghostbuster Working closely with the Department of Homeland Security, CERT is a renowned engine of the cybersecurity field. 5. NIST’s SAMATE standards, a business’s survival guide The National Institute of Standardsand Technologyprovidesstandardsfororganizationstobe able to choose the right cybersecurity tools for their environment. Link: https://www.reveelium.com/en/dark-side-of-cybersecurity-awareness-month/