STE WILLIAMS

Deep Instinct Adds MacOS Support

Deep Instinct adds support for MacOS, Citrix, and multi-tenancy in its version 2.2 release.

Deep Instinct, an enterprise endpoint protection company that has built its products on the basis of deep learning machine intelligence, has announced the release of version 2.2, which includes support for MacOS, VDI with Citrix XenDesktop and XenApp, and multi-tenancy.

The additional OS and VDI features of Deep Instinct allow a customer to deploy the product across a wider variety of endpoints, including desktop, laptop, and mobile platforms.

Deep Instinct’s multi-tenancy support should make the product suitable for use by MSSPs, ISPs, and other organizations looking to provide security services as part or all of their offerings.

With the additional protection features, Deep Instinct has also boosted its reporting capabilities to provide both real-time and periodic reporting on the type and number of threats identified and blocked by the service.

Deep Instinct will be demonstrating the new version at the upcoming RSA Conference in San Francisco.

For more, read here.

Interop ITX 2018

Join Dark Reading LIVE for a two-day Cybersecurity Crash Course at Interop ITX. Learn from the industry’s most knowledgeable IT security experts. Check out the agenda here. Register with Promo Code DR200 and save $200.

Dark Reading’s Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Article source: https://www.darkreading.com/endpoint/deep-instinct-adds-macos-support/d/d-id/1331486?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Ransomware Up for Businesses, Down for Consumers in Q1

Ransomware, spyware, and cryptomining were the biggest enterprise threats during an otherwise quiet quarter for malware, researchers report.

Cybercriminals go where the money is, and these days the money is in cryptomining. Researchers detected a 28% increase in cryptomining malware among enterprise victims in the first quarter of 2018, during which “virtually all other malware was on the decline.”

The data comes from Malwarebytes’ Cybercrime Tactics and Techniques: Q1 2018 report, which pulls intel and statistics from consumer and business products between January and March 2018. Cryptomining, ransomware, and spyware were the biggest threats to business targets.

Attackers also capitalized on the public disclosure of the Meltdown and Spectre vulnerabilities, which prompted software and hardware vendors to issue patches to mitigate the threat. Cybercriminals are taking advantage of the issue and using it as a scare tactic for social engineering scams.

Scamming extended to cryptominers as well, with criminals creating fake support numbers for Coinbase users. By using poisoned search results, they redirect victims to a scam call center and steal their credentials. It’s one of many ways crypto was the most prominent theme of Q1 2018.

Mining for Money

“The biggest thing going on is cryptomining is all over the place,” says Adam Kujawa, head of malware intelligence at Malwarebytes. “In December it jumped up. Once the Bitcoin price reached 19,000, around that time we saw our biggest spike in detections of cryptominers of all types.”

Cryptomining malware is increasingly lucrative for cybercriminals as digital currencies become more valuable. Malicious cryptomining affects all platforms, devices, operating systems, and browsers, and attackers are maximizing their reach by delivering miners via malspam campaigns, exploits, malicious APKs, and supply chain attacks. Beyond Bitcoin, they’re going after alternate currencies including Monero, ByteCoin, and AEON.

“It seems like there’s a lot more utilization of the user as a resource for the criminal rather than as a victim,” says Kujawa. Instead of stealing data or credentials and trying to extort money, attackers are installing miners so their targets generate currencies for them.

While desktop-based cryptomining attacks are more popular, mobile devices are also targeted. Researchers noticed nearly 40 times more detections of Android miners, which were up 4,000%. On Macs, they saw nearly 1,000 detections of malware-based miners, browser extensions, and cryptomining apps in Q1, and 74% of those detections happened in March.

Malicious cryptomining appears less dangerous than ransomware but should not be underestimated, says Kujawa, pointing out the drain on computing resources. If not managed properly, miners could disrupt business or critical infrastructure operations by overloading systems until they become unresponsive. He anticipates miners will become more advanced.

“If cryptominers continue to be as profitable and interesting for cybercriminals as they have been, we’re going to see the development of some very dangerous miners,” he predicts, adding “they’ll make a lot less noise, in my opinion.”

“If you have a stealthy miner, one that hides and only uses a small percentage of processing power, that can hang out for a long time.”

Ransomware, Spyware Try to Compete

Spyware, which dipped toward the end of last quarter, increased 56% during Q1 2018. Researchers saw more than 80,000 detections on enterprise endpoints, quadruple the amount seen in November 2017. Researchers attribute the spike to a campaign delivering Emotet spyware. Shortly after the spike, spyware began to drop again toward the end of the first quarter.

Ransomware dropped 35% among consumers but continued to be a problem for businesses, where detections are up but overall attack volume remains low. “It seems like there’s been more and more activity pushing ransomware to businesses, where I believe the return on investment is worth it,” says Kujawa.

The ROI for hitting consumers with ransomware is comparatively lower. After ransomware made major headlines in 2017, people had greater access to information on how to defend against attacks and back up their data. They aren’t quite as likely to pay their attackers for its return; as a result, broad ransomware attacks aren’t as lucrative.

“Attacks on businesses, that’s where the money really comes from,” he says. “Businesses don’t have the option to say, ‘I can go without those pictures.’ They have to protect customer data.”

There are fewer opportunities for ransomware distribution as major families are replaced by new threats. Major families Cerber, Locky, and Jaff have vanished, researchers report. Notable campaigns from Q1 include GandCrab, Scarabey, and Hermes. GandCrab, a new ransomware threat, generated more than $600,000 for attackers in January and February.

“Ransomware won’t return to its former glory,” Kujawa predicts. “But I don’t think it’s ever going to vanish completely.”

Related Content:

Interop ITX 2018

Join Dark Reading LIVE for an intensive Security Pro Summit at Interop IT X and learn from the industry’s most knowledgeable IT security experts. Check out the agenda here.Register with Promo Code DR200 and save $200.

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance Technology, where she covered financial … View Full Bio

Article source: https://www.darkreading.com/attacks-breaches/ransomware-up-for-businesses-down-for-consumers-in-q1/d/d-id/1331487?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Attackers Exploit Cisco Switch Issue as Vendor Warns of Yet Another Critical Flaw

Cisco says companies fixing previously known protocol issue should also patch against critical remote-code execution issue.

Cisco is urging organizations to immediately address a critical flaw in its network switches running IOS and IOS XE software amid reports of widespread attacks against the devices in several countries.

The company on Monday published a security advisory on the remote code execution flaw (CVE-2018-0171) in the Smart Install function in Cisco IOS and IOS XE software.

Cisco described the flaw — first disclosed March 29 by Embedi — as an issue that could allow an unauthenticated remote attacker to trigger a denial-of-service condition or to execute code of their choice on an affected device. Emedi on March 29 claimed it had found some 250,000 network devices that were vulnerable to the issue.

The RCE flaw is separate from a protocol misuse issue also related to the Smart Install function that Cisco first issued an advisory about on Feb 14, 2017 and has updated a couple of times. It is apparently the protocol misuse issue that attackers have been exploiting in the recent attacks,  not the RCE flaw.

However, Cisco has urged organizations to address both issues immediately, citing widespread and ongoing attacks against its switches in multiple countries. “While we have only observed attacks leveraging the protocol misuse issue, recently, another vulnerability in the Cisco Smart Install Client was disclosed and patched,” the company said in a blog. “While mitigating the protocol misuse issue, customers should also address this vulnerability.”

‘Don’t Mess With Our Elections’

Reuters over the weekend reported that some 200,000 Cisco switches had been compromised in attacks in multiple countries. Among those impacted were data centers and ISPs in Iran and Russia where the attackers displayed a US flag on the screens of compromised systems with the message, “Don’t mess with our elections.”

IRNA, Iran’s official news agency said the attacks impacted at least 3,500 routers in the country. The agency quoted cybersecurity officials within the country as saying that attackers had tampered with configuration settings on the devices to cause systems to become unavailable.

Cisco had first warned about the protocol misuse issue that the threat actors leveraged in the attacks last February. The company has described the issue as something that attackers can abuse to modify the TFTP server setting to steal and modify configuration files, replace the operating system image, and set up command.

“Although this is not a vulnerability in the classic sense, the misuse of this protocol is an attack vector that should be mitigated immediately,” Cisco had noted in an April 5 blog warning about the surge recent attacks targeting the issue.

According to the company, attackers have been using search engines like Shodan to scan for vulnerable devices throughout 2017 and the early part of this year. Though, Cisco has long ago provided instructions on how organizations can find vulnerable routers and mitigate the protocol misuse issue, some 168,000 devices worldwide remain exposed to the issue when Cisco conducted a recent scan. These devices need to be addressed immediately, the company has noted.

Cisco said that several threat actors, including nation-state groups like the Dragonfly campaign targeting western energy firms have been exploiting the protocol issue in widespread attacks in countries. Some of the attacks have targeted critical infrastructure organizations, Cisco has warned.

No Attacks Yet

So far, there is no evidence that the RCE flaw in Smart Install has been exploited. However, proof-of-concept code for exploiting is available. The vulnerability stems from improper validation of packet data. Attackers can exploit it by sending a specially crafted Smart Install message to a vulnerable device via TCP port 4786 causing the device to reload. Attackers could also exploit the flaw to execute arbitrary code or to cause a denial of service condition, Cisco said.

Cisco did not respond to multiple requests for comment on whether the RCE flaw is being exploited in any of the ongoing attacks considering the significant number of devices that Embedi has reported as being exposed to the issue.

However, some security researchers said that the flaw indeed appears to be different from the one being exploited.

“This attack took advantage of Cisco’s Smart Install protocol,” says Bob Noel, director of strategic relationships and marketing for Plixer. “Organizations were provided guidance that Cisco did not consider this a vulnerability, and therefore no changes would be done to the protocol.”

Organizations were instructed to simply turn off the protocol, and those that remain exposed are those who have not done so, he says.

The damage an attacker could do with this would depend on their access privileges. By changing the startup configuration, an attacker could force a reboot of a switch and stop all traffic forwarding. “In a case where an attacker gained full administrative rights to a router/switch, they would be able to change the configuration of the device, add or remove security policies, or make any other changes,” Noel says.

Ashley Stephenson, CEO of Corero Network Security, says available evidence suggests attackers would not have needed to exploit the RCE flaw in the recent attacks. “While there is no proof, this was likely accomplished by just misusing the protocol,” he says.

The attacks show why it is important for organizations to understand the profile of systems exposed to the Internet. If it is exposed, someone will attempt to compromise it. “There is no excuse for exposing unnecessary ports or services, like TCP 4786 for Cisco Smart Install Client,” Stephenson says.

Related Content:

Interop ITX 2018

Join Dark Reading LIVE for a two-day Cybersecurity Crash Course at Interop ITX. Learn from the industry’s most knowledgeable IT security experts. Check out the agenda here. Register with Promo Code DR200 and save $200.

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year … View Full Bio

Article source: https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Thousands of Google employees call for company to cancel Pentagon work

“You don’t buy [artificial intelligence] like you buy ammunition,” says Marine Corps Col. Drew Cukor.

Cukor, from a speech given to military and industry technology experts in July:

There is no ‘black box’ that delivers the AI system the government needs, at least not now. Key elements have to be put together… and the only way to do that is with commercial partners alongside us.

Gizmodo first reported last month that when we’re talking industry heavyweights in artificial intelligence (AI) that are working with the Pentagon, we’re talking, among others, about Google.

Specifically, Google’s working with the Pentagon on Project Maven, a pilot program to identify objects in drone footage and to thereby better target drone strikes.

Google, as in, the company whose motto is Don’t Be Evil.

A vocal and large group of Google employees are outraged that the company’s working on what they call the “business of war.” The New York Times reports that a letter – the newspaper published it here – circulating within Google pleads with the company to pull out of the program. As of Wednesday, it had garnered more than 3,100 signatures.

The letter, which is addressed to CEO Sundar Pichai, asks that the company announce a policy that it will not “ever build warfare technology” and that it pull out of Project Maven:

We believe that Google should not be in the business of war. Therefore we ask that Project Maven be cancelled, and that Google draft, publicize and enforce a clear policy stating that neither Google nor its contractors will ever build warfare technology.

The letter references reassurances from Diane Greene, who leads Google’s cloud infrastructure business, that the technology will not “operate or fly drones” and “will not be used to launch weapons.”

Still, the technology’s being built for the military, the letter says, and once it’s delivered, “it could easily be used to assist in these tasks.”

The NYT reports that Google employees had raised questions about Google’s involvement in Project Maven at a recent company-wide meeting.

A company spokesman said that most of the signatures on the protest letter were collected before the company explained the situation.

The letter predicts that working on technology that could wind up on the battlefield “will irreparably damage Google’s brand and its ability to compete for talent.” That reflects what the NYT calls a culture clash between Silicon Valley and the federal government: one that’s “likely to intensify as cutting-edge artificial intelligence is increasingly employed for military purposes.”

A Google spokesperson told Gizmodo that the company is providing the Defense Department with TensorFlow APIs, which are used in machine learning applications, to help military analysts detect objects in images.

Both Google and the Pentagon are all too aware of fears about entrusting the killing of humans to autonomous weapons systems: systems that could fire without a human operator. Both Google and the Pentagon have said that Google’s tools won’t be used to create such a system.

The Google spokesperson who spoke with the NYT acknowledged this much-debated topic and said that the company is currently working “to develop polices and safeguards” around the technology’s use:

We have long worked with government agencies to provide technology solutions. This specific project is a pilot with the Department of Defense, to provide open source TensorFlow APIs that can assist in object recognition on unclassified data. The technology flags images for human review, and is for non-offensive uses only. Military use of machine learning naturally raises valid concerns. We’re actively discussing this important topic internally and with others as we continue to develop policies and safeguards around the development and use of our machine learning technologies.


Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/i21xZFp7ApM/

Hacker mines up to $1 million in Verge after exploiting major bug

Earlier this week, investors in the popular privacy-oriented Verge (XVG) cryptocurrency received disquieting news.

According to a forum post, a malicious miner appeared to have found a way to subject Verge to a widely-hypothesised blockchain takeover called a “51% attack”.

In layman’s terms, someone was exploiting the majority of the mining power of the blockchain, potentially gaining power over its currency generation.

Theoretically, this could happen if a single miner suddenly acquired lots of computing power to ramp up its hashrate (equivalent to its currency-generating horsepower) but this time it appeared the reason was simpler – the attacker had found bugs in Verge’s software:

According to someone called OCminer:

Due to several bugs in the XVG code, you can exploit this feature by mining blocks with a spoofed timestamp. When you submit a mined block, as a malicious miner or pool, you simply set a false timestamp to this block one hour ago and XVG will then “think” the last block mined on that algorithm was one hour ago.

Your next block, the subsequent block, will then have the correct time. And since it’s already an hour ago – at least that is what the network thinks – it will allow this block to be added to the main chain as well.

Because Verge uses five different algorithms for successive mined blocks, this shouldn’t be possible. However, the time stamp spoofing bug had allowed the attacker to mine the currency using only one, Scrypt, at a greatly accelerated rate.

With anxiety rising, Verge’s official Twitter feed claimed that this was not a dreaded 51% attack after all:

Equally, others pointed out, this “small attack” had allowed the attacker to generate 1,560 Verge per second ($80 per second) which, depending on how long this rate was sustained, could represent anything from a few thousand dollars to approaching a million.

Inconveniently, fixing the issue would require what amounted to a hard fork in Verge, a major upgrade requiring all miners to upgrade to a new protocol and blockchain.

Verge experienced metamorphosis before when it emerged from a rebranding of a currency called DogeCoinDark in 2016, itself an earlier hard fork of the cultish Dogecoin.

The Verge community has been left arguing about what this fork achieved as a defence mechanism, with some describing it as botched.

Argued one analysis:

The XVG team erroneously forked their entire network to ‘undo’ the exploited blocks, but this resulted in the entire network being unable to sync.

Meanwhile, it looks as if the attacker will keep the Verge mined during the attack.

This isn’t the first time a software bug in a cryptocurrency blockchain has created money out of thin air – a less serious issue allowed something like this to happen to Coinbase last month.

What will seem extraordinary to outsiders is the confusion surrounding what did or didn’t happen to Verge during this attack, let alone the fact it happened at all.

To sceptics, it’s another warning that blockchains are not the infallible concept some have claimed.


Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/xYFh2yhDzfk/

5 Facebook facepalms (just last week)

Your weekly roundup of Facebook news, also known as #SOMUCHPRIVACYSPLATTER!!!

In the wake of the Cambridge Analytica (CA) User Data Grabathon, Facebook’s spasming like a data addict suffering from withdrawal-related delirium tremors. Here are our picks for the week’s Top 5 chunks of shrapnel from that and other Facebook hijinx:

1. Facebook broke Tinder

Facebook on Wednesday applied thumbscrews to apps, tightening up its API in hopes of rewriting its history of ignoring developers as they’ve gleefully ransacked users’ private data.

We said, Hooray! No more searching for users by email or phone, making it that much tougher for these apps to auto-scrape our data!

Oh, NO! said people who found that the privacy changes interrupted their Tinder chats with cute French people.

Users reported getting logged out and then not being able to log back in, in spite of jumping through a whole lot of privacy hoops. New York Magazine reported that things got circular: users were first asked to log in to Facebook. Then they were asked to provide “additional Facebook permissions” to “create fuller profiles, verify authenticity and provide support.” Tapping “Ask me” on the permission request merely sent users back to the original notification asking them to log in to Facebook.

Facebook said it was a glitch. It was fixed later Wednesday night. Sorry about that, Facebook said. And no, your come-on lines weren’t that bad, and yes, you can now return to the search for the love of your life.

2. What’s a mere 37 million more CA victims between BFFs?

Speaking of that Wednesday privacy spasm, Facebook’s post about the overhaul included a wee bit more information about the CA Grabathon.

The factoid has to do with how many Facebook users were affected by CA’s harvesting of data to build “psychographic” profiles (all the better to profile you with, my dear, and to then target you with uber personalized political ads).

Two investigatory reports – one from the New York Times, another from The Observer – had originally estimated that more than 50 million Facebook users were psychographically scraped in early 2014 to build the system.

Make that 87 million-ish, Facebook said… A number that translates into “basically, all US users.”

From the post, written by Facebook CTO Mike Schropfer:

Given the scale and sophistication of the activity we’ve seen, we believe most people on Facebook could have had their public profile scraped in this way.

3. Facebook shelves plans to share data with hospitals (what now?!!?!?!!)

Now here’s a neat idea, Facebook apparently said to itself before CA blew up in its face: we’ll build medical profiles of people with anonymized medical data – illnesses, prescription information, that sort of thing – match it with the data we’ve got, and help hospitals figure out which patients might need special care or treatment.

Right. Then CA happened. You could practically hear the screeching wheels on that data gurney.

A Facebook spokesperson told CNBC that the plan never went beyond the talking stage:

This work has not progressed past the planning phase, and we have not received, shared, or analyzed anyone’s data.

…though as recently as last month, Facebook was talking to several health organizations about signing a data-sharing agreement, including Stanford Medical School and American College of Cardiology. The plan would have been to anonymize the data, to use hashing to match individuals’ Facebook profiles with their medical profiles, and to use the data strictly for medical research.

What could possibly have gone wrong with that, Dr. Frankenzucker? I guess we’ll have to wait for things to calm down before we find out. Granted, that might be never, at this rate.

4. Facebook’s been secretly deleting Zuck’s Messenger messages

No, thank you: that privacy dogfood we put out for public consumption isn’t quite to our taste, Facebook admitted. That’s why it’s been secretly deleting founder and CEO Mark Zuckerberg’s messages.

A spokesperson told TechCrunch that the company started retracting certain messages from users’ inboxes after the embarrassing Sony Pictures hack:

After Sony Pictures’ emails were hacked in 2014 we made a number of changes to protect our executives’ communications. These included limiting the retention period for Mark’s messages in Messenger. We did so in full compliance with our legal obligations to preserve messages.

5. Privacy groups challenge Facebook’s use of facial recognition

Just who, exactly, told Facebook it was OK to use our biometrics to tag us in photos?

Why, nobody. That’s why the Electronic Privacy Information Center (EPIC) and several other consumer groups planned to file a complaint on Friday with the US Federal Trade Commission (FTC), asking for an investigation into the company’s use of facial recognition technology.

They shared a draft of the complaint with USA Today.

EPIC president Marc Rotenberg:

The problem is that the people Facebook is trying to ‘tag’ did not consent to being identified.

Facebook uses facial identification to recognize people in photos, thus making it easier for users to tag them. It also lets people know if they’ve shown up in other people’s photos or videos.

Rob Sherman, Facebook Deputy Chief Privacy Officer, said in a statement that it also helps the visually impaired:

Our face recognition technology helps people manage their identity on Facebook and makes our features work better for people who are visually impaired.

Facebook is already facing a class action suit brought by Illinois residents that claim that the social network violated Illinois privacy laws by “secretly” amassing users’ biometric data without getting consent from the plaintiffs.

Another complaint? Just add it to the pile: the FTC’s already going after Facebook over CA-palooza.

Let’s get meta: for more Naked Security coverage of Facebook, follow us on Facebook!


Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/ndOXR7aPfq8/

Cinema voucher-pusher tells customers: Cancel your credit cards, we’ve been ‘attacked’

Updated Worker perks-flinger Sodexo has told a number of customers to cancel their credit cards following “a targeted attack” on its cinema vouchers platform, Filmology.

The scheme, which provides UK employee rewards via discounted cinema tickets, has also taken its site down “for the foreseeable future” in order “to eliminate any further potential risk” to consumers and to protect consumers’ data.

In an email to customers, seen by The Register, Sodexo Filmology said it had informed the Information Commissioner’s Office and a specialist forensic investigation team.

“We would advise all employees who have used the site between 19th March-3rd April to cancel their payment cards and check their payment card statements,” it said.

“These incidents have been caused by a targeted attack on the system we use to host our Cinema Benefits platform, despite having put in place a number of preventative measures with CREST-approved security specialists.”

It seems the issue has been going on for several months, with one employee complaining on the Money Saving Expert forum in February that he had been the victim of attempted fraud.

British post box

£12k fine slapped on Postman Pat and his 300,000 spam emails

READ MORE

He wrote: “After speaking to Filmology to ask exactly what had happened, I was informed that my bank details were stolen from the payment page and that the incident has been reported to the ICO. The hack on the payment page was carried out over 2 months and involved many accounts.”

Benn Morris, founder of 3B Data Security, which forensically investigates credit card breaches, said: “In terms of who is at fault, that is unanswerable without looking at the investigation.

“While the merchant is ultimately responsible, that does not mean they caused the breach as it could be down to outsourcing a service to a third party, or a fault in one of the software products they are using. All will have to be PCI compliant [the payment card industry’s data security standard].”

Advice to cancel cards might be due to either Visa, MasterCard or the card issuer having spotted a pattern of fraudulent activity and having alerted the merchant after suspecting they are the common point of purchase for fraudulent activity. “In which case they are taking a precautionary step by informing customers in this way,” Morris said.

He added that taking the website down was one way of ensuring no further breaches occurred. “That doesn’t often happen, but it might be in this case they are still taking payments through other means. Again, that doesn’t necessarily imply a hack.”

In a statement Sodexo said the breach only affected customers in the UK and Ireland. It said the company had previously been made aware of similar unlawful access to personal data on Sodexo Filmology platforms, and immediately notified the authorities, including law enforcement agencies, as well as affected customers.

“Since that incident, Sodexo has continued to carefully monitor and audit the site, and was thereby able to identify additional unlawful access to personal data that were used on certain Sodexo Filmology platforms.” It added that the recent attack occurred despite having put in place a number of preventative measures with CREST-approved security specialists. It then took the decision to take the website down.

“We apologise for the inconvenience this has caused and are doing all that we can to provide access to these benefits via alternative means. We will share more information on this with our customers in due course.” ®

Sponsored:
Minds Mastering Machines – Call for papers now open

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2018/04/09/cinema_voucher_biz_tells_customers_to_cancel_credit_cards_following_breach/

Best Buy the Latest Victim of Third-Party Security Breach

Retailer says customer payment and other information may have been exposed via the breach of [24]7.ai online chat provider.

Best Buy last week joined Sears Holding Corp. and Delta Airlines in disclosing that their customer data was exposed via a breach of online chat provider [24]7.ai.

The electronics retailer said its customers’ payment information may have been compromised between Sept. 27 and Oct. 12, the timeframe [24]7.ai said it had suffered a security breach

“Since we were notified by [24]7.ai, we have been working to determine the extent to which Best Buy online customers’ information was affected. We have done that in collaboration with our third-party vendor and have notified law enforcement. As best we can tell, only a small fraction of our overall online customer population could have been caught up in this [24]7.ai incident, whether or not they used the chat function,” Best Buy said in an April 5 statement on its website. 

Best Buy’s revelation follows that of Sears and Delta Airlines. Sears last week said credit card information belonging to about 100,000 of its customers may have been stolen during online transactions, and Delta said names, addresses, card numbers, CVV numbers, and card expiration dates of potentially several hundred thousand customers were exposed via the [24]7.ai breach.

Read more from Best Buy here

Interop ITX 2018

Join Dark Reading LIVE for two cybersecurity summits at Interop ITX. Learn from the industry’s most knowledgeable IT security experts. Check out the security track here. Register with Promo Code DR200 and save $200.

Dark Reading’s Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Article source: https://www.darkreading.com/attacks-breaches/best-buy-the-latest-victim-of-third-party-security-breach/d/d-id/1331479?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Serverless Architectures: A Paradigm Shift in Application Security

“Serverless” forces software architects and developers to approach security by building it in rather than bolting it on. But there is a downside.

One of the biggest security upsides to developing on serverless architectures is that organizations don’t have to deal with the daunting task of having to constantly apply security patches for the underlying operating system. These tasks are now in the domain of the serverless architecture provider.

Yet even though developers are no longer accountable for the many security tasks now handled by the serverless cloud provider, they are still responsible for designing robust applications and making sure that application code doesn’t introduce application layer vulnerabilities. It seems that this responsibility is not going away any time soon.

Moreover, any configuration related to the application itself or to the cloud services it interacts with would still need to be secure; again, this is still the responsibility of the application owner.

In the serverless world, the cloud vendor and you share security responsibilities. The following images demonstrate the shared serverless security responsibilities model:

While serverless architectures introduce simplicity and elegance, it also introduces a new set of issues and application security challenges:

Increased attack surface: Serverless functions consume data from a wide range of event sources such as HTTP APIs, message queues, cloud storage, and Internet of Things device communications. This increases the attack surface dramatically, especially when messages use protocols and complex message structures, many of which cannot be inspected by standard application layer protections such as Web application firewalls.

Attack surface complexity: The attack surface in serverless architectures can be difficult for some to understand given that such architectures are still rather new. Many software developers and architects have yet to gain enough experience with the security risks and appropriate security protections required to secure such applications.

Overall system complexity: Visualizing and monitoring serverless architectures is still more complex than standard software environments

Inadequate security testing: Performing security testing for serverless architectures is more complex than testing standard applications, especially when such applications interact with remote third-party services or with back-end cloud services such as NoSQL databases, cloud storage, or stream processing services. In addition, automated scanning tools are currently not adapted to scanning serverless applications.

Traditional security protections become unsuitable: Since organizations that use serverless architectures do not have access to the physical (or virtual) server or its operating system, they are not at liberty to deploy traditional security layers such as endpoint protection, host-based intrusion prevention, Web application firewalls, or RASP (runtime application self-protection) solutions.

This last point mandates a drastic paradigm shift in application security for serverless architectures. By definition, in a serverless architecture you only control your application’s code, and that’s pretty much the only thing you own. This means that if you need to protect your own serverless code, your only option is to make sure that you write secure code and that you bake security into your application.

That’s actually not a bad thing — serverless computing forces software architects and developers to approach security the way it should’ve been approached early on — by building security in rather than bolting it on.

Related Content:

Interop ITX 2018

Join Dark Reading LIVE for two cybersecurity summits at Interop ITX. Learn from the industry’s most knowledgeable IT security experts. Check out the security track here. Register with Promo Code DR200 and save $200.

 

Ory Segal is a world-renowned expert in application security, with 20 years of experience in the field. Ory is the CTO and co-founder of PureSec, a start-up that enables organizations to secure serverless applications. Prior to PureSec, Ory was senior director of threat … View Full Bio

Article source: https://www.darkreading.com/cloud/serverless-architectures-a-paradigm-shift-in-application-security/a/d-id/1331418?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

CA Acquires SourceClear

CA adds software composition analysis capabilities to Veracode lineup through acquisition

CA has announced the acquisition of SourceClear, a software composition analysis (SCA) firm founded by Mark Curphey, the creator of OWASP. SCA identifies third-party and open-source components used in applications and informs development teams about the licenses and libraries, including those that should be upgraded or patched. In particular, SCA will alert the development team to any open-source frameworks have open CVEs that must be addressed.

SourceClear’s SaaS-based tool looks not only at the libraries bound to the project but whether vulnerable components are being used by the application. According to CA, this capability will allow developers to focus their attention on vulnerabilities that are most likely to have an impact on the project and its users.

SourceClear data-mines commits (formal changes) in open-source libraries, watches bug-trackers, and parses the change-logs of commonly used libraries, in addition to tracking public sources such as CVEs. This may allow customers to find vulnerabilities that have not yet been reported to NVD. In each case, SourceClear includes prescriptive fix information.

In a statement, CA said that it plans to ultimately integrate SourceClear fully into the Veracode cloud platform.

For more, read here.

Interop ITX 2018

Join Dark Reading LIVE for an intensive Security Pro Summit at Interop IT X and learn from the industry’s most knowledgeable IT security experts. Check out the agenda here.Register with Promo Code DR200 and save $200.

Dark Reading’s Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Article source: https://www.darkreading.com/application-security/ca-acquires-sourceclear/d/d-id/1331481?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple