Network News, Articles and Updates

Lazy hackers employ gruntbots to quickly breach network defences

Researchers at Cybereason have been analysing a complex network honeypot operation, and the results should make every CISO pause for thought.

UK and US point fingers at ongoing Russia network attacks

Russian state-sponsored hackers are attacking network infrastructure wholesale, according to US and UK governments.

Juniper patched multiple vulnerabilities

Juniper Networks released more than a dozen security updates to patch a wide range of issues including two denial-of-service vulnerabilities and one for remote code execution.

Hackers still exploiting the human factor to carry out ransomware attacks

Nearly 70 percent of successful ransomware attacks in 2017 were the result of hackers gaining access to enterprise networks by phishing via email or social media network.

How to avoid legacy IT costing your business more than money

There's no need to update valid technologies unless the cost of maintaining them outweighs the upgrade cost. Take into account some legacy systems can increase your vulnerability if not designed for the current threat landscape.

Critical flaws in 4G LTE protocols leaving mobile devices vulnerable

Unpatched security vulnerabilities in the 4G LTE protocol allow anyone to connect to a network by impersonating a victim's phone without possessing legitimate credentials, launch DDoS attacks, and hijack a phone's paging channel.

Why visibility & forensics are key to enterprise security - a checklist

A six point checklist for making sure that your security teams have the capacity to track the root causes and progress of malware.

After 'isolated' hack, Germany says government computers are secure

The German government said on Wednesday that hackers had breached the network of government computers with an isolated attack that had been brought under control and which was being investigated by security officials.

Secure digital transformation - separate security from infrastructure

The key to achieving 'pay as you grow' security is to move away from traditional rigid security product models tied into the infrastructure by embracing an overlay approach that decouples security from the connectivity infrastructure.

SC Congress 2018: What's happening on your network?

Not knowing who or what is on your network is leaving organisations vulnerable to cyber-crime including ransomware. Although there are technical issues, training and personnel is a bigger problem.

Final Fantasy network recovers after losing health points to DDoS attack

The network hosting the role-playing video game Final Fantasy XIV experienced significant disruptions for three hours on 5 February as the result of a distributed denial of service (DDoS) attack.

Active Directory attack could enable malicious domain controller set up

DCShadow attack allows installation of backdoor. Hackers could set up their own fake domain controller in an existing corporate network to distribute malware and leave a backdoor.

Grey's Anatomy resolves hospital hacker plot, security experts analyse plot

Previously on Grey's Anatomy... Grey Sloan Memorial Hospital's network was taken over by a hacker who demanded millions in Bitcoin, in what was essentially a ransomware attack.

Google's DoubleClick network exploited to serve cryptominers

A malvertising campaign was observed exploiting Google's DoubleClick network to deliver silent cryptominers on high-traffic sites.

Securing the future of IoT; poor implementation will weaken security

IoT is part of a fundamental shift forward in enterprise networking - towards a cloud-enabled 'consume' approach - and yet most companies plan to implement IoT in a way that parallels an outdated way of 'DIY' networking.

Cyber-attack shuts down US Regional Hospital's online system

A cyber-attack that left computer screens at Hancock Regional Hospital in Greenfield, Indiana, USA, with a ransom message for bitcoin has caused the entire network at the hospital to go offline to stop damage to data of the patients.

Hackers use NSA exploits to mine Monero

Zealot campaign used Eternalblue and Eternalsynergy to mine Monero cryptocurrency on networks.

Understanding the threat of privilege identity theft

You'd think hackers will attempt social engineering exploits on your privileged users. In reality, it is more likely they will aim for a softer initial target. But once within the network, hackers will move onto their true target, the privileged user.

A postmortem of the Grey's Anatomy ransomware episode: Accurate or not?

In the mid-season finale of Grey's Anatomy, titled "Out of Nowhere," Grey-Sloan Memorial Hospital itself was on life support after its network became infected with ransomware - how realistic was the portrayal?

The evolution of analytics in threat detection

Cyber threats are evolving quickly. Fortunately, so is incident detection and response (IDR), powered by data explains Eric Sun, with techniques such as honeypots identifying suspect behaviour.

Will IETF proposal be the end of enterprise middlebox traffic snooping?

Is the ability to effectively bypass monitoring middleboxes is a good thing, both for the enterprise and more broadly network security?

Equifax hackers likely in network from March - 141 days before discovery

It took Equifax 141 days to discover a breach that exposed the data of 143 million US consumers with hackers likely accessing the credit monitoring firm's systems in March, a full two months before Equifax originally said they did.

'ShadowPad' attack sabotaged NetSarang software with backdoor

Attackers secretly modified at least five software packages distributed by network connectivity and server management solutions provider NetSarang in order to infect its business users with modular backdoor spyware.

Cyber due-diligence now forms an essential part of M&A planning

As cyber-concerns make their way up the boardroom agenda, companies involved in mergers and acquisitions are increasingly conducting cyber due-diligence.

RSA 2016: Gartner Tries To Demystify Security Analytics

With more companies adding tools that significantly increase the data flows used to analyse network traffic, a mythology seems to have been created surrounding security analytics according to Anton Chuvakin, research vice president at Gartner.

'Devastating flaws' in Kerberos authentication protocol

Security watchers warn of authentication and authorisation flaws in Windows network environments

Securing your organisation from insider threats

Living in a networked world has its advantages, but it also leaves organisations vulnerable to exploitation by malware, inadvertent employee actions and malicious attacks, says Salo Fajer

Is your app secure? Probably not

App vulnerabilities need to be thought about holistically, so the network and database in which they reside also need to be considered says Josh Shaul.

Poor measurement leaves networks dangerously open to attack

The ever-changing threat landscape is causing problems, with many business networks unable to keep up with the pace of innovation, argues Gavin Millard.

More questions than answers as BBC outage fuels DDoS talk

The British Broadcasting Corporation was hit by a prolonged outage on its website and iPlayer video-on-demand service (VOD) last weekend, raising questions about the cause and whether it was subjected to a distributed-denial-of-service (DDoS) attack.