๐ด Twitter Hack May Have State-Sponsored Ties ๐ด
๐ Read
via "Dark Reading: ".
A data leak was disclosed after attackers targeted a support form, which had "unusual activity."๐ Read
via "Dark Reading: ".
Dark Reading
Twitter Hack May Have State-Sponsored Ties
A data leak was disclosed after attackers targeted a support form, which had unusual activity.
<b>⌨ A Chief Security Concern for Executive Teams ⌨</b>
<code>Virtually all companies like to say they take their customersโ privacy and security seriously, make it a top priority, blah blah. But youโd be forgiven if you couldnโt tell this by studying the executive leadership page of each companyโs Web site. Thatโs because very few of the worldโs biggest companies list any security executives in their highest ranks. Even among top tech firms, less than half list a chief technology officer (CTO). This post explores some reasons why this is the case, and why it canโt change fast enough.</code><code>KrebsOnSecurity reviewed the Web sites for the global top 100 companies by market value, and found just five percent of top 100 firms listed a chief information security officer (CISO) or chief security officer (CSO). Only a little more than a third even listed a CTO in their executive leadership pages.</code><code>The reality among high-tech firms that make up the top 50 companies in the NASDAQ market was even more striking: Fewer than half listed a CTO in their executive ranks, and I could find only three that featured a person with a security title.</code><code>Nobodyโs saying these companies donโt have CISOs and/or CSOs and CTOs in their employ. A review of these companies via LinkedIn suggests that most of them in fact do have people in those roles (although I suspect the few that arenโt present or easily findable on LinkedIn have made a personal and/or professional decision not to be listed as such).</code><code>But it is interesting to note which roles companies consider worthwhile publishing in their executive leadership pages. For example, 73 percent of the top 100 companies listed a chief of human resources (or โchief people officerโ), and about one-third included a chief marketing officer.</code><code>Not that these roles are somehow more or less important than that of a CISO/CSO within the organization. Nor is the average pay hugely different among all three roles. Yet, considering how much marketing (think consumer/customer data) and human resources (think employee personal/financial data) are impacted by your average data breach, itโs somewhat remarkable that more companies donโt list their chief security personnel among their top ranks.</code><code>Media</code><code>Julie Conroy, research director at the market analyst firm Aite Group, said she initially hypothesized that companies with a regulatory mandate for strong cybersecurity controls (e.g. banks) would have this role in their executive leadership team.</code><code>โBut a quick look at Bank of America and Chaseโs websites proved me wrong,โ Conroy said. โIt looks like the CISO in those firms is one layer down, reporting to the executive leadership.โ</code><code>Conroy says this dynamic reflects the fact that revenue centers like human capital and the ability to drum up new business are still prioritized and valued by businesses more than cost centers โ including loss prevention and cybersecurity.</code><code>โMarketing and digital strategy roles drive top line revenue for firmsโthe latter is particularly important in retail and banking businesses as so much commerce moves online,โ Conroy said. โWhile you and I know that cybersecurity and loss prevention are critical functions for all types of businesses, I donโt think that reality is reflected in the organizational structure of many businesses still. A common theme in my discussions with executives in cost center roles is how difficult it is for them to get budget to fund the tech they need for loss prevention initiatives.โ</code><code>EXHIBIT A: EQUIFAX</code><code>Common or not, the dominant reporting structure in corporations runs the risk of having security concerns take a backseat when they get in the way of productivity, and often leaves the security team without someone to advocate for the proper budget.</code><code>Take the mega breach at Equifax last year that exposed the personal and financialโฆ
<code>Virtually all companies like to say they take their customersโ privacy and security seriously, make it a top priority, blah blah. But youโd be forgiven if you couldnโt tell this by studying the executive leadership page of each companyโs Web site. Thatโs because very few of the worldโs biggest companies list any security executives in their highest ranks. Even among top tech firms, less than half list a chief technology officer (CTO). This post explores some reasons why this is the case, and why it canโt change fast enough.</code><code>KrebsOnSecurity reviewed the Web sites for the global top 100 companies by market value, and found just five percent of top 100 firms listed a chief information security officer (CISO) or chief security officer (CSO). Only a little more than a third even listed a CTO in their executive leadership pages.</code><code>The reality among high-tech firms that make up the top 50 companies in the NASDAQ market was even more striking: Fewer than half listed a CTO in their executive ranks, and I could find only three that featured a person with a security title.</code><code>Nobodyโs saying these companies donโt have CISOs and/or CSOs and CTOs in their employ. A review of these companies via LinkedIn suggests that most of them in fact do have people in those roles (although I suspect the few that arenโt present or easily findable on LinkedIn have made a personal and/or professional decision not to be listed as such).</code><code>But it is interesting to note which roles companies consider worthwhile publishing in their executive leadership pages. For example, 73 percent of the top 100 companies listed a chief of human resources (or โchief people officerโ), and about one-third included a chief marketing officer.</code><code>Not that these roles are somehow more or less important than that of a CISO/CSO within the organization. Nor is the average pay hugely different among all three roles. Yet, considering how much marketing (think consumer/customer data) and human resources (think employee personal/financial data) are impacted by your average data breach, itโs somewhat remarkable that more companies donโt list their chief security personnel among their top ranks.</code><code>Media</code><code>Julie Conroy, research director at the market analyst firm Aite Group, said she initially hypothesized that companies with a regulatory mandate for strong cybersecurity controls (e.g. banks) would have this role in their executive leadership team.</code><code>โBut a quick look at Bank of America and Chaseโs websites proved me wrong,โ Conroy said. โIt looks like the CISO in those firms is one layer down, reporting to the executive leadership.โ</code><code>Conroy says this dynamic reflects the fact that revenue centers like human capital and the ability to drum up new business are still prioritized and valued by businesses more than cost centers โ including loss prevention and cybersecurity.</code><code>โMarketing and digital strategy roles drive top line revenue for firmsโthe latter is particularly important in retail and banking businesses as so much commerce moves online,โ Conroy said. โWhile you and I know that cybersecurity and loss prevention are critical functions for all types of businesses, I donโt think that reality is reflected in the organizational structure of many businesses still. A common theme in my discussions with executives in cost center roles is how difficult it is for them to get budget to fund the tech they need for loss prevention initiatives.โ</code><code>EXHIBIT A: EQUIFAX</code><code>Common or not, the dominant reporting structure in corporations runs the risk of having security concerns take a backseat when they get in the way of productivity, and often leaves the security team without someone to advocate for the proper budget.</code><code>Take the mega breach at Equifax last year that exposed the personal and financialโฆ
โ Russia-Linked Sofacy Debuts Fresh Zebrocy Malware Variant โ
๐ Read
via "Threatpost | The first stop for security news".
The group continues to evolve its custom malware in an effort to evade detection.๐ Read
via "Threatpost | The first stop for security news".
Threat Post
Russia-Linked Sofacy Debuts Fresh Zebrocy Malware Variant
The group continues to evolve its custom malware in an effort to evade detection.
๐ด Memes on Twitter Used to Communicate With Malware ๐ด
๐ Read
via "Dark Reading: ".
Steganography via tweet images gave attackers a way to pass on malicious instructions to Trojan, researchers say.๐ Read
via "Dark Reading: ".
Darkreading
Memes on Twitter Used to Communicate With Malware
Steganography via tweet images gave attackers a way to pass on malicious instructions to Trojan, researchers say.
๐ด When Cryptocurrency Falls, What Happens to Cryptominers? ๐ด
๐ Read
via "Dark Reading: ".
The fall of cryptocurrency's value doesn't signify an end to cryptomining, but attackers may be more particular about when they use it.๐ Read
via "Dark Reading: ".
Darkreading
When Cryptocurrency Falls, What Happens to Cryptominers?
The fall of cryptocurrency's value doesn't signify an end to cryptomining, but attackers may be more particular about when they use it.
โ How not to secure US missile defences โ
๐ Read
via "Naked Security".
One BMDS siteโs patching was so deficient, it failed to address a critical vulnerability that first came to light nearly three decades ago.๐ Read
via "Naked Security".
Naked Security
How not to secure US missile defences
One BMDS siteโs patching was so deficient, it failed to address a critical vulnerability that first came to light nearly three decades ago.
โ SQLite creator fires back at Tencentโs bug hunters โ
๐ Read
via "Naked Security".
The creator of SQLite has downplayed reports of a bug that could lead to remote code execution.๐ Read
via "Naked Security".
Naked Security
SQLite creator fires back at Tencentโs bug hunters
The creator of SQLite has downplayed reports of a bug that could lead to remote code execution.
โ Instagram became the preferred tool in Russiaโs propaganda war โ
๐ Read
via "Naked Security".
Facebook and Twitter got a lot of heat, but "Instagramโs appeal is thatโs where the kids are, and that seems to be where the Russians went."๐ Read
via "Naked Security".
Naked Security
Instagram became the preferred tool in Russiaโs propaganda war
Facebook and Twitter got a lot of heat, but โInstagramโs appeal is thatโs where the kids are, and that seems to be where the Russians went.โ
โ Snack-happy parrot shows insider threats come in all shapes and sizes โ
๐ Read
via "Naked Security".
The African Grey has tried to get Alexa to send him lightbulbs, a kite, watermelon, ice cream, strawberries, raisins, broccoli and ice cream.๐ Read
via "Naked Security".
Naked Security
Snack-happy parrot shows insider threats come in all shapes and sizes
The African Grey has tried to get Alexa to send him lightbulbs, a kite, watermelon, ice cream, strawberries, raisins, broccoli and ice cream.
โ Facebook Defends Against Data-Sharing Partnerships โ
๐ Read
via "Threatpost | The first stop for security news".
Facebook is under fire again for its data privacy policies.๐ Read
via "Threatpost | The first stop for security news".
Threat Post
Facebook Fights Back on Secret Data-Sharing Partnerships
Facebook is under fire again after a bombshell report claims it has broad data-sharing arrangements with Amazon, Apple, Twitter and others.
๐ Malware targeting IoT devices grew 72% in Q3 alone ๐
๐ Read
via "Security on TechRepublic".
Total malware samples grew 34% over the past year, with major rises in coinmining and fileless attacks, according to a McAfee Labs report.๐ Read
via "Security on TechRepublic".
TechRepublic
Malware targeting IoT devices grew 72% in Q3 alone
Total malware samples grew 34% over the past year, with major rises in coinmining and fileless attacks, according to a McAfee Labs report.
โ Serious Security: When cryptographic certificates attack โ
๐ Read
via "Naked Security".
Machine learning is all the rage - but don't knock human savvy just yet! One weird character can be enough to alert a smart researcher...๐ Read
via "Naked Security".
Naked Security
Serious Security: When cryptographic certificates attack
Machine learning is all the rage โ but donโt knock human savvy just yet! One weird character can be enough to alert a smart researcherโฆ
๐ How BMC and UEFI can be exploited to brick servers and take down your data center ๐
๐ Read
via "Security on TechRepublic".
Out-of-band management systems can be a weak link to securing your data center. Here's how a debug utility can be leveraged to brick your systems.๐ Read
via "Security on TechRepublic".
TechRepublic
How BMC and UEFI can be exploited to brick servers and take down your data center
Out-of-band management systems can be a weak link to securing your data center. Here's how a debug utility can be leveraged to brick your systems.
โ Threatpost Poll: Do You Hate Facebook? โ
๐ Read
via "Threatpost | The first stop for security news".
Weigh in on Facebook and privacy in our short poll.๐ Read
via "Threatpost | The first stop for security news".
Threat Post
Threatpost Poll: Do You Hate Facebook?
Weigh in on how you plan to cope with the latest reports of Facebook's privacy-eviscerating practices.
๐ Why CXOs are leading the charge for AI-based security ๐
๐ Read
via "Security on TechRepublic".
While 73% of organizations already use some level of artificial intelligence, the technology comes with its own challenges, according to a ProtectWise report.๐ Read
via "Security on TechRepublic".
TechRepublic
Why CXOs are leading the charge for AI-based security
While 73% of organizations already use some level of artificial intelligence, the technology comes with its own challenges, according to a ProtectWise report.
๐ด Cybersecurity in 2019: From IoT & Struts to Gray Hats & Honeypots ๐ด
๐ Read
via "Dark Reading: ".
While you prepare your defenses against the next big thing, also pay attention to the longstanding threats that the industry still hasn't put to rest.๐ Read
via "Dark Reading: ".
Dark Reading
Cybersecurity in 2019: From IoT & Struts to Gray Hats & Honeypots
While you prepare your defenses against the next big thing, also pay attention to the longstanding threats that the industry still hasn't put to rest.
๐ด DOJ Announces Indictment in Nigerian Banking Scam ๐ด
๐ Read
via "Dark Reading: ".
International investment scam laundered funds through US bank accounts before being sent to Nigeria.๐ Read
via "Dark Reading: ".
Darkreading
DOJ Announces Indictment in Nigerian Banking Scam
International investment scam laundered funds through US bank accounts before being sent to Nigeria.
โ Hackers Succeed in NASA Mission, Lifting Thousands of Employee Records โ
๐ Read
via "Threatpost | The first stop for security news".
Twelve years' worth of data has blasted off into the Dark Web.๐ Read
via "Threatpost | The first stop for security news".
Threat Post
Hackers Succeed in NASA Mission, Lifting Thousands of Employee Records
Twelve years' worth of data has blasted off into the Dark Web.
๐ Attackers are using cloud services to mask attack origin and build false trust ๐
๐ Read
via "Security on TechRepublic".
Conditioning users to think "padlock equals security" has unintended consequences when cloud services are used to host malware droppers.๐ Read
via "Security on TechRepublic".
TechRepublic
Attackers are using cloud services to mask attack origin and build false trust
Conditioning users to think "padlock equals security" has unintended consequences when cloud services are used to host malware droppers.
๐ 5 biggest security vulnerabilities of 2018 ๐
๐ Read
via "Security on TechRepublic".
2018 brought massive, hardware-level security vulnerabilities to the forefront. Here's the five biggest vulnerabilities of the year, and howyou can address them.๐ Read
via "Security on TechRepublic".
TechRepublic
5 biggest security vulnerabilities of 2018
2018 brought massive, hardware-level security vulnerabilities to the forefront. Here's the five biggest vulnerabilities of the year, and how you can address them.
๐ด Facebook Data Deals Extend to Microsoft, Amazon, Netflix ๐ด
๐ Read
via "Dark Reading: ".
An explosive new report sheds light on data-sharing deals that benefited 150 companies as Facebook handed over unknowing users' information.๐ Read
via "Dark Reading: ".
Dark Reading
Endpoint Security recent news | Dark Reading
Explore the latest news and expert commentary on Endpoint Security, brought to you by the editors of Dark Reading