Sunday, July 31, 2022

Now is the time to focus on software supply chain security improvements

The shift to cloud-native development, along with the increased speed in development brought about by the adoption of DevOps processes, has made the challenges connected with securing software supply chains infinitely more complex, according to recent research from Venafi. In this Help Net Security video, Kevin Bocek, VP of Threat Intelligence and Business Development, Venafi, discusses how CIOs are becoming increasingly concerned about the serious business disruptions, revenue loss, data theft, and customer damage that … More

The post Now is the time to focus on software supply chain security improvements appeared first on Help Net Security.


from Help Net Security https://ift.tt/7HahJtG

The most impersonated brand in phishing attacks? Microsoft

Vade announced its H1 2022 Phishers’ Favorites report, a ranking of the top 25 most impersonated brands in phishing attacks. Microsoft came in at #1 on the list, followed by Facebook. Rounding out the top five are Crédit Agricole, WhatsApp, and Orange.

Microsoft brand impersonation

Microsoft continues to be a top target for brand impersonation

With 11,041 unique phishing URLs, Microsoft is the top target for brand impersonation. The popularity of Microsoft 365 among SMBs and enterprises has made Microsoft a lucrative target for phishers hoping to steal valuable data from Microsoft 365 applications.

Additionally, compromising a Microsoft 365 account allows hackers to conduct internal attacks, such as distributing malware, launching ransomware attacks, and manipulating users into participating in business email compromise.

Phishing attacks increased in Q1, then declined in Q2

According to the report, which you can read in full here, Q1 saw the most phishing attacks, with 81,447 unique phishing URLs detected, compared to 53,198 in Q2. For most brands, the phishing increase in Q1 was drastic. Among the most notable increases, Google phishing increased 873 percent, Apple phishing increased 737 percent, and Instagram phishing increased 683 percent.

Microsoft phishing increased 266 percent in Q1, while Facebook phishing declined 12 percent, making Facebook the only brand in the top 25 to see a QoQ decline in Q1.

Financial services was the most impersonated industry

Financial services brands saw the most impersonation of any industry represented in the report. The financial services industry had a total of eight brands in the top 25. Cloud followed with six brands on the list. The eCommerce/logistics and telco industries each had four brands in the top 25, followed by social media with three.

Highlights from the report

  • Phishers are most likely to attack on weekdays.
  • 34 percent of phishing URLs impersonated financial services brands in H1.
  • Facebook and WhatsApp were the most impersonated social media brands.
  • Microsoft was the most impersonated cloud brand.

from Help Net Security https://ift.tt/7SiRubV

Test your security configuration with a free assessment tool from CIS

CIS-CAT Lite is the free assessment tool developed by the CIS (Center for Internet Security), which helps users implement secure configurations for multiple technologies. With unlimited scans available via CIS-CAT Lite, your organization can download and start implementing CIS Benchmarks in minutes. With CIS-CAT Lite, you can: Instantly check your systems against CIS Benchmarks. Receive a compliance score 1-100. Follow remediation steps to improve your security.

The post Test your security configuration with a free assessment tool from CIS appeared first on Help Net Security.


from Help Net Security https://ift.tt/dtHvTli

Most companies are unprepared for CCPA and GDPR compliance

As of June 30, 2022, 91% of companies across all verticals, states, and business size that must comply with CCPA are still unprepared to meet CCPA requirements, according to CYTRIO. Further, 94% of companies that must comply with GDPR are ill prepared to meet the GDPR compliance requirements.

“The majority of companies that must meet CCPA, CPRA, and GDPR compliance have a long way to go, and with enforcements looming, many are exposed to compliance enforcement fines and private-right of-action,” said Vijay Basani, CEO, CYTRIO. “Through our ongoing research, we aim to educate the market on the importance of data privacy rights compliance, the need to enable consumers to easily exercise their data privacy rights, and how companies can build trust with their customers leveraging automated Data Subject Access Request (DSAR) submission and response solutions.”

During Q2 2022, CYTRIO researched 1,525 companies, bringing the total number of U.S. mid to large companies with revenues from $25 million to $5+ billion researched to 8,270 since Q3 2021. The research found 90% of companies were not fully compliant with CCPA and CPRA DSAR requirements and 95% of companies were using error prone and time consuming manual processes for GDPR compliance.

The research also revealed that more than 50% of companies that acknowledge in their privacy policy they need to comply with CCPA do not provide a mechanism for consumers to exercise their data privacy rights.

Companies are slowly shifting up in the compliance maturity curve with 3.5% of companies that were using manual processes in Q1 2022 moved to compliance automation solutions, while 6% of non-compliant companies moved to a manual process to begin compliance with CCPA.

Other observations from the Q2 research includes:

  • 22% of companies stated they need to comply with both CCPA and GDPR, an almost 6% increase from the Q1 2022 cohort.
  • The trend of larger companies (1,000+ employees) deploying automated solutions at a slightly higher rate than smaller companies (less 1,000 employees) continues, though the vast majority are unprepared for compliance.
  • Though CCPA is agnostic to industry verticals, the top three most compliant verticals remained the same from the end of Q1 2021 to the end of Q2 2022: Business Services, Retail, and Finance, making up 55% of the companies researched.
  • B2C companies are more likely to deploy an automation solution and are better prepared to comply with CCPA data privacy rights. More than 52% of B2B companies do not provide a mechanism for consumers to exercise their data privacy rights compared to 47% of B2C companies.

Data privacy rights are becoming more urgent as the expansive CPRA that goes into effect on January 1, 2023 requires companies to deploy an effective and scalable CCPA compliance management solution.


from Help Net Security https://ift.tt/57Zpnm3

Infosec products of the month: July 2022

Here’s a look at the most interesting products from the past month, featuring releases from: Action1, Aqua Security, Cato Networks, CertiK, CoSoSys, CyberArk, Darktrace, Deloitte, EnGenius, Flashpoint, Fusion Risk Management, G-Core Labs, Kingston Digital, LogRhythm, N-able, NetApp, Orca Security, Persona, Rafay Systems, RangeForce, Rapid7, Resecurity, Runecast, Socura, and Teleport.

infosec products July 2022

Resecurity Digital Identity Protection defends individuals and businesses from identity theft

The Digital Identify Protection solution leverages Resecurity’s threat intelligence data from dark web activity, data leaks, credentials compromise, hacking activity, cyberespionage, supply chain and third-party data breaches — all of which are catalysts for major security incidents.

infosec products July 2022

Darktrace PREVENT proactively protects enterprises against sophisticated cyber threats

Darktrace launched Darktrace PREVENT, an interconnected set of AI products that deliver a proactive cyber security capability to help organizations pre-empt future cyber-attacks. PREVENT uses AI to ‘think like an attacker,’ finding pathways to an organization’s most critical assets from inside and outside.

infosec products July 2022

Fusion Risk Management announces new capabilities to improve incident response for organizations

By providing a dynamic approach to incident response, Fusion’s new functionalities enable organizations to understand the full impact of disruption and engage teams, critical partners, and response automation in response and recovery efforts. Organizations now have the power to protect important services and products by resolving incidents faster and preventing future occurrences.

infosec products July 2022

RangeForce platform updates enable users to conduct offensive and defensive attack scenarios

RangeForce announced it has enhanced its team threat exercises platform with new capabilities that make it easier for organizations to accelerate the skills development of their security teams through multi-user detection and response exercises of emulated attacks.

infosec products July 2022

G-Core Labs’ stand-alone solution offers protection against SYN Flood DDoS attacks

To provide its customers with better protection against SYN Flood DDoS attacks, G-Core Labs, in cooperation with Intel, have developed a stand-alone solution based on 3rd generation Intel Xeon Scalable processors. This new type of solution removes the need for a dedicated DDoS protection server and evenly distributes volumetric attacks across CDN servers, decreasing the performance requirements for every individual CDN node.

infosec products July 2022

Rafay Systems Paralus helps users achieve secure access to Kubernetes clusters

Paralus offers access management for developers, architects, and CI/CD tools to remote K8s clusters by consolidating zero-trust access principles such as transaction level authentication and authorization into a single open-source tool.

infosec products July 2022

Kingston IronKey Locker+ 50 protects sensitive personal or business data

Kingston Digital released IronKey Locker+ 50 (LP50) USB Flash drive that provides consumer-grade security with AES hardware-encryption in XTS mode to safeguard against BadUSB with digitally-signed firmware and Brute Force password attacks.

infosec products July 2022

Socura launches Managed Vulnerability Scanning service to help users identify potential vulnerabilities

Socura’s MVS service has been designed to help clients identify potential vulnerabilities and misconfigurations across all on- and off-premises systems, including their local network, cloud applications, web applications and mobile devices.

infosec products July 2022

LogRhythm platform enhancements accelerate threat response for security teams

LogRhythm launched version 7.9 of the LogRhythm SIEM Platform and updates to LogRhythm NDR and LogRhythm UEBA. LogRhythm arms security teams with intelligent analytics and automated responses to reduce cybersecurity exposure, eliminate blind spots and shut down attacks.

infosec products July 2022

Updated Action1 RMM enables MSPs and IT departments to automate critical tasks

Action1 released a new version of Action1 RMM, empowering MSPs and IT departments to mitigate and remediate security vulnerabilities on their managed endpoints more efficiently — as required to secure and support today’s work-from-anywhere workforce.

infosec products July 2022

Flashpoint Automate accelerates repeatable security-related processes

Combined with the Flashpoint Intelligence Platform, Flashpoint Automate’s capabilities provide security teams with the additional context needed to ensure they take action on intelligence, prioritize which threats or risks to work on, and remediate those risks from their organization.

infosec products July 2022

Deloitte Zero Trust Access protects sensitive enterprise data

Deloitte is launching a new managed service, Zero Trust Access. The service is designed to help businesses address the evolving requirements of enterprises to confidently protect their applications, infrastructure and data. It offers a cloud-native service that secures communications between end user devices, and enterprise applications, wherever they may reside.

infosec products July 2022

CertiK launches new web3 security features for addressing risk on crypto projects

CertiK launched several web3 Skynet security features to bolster end-to-end security for the web3 world. A new Skynet features provide further transparency to consumers around project risk, while also giving credit to projects where needed through badges and honors.

infosec products July 2022

N-able N-sight RMM enables MSPs to manage and secure their small to medium enterprise customers

N-able announced that it has launched N-able N-sight RMM, the complete solution for growing managed services providers (MSPs). N-sight RMM (RMM, MSP Manager, and Take Control) allow teams to safely access tools and information from nearly anywhere and also enables them to reduce manual efforts and increase operational performance.

infosec products July 2022

CyberArk Secrets Hub enables enterprises to accelerate transition to AWS

Secrets Hub, part of the CyberArk Identity Security Platform, was developed in cooperation with the AWS Secrets Manager team to deliver effective secrets management in hybrid environments. CyberArk Secrets Hub works by automatically replicating CyberArk-managed secrets (that are intended for use on AWS) to AWS Secrets Manager.

infosec products July 2022

CoSoSys Endpoint Protector v5.6 enables users to protect sensitive information

CoSoSys launched v5.6 of its Endpoint Protector solution, adding a host of new features to help organizations better protect their sensitive data from insider threats, accidental loss, and compliance breaches.

infosec products July 2022

Orca Security helps enterprises detect cloud attacks with Cloud Detection and Response capabilities

Orca Security, added Cloud Detection and Response (CDR) capabilities to its agentless Cloud Security Platform. The Orca Platform analyzes cloud provider logs and threat intelligence feeds using machine learning and rules-based heuristics, while also providing automated remediation to prevent security issues from progressing across the software development lifecycle (SDLC).

infosec products July 2022

Cato DLP secures and optimizes access to all applications

Cato Networks introduced Cato DLP, a Data Loss Prevention (DLP) engine to protect data across all enterprise applications without complex, cumbersome DLP rules. Cato’s access control layer ensures user can only access authorized applications and prevents them from accessing unauthorized resources or malicious sites.

infosec products July 2022

Persona Dynamic Flow enables users to verify sensitive identity information

Persona launched “Dynamic Flow,” a risk response and verification engine that customizes the identity verification (IDV) process in real time for each user and use case. The new release ingests live signals throughout the verification process and uses these signals to adjust each individual’s experience based on their risk profile and the company’s risk tolerance.

infosec products July 2022

EnGenius security gateway series helps IT teams protect business networks

EnGenius Technologies released its first-ever security gateway product line, bringing enterprise features, enhanced security, and cloud management from anywhere. The ESG series will work seamlessly with any third-party vendor network—all without the complex setup and configuration.

infosec products July 2022

Runecast announces new capabilities to simplify Kubernetes security and speed up operations

Runecast announced that its patented enterprise platform Runecast has expanded its current Kubernetes Security Posture Management (KSPM) capabilities with advanced image scanning. Running securely on-premises, Runecast automates security compliance checks for Kubernetes with insights into what is happening both on-premises and in the cloud.

infosec products July 2022

Rapid7 adds layered context capabilities to its InsightCloudSec platform

Rapid7’s addition of layered context provides organizations with a consolidated, resource-oriented view of the most critical risks in their environment, enabling them to more effectively prioritize and remediate issues.

infosec products July 2022

Aqua Runtime Protection detects sophisticated attacks in real time

Aqua Security launches runtime protection with minimal configuration to stop attacks in real time on running workloads. Protection is composed of new curated and optimised default security controls, as well as threat intel from observations of real attacks on cloud native environments.

infosec products July 2022

NetApp Spot Security identifies and assesses cloud security posture risks

Spot Security’s agentless technology analyzes cloud resource relationships to provide clear visibility and prioritized actions, automatically determining the prospective exposure of each cloud resource and surfacing critical security threats based on their potential impact to the organization. These automated actions mitigate alert fatigue and keep cloud infrastructure secure and operations teams efficient.

infosec products July 2022

Teleport 10 enables single sign-on to any infrastructure resource without passwords or usernames

Teleport 10 features passwordless access, a single sign-on infrastructure access solution that eliminates the need for usernames, passwords, private keys, and other secrets. Integrating secure biometric solutions such as TouchID, Windows Hello, Yubikey BIO, and other biometric hardware, Teleport 10 offers scalable identity-based access while reducing the probability of lost, shared or stolen credentials.

infosec products July 2022


from Help Net Security https://ift.tt/tD2gmLX