πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
<b>&#9000; A Breach, or Just a Forced Password Reset? &#9000;</b>

<code>Software giant Citrix Systems recently forced a password reset for many users of its Sharefile content collaboration service, warning it would be doing this on a regular basis in response to password-guessing attacks that target people who re-use passwords across multiple Web sites. Many Sharefile users interpreted this as a breach at Citrix and/or Sharefile, but the company maintains that’s not the case. Here’s a closer look at what happened, and some ideas about how to avoid a repeat of this scenario going forward.</code><code>The notice sent to ShareFile users looked like this:</code><code>Media</code><code>Dozens of readers forwarded the above message to KrebsOnSecurity, saying they didn’t understand the reasoning for the mass password reset and that they suspected a breach at ShareFile.</code><code>I reached out to ShareFile and asked them point blank whether this reset effort was in response to any sort of intrusion at Citrix or ShareFile; they said no. I asked if this notice had been sent to everyone, and inquired whether ShareFile offers any form(s) of multi-factor authentication options that customers could use to supplement the security of passwords.</code><code>A Citrix spokesperson referred me to this page, which says ShareFile users have a number of options when it comes to locking down their accounts with multi-factor authentication, including a one-time code sent via SMS/text message, as well as one-time passwords generated by support authenticator mobile apps from Google and Microsoft (app-based multi-factor is the more secure option, as discussed here).</code><code>More importantly, the Citrix spokesperson said the company did not enforce a password reset on accounts that were using multi-factor authentication. To wit:</code><code>β€œThis is not in response to a breach of Citrix products or services,” wrote spokesperson Jamie Buranich. β€œCitrix forced password resets with the knowledge that attacks of this nature historically come in waves. Attacker’s additional efforts adapt to the results, often tuning the volume and approach of their methods. Our objective was to minimize the risk to our customers. We did not enforce a password reset on accounts that are using more stringent authentication controls [emphasis added]. Citrix also directly integrates with common SSO solutions, which significantly reduces risk.”</code><code>The company did not respond to questions about why it decided to adopt regular password resets as a policy when doing so flies in the face of password and authentication best practices recommended the National Institute of Standards and Technology (NIST), which warns:</code><code>β€œVerifiers SHOULD NOT require memorized secrets to be changed arbitrarily (e.g., periodically). However, verifiers SHALL force a change if there is evidence of compromise of the authenticator.”</code><code>NIST explains its rationale for steering organizations away from regular forced password resets thusly:</code><code>β€œUsers tend to choose weaker memorized secrets when they know that they will have to change them in the near future. When those changes do occur, they often select a secret that is similar to their old memorized secret by applying a set of common transformations such as increasing a number in the password. This practice provides a false sense of security if any of the previous secrets has been compromised since attackers can apply these same common transformations.”</code><code>β€œBut if there is evidence that the memorized secret has been compromised, such as by a breach of the verifier’s hashed password database or observed fraudulent activity, subscribers should be required to change their memorized secrets. However, this event-based change should occur rarely, so that they are less motivated to choose a weak secret with the knowledge that it will only be used for a limited period of time.”</code><code>In short, NIST says it makes…
πŸ•΄ Backdoors Up 44%, Ransomware Up 43% from 2017 πŸ•΄

Nearly one in three computers was hit with a malware attack this year, and ransomware and backdoors continue to pose a risk.

πŸ“– Read

via "Dark Reading: ".
❌ Google Chrome 71 Touts 43 Fixes, Fights Ad Abuse ❌

The browser comes with a new set of protections to block pop-ups that could lead to 'abusive experiences.'

πŸ“– Read

via "Threatpost | The first stop for security news".
⚠ Could adult content ban spell the end for Tumblr? ⚠

#TumblrIsDead? Tumblr is banning adult content in an effort to be safer, better, β€œmore positive,” and less (female) nipple-ish.

πŸ“– Read

via "Naked Security".
⚠ Those are NOT your grandchildren! FTC warns of new scam ⚠

Grandkid imposters are managing to finagle a skyrocketing amount of money out of people, the FTC warns.

πŸ“– Read

via "Naked Security".
⚠ Kubernetes cloud computing bug could rain data for attackers ⚠

Kubernetes, a tool that powers much modern native cloud infrastructure, just got its first big security bug - and it’s a mammoth one.

πŸ“– Read

via "Naked Security".
⚠ Quora.com admits data breach affecting 100 million accounts ⚠

Hackers have compromised data from the accounts of 100 million users of question and answer site Quora.com.

πŸ“– Read

via "Naked Security".
πŸ•΄ 6 Ways to Strengthen Your GDPR Compliance Efforts πŸ•΄

Companies have some mistaken notions about how to comply with the new data protection and privacy regulation - and that could cost them.

πŸ“– Read

via "Dark Reading: ".
πŸ” 3 ways to kick-start your organization's cybersecurity training πŸ”

Only 45% of organizations offer mandatory cybersecurity training, according to a Mimecast report. Here's how to boost your employees' security education.

πŸ“– Read

via "Security on TechRepublic".
πŸ” 70% of businesses using bots to boost efficiency, only 5% govern their access to data πŸ”

As software bots spread throughout the enterprise, business leaders must control their access to sensitive information, according to a SailPoint report.

πŸ“– Read

via "Security on TechRepublic".
❌ Adobe Patches Zero-Day Vulnerability in Flash Player ❌

The vulnerability could lead to arbitrary code execution.

πŸ“– Read

via "Threatpost | The first stop for security news".
πŸ” 5 ways to avoid cyberattacks during holiday travel πŸ”

Whether traveling for business or the holidays this month, follow these tips from Matrix Integration to keep your devices safe.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ The Case for a Human Security Officer πŸ•΄

Wanted: a security exec responsible for identifying and mitigating the attack vectors and vulnerabilities specifically targeting and involving people.

πŸ“– Read

via "Dark Reading: ".
❌ Kubernetes Flaw is a β€œHuge Deal,” Lays Open Cloud Deployments ❌

Hackers can steal data, sabotage cloud deployments and more.

πŸ“– Read

via "Threatpost | The first stop for security news".
❌ Adobe Flash Zero-Day Leveraged Via Office Docs in Campaign ❌

Adobe issued a patch for the zero-day on Wednesday.

πŸ“– Read

via "Threatpost | The first stop for security news".
πŸ•΄ Republican Committee Email Hacked During Midterms πŸ•΄

The National Republican Congressional Committee detected the compromise of four staffers' email accounts in April.

πŸ“– Read

via "Dark Reading: ".
πŸ” Symantec develops neural network to thwart cyberattack-induced blackouts πŸ”

The company is rolling out a device that scans for malware on USB devices to block attacks on IoT and operational technology environments.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Former Estonian Foreign Minister Urges Cooperation in Cyberattack Attribution, Policy πŸ•΄

Nations must band together to face nation-state cyberattack threats, said Marina Kaljurand.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Google Cloud Security Command Center Now in Beta πŸ•΄

The beta release of Google Cloud SCC will include broader coverage across the cloud platform and more granular access controls, among other features.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2017-1622

IBM QRadar SIEM 7.2.8 and 7.3 does not validate, or incorrectly validates, a certificate. This weakness might allow an attacker to spoof a trusted entity by using a man-in-the-middle (MITM) attack. IBM X-force ID: 133120.

πŸ“– Read

via "National Vulnerability Database".