Nothing is more difficult than making predictions, especially in fast advancing cyber security field. Instead of me trowing out wild ideas what might be coming, I have collected here some trends many people and publications have predicted for 2023.
HTTPS: These days HTTPS has effectively become the default transport for web browsing. Most notably, the Chrome browser now marks any older HTTP website as “Not Secure” in the address bar. Chrome to attempt to “upgrade” to the HTTPS version of websites, if you ever accidentally navigate to the insecure version. If a secure version isn’t available, an on-screen warning is shown, asking if you would like to continue. As HTTPS has become more common across the web, Google Chrome is preparing to launch a security option that will block “insecure” downloads through HTTP on Chrome browser.
Malwertising: Cyber Criminals Impersonating Brands Using Search Engine Advertisement Services to Defraud Users also in 2023. The FBI is warning US consumers that cybercriminals are placing ads in search engine results that impersonate well-known brands, in an attempt to spread ransomware and steal financial information. Cybercriminals are purchasing ads that show up at the very top of search engine results, often purporting to link to a legitimate company’s website. However, anyone clicking on the link is instead taken to a lookalike page that may appear identical, but is in fact designed to phish for login credentials and financial details, or even trick the unwary into downloading ransomware. The FBI has advised consumers to use ad blockers to protect themselves from such threats.
Encrypted malware: The vast majority of malware arriving over encrypted connections that are typically HTTPS web sessions. The vast majority of cyber-attacks over the past year have used TLS/SSL encryption to hide from security teams traditional firewalls and many other security tools. Over 85% of Attacks Hide in Encrypted Channels. WatchGuard Threat Lab Report Finds Top Threat Arriving Exclusively Over Encrypted Connections. If you are not inspecting encrypted traffic when it enters your network, you will not be able to detect most malware at network level. Hopefully, you at least have endpoint protection implemented for a chance to catch it further down the cyber kill chain.
Software vulnerabilities: Weak configurations for encryption and missing security headers will be still very common in 2023. In 2022 nearly every application has at least one vulnerability or misconfiguration that affects security and a quarter of application tests found a highly or critically severe vulnerability. Read more at Misconfigurations, Vulnerabilities Found in 95% of Applications
Old vulnerabilities: You will see attackers try to use old vulnerabilities again in 2023 because they work. Attackers will take the path of least resistance, and as long as vendors don’t consistently perform thorough root-cause analysis when fixing security vulnerabilities, it will continue to be worth investing time in trying to revive known vulnerabilities before looking for novel ones. There are many companies that do not patch their systems at reasonable time or at all, so they stay vulnerable. Also new variations of old vulnerabilities are also developed: approximately 50% of the observed 0-days in the first half of 2022 were variants of previously patched vulnerabilities.
Security gaps: There are still big gaps in companies’ cyber security. The rapid advancement of technology in all industries has led to the threat of ever-increasing cyberattacks that target businesses, governments, and individuals alike. Lack of knowledge, maintenance of employees’ skills and indifference are the strongest obstacles in the development of many companies’ cyber security. While security screening and limiting who has access to your data are both important aspects of personnel security, they will only get you so far.
Cloud: In a hyperscale cloud provider, there can be potentially several thousand people, working around the globe that could potentially access our data. Security screening and limiting alone still leaves a significant risk of malicious or accidental access to data. Instead, you should expect your cloud provider to take a more layered approach.
MFA: MFA Fatigue attacks are putting your organization at risk in 2023. Multi-factor auth fatigue is real. A common threat targeting businesses is MFA fatigue attacks a technique where a cybercriminal attempts to gain access to a corporate network by bombarding a user with MFA prompts until they finally accept one. This attempt can be successful, especially when the target victim is distracted or overwhelmed by the notifications or misinterprets them with legitimate authentication requests. t’s a huge threat because it bypasses one of the most effective the security measures.
Passwords: Passwords will not go away completely even though new solutions to replace then will be pushed to users. When you create passwords or passphrases, make them good and long enough to be secure. Including a comma character to the password can make it harder for cyber criminals to use if for some reason it leaks out. The reason us that comma in password can obfuscate tabular comma separated values (csv) files, which are a common way to collect and distribute stolen passwords.
EU: The Network and Information Security (NIS) Directive was the first piece of EU-wide legislation on cybersecurity: Network and Information Security 2 also known as NIS2. Rules requiring EU countries to meet stricter supervisory and enforcement measures and harmonise their sanctions were approved by MEPs on late 2022. They will start to affect security decisions in 2023. The new rules will set tighter cybersecurity obligations for risk management, reporting obligations and information sharing. The requirements cover incident response, supply chain security, encryption and vulnerability disclosure, among other provisions. The new rules will also protect so-called “important sectors” such as postal services, waste management, chemicals, food, manufacturing of medical devices, electronics, machinery, motor vehicles and digital providers. All medium-sized and large companies in selected sectors would fall under the legislation. The NIS Directive has impacted the cybersecurity budget of operators over the past year with deep-dives into the Energy and Health sectors. Cybersecurity Investments in the EU: Is the Money Enough to Meet the New Cybersecurity Standards?
USA: CISA has released cross-sector cybersecurity performance goals (CPGs) in response to President Biden’s 2021 National Security Memorandum on improving cybersecurity for critical infrastructure control systems. Since then, the CPGs have been observed by the cybersecurity community as “the floor” and “a baseline” to cybersecurity hygiene and practices. Many organizations overlook OT as part of their cybersecurity strategy, remaining their focus solely to IT systems. Especially in the critical infrastructure sectors, overlooking OT can have serious risks to all operations. As a result, the CPGs released explicitly are scoped to include OT devices.
Android: Android security will advance in 2023 in many ways. Android is adding support for updatable root certificates in the next Android 14 release. Google Play now lets children send purchase requests to guardians.
Loosing the trust: The world’s biggest tech companies have lost confidence in one of the Internet’s behind-the-scenes gatekeepers. Microsoft, Mozilla, and Google are dropping TrustCor Systems as a root certificate authority in their products.
Need for better communication: At a time when less than a fifth (18%) of risk and compliance professionals profess to be very confident in their ability to clearly communicate risk to the board, it’s clear that lines of communication—not to mention understanding—must be improved.
Supply chain risks: Watch for geopolitical instability to continue to be a governance issue, particularly with the need to oversee third-party and supply chain risk.
Privacy and data protection:Privacy and data protection are the big story for compliance officers in 2023, with expanding regulations soon expected to cover five billion citizens.
Business risks: In 2023, business risks will run the gamut: geopolitical volatility, talent management, DEI (Diversity, Equity, and Inclusion), ESG (Environmental, Social, and Governance), IT security amid continued remote and hybrid work, and business continuity amid the threat of large-scale operational and utility interruptions. There is also a challenge that Executives take more cybersecurity risks than office workers – leaders engage in more dangerous behavior and are four times more likely to be victims of phishing compared to office workers.
Integrated Risk Management: Look for risk to be increasingly viewed as a driver of business performance and value as digital landscapes and business models evolve. Forward-looking companies will embed integrated risk management (IRM) into their business strategy, so they can better understand the risks associated with new strategic initiatives and be able to pivot as necessary. Keep in mind that Executives take more cybersecurity risks than office workers
Zero trust: Many people think that Zero Trust is pretty optimal security practice in 2023. It is good for those new systems to whom it’s model suits, but Zero Trust has also challenges. Incorporating zero trust into an existing network can be very expensive. Zero Trust Shouldnt Be The New Normal article says that the zero trust model starts to erode when the resources of two corporations need to play together nicely. Federated activity, ranging from authentication to resource pooled cloud federation, doesnt coexist well with zero trust. To usefully emulate the kind of informed trust model that humans use every day, we need to flip the entire concept of zero trust on its head. In order to do that, network interactions need to be evaluated in terms of risk. Thats where identity-first networking comes in. In order for a network request to be accepted, it needs both an identity and explicit authorization; System for Cross-domain Identity Management (SCIM) based synchronization is used to achieve this. This securely automates the exchange of a user identity between cloud applications, diverse networks, and service providers.
Poor software: There will be a lot of poor software in use in 2023 and it will cost lots of money. Poor software costs the US 2.4 trillion: cyberattacks due to existing vulnerabilities, complex issues involving the software supply chain, and the growing impact of rapidly accumulating technical debt have led to a build-up of historic software deficiencies.
Microsoft: Microsoft will permanently turn off Exchange Online basic authentication starting early January 2023 to improve security. A future Microsoft Edge update would permanently disable the Internet Explorer 11 desktop web browser on some Windows 10 systems in February. This means that “The out-of-support Internet Explorer 11 (IE11) desktop application is scheduled to be permanently disabled on certain versions of Windows 10 devices on February 14, 2023, through a Microsoft Edge update, not a Windows update as previously communicated”
Google Workplace: Google Workspace Gets Client-Side Encryption in Gmail. Long waited Client-side encryption for Gmail available in beta .
Google is letting businesses try out client-side encryption for Gmail, but it’s probably not coming to personal accounts anytime soon. Google has already enabled optional client-side encryption for many Workspace services.
Passkeys: Google has made passkey support available in the stable version of Chrome. Passkeys use biometric verification to authenticate users and are meant to replace the use of passwords, which can be easily compromised. Passkeys are usable cross-platform with both applications and websites. Passkeys offer the same experience that password autofill does, but provide the advantage of passwordless authentication. They cannot be reused, don’t leak in server breaches, and protect users from phishing attacks. Passkeys are only available for websites that provide support for them, via the WebAuthn API,
War risks: Watch for continued war between Russia and Ukraine real world and cyber world in 2023. Cyber as important as missile defences – an ex-NATO general. The risk of escalation from cyber attacks has never been greater. A cyber attack on the German ports of Bremerhaven or Hamburg would severely impede NATO efforts to send military reinforcements to allies, retired U.S. General Ben Hodges told Reuters.
Cloud takeover: AWS Elastic IP Transfer Feature Gives Cyberattackers Free Range
Threat actors can take over victims’ cloud accounts to steal data, or use them for command-and-control for phishing attacks, denial of service, or other cyberattacks.
ISC: ICS and SCADA systems remain trending attack targets also in 2023.
Code security: Microsoft-owned code hosting platform GitHub has just announced multiple security improvements, including free secret scanning for public repositories and mandatory two-factor authentication (2FA) for developers and contributors. The secret scanning program is meant to help developers and organizations identify exposed secrets and credentials in their code. In 2022, code scanning helped identify 1.7 million potential secrets exposed in public repositories. Now the feature is available for free for all free public repositories, to help prevent secret exposures and secure the open source ecosystem. With secret scanning alerts, you can track and action on leaked secrets directly within GitHub.
Data destruction: We must develop a cloud-compatible way of doing destruction that meets security standards. Maybe cloud providers can come up with a service to provide this capability, since only they have direct access to the underlying hardware. They have never been shy about inventing new services to charge for, and certainly plenty of companies would be eager to pay for such a service, if the appropriate certificates of destruction were provided.
PCI DSS: PCI DSS 4.0 Should Be on Your Radar in 2023 if you work on field that needs to meet that. The latest version of the standard will bring a new focus to an overlooked yet critically important area of security. For a long time, client-side threats, which involve security incidents and breaches that occur on the customer’s computer rather than on the company’s servers or in between the two, were disregarded. But that’s changing with the release of PCI DSS 4.0. Now, many new requirements focus on client-side security.
SHA-1: NIST Retires SHA-1 Cryptographic Algorithm, not fully in 2023, but starts preparations for phase-out. The venerable cryptographic hash function has vulnerabilities that make its further use inadvisable. According to NIST, SHA-1 ‘has reached the end of its useful life’, given that the high computing capabilities of today’s systems can easily attack the algorithm using the technique is referred to as a ‘collision’ attack. SHA-1, whose initials stand for secure hash algorithm, has been in use since 1995 as part of the Federal Information Processing Standard and NIST has announced that SHA-1 should be phased out by Dec. 31, 2030, in favor of the more secure SHA-2 and SHA-3 groups of algorithms. The US National Institute of Standards and Technology (NIST) recommended that IT professionals start replace the 27 years old SHA-1 cryptographic algorithm with newer, more secure ones. Because SHA-1 is used as the foundation of numerous security applications, the phaseout period will take many years. Tech giants such as Google, Facebook, Microsoft and Mozilla have already taken steps to move away from the SHA-1 cryptographic algorithm. Certificate authorities stopped issuing certificates using SHA-1 as of January 1, 2017.
Cloud: Is Cloud Native Security Good Enough? Cloud native technologies enable organizations to tap into the agility required to keep up in the current competitive landscape and to create new business models. But achieving efficient, flexible, distributed and resilient cloud native security is tough. All major public cloud providers -Amazon Web Services (AWS), Microsoft Azure and Google Cloud- of course offer security features and services, which are designed to address significant threats to cloud-based data. However, in spite of this, public cloud providers’ security tools commonly fail to meet operational needs, and their limitations should prompt organizations to consider or reconsider how they are protecting public cloud environments.
Privacy: The Privacy War Is Coming. Privacy standards are only going to increase. It’s time for organizations to get ahead of the coming reckoning.
Ethical hacking: Ethical hacking has become a highly-sought after career route for emerging tech aspirants. The role of ethical hackers enables countless businesses and individuals to improve their security posture and minimize the potential attack risk for organizations. But there are several analysts who believe that becoming a self-taught ethical hacker in 2023 might not be worth it because they are at constant risk of failing to perform properly and many companies might not want to hire an ethical hacker.
MFA: Two factor authentication might not be enough in 2023 for applications that need good security. In the past few months, we’ve seen an unprecedented number of identity theft attacks targeting accounts protected by two-factor authentication (2FA), challenging the perception that existing 2FA solutions provide adequate protection against identity theft attacks. So for some demanding users 2FA is over. Long live 3FA!
Cloud APIs: With Cloud Comes APIs & Security Headaches also in 2023. Web application programming interfaces (APIs) are the glue that holds together cloud applications and infrastructure, but these endpoints are increasingly under attack, with half of companies acknowledging an API-related security incident in the past 12 months. ccording to a survey conducted by Google Cloud, the most troublesome security problems affecting companies’ use of APIs are security misconfigurations, outdated APIs and components, and spam or abuse bots . About 40% of companies are suffering an incident due to misconfiguration and a third coping with the latter two issues. Two-thirds of companies (67%) found API-related security issues and vulnerabilities during the testing phase, but more than three-quarters (77%) have confidence that they will catch issues, saying they have the required API tools and solutions-
Lack of cyber security workers: Businesses need to secure their assets and ensure the continuous readiness of employees to respond to a cyberattack if they want to move forward safely and avoid losses caused by cybercriminals or malicious attackers. There is an acute shortage of cyber security professionals. As Threat Levels remain high, companies and organizations remain on alert – but face ongoing challenges in finding and retaining the right people with the required skill levels. There is a significant skills gap and a clear need for hiring cyber security experts in organizations across the world.
VPN: Is Enterprise VPN on Life Support or Ripe for Reinvention? While enterprise VPNs fill a vital role for business, they have several limitations. To get work-from-anywhere initiatives off the ground quickly and keep their business afloat, many organizations turned to enterprise virtual private networks (VPNs). This allowed them to connect their remote employees to critical business operations at the corporate site. However, as fast as VPNs were deployed, organizations learned their limitations and security risks. So are traditional VPNs really “dead” as some industry analysts and pundits claim? Or do they simply need a refresh? Time will tell, and this will be discussed in 2023.
AI: Corporations have discovered the power of artificial intelligence (A.I.) to transform what’s possible in their operations
But with great promise comes great responsibility—and a growing imperative for monitoring and governance. “As algorithmic decision-making becomes part of many core business functions, it creates the kind of enterprise risks to which boards need to pay attention.
AI dangers: Large AI language models have potential dangers. AI is better at fooling humans than ever—and the consequences will be serious. Wired magazine article expects that In 2023, we may well see our first death by chatbot. Causality will be hard to prove was it really the words of the chatbot that put the murderer over the edge? Or perhaps a chatbot has broken someone’s heart so badly they felt compelled to take their own life?
Metaverse: Police Must Prepare For New Crimes In The Metaverse, Says Europol. It encourages law enforcement agencies to start considering the ways in which existing types of crime could spread to virtual worlds, while entirely new crimes could start to appear. ReadPolicing in the metaverse: what law enforcement needs to know report for more information.
Blockchain: Digital products like cryptocurrency and blockchain will affect a company’s risk profile. Boards and management will need to understand these assets’ potential impact and align governance with their overall risk and business strategies. Year 2022 already showed how a lot of cryptocurrency related risks realized. More “Crypto travel rules” enacted to combat money laundering and terrorism financing.
Insurance: Getting a cyber insurance can become harder and more expensive in 2023. Insurance executives have been increasingly vocal in recent years about systemic risks and now increasing cyber was the risk to watch. Spiralling cyber losses in recent years have prompted emergency measures by the sector’s underwriters to limit their exposure. There is growing concern among industry executives about large-scale strikes. As well as pushing up prices, some insurers have responded by tweaking policies so clients retain more losses. There are already insurance policies written in the market have an exemption for state-backed attacks, but but the difficulty of identifying those behind attacks and their affiliations makes such exemptions legally fraught. The chief executive of one of Europe’s biggest insurance companies has warned that cyber attacks, rather than natural catastrophes, will become “uninsurable” as the disruption from hacks continues to grow. Recent attacks that have disrupted hospitals, shut down pipelines and targeted government department. “What if someone takes control of vital parts of our infrastructure, the consequences of that?” In September, the US government called for views on whether a federal insurance response to cyber was warranted.
Sources:
Asiantuntija neuvoo käyttämään pilkkua salasanassa – taustalla vinha logiikka
Overseeing artificial intelligence: Moving your board from reticence to confidence
Android is adding support for updatable root certificates amidst TrustCor scare
Google Play now lets children send purchase requests to guardians
Diligent’s outlook for 2023: Risk is the trend to watch
Microsoft will turn off Exchange Online basic auth in January
Google is letting businesses try out client-side encryption for Gmail
Google Workspace Gets Client-Side Encryption in Gmail
The risk of escalation from cyberattacks has never been greater
Client-side encryption for Gmail available in beta
AWS Elastic IP Transfer Feature Gives Cyberattackers Free Range
Microsoft: Edge update will disable Internet Explorer in February
Is Cloud Native Security Good Enough?
Top Reasons Not to Become a Self-Taught Ethical Hacker in 2023
Google Chrome preparing an option to block insecure HTTP downloads
Cyber attacks set to become ‘uninsurable’, says Zurich chief
The Dark Risk of Large Language Models
Police Must Prepare For New Crimes In The Metaverse, Says Europol
Policing in the metaverse: what law enforcement needs to know
Cyber as important as missile defences – an ex-NATO general
Misconfigurations, Vulnerabilities Found in 95% of Applications
Personnel security in the cloud
Multi-factor auth fatigue is real – and it’s why you may be in the headlines next
MFA Fatigue attacks are putting your organization at risk
NIS2 hyväksyttiin – EU-maille tiukemmat kyberturvavaatimukset
Cybersecurity Investments in the EU: Is the Money Enough to Meet the New Cybersecurity Standards?
Poor software costs the US 2.4 trillion
Passkeys Now Fully Supported in Google Chrome
Google Takes Gmail Security to the Next Level with Client-Side Encryption
Executives take more cybersecurity risks than office workers
NIST Retires SHA-1 Cryptographic Algorithm
NIST to Retire 27-Year-Old SHA-1 Cryptographic Algorithm
WatchGuard Threat Lab Report Finds Top Threat Arriving Exclusively Over Encrypted Connections
Over 85% of Attacks Hide in Encrypted Channels
GitHub Announces Free Secret Scanning, Mandatory 2FA
Leaked a secret? Check your GitHub alerts…for free
Data Destruction Policies in the Age of Cloud Computing
Why PCI DSS 4.0 Should Be on Your Radar in 2023
Google: With Cloud Comes APIs & Security Headaches
Digesting CISA’s Cross-Sector Cybersecurity Performance Goals
Zero Trust Shouldnt Be The New Normal
Don’t click too quick! FBI warns of malicious search engine ads
FBI Recommends Ad Blockers as Cybercriminals Impersonate Brands in Search Engine Ads
Cyber Criminals Impersonating Brands Using Search Engine Advertisement Services to Defraud Users
Kyberturvan ammattilaisista on huutava pula
1,768 Comments
Tomi Engdahl says:
https://securelist.com/apt-trends-report-q3-2023/110752/
Tomi Engdahl says:
https://www.paloaltonetworks.com/network-security/zero-trust-ot-security?utm_source=securityweek-jg-amer-cdss&utm_medium=display&utm_campaign=securityweek-cdss-ot-amer-multi-awareness-en–&cq_plac={placement}&cq_net={network}&dclid=CKCUiv-P2IEDFZsWaAgdQb0MHQ
Tomi Engdahl says:
Bitsight identifies nearly 100,000 exposed industrial control systems
https://www.bitsight.com/blog/bitsight-identifies-nearly-100000-exposed-industrial-control-systems
Tomi Engdahl says:
NIST Special Publication
NIST SP 800-82r3
Guide to Operational Technology
(OT) Security
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-82r3.pdf
Tomi Engdahl says:
Microsoft Digital
Defense Report
Building and improving
cyber resilience
file:///C:/Users/hengtom/Downloads/MDDR_FINAL_2023_1004.pdf
Tomi Engdahl says:
Application Whitelisting in Linux Environment
https://www.youtube.com/watch?v=tnIEELOEQ-w
Are you a sysadmin and feeling paranoid? Let’s promote security hardening to another level.
Perhaps, with the concept of Application Whitelisting you will be able to sleep again.
In this session we are going to explain the Application Whitelisting idea and its implementation, what benefits are there from a security point of view and how it differs from competitors.
We are going to show how to create a new set of rules based on distribution default for given examples.
As a result, an attendee should be able to setup the Application Whitelisting framework on his server or workstation.
Tomi Engdahl says:
https://www.linux-magazine.com/Issues/2019/228/AppArmor
https://www.researchgate.net/publication/50848779_A_Linux_Kernel_Module_for_Locking_Down_Applications_on_Linux_Clients
Tomi Engdahl says:
ICS/OT
This New Era of Security Requires Secure Networking, Vendor Consolidation, and Focus on OT
The convergence of networking and security, the consolidation of technology vendors, and a focus on OT security are essential underpinnings of any organization’s success.
https://www.securityweek.com/this-new-era-of-security-requires-secure-networking-vendor-consolidation-and-a-focus-on-ot/
Tomi Engdahl says:
https://github.com/linux-application-whitelisting/fapolicyd
https://www.starlab.io/blog/application-whitelisting-for-linux
Tomi Engdahl says:
Julie Jargon / Wall Street Journal:
Members of Gen Z say they use family location sharing apps to bolster a sense of security, such as during dates or at concerts; Life360 now has 33M+ US MAUs
Teens Want Parents to Track Their Phones and Monitor Their Every Move
An upbringing filled with anxiety has Gen Z sharing their location via apps
https://www.wsj.com/tech/personal-tech/track-my-phone-teens-feel-safer-when-parents-monitor-7ad437ff?mod=followamazon
Tomi Engdahl says:
Tästä syystä nettisi voi lakata toimimasta: ”Joudumme sulkemaan liittymän väliaikaisesti” https://www.is.fi/digitoday/tietoturva/art-2000009948947.html
SUOMALAISET heräsivät taannoin reitittimien aiheuttamaan tietoturvauhkaan. Teleoperaattori Telia sanoo saaneensa aiheesta satoja yhteydenottoja asiakaspalveluunsa sen jälkeen, kun Suojelupoliisi varoitti päivittämättömien kotireititinten vaarantavan kansallista turvallisuutta.
Tomi Engdahl says:
https://www.enertec.fi/natiivi/3937/paranna-kyberturvallisuutta-kokonaispalvelukonseptilla?fbclid=IwAR3HEKYrXg5_90RIfNWFqyy0hdYr8LemaASAnpgXlc_GHAGllRp7KExer_Y_aem_AcZHVlANuYs_b-cL4uG9RlwnFzjlsPPEROjqv-ClMHCQ1kLrv3tJvxY88J7kGWxETbSwk_nNsWCFyuHlZoxLU0E_
Tomi Engdahl says:
https://www.iflscience.com/around-10-percent-of-the-internet-is-encrypted-via-lava-lamps-71274
Tomi Engdahl says:
https://tenendo.com/how-to-choose-the-right-penetration-testing-for-your-business/
Tomi Engdahl says:
https://dnyuz.com/2023/10/22/the-race-to-save-our-secrets-from-the-computers-of-the-future/?fbclid=IwAR24aaYB60Jh4gKvn6YQmAv3p1_oq6j2YiuuqkpIkzJl_aHDp_aJUWh-VQc
Tomi Engdahl says:
https://thehackernews.com/2023/10/unraveling-real-life-attack-paths-key.html
Tomi Engdahl says:
https://hackersonlineclub.com/how-to-root-android-devices-and-act-as-administrator/#google_vignette
Tomi Engdahl says:
https://www.uusiteknologia.fi/2023/10/20/uutta-suojaa-pilviratkaisuihin-tietoturva-aukoista-80-prosenttia-pilvesta/?utm_campaign=uutta-suojaa-pilviratkaisuihin-tietoturva-aukoista-80-prosenttia-pilvesta&utm_medium=rss&utm_source=rss&fbclid=IwAR3cRdJLQwdWDlpdjS–g9EfwoxUiFPOOJGkxrVKfe4ReoWGjeLFbjMUgfc
Tomi Engdahl says:
https://www.ghacks.net/2023/10/18/brave-is-installing-vpn-services-without-user-consent/?fbclid=IwAR0PIOm7uh018jVs7WEw5r-EcDbBOGrEKdX0WSfQQfBFOY72e012-Hl_Fz0
Tomi Engdahl says:
https://www.bleepingcomputer.com/news/security/fake-keepass-site-uses-google-ads-and-punycode-to-push-malware/
Tomi Engdahl says:
https://www.bleepingcomputer.com/news/security/cisa-shares-vulnerabilities-misconfigs-used-by-ransomware-gangs/
Tomi Engdahl says:
https://www.etteplan.com/stories/preparing-factory-and-production-plant-success-evolving-energy-landscape
Tomi Engdahl says:
https://arstechnica.com/security/2023/10/theres-a-new-way-to-flip-bits-in-dram-and-it-works-against-the-latest-defenses/
Tomi Engdahl says:
https://www.zdnet.com/article/flipper-zero-can-lock-up-an-iphone-running-the-latest-ios-17/?ftag=COS-05-10aaa0h&utm_campaign=trueAnthem%3A%20Trending%20Content&utm_medium=trueAnthem&utm_source=facebook&fbclid=IwAR32WPmXuksDodu6ONBfGV5-LWe-aQaOCiKC77NnXkWJX16HsBSX7oFb4sE
Tomi Engdahl says:
Suomi.fi muuttui hakkereiden leikkikentäksi – Poliisille kerrotaan vasta, jos pahin tapahtuu
Digi- ja väestötietovirasto (DVV) on ryhtynyt jo kolmatta kertaa yhteistyöhön hakkereiden kanssa. Kohteena on tällä kertaa Suomi.fi-verkkopalvelun, varmennepalveluiden sekä väestötietojärjestelmän osia. Sopimukseen kuuluu, että mikäli hakkerit noudattavat sovittuja sääntöjä, ei virasto ilmoita heidän tekemisistään poliisille.
https://www.iltalehti.fi/digiuutiset/a/06253915-8c01-4d95-a39d-c3c924f04ad9
Tomi Engdahl says:
https://www.mikrobitti.fi/uutiset/flipper-zero-osa-3-ala-ikina-kiinnita-tietokoneeseen-vierasta-usb-laitetta/e2b24964-f3c1-462e-b635-dc9c8284b7ba
Tomi Engdahl says:
https://www.zdnet.com/article/flipper-zero-can-lock-up-an-iphone-running-the-latest-ios-17/
Tomi Engdahl says:
https://www.kone.fi/referenssit-ja-tarinat/artikkelit/miten-eettiset-hakkerit-lisaavat-kyberturvallisuutta.aspx
Tomi Engdahl says:
Does Resetting a Hacked Router Make It Secure Again?
BY
AARON BROOKS
PUBLISHED OCT 11, 2023
So, you’re router’s been hacked. The best solution is to reset the hardware, but does that make it secure again? Here’s what you need to know.
https://www.makeuseof.com/reset-hacked-router/#Echobox=1697289986
Tomi Engdahl says:
https://www.bleepingcomputer.com/news/security/microsoft-defender-now-auto-isolates-compromised-accounts/
Tomi Engdahl says:
https://thehackernews.com/2023/10/microsoft-to-phase-out-ntlm-in-favor-of.html
Tomi Engdahl says:
https://www.phoronix.com/news/Logitech-USB-Unplug-Linux-Crash
Tomi Engdahl says:
https://www.kitploit.com/2023/10/hbsqli-automated-tool-for-testing.html?fbclid=IwAR36aImd8RMsC1A4DzUFoV_bAOhkGgNItVZvfiSn2fmKVqi_d3Nsc_iqaQk&m=1#google_vignette
Tomi Engdahl says:
https://www.akamai.com/blog/security-research/magecart-new-technique-404-pages-skimmer
Tomi Engdahl says:
Kiristysiskun uhrille myönnettiin tietoturvapalkinto – syynä avoimuus vaikeassa tilanteessa
Joakim Kullas17.10.202312:00|päivitetty17.10.202312:02TIETOTURVAKIRISTYSHAITTAOHJELMAT
Pahamaineinen LockBit-kiristyshaittaohjelma saastutti 60 prosenttia uhrin työasemista ja palvelimista.
https://www.tivi.fi/uutiset/kiristysiskun-uhrille-myonnettiin-tietoturvapalkinto-syyna-avoimuus-vaikeassa-tilanteessa/327a92ab-cd3c-4d0d-8b3f-c09729b2aa9b
Tomi Engdahl says:
Yksi kuva näyttää kaikki maailman merikaapelit ja kertoo, miksi ne katkeilevat
https://www.tekniikkatalous.fi/uutiset/yksi-kuva-nayttaa-kaikki-maailman-merikaapelit-ja-kertoo-miksi-ne-katkeilevat/0e46dd3d-d2ed-4535-ab91-c326cfa2fe20
Merikaapelit ovat internetin suonisto, joka mahdollistaa datan liikkumisen yhä useammille maailman maille, yhä nopeammin.
Tomi Engdahl says:
https://www.engadget.com/how-hackers-are-using-bluetooth-to-track-police-activity-140012717.html
Tomi Engdahl says:
Yritykset saavat uusia tietoturvavaatimuksia – ”voi tulla haastavaa, jos Nis on uusi asia”
Toni Stubin12.10.202306:05KYBER
Euroopan unionin uusi kyberturvadirektiivi edellyttää yrityksiltä entistä enemmän panostusta tietoturvaan.
https://www.tivi.fi/uutiset/yritykset-saavat-uusia-tietoturvavaatimuksia-voi-tulla-haastavaa-jos-nis-on-uusi-asia/828eb178-d280-4cbc-a66a-d5f3209d668c
Tomi Engdahl says:
12 Ways Hackers Can Attack and Take Control of Your Smart TV
BY
PRANAV BHARDWAJ
PUBLISHED JAN 12, 2023
Your smart TV is just another computer connected to your network, and there’s a good chance it’s not a well-protected one.
https://www.makeuseof.com/ways-hackers-attack-smart-tv/
Tomi Engdahl says:
https://www.uusiteknologia.fi/2023/10/13/tietoturvan-takia-vanhat-reitittimet-vaihtoon/
Tomi Engdahl says:
Miksi datakaapeleiden sijainnit ovat julkisia Suomessa? Asiasta on oltu huolissaan jo pitkään
Viranomaiset ovat jakaneet sijaintitietoja avoimesti operaattoreiden varoituksista huolimatta
https://yle.fi/a/74-20054707
Tomi Engdahl says:
Tässä muistutus siitä, miksi työpaikan kulkulätkää ei koskaan kannata jättää lojumaan pöydälle
9.10.202315:14|päivitetty9.10.202315:14
Mikrobitin testissä työpaikan kulkulätkän kopioiminen oikeilla työkaluilla onnistui käden käänteessä.
https://www.mikrobitti.fi/uutiset/tassa-muistutus-siita-miksi-tyopaikan-kulkulatkaa-ei-koskaan-kannata-jattaa-lojumaan-poydalle/b4fd7e88-352f-4efb-adf7-68105b9eeaeb
Tomi Engdahl says:
https://www.bleepingcomputer.com/news/security/nsa-and-cisa-reveal-top-10-cybersecurity-misconfigurations/?fbclid=IwAR1Gms3wTwiZiW5eFqS31-_vdb_Kv_EUv1Iovw-JdGBRcB8krN1Sea8_f6w
Tomi Engdahl says:
https://www.darkreading.com/attacks-breaches/etherhiding-blockchain-technique-hides-malicious-code-wordpress-sites
Tomi Engdahl says:
https://www.enertec.fi/natiivi/3937/paranna-kyberturvallisuutta-kokonaispalvelukonseptilla?fbclid=IwAR2h8JW46Ese49cYXJz4p1WG7IiaVMJGeUses4hGVRT-PRzyXnrNwdyhkaQ_aem_AaXOzv2QTxA810DlXk7oS3DgawG-fbz3t5oJvv8aNrXkNnqbknP_eSPVpTuiUeivGGODeJ4NX0jU38GXqnNeJ90Q
Tomi Engdahl says:
https://www.nextgov.com/cybersecurity/2023/10/nist-issue-cyber-updates-introduce-new-security-controls/391242/
Tomi Engdahl says:
How To Root Android Devices and Act As Administrator?
https://hackersonlineclub.com/how-to-root-android-devices-and-act-as-administrator/#google_vignette
Tomi Engdahl says:
Jopa 43.1% kaikista maailman verkkosivuista pyörii WordPressillä. Valitettavasti suuri suosio altistaa myös hyökkäyksille. Siksi toimiva palvelin ja ylläpitopalvelu on elintärkeää sivuston toimivuuden ja tietoturvan kannalta.
Lue koko artikkeli: https://www.dude.fi/wordpress-yllapito-yhdelta-kumppanilta
Tomi Engdahl says:
Web3 Security Best Practices: Safeguarding Your Digital Assets in a Decentralized World
https://olympixai.medium.com/web3-security-best-practices-safeguarding-your-digital-assets-in-a-decentralised-world-f790dc691272
In the rapidly evolving landscape of Web3, where decentralization and digital assets reign supreme, ensuring the security of your holdings has never been more critical. This article thoroughly explores Web3 security best practices, delving into the technical aspects that can help you safeguard your digital assets effectively.
Introduction
Web3, powered by blockchain technology, offers incredible innovation, finance, and personal empowerment opportunities. However, this ecosystem’s decentralized and pseudonymous nature also introduces unique security challenges. To navigate this landscape safely, you must adopt robust security practices.
1. Secure Your Private Keys
Private keys are the linchpin of Web3 security. They grant control over your digital assets, and their loss or compromise can be catastrophic.
2. Be Wary of Phishing and Scams
Phishing attacks in the Web3 space are sophisticated.
3. Smart Contract Security
Smart contracts underpin DeFi and DApps, but they can harbor vulnerabilities.
4. Regular Software Updates
Keep your software and wallets updated to patch vulnerabilities
5. Data Encryption
Encrypt sensitive data, such as private keys and wallet recovery phrases.
6. Network Security
Protect your connections and data transfers
7. Decentralised Identity (DID)
DIDs are gaining popularity for authentication and identity management
8. Privacy and Anonymity
Preserve your privacy in a pseudonymous world:
Explore platforms and solutions employing zero-knowledge proofs to enhance privacy.
9. Be Cautious with Third-Party Services
Vet the security practices of any third-party service you use
10. Backup and Recovery
Prepare for contingencies:
Back up your private keys, wallet information, and crucial data.
Conclusion
In the Web3 world, security is paramount. By diligently following these technical best practices, you can safeguard your digital assets, protect your privacy, and confidently engage in the decentralized landscape. Remember that security is an ongoing effort; stay informed about emerging threats and technologies to adapt and evolve your security strategies accordingly.
Tomi Engdahl says:
https://www.uusiteknologia.fi/2023/11/09/vuoden-tietoturvatunnustukset-jaettiin-avoimuutta-ja-tekoalya/