Cybersecurity Weekly News Roundup
Posted in Cyber Security

Cybersecurity Weekly News Roundup for 2nd week of November

Latest Blogs

Cybersecurity Weekly News Roundup

By AMSAT Nov 13,2020

Cybersecurity Weekly News Roundup

In the outgoing week, reports of security patches, discovery of new ransomware, and phone-based multi-factor authentication dominated the cybersecurity landscape.

 

Here is a brief review of news that stood out in the cyberworld.


Security firm discovers Linux version of RansomEXX ransomware

Security firm Kaspersky found a Linux version of the RansomEXX ransomware, marking the first time a key Windows ransomware strain had been ported to Linux to help in targeted interferences.

The ransomware had been used in attacks against the Texas Department of Transportation, Konica Minolta, US government contractor Tyler Technologies, Montreal’s public transportation system, and, most lately, against Brazil’s court system (STJ).

Microsoft released monthly roll-up of security fixes

Tech giant Microsoft released its monthly roll-up of security fixes known as Patch Tuesday. In November, the software behemoth patched 112 security flaws across an extensive range of products, from Microsoft Edge to the Windows Wallet Service.

Google patched two more zero-day flaws

On Wednesday, search engine behemoth Google released Chrome version 86.0.4240.198 to fix two zero-day flaws that were exploited in the wild. These two vulnerabilities marked the fourth and fifth zero-days that the search engine giant fixed in Chrome over the last couple of weeks.


Microsoft urged users to stop using phone-based multi-factor authentication

Microsoft advised users to stop telephone-based multi-factor authentication (MFA) solutions like one-time codes sent via SMS and voice calls and instead replace them with newer MFA technologies, like app-based authenticators and security keys.

TAGS

  • Cyber security
  • Security Updates
  • ransomware

Recent Blogs

Share this article

Ready to Get Started?

Our specialists are ready to tailor our security service solutions to fit the needs of your organization.

    By submitting the form, you agree to the Terms of Use and Privacy Policy

    Five Key Risk Mitigation Strategies
    Posted in Miscellaneous

    Five Key Mitigation Strategies You Should be Aware of

    Latest Blogs

    Five Key Risk Mitigation Strategies

    By AMSAT Nov 11,2020

    Five Key Risk Mitigation Strategies

    When a production team kicks off a new project, there are integral risks that can be connected to a project’s processes. Nevertheless, there are approaches that can help alleviate these risks as well as anticipating the repercussions of these risks. These approaches can be used to recognize, evaluate, and examine risks and any associated consequences.

    What is risk mitigation?

    Risk mitigation refers to the method of planning and developing approaches and options to decrease threats, or risks, to the objectives of the project. A project team might enforce risk mitigation tactics to recognize, oversee and assess risks and implications integral to executing a specific project, such as new product creation. The process also comprises the actions put into place to handle issues and impacts of those issues concerning a project.

    Five risk mitigation strategies with examples

    Appropriate risk mitigation involves first identifying potential risks to a project—like team turnover, product failure or scope creep—and then planning for the risk by implementing strategies to help alleviate or halt the risk. The following strategies can be used in risk mitigation planning and monitoring.

    1. Assume and accept risk

    This strategy can involve alliance between teammates to spot the possible risks of a project and whether the effects of the recognized risks are satisfactory. Teammates are also likely to recognize and presume the possible flaws posed by the risks, while identifying risks and associated implications. This approach is commonly used for detecting and appreciating the risks that can impact a project’s productivity. The objective of this strategy helps bring these risks to the company’s attention, allowing everyone working on the project to have a mutual understanding of the risks and implications involved.

    1. Risk avoidance

    The avoidance strategy presents the accepted and assumed risks and consequences of a project and presents opportunities for avoiding those accepted risks. Some methods of implementing the avoidance strategy is to plan for risk and then to take steps to avoid it. For example, to mitigate risk on new product production, a project team may decide to implement product testing to avoid the risk of product failure before final production is approved. And this can be performed in these two ways.

     

    • Risk to performance

    Mitigation of performance risks, such as inadequate resources to carry out the work, insufficient design or poor team dynamics, can let a project team recognize possible methods to steer clear of these types of risk circumstances that may cause issues with project performance. For example, a production team might test more robust product resources to evade the risk of product fiasco with less durable resources.

    • Risk to schedule

    Circumvention of schedule implications can be executed by recognizing issues that could arise, affecting the timeline of the project. Vital deadlines, due dates and final delivery dates can be impacted by risks, such as being excessively hopeful about the timeline of a project. The avoidance approach can help the project team strategize ways to avoid schedule conflicts. And this can be done by creating a managed schedule that demonstrates specific time allowances for planning, designing, and making changes as needed.

     

    1. Controlling risk

    Teammates are also likely to enforce a control strategy when reducing risks to a project. This strategy works by considering risks recognized and accepted and then taking actions to decrease or remove the effects of these risks. The following examples highlight how control methods can be implemented for risk mitigation.

    1. Transference of risk

    When risks are identified and taken into account, mitigating the consequences through transference can be a viable strategy. The transference strategy works by transferring the strain of the risk and consequences to another party. This can present its own downsides, though, and when an organization enforces this risk mitigation strategy, it should be in a way that is acceptable to everybody involved.

    1. Monitoring risk

    Supervising projects for risks and consequences involves watching for and recognizing any changes that can affect the impact of the risk. Production teams might use this approach as part of a standard project appraisal plan. Cost, scheduling and performance or output are all features of a project that can be supervised for risks that may emerge during completion of a project. For example, a finance team or budget committee can assess and review risks to cost by generating a reporting routine to outline each expense of the company. This approach works by letting teams constantly measure the budget and change any cost plans accordingly.

    TAGS

    • Cyber Crime
    • Security Updates
    • risk mitigation
    • Cyber Security

    Recent Blogs

    Share this article

    Ready to Get Started?

    Our specialists are ready to tailor our security service solutions to fit the needs of your organization.

      By submitting the form, you agree to the Terms of Use and Privacy Policy

      All You Need to Know about Phishing 101
      Posted in Miscellaneous

      All You Need to Know about Phishing 101

      Latest Blogs

      9-11-All-You-Need-to-about-Phishing

      By AMSAT Nov 11,2020

      All You Need to Know about Phishing 101

      At a high level, phishing is trying to deceive people into doing something through an email that allows the cybercriminal to hack a target.

      What is phishing?


      When phishing is typically discussed, the emails that consumers receive are from someone mimicking a brand or an individual. For example, if the rival’s objective is to get the user to click a link that then leads to a suspicious website asking for personal information to help them log in to the target’s bank details, the link could be anything from “click to reset your password,” to an email mimicking your debt loan officer asking you to “click to pay your late fees.”

      Another version of phishing is an email that comprises malevolent attachments. A common instance is an email purportedly from a mobile shipper telling users they have a bill past due and to open the attachment to view it. Once that infected document is opened, a few things can occur. There might be a link to a compromised site which may install ransomware on your computer or ask for your details. A computerized message from the attacker cloaked as a standard prompt may ask you to allow commands in the document, which then installs the threat on your machine. Otherwise, the document itself could hold an exploit, and you are likely to be infected if you simply open it.

      Phishing attack tactics

      We come across quite a few impersonated financial institutions and cloud provider phishing emails that are particularly seeking to steal user credentials. On the positioned malware side of things, you’ll get reports including bills from your bank or mobile shipper. We’ve also come across phishing attacks mimicking law enforcement and in the form of a court order or an unpaid fine. Generally, the strategies tend to circle around a call to action with some kind of resolve to get clients to click.

      A few years ago, a unique tactic was employed where attackers exploited a huge breach to carry out targeted phishing attacks. They used users’ leaked personal information to send phishing emails laced with individual details that make the message appear real. If you receive an email that comprises information such as your full mail address and your phone number, for instance, that email will appear reliable enough that you might be lured to click. Whenever these big breaks happen, it’s generally suspected that people’s information is later being leveraged in these malicious attacks.

       

      What should users do to stay protected?


      Users need to put security above and over everything else. In fact, ensuring cybersecurity is extremely important for your home computers and devices as well as your systems at workstations. Threat attackers use the same tactics on ordinary consumers as they do on companies, so you can’t let your guard down when you leave your workplace. You’re a target regardless of your location, and keeping that in mind will help you make better security decisions.

      If you typically receive any email that appears too good to be true, it perhaps is. Here are some more actionable tips to keep in mind:

       

      Trust, but confirm. If you get an email from an organization you do business with, call them up instead of clicking on any links. This will help you verify whether the email is real without any possible harm. And if you’re one of the first people targeted in the phishing campaign, you could be helping the brand by notifying them that their name is being used spitefully.

      Always create unique passwords for each personal account, particularly each bank account, you need to log in to and change them frequently

      Enable 2-factor authentication when it’s available

      Do not open attachments in emails from recipients you are not familiar with

      Do not enable macros in document attachments received through email

      If undecided, never give out your personal data

      Back up frequently and keep a fresh backup copy off-site

      Protect your computer with cutting-edge real-time security

      TAGS

      • phishing attack
      • Security Updates
      • cybercriminal

      Recent Blogs

      Share this article

      Ready to Get Started?

      Our specialists are ready to tailor our security service solutions to fit the needs of your organization.

        By submitting the form, you agree to the Terms of Use and Privacy Policy

        IT Infrastructure Security & Resiliency Explained
        Posted in Cyber Security

        IT Infrastructure Security & Resiliency Explained

        Latest Blogs

        IT Infrastructure Security & Resiliency Explained

        By AMSAT Nov 04,2020

        IT Infrastructure Security & Resiliency Explained

        IT security is not an easy infrastructure to understand. It has many different levels to it and requires a lot of knowledge in different areas to understand how it works. You also need to know that IT infrastructure security consists of different components. Some provide specific functions such as security while others are generally required for the IT operation to go smoothly. In this article, we will explain IT infrastructure security and resiliency so continue reading.

        IT Infrastructure Security

        The security of an IT Infrastructure consists of just firewalls. When we talk about IT security, we are talking about a multi-discipline subject. It requires different skill sets and in-depth knowledge in this area. Let us take a deeper look into what a firewall is and how it works.

        Firewalls

        A firewall is a software created to prevent any harmful data from accessing the computer through the internet. It blocks any kind of data, which it seems dangerous for the computer. The primary function of a firewall is to prevent any kind of unauthorized person or data to access the computer.

        In other words, a firewall is like a bodyguard for your computer. Everyone who owns a computer has a firewall installed in it to prevent his or her computers from harm through the internet. A person who wants a good security system has different layers of protection and normally firewall is the first layer of defense.

        Firewalls are divided into three categories:

        1.      Packet-filtering Firewalls

        This is one of the most basic types of firewalls out there. Their main job is to inspect data packets. They do not let data packets pass that do not meet the criteria of the firewall rules. You can block out different types of information using this firewall by only blocking their IP addresses. They are built into the routers so that they can automatically do their job. They are not that effective as they can only block out IP addresses however, they are very fast and easy to set up to give you some sort of protection from harmful data on the internet.

        2.      Proxy Service Firewalls

        Proxy service firewalls are placed between a network of computers and the internet. As it connects to a network of computers, you do not directly interact with the data on the internet. Using proxy service firewalls first, the data is sent to a network of computers where it checks if the data is safe enough to send to the computer. If it is safe, it is sent to the computer, and if it is not then it is rejected access to the computer. This protects your IP address and does not allow any third-party source to access it without your permission.

        Proxy service firewalls also help you load web pages you frequently visit faster as they already have the data of the web page stored and allow you automatically to enter as they know the website is safe.

        3.      Stateful Inspection Firewalls

        Stateful Inspection firewalls are also called “dynamic packet filtering firewalls.” They combine the features of the packet-filtering firewalls and the proxy service firewalls. They not only scan the information being sent to your computer by the internet but also monitor it so that they are from a legitimate source and no harmful data is being sent to your computer. Stateful Inspection Firewalls allow you to block any kind of data and is not limited to anything.

        IT Infrastructure Resiliency

        Resiliency means to be prepared for any sort of the change in action and be ready to face the consequences, which come with the problem. Resiliency is to be prepared for that problem and learn how to tackle it. There are many different tasks done by companies to be resilient to any sort of problem.

        The most normal problem is when the power goes out. You should always have a backup power generator waiting to be turned on in case of any emergency. You should have a plan for your company for the future so that everything goes smoothly. You should always implement security features, which will protect you from hackers.

        TAGS

        • Infrastructure Security
        • Cyber Security
        • Infrastructure Resiliency
        • firewalls

        Recent Blogs

        Share this article

        Ready to Get Started?

        Our specialists are ready to tailor our security service solutions to fit the needs of your organization.

          By submitting the form, you agree to the Terms of Use and Privacy Policy

          DNS Security Solution: Best Practices for Network Security
          Posted in Miscellaneous

          DNS Security Solution: Best Practices for Network Security

          Latest Blogs

          DNS Security Solution: Best Practices for Network Security

          By AMSAT Nov 02,2020

          DNS Security Solution: Best Practices for Network Security

          DNS attacks are always supposed to be top priority and mission-critical. Should the DNS server go offline, reaching vital services and apps will not be possible. Therefore, taking DNS security is very important. At the same time, ensuring best practices is also necessary.

          DNS stands for Domain Name System. It plays a vital role in protecting us from dangerous data on the internet. Many consider it the very core of the internet. Now you may want to know what DNS does. DNS’s main goal is to provide you with complete access to your network activity. It helps you detect any suspicious activity and will help you deal with it as soon as possible.

          So, What Are the Uses of DNS?

          • It helps you gain visibility over your network activity and let you see if any suspicious activity is taking place or not.
          • It prevents DoS attacks (Denial of Service attacks).
          • It prevents a weaponized payload through Domain Squatting, or Domain Hijacking attacks.
          • It automatically lets data from a secured network to pass through, as it already knows that the data is safe.

          DNS servers are hackers’ top priority. If your DNS server goes down you can have no access to any data or service. DNS servers are hackers’ arch-nemesis. Hackers’ first and most important goal is to shut down the DNS servers. Companies should be investing in protecting their DNS servers with high-quality security features. Around 79% of companies faced DNS attacks and suffered great amounts of damage such as Loss of business (29%), application downtime (82%), data theft (16%), and more.

          Protect Your Business from Data Theft Using DNS

          Data theft is one of the hardest to detect cyber-crimes. Data theft is only detectable after the information has already gone through to the hacker. To prevent data theft real-time, DNS analytics are a requirement. This requires a feature of DNS known as DNS Transaction Inspection (DTI) to provide the detection of threats. Criteria are set and steps are taken to avoid any unknown source from stealing data from the business.

          Best Practices for DNS Security

          • Always make sure that DNS records all the activities taking place on the server. This will provide you valuable information from where the malicious content is coming from and what their purpose is. DNS automatically detects if any trace is leading towards any cache poisoning or malicious intent. Monitoring all of this makes sure you are aware of where the attack is from and how it is affecting your business.
          • DNS always stores client’s information in a cache for future usage. As all of your information is being stored in a cache hackers can take advantage of this. They can steal this information and exploit it in any way possible. Always make sure to lock the DNS cache so that hackers cannot access it and steal your data in any way possible. This works in such a way that if you lock the DNS cache the data inside it can only be accessed or changed before the expiry time of TTL(time to live).
          • There is a feature in DNS known as DNS filtering. DNS filtering makes sure to block users from gaining access to malicious websites. It automatically rejects entry into the website if the user tries to access it or vice versa, as the DNS knows that it is already malicious. It immediately cuts off all the information going to the malicious website and does not send the DNS cache to the website.
          • Hackers will always find a way to steal your data. To avoid this always keep the hackers on their feet by updating your DNS server regularly. This will result in the hackers not being able to gain access to your DNS server. If you update your DNS server, regularly better security features will be added to it, which will keep your DNS server safe and secure.

          For more information about DNS security, scroll through the infrastructure management on our website.

          TAGS

          • DNS Security Solution
          • Network Security
          • Data Theft

          Recent Blogs

          Share this article

          Ready to Get Started?

          Our specialists are ready to tailor our security service solutions to fit the needs of your organization.

            By submitting the form, you agree to the Terms of Use and Privacy Policy