Cyber security trends for 2022

Nothing is more difficult than making predictions. Instead of trowing out wild ideas what might be coming, I have collected here some trends other people have predicted or reported.

Why the Future Needs Passwordless Authentication
https://securityintelligence.com/future-needs-passwordless-authentication/
As of September, Microsoft users no longer have to rely on passwords when logging in to their accounts. Passwords were suitable for authentication when users had fewer accounts, but things have changed.
Nowadays, everyone’s digital footprint is larger, making passwords more of a burden than a security necessity.

Cyber Warfare: What To Expect in 2022
https://securityintelligence.com/articles/cyber-warfare-what-to-expect-2022/
Cyberwarfare is not a future threatit’s a clear and present danger.
While the concept of cyber terrorism might sound like something from a fictional movie, our interconnected world is riddled with security flaws that make it an unfortunate reality. Read on as we cover seven cyber warfare and cybersecurity threats to watch out for in 2022.

Prediction Season: What’s in Store for Cybersecurity in 2022?
https://www.securityweek.com/prediction-season-whats-store-cybersecurity-2022
The past year has been quite challenging and tiring for many IT and security professionals, as threat actors capitalized on the rapidly changing environment created by accelerated digitalization and cloud transformation in response to the COVID-19 pandemic. And while we all hope that the next year is better when it comes to the onslaught of daily phishing, ransomware, and credential stuffing attacks; cyber criminals will likely learn from this year’s successful tactics, retool, and pivot them into next year’s campaigns to wreak even more havoc in all lives.
Consider the following threats that are on the horizon in 2022 and start preparing for them now:
Compromised Identities Continue to Fuel the Cyberattack Engine
Ransomware Attacks Evolve to Multifaceted Extortion Schemes
Pay Attention to the Supply Chain Threats
The Work from Anywhere Era Creates New Threats

“AI and ML will be an enabler for cybersecurity for the foreseeable future”
https://cisomag.eccouncil.org/ai-and-ml-will-be-an-enabler-for-cybersecurity-for-the-foreseeable-future/
We are proceeding in an era of “Malthusian” advances in science and technology, enabled by faster computing and ever-expanding data analytics. Those emerging technologies are significantly impacting cybersecurity. They include artificial intelligence (AI), machine learning, high-performance computing, cloud, edge computing, 5G, and eventually quantum technologies.
Computing systems that employ AI and ML are becoming more pervasive and critical to cyber operations and have become a major focus of cybersecurity research development and investments. Advanced 5G and wireless networks will benefit higher traffic capacities, lower latency, increased reliability, and enable processing and analytics in real-time. Edge computing strives to bring real-time computation, data storage, and operations closer to the device, rather than relying on a central location, avoiding latency issues. Technologies that improve capabilities for discovering, categorizing, monitoring, synthesizing, and automating the analysis of data are advantages in mitigating cybersecurity threats. Specifically, such tech can be used to bolster botnet detection and mitigation technology, data visualization tools, active malware protection, rootkit detection and mitigation technology, and incident response analytics.
Emerging tech can be a two-way street for good and bad. Artificial intelligence and machine learning can be used by hackers to automate target selection and more. Threat actors, especially state-sponsored and criminal enterprises, are becoming more sophisticated by searching for vulnerabilities and infiltrating malware by adapting (and automating), enabling machine learning, deep learning, artificial intelligence, and other analytic tools.
Also, the emergence of the Internet of Things presents special security challenges. There are an estimated 44 billion IoT endpoints today and trillions of sensors connected to those endpoints. Hackers have many attack options and entries for inserting malware into such a large and unregulated attack surface.

Google Finds 35,863 Java Packages Using Defective Log4j
https://www.securityweek.com/google-finds-35863-java-packages-using-defective-log4j
The computer security industry is bracing for travel on long, bumpy roads littered with Log4j security problems as experts warn that software dependency patching hiccups will slow global mitigation efforts.
The sheer scale and impact of the crisis became a bit clearer this week with Google’s open-source team reporting that a whopping 35,863 Java packages in Maven Central are still using defective versions of Log4j library.
The vulnerability, flagged as CVE-2021-44228, was first discovered and reported by the Alibaba cloud security team on November 24 this year. Less than two weeks later, exploitation was spotted in the wild, prompting the release of multiple high-priority patches and an industry-wide scramble to apply practical mitigations.
Many actors have exploited the critical Apache Log4j vulnerability named Log4Shell to infect vulnerable devices. Apache has released several Log4j versions to fix the original Log4j vulnerability (CVE-2021-44228) and newer findings on the same software (CVE-2021-44832, CVE-2021-45046, CVE-2021-45105, CVE-2021-42550).

Threat Intelligence on Log4j CVE: Key Findings and Their Implications
https://www.akamai.com/blog/security/threat-intelligence-on-log4j-cve-key-findings-and-their-implications
Expect this vulnerability to have a long attack tail. We anticipate that due to how widely used this software is and the large number of exploit variations, we will continue to see exploit attempts for months to come and expect many breaches will get uncovered going forward.
Attackers used opportunistic injections and became more targeted. Consequences of the reconnaissance may not be fully understood for months. While the attacks can be mitigated by patching and other methods, it’s unclear how many breaches have happened already. It will take time for the breaches to come to light and for us to understand their magnitude.

Ransomware in 2022: We’re all screwed
https://www.zdnet.com/article/ransomware-in-2022-were-all-screwed/
Over the past few years, we’ve seen ransomware operators evolve from disorganized splinter groups and individuals to highly sophisticated operations, with separate teams collaborating to target everything from SMBs to software supply chains. Ransomware infection is no longer an end goal of a cyberattack. We are experiencing the “golden era of ransomware,” now in part due to multiple monetization options.

Burnout: The next great security threat at work
https://blog.1password.com/state-of-access-report-burnout-breach/
Many companies feel like they’ve successfully pivoted to remote and hybrid work. Team members have learned the tools and processes required to be successful outside the office, and IT departments have adjusted their security rules and policies accordingly. But now, nearly two years into the pandemic, another cybersecurity threat has
emerged: employee burnout.

In 2022, security will be Linux and open-source developers job number one
https://www.zdnet.com/article/in-2022-security-will-be-linux-and-open-source-developers-job-number-one/
Linux is everywhere. It’s what all the clouds, even Microsoft Azure, run. It’s what makes all 500 of the Top 500 supercomputers work. Heck, even desktop Linux is growing if you can believe Pornhub, which claims Linux users grew by 28%, while Windows users declined by 3%. Its real trouble isn’t so much with open-source itself. There’s nothing magical about open-source methodology and security. Security mistakes can still enter the code. Linus’s law is that given enough eyeballs, all bugs are shallow. But, if not enough developers are looking, security vulnerabilities will still go unnoticed. As what I’m now calling Schneier’s law, “Security is a process, not a product, ” points out constant vigilance is needed to secure all software.

The future of OT security in an IT-OT converged world
https://www.theregister.com/2021/11/09/securing_ics_in_the_cloud/
Securing ICS in the cloud requires ‘fundamentally different’ approach
If you thought the industrial internet of things (IIoT) was the cutting edge of industrial control systems, think again. Companies have been busy allowing external access to sensors and controllers in factories and utilities for a while now, but forward-thinking firms are now exploring a new development; operating their industrial control systems (ICS) entirely from the cloud. That raises a critical question: who’s going to protect it all?
Dave Masson, Director of Enterprise Security at Darktrace, calls this new trend ‘ICSaaS’. “ICS for the cloud is starting to happen now. That represents a whole new world for industrial technology and security.”
This trend has been possible for the last decade or so, he explains, but the uptake has been slow. Now, Masson is hearing from clients who are actioning it.
Operational technology admins may be nervous about allowing cloud-based control of their infrastructures, but they’re attracted by the potential benefits. If operators are accessing ICS remotely anyway, then it makes it easier to consider cloud-based interfaces. These make the management infrastructure cheaper and easier to operate.
In this scenario, the hardware components that make up ICS stay where they are. We’re not talking about virtualizing programmable logic controllers here. It’s the data governing their operation that moves to the cloud. That means the applications, databases, and other services that operators rely on to keep those components running smoothly.
Security is just as important in these new cloud-enabled environments as it was in the old legacy walled gardens, but the challenges facing defenders are different. The cloud is eroding the gap between IT and OT. OT is now part of what looks increasingly like a common IT network.
“Now, anybody can access this network from anywhere, so you’ve got to make sure you have good controls around who’s got permission”
“This raises questions about data security, compliance, and regulation.”
OT admins, used to maintaining an iron grip on their infrastructure, now risk a loss of visibility and control. There are organizational worries to consider beyond the technological ones. Converging IT/OT infrastructures is only part of the story. You must also decide who is managing security for the expanded network. Is it the IT security team, or the OT team, or both?
Zero trust architecture is a common talking point today when discussing cloud-based security, and that will be important. ICSaaS is only one part of a broader shift towards OT/IT convergence. The advent of 5G, along with the development of edge computing, will accelerate the trend still further.

Sophos 2022 Threat Report: Malware, Mobile, Machine learning and more!
https://nakedsecurity.sophos.com/2021/11/09/2022-threat-report/
we’ve covered five main topics: 1 Malware, 2 Mobile, 3 Machine Learning and AI, 4 Ransomware (because we simply couldn’t not give it a section of its own), and 5 Where next?. PDF:
https://www.sophos.com/en-us/medialibrary/pdfs/technical-papers/sophos-2022-threat-report.pdf

“AI and ML will be an enabler for cybersecurity for the foreseeable future”
https://cisomag.eccouncil.org/ai-and-ml-will-be-an-enabler-for-cybersecurity-for-the-foreseeable-future/
What are some of the emerging technologies in security? Would these generate opportunities and create challenges?
Critical Infrastructure (CI) and supply chain will be targeted even more in 2022 (state-sponsored, cybercriminal gangs) with ransomware and malware attacks.
• Investment and risk strategies will expand in conducting vulnerability assessments and filling operational gaps with cybersecurity tools. Tools include Data Loss Prevention (DLP), encryption, identity and access management solutions, log management, and SIEM platforms.
• Despite efforts to attract workers to security and tech jobs, the qualified cybersecurity worker shortage will continue to pose major operational challenges. Both the public and private sectors are currently facing challenges from a dearth of cybersecurity talent. A report out from the firm Cybersecurity Ventures estimates there are 3.5 million unfilled cybersecurity jobs in 2021. 2022 is not showing any signs of improvement in hiring.
• The Internet of Things (IoT) will pose a growing cybersecurity risk. IoT’s exponential connectivity is an ever-expanding mesh of networks and devices.
There are some specific areas where AI technology will contribute to making cybersecurity smarter include:
• AI can provide a faster means to detect and identify cyberthreats. Cybersecurity companies will be using software and a platform powered by AI that monitors real-time activities on the network by scanning data and files to recognize unauthorized communication attempts, unauthorized connections, abnormal/malicious credential use, brute force login attempts, unusual data movement, and data exfiltration. This allows businesses to draw statistical inferences and protect against anomalies before they are reported and patched.
• AI will impact Incident Diagnosis and Response capabilities.
While descriptive analytics provided by network surveillance and threat detection tools can answer the question “what happened,” incident diagnosis analytics address the question of “why and how it happened.” To answer those questions, new software applications and platforms powered by AI can examine past data sets to find root causes of the incident by looking back at change and anomaly indicators in the network activities
• AI will also enable better cyberthreat intelligence reports by analysts. Next year analysts will be able to use AI tools to generate automated cyberthreat intelligence reports (CTI). Cyberthreat intelligence reports provide the indicators and early warning necessary to better monitor unusual activities on a given network and detect more rapidly cyber threats.
AI and ML will be an enabler for cybersecurity for the foreseeable future. AI-powered tools and automation enablement will play an increased and integral role in keeping us cyber-safe in 2022 and beyond.

Kännyköiden tietoturva menee uusiksi
https://etn.fi/index.php/13-news/12788-kaennykoeiden-tietoturva-menee-uusiksi
In smartphones, security has been in place for more than a decade, with trusted processing performed in the TEE (Trusted Execution Environment) section of device memory. The current standard solution for smartphone security is typically created with Arm’s TrustZone technology. The phone’s own security comes from TEE. A secure boot usually includes a TEE. TEE has been an elegant solution for smartphones, although it is becoming old-fashioned (Arm TrustZone was developed 15 years ago).
The memory required by the TEE has not been available in the small controller chips used for embedded applications. Manufacturers have promoted Safe Boot and Memory Encryption or Flash Encryption, but they have been pretty weak solutions. Recently, Arm’s TrustZone M has introduced a new security model for controllers.
In recent years, this picture has begun to diversify. A revolution is underway now. Google has launched a keystone technology that allows an application to generate a system-maintained key and authenticate services (still uses TEE).
In the future, for example, encryption keys will be stored in an isolated memory area, an enclave, says Jan-Erik Ekberg, head of Huawei’s HSSL laboratory (Helsinki System Security Lab). Five years ago, Intel introduced SGX technology for PC servers, which simply means security extension commands added to the CPU chip. In this solution, TEE type protections are provided by a secure enclave. The use of this type of security enclave needs less code than traditional TEE structure. An enclave is a temporary structure in the memory of a device. It is created only for security processes and exits when it has completed its task. The difference is significant in the TEE structure, where another kernel runs all the time alongside the operating system. When there is no other parallel kernel, there is one component less to attack.
In Intel’s SGX, enclaves were implemented through caching, which limited their use. Intel has sought to overcome this limitation with newer TDX (Trust Domain Extensions) technology. AMD aims to do the same with its own SEV (Secure Encrypted Virtualization) technology.
Enclave-style solution structure will also come in the smart phones. The new Armv9-A architecture last year offers a realm mode that is very close to the technologies offered on the server side (Intel SGX). With the coming enclaves, an infinite number of secured environments will be available in principle.
In the mobile ecosystem, TEE is so deeply rooted that the transition will probably take five years. During the transition period TEE and more dynamic solutions will be on the market in parallel.

Kyberhyökkäykset uhkaavat jo tavarantoimituksiakin
https://www.uusiteknologia.fi/2021/11/08/kyberhyokkaykset-uhkaavat-jo-tavarantoimituksiakin/
Cyber attacks will cause chaos in product supply chains in the future, estimates Japanese security firm Trend Micro in its latest report. They can also cause physical harm to people, so it’s not just about problems with production or distribution.
According to Trend Micro, network connectivity by 2030 will affect our everyday lives even more, both physically and mentally. At the same time, cyber threats are constantly evolving and abusing technological innovation in ever new ways.
Artificial intelligence tools democratize cybercrime from technically savvy individuals and criminal organizations to all. The new “Everything as a Service” service model also makes cloud service providers very attractive targets for cyber attackers.
Massive IoT (MIoT) environments in industrial facilities, logistics centers, transportation systems, healthcare, education, commerce, and homes are attractive targets for saboteurs and blackmailers. The new 5G and subsequent 6G networks are also making attacks more sophisticated and targeted.
In the future, user manipulation and fake news will become increasingly important and difficult to ignore when fed to smart glasses. Reality can be badly distorted.
https://resources.trendmicro.com/rs/945-CXD-062/images/WP01_Project%202030_White%20Paper_210505US_Web.pdf

Jarno Limnéll varoittaa “kyberpandemiasta” internetin häiriö voi panna maailman taas sekaisin
https://www.tivi.fi/uutiset/tv/211df5c9-7909-47b7-842b-719f6a496206
Cyber harassment and sports doping have a lot in common. Tracing and testing methods are evolving, but so are scams. And scammers always seem to be one step ahead. Sometimes they are only revealed years later. “The world is moving in the direction that technology is evolving faster and faster, and rather increasing the possibility of various disruptions and creating new types of vulnerabilities. There is no seamless security,” Limnagl says. So even with technology, the world will not be completed. In addition, crises always come as a surprise: New York on September 11, the Bosnian war, Hitler’s rise to power, the shots in Sarajevo. “In light of history, we’re always surprised. And if you think about it, technology only adds to the complexity and surprise of crises.”

Kyberhyökkäykset kiihtyvät, mutta yritykset voivat vastata niihin
https://etn.fi/index.php/new-products/13-news/12920-kyberhyoekkaeykset-kiihtyvaet-mutta-yritykset-voivat-vastata-niihin
Cyber attacks are accelerating, but companies can respond to them A new study by security firm Trend Micro predicts that the number of cyber attacks will increase, with a particular focus on IoT devices. At the same time in 2022 global organizations will be more vigilant and better prepared to face new cyber threats. Research, foresight, and automation are critical to risk management and employee protection. The shift of workers to telecommuting has opened up new avenues for attackers, so the attack area of companies and organizations has grown exponentially. Fortunately, hybrid work is becoming more established and more predictable, allowing security decision-makers to plan and refine their security strategies. Those are:
• Enhanced server security and application management policies to combat blackmail
• A risk-based update plan and an effort to detect security vulnerabilities in advance
• Improved basic protection for SMEs using cloud services
• Active network monitoring, especially in IoT environments
• Zero Trust security model to secure international supply chains
• Cloud security focused on the risks assessed by the DevOps team and industry best practices
• Advanced Detection and Response (XDR) model to detect attacks on large networks

Trend Micron raportti: tulevaisuudessa kaikki on vaarassa
https://etn.fi/index.php/13-news/12785-trend-micro-raportti-tulevaisuudessa-kaikki-on-vaarassa
Security company Trend Micro has released its 2030 future report. Videos also tell us what the world could look like at the beginning of the next decade. From the perspective of cyber threats and cybersecurity, the future looks bleak. By 2030, connectivity, or continuous online presence, will affect our daily lives on both a physical and mental level. At the same time, cyber threats are constantly evolving and abusing technological innovation in ever new ways.
Trend Micro hopes that this review will spark debate both within the security industry and in society at large. We can only prepare for the cyber challenges of the next decade by comprehensively anticipating all possible situations and advising how governments, the business world and individuals can prepare for them.
Project 2030
https://2030.trendmicro.com/?utm_campaign=ADC2021_Corporate_2030_Predictions&utm_medium=Press-Release&utm_source=Press-Release_Glimpse-into-future_PR&utm_content=Watch-video
Welcome to your new reality, more connected than ever to all the riches modern life has to offer, yet where truth has never been more insubstantial.

3,062 Comments

  1. Tomi Engdahl says:

    Ice phishing on the blockchain
    https://www.microsoft.com/security/blog/2022/02/16/ice-phishing-on-the-blockchain/
    There are multiple types of phishing attacks in the web3 world. The technology is still nascent, and new types of attacks may emerge. Some attacks look similar to traditional credential phishing attacks observed on web2, but some are unique to web3. Stealing [private] keys is analogous to stealing credentials to web2 accounts. [...] The ice phishing technique we discuss in this post doesnt . involve stealing ones private keys. Rather, it entails tricking a user into signing a transaction that delegates approval of the users tokens to the attacker. This is a common type of transaction that enables interactions with DeFi smart contracts, as those are used to interact with the users tokens (e.g., swaps)

    Reply
  2. Tomi Engdahl says:

    Interpol: Policing model needs to change with cybercrime https://www.theregister.com/2022/02/17/interpol_cybercrime/
    Jones said one way forward was for law enforcement to share its data, presumably with other agencies outside individual jurisdictions. “In much the same way you as a community share data information between yourselves, law enforcement needs to do better,” said the director.

    Reply
  3. Tomi Engdahl says:

    EU to probe use of cloud services across EU bodies, overseas data transfers https://therecord.media/eu-to-probe-use-of-cloud-services-across-eu-bodies-overseas-data-transfers/
    The European Data Protection Board (EDPB) has announced plans to probe the use of cloud-based services across EU public bodies as part of an effort to investigate GDPR compliance and detect possible data transfers of EU data overseas.

    Reply
  4. Tomi Engdahl says:

    Suositus teleoperaattoreille keinoista kansainvälisten huijaussoittojen estämiseksi https://www.traficom.fi/fi/ajankohtaista/suositus-teleoperaattoreille-keinoista-kansainvalisten-huijaussoittojen-estamiseksi
    Liikenne- ja viestintävirasto Traficom antoi operaattoreille uuden suosituksen eri keinoista estää soittajan numeron väärentäminen ja huijaussoittojen välittäminen puhelun vastaanottajille Suomessa.
    Tavoitteena on estää suomalaisten numeroiden käyttö kansainvälisessä tietoverkkorikollisuudessa ja vähentää ulkomailta tulevia huijauspuheluita.

    Reply
  5. Tomi Engdahl says:

    FBI Warns of BEC Scams Abusing Virtual Meeting Platforms
    https://www.securityweek.com/fbi-warns-bec-scams-abusing-virtual-meeting-platforms

    The Federal Bureau of Investigation (FBI) this week issued an alert regarding the increasing use of virtual meeting platforms to conduct business email compromise (BEC) and email account compromise (EAC) scams.

    As part of such schemes, attackers target employees who can make or authorize payments, using social engineering to trick them into transferring funds into fraudulent accounts.

    Typically, such schemes are carried out over email (either business or personal email addresses), but over the past three years the FBI’s Internet Crime Complaint Center (IC3) has seen an increase in complaints related to BEC attacks carried out over virtual meeting platforms.

    Facilitating collaboration between remote teams and increasingly popular due to the COVID-19 pandemic, which has forced many to work remotely, such platforms allow users to engage in video conferencing, screen sharing, and more.

    To conduct BEC scams over virtual meeting platforms, cybercriminals first compromise the email address of an employer or financial director (including CEO or CFO), and then instruct employees to participate in an online meeting.

    Reply
  6. Tomi Engdahl says:

    Are You Prepared for 2022′s More Destructive Ransomware?
    https://www.securityweek.com/are-you-prepared-2022s-more-destructive-ransomware

    We’re barely into 2022, and already we’re seeing ransomware proliferate. What we saw last year is that while most attacks continue to exploit known vulnerabilities, cybercriminals have also redoubled efforts to target new ones – such as what we saw with Hafnium and new Microsoft Exchange vulnerabilities.

    We expect that this year, as a result of the high-profile attacks of 2021, many organizations are finally dedicating time to basic cyber hygiene. And as they continue efforts to patch the one- to three-year-old Common Vulnerabilities and Exposures (CVEs) that most cybercriminals seek to exploit, 2022 will most likely be a record year for the number of CVEs reported – in excess of 22,000, we expect. This will likely raise the high-water mark even further as the attack surface continues to expand. And attackers will start to use those fresh or zero-day vulnerabilities to target unprepared organizations with speed.

    Linux becoming a bigger focus

    We’re observing shifts that typically follow advances in technology or new trends arising in the threat landscape. For example, 10 years ago we saw a big shift going from PC to mobile and Android – same thing with IoT. We’re also seeing Linux becoming a focal point, partially because of IoT and botnets like Mirai, but we’re also seeing it in various attack types. Linux integrations, like the Windows subsystem for Linux, are also being targeted, leading to a much wider attack surface.

    Many IoT devices and mission-critical applications running on container-based solutions are running Linux operating systems. This is mainly due to the popularity of Docker and LXCs in the cloud and real-time operating systems (RTOS) for IoT and ICS devices. As Linux’s popularity has grown, so has its popularity as a target for bad actors. Attacks against Linux operating systems and applications running on those systems are just as prevalent as attacks on Windows operating systems.

    Critical infrastructure attacks increase and evolve

    The term “killware” has been used to describe some of the recent attacks against critical infrastructure, which are on the rise. These attacks aren’t explicitly coded to go after human lives per se, but they are attacks against healthcare and medical systems with detrimental effects on real people, hence the term. Attacks against critical infrastructure differ from regular ransomware exploits because of the direct impact they can have on everyday people. They know the risk, so they are using this to speed up the clock on ransom payments.

    This was also apparent in the Colonial Pipeline and DarkSide attacks. Cybercriminals are changing the strategy use in these ransomware attacks; in addition, the attacks are becoming more connected rather than just the internal organization and its direct stakeholders.

    Defeating evolving attack trends

    To stay ahead of the continually evolving world of ransomware attacks, organizations need to update their defenses. Keeping employees up to date on standard cybercriminal attack techniques can effectively improve an organization’s overall security posture. Establishing an effective security strategy that includes zero-trust access, segmentation and micro-segmentation can help prevent ransomware attacks and protect your data. In addition, regular backup of data and offline and off-network storage can provide backups for rapid recovery if needed.

    Closing the gaps

    Crimeware will continue to expand for the foreseeable future, and criminals will continue to use ransomware everywhere they can. Adding a “ticking time bomb” of wiper malware to their ransom tactics, which could not only wreck data but destroy systems and hardware, creates additional urgency. Wiper malware has already made a visible comeback, targeting the Olympic Games in Tokyo, for example.

    This could be highly destructive for emerging edge environments, critical infrastructure and supply chains. Organizations must remain hyper-vigilant and upgrade their defenses as thoroughly and quickly as possible. They also need to upgrade their employees’ cyber hygiene and knowledge of attack types. Use the other best practices noted above to create a holistic security approach that closes all the gaps and helps spare your organization from killware and other destructive attacks.

    Reply
  7. Tomi Engdahl says:

    Zero-day exploits are very difficult to prepare for as they’re quite unpredictable.

    Check out 4 best practices to reduce the chances of zero-day exploits: https://bit.ly/3IaomRL

    #vulnerabilities #zeroday #cyberattack #cybersecurity #apptrana #indusface

    Reply
  8. Tomi Engdahl says:

    Susan Dominus / New York Times:
    A look at tech recruitment issues as the US unemployment rate for tech workers is 1.7% and 0.2% for cybersecurity experts, well below 4% for the general economy
    https://www.nytimes.com/2022/02/16/magazine/tech-company-recruiters.html

    Reply
  9. Tomi Engdahl says:

    Chainalysis:
    Analysis identifies 4,068 “criminal whales” holding over $25B worth of stolen cryptocurrency, following a major jump in illicit balances in 2021

    Criminal Whales Hold over $25 Billion in Cryptocurrency From Multitude of Illicit Sources
    https://blog.chainalysis.com/reports/2022-crypto-crime-report-preview-criminal-balances-criminal-whales/

    Reply
  10. Tomi Engdahl says:

    When you’re fending off cyber-attackers, it is possible to be just too tooled up
    This webinar will help you put insight first
    https://www.theregister.com/2022/02/18/fending_off_cyber_attackers/

    Organizations face more cyber-threats than ever before, leading many security teams to implement increasing numbers of tools and controls in response.

    The problem is this means your security dashboard can soon start looking more like a smorgasbord. As data and alerts keep piling up, it becomes harder and harder to pick out the insight among the noise.

    More context aware tooling, taking advantage of AI, is at hand, but where do you begin when it comes to overhauling your current unwieldy system?

    Reply
  11. Tomi Engdahl says:

    Should You Dispose Your Old Router? How to Delete Personal Data From the Device
    https://www.itechpost.com/articles/109188/20220217/internet-router-old-router-5g-router-how-to-reset-router-data-how-to-reuse-old-router.htm

    After gearing up the latest and greatest internet router to the house, many consumers are at a loss on what to do with an old router. Be warned that simply tossing it into the trash bin could be a huge mistake!

    Most Internet Service Providers (ISP) lends subscribers with their complimentary internet router. However, when users buy a different router or when they are switching to a different ISP, the original router will eventually be scrapped.

    Reply
  12. Tomi Engdahl says:

    Here comes the web browser 100 problem
    Google Chrome and Firefox will both soon release their 100th version — and that could mean trouble for both website developers and web browser users.
    https://www.zdnet.com/article/here-comes-the-web-browser-100-problem/

    Reply
  13. Tomi Engdahl says:

    Tutorial: Kubernetes Vulnerability Scanning & Testing With Open Source
    How to Use Kubesploit & KubiScan to Improve Cloud Native Security
    https://www.conjur.org/blog/tutorial-kubernetes-vulnerability-scanning-testing-with-open-source/

    Reply
  14. Tomi Engdahl says:

    The race to save the Internet from quantum hackers
    The quantum computer revolution could break encryption — but more-secure algorithms can safeguard privacy.
    https://www.nature.com/articles/d41586-022-00339-5

    Reply
  15. Tomi Engdahl says:

    Journalist won’t be prosecuted for pressing ‘view source’
    Despite all logic, state governor still insists hitting F12 in a web browser is ‘hacking’
    https://www.theregister.com/2022/02/15/missouri_html_hacking/

    Reply
  16. Tomi Engdahl says:

    Apple Employees Are Unionizing and They’re Using Android Phones to Keep Apple From Spying on Them
    https://lm.facebook.com/l.php?u=https%3A%2F%2Ffuturism.com%2Fthe-byte%2Fapple-union-android&h=AT3pCMmHJborOkJHMYpc-JzR7tsoRVbv-TNE-kPiOCav5LECFYOluAG6UuyYaWtZhJ-2fvqLpP3pVikQ8n6jO4jM7VLWYQV8XoIUFOR5__sKzXvmra5wErXUQAaq5xGCxQ

    The labor movement has finally made its way to Apple. According to the Washington Post, retail employees at the tech giant are beginning to quietly unionize, in part because hourly wages have remained stagnant while Apple’s profit margins soar.

    https://www.washingtonpost.com/technology/2022/02/18/apple-retail-stores-union-labor/

    Reply
  17. Tomi Engdahl says:

    4 Beckoning Cyber-Threat Challenges
    https://lm.facebook.com/l.php?u=https%3A%2F%2Fwww.forbes.com%2Fsites%2Fchuckbrooks%2F2021%2F05%2F09%2F4-beckoning-cyber-threat-challenges%2F%3Fsh%3D39b158095e53&h=AT3-23SAxWre3H-JHxDz0KIn0HF7s0XFilMgiSCsBm6aIQI4_tZ85fNMc4lc-tbUWwDflZgSN54qP3Fq2h75GuLs2n9u8TUAVOjnynw6NxEptsUNJFePqdxshmTBdP-1xqg6In4tgk6lpclFlA

    1.    Critical Infrastructure Attacks (Via Ransomware and Malware) Will Heighten In Numbers And Intensity:

    2.    Expect Continued and Elevated Sophistication of Cyber-attacks:

    3.    Greater Collaboration Among Cybercriminals

    4.    Internet of Things Devices Presents Special Security Challenges: 

    Recently, the United States Government Accountability Office issued an assessment of the status and security issues surrounding the Internet of Things. The GAO identified the following type of attacks as primary threats to IoT:

    Denial of Service
    Malware
    Passive Wiretapping
    Structured query language injection (SQLi controls a web application’s database server)
    Wardriving (search for Wi-Fi networks by a person in a moving vehicle)
    Zero-day exploits

    This list is not inclusive of all the cyber-threats on the horizon. It is reflective on what challenges we are facing and hopeful that the right cybersecurity resources, training, and technologies can help alleviate risk to our critical infrastructure, commerce, and privacy.

    Reply
  18. Tomi Engdahl says:

    Cybersecurity Threats: The Daunting Challenge Of Securing The Internet Of Things
    https://www.forbes.com/sites/chuckbrooks/2021/02/07/cybersecurity-threats-the-daunting-challenge-of-securing-the-internet-of-things/?sh=7fe018045d50

    The Internet of Things (IoT) broadly refers to devices and equipment that are readable, recognizable, locatable, addressable and/or controllable via the internet. This incorporates physical objects communicating with each other including machine to machine, and machine to people. It encompasses everything from edge computing devices to home appliances, from wearable technology to cars. IoT represents the melding of the physical world and the digital world.

    Reply
  19. Tomi Engdahl says:

    https://www.forbes.com/sites/chuckbrooks/2021/02/07/cybersecurity-threats-the-daunting-challenge-of-securing-the-internet-of-things/?sh=7fe018045d50

    Below is an example list for the C-Suite, CISOs, CTOS and CIOs to heuristically use to help meet their IoT security challenges:

    Use an established IoT Cybersecurity framework that draws on industry experience and best practices, such as those provided by NIST.
    Do a vulnerability assessment of all devices connected to your network (on Premises and remote)
    Create an IoT/Cybersecurity incident response plan
    Compartmentalize IoT devices to minimize attack surfaces
    Add security software, containers, and devices to “digitally fence” network and devices
    Monitor and share threat intelligence
    Scan all software for vulnerabilities in networks and applications
    Update and patch vulnerabilities to both networks and devices
    Do not integrate devices into your network with default passwords and other known vulnerabilities
    Establish privileged access for device controls and applications
    Use strong authentication and perhaps biometrics for access control
    Use machine authentication when connecting to a network
    Encrypt IoT communications, especially for data in transit
    Use strong firewalls
    Use secure routers and WIFI
    Use multi-layered cybersecurity protections, including antivirus software
    Back up all data
    Consider Managed Security and outside subject matter experts
    Consider Cloud security as a service
    Integrate emerging technologies for protections including machine learning/artificial intelligence
    Continually audit and use real time analytics (including predictive analytics)
    Implement security awareness training for all employees
    Be Vigilant

    Reply
  20. Tomi Engdahl says:

    Clearview AI aims to put almost every human in facial recognition database
    Investor pitch said 100 billion photos would make almost everyone “identifiable.”
    https://arstechnica.com/tech-policy/2022/02/clearview-ai-aims-to-put-almost-every-human-in-facial-recognition-database/

    Reply
  21. Tomi Engdahl says:

    Linux developers patch security holes faster than anyone else, says Google Project Zero
    Linux programmers do a better job of patching security holes than programmers at Apple, Google, and Microsoft.
    https://www.zdnet.com/article/google-project-zero-finds-linux-developers-patch-security-holes-faster-than-anyone-else/

    Reply
  22. Tomi Engdahl says:

    U.S. Cybersecurity Agency Publishes List of Free Security Tools and Services
    https://thehackernews.com/2022/02/us-cybersecurity-agency-publishes-list.html

    Reply

Leave a Reply to Tomi Engdahl Cancel reply

Your email address will not be published. Required fields are marked *

*

*