top-stories-that-dominated-the-cyberworld
Posted in Cyber Security

A Brief Weekly Review of Top Stories that Dominated the Cyberworld

Latest Blogs

top-stories-that-dominated-the-cyberworld

By AMSAT July 07,2021

A Brief Weekly Review of Top Stories that Dominated the Cyberworld

The security landscape saw a number of developments with far-reaching consequences over the last week. From US President Joe Biden warning his Russian counterpart Vladimir Putin to take action against cybercriminals to Microsoft’s decision to acquire cybersecurity startup RiskIQ, the outgoing week was replete with many headline-grabbing events.

Here’s a brief review of what occurred in the outgoing week.  

Biden Told Putin to “Take Action” against Cybercriminals

In a phone call, President Joe Biden warned Russian President Vladimir Putin that he must crack down against threat actors acting in his country.

 

The White House said that the United States reserves the right to protect its people and its critical infrastructure from future attacks.

 

In his call with Putin, Biden also underlined that he is committed to sustained engagement on the wider threat posed by ransomware, as per the White House.

 

Last month, Biden warned the Russian president that there would be consequences for continuing cyberattacks stemming from Russia. Since then, a new ransomware attack associated with the Russia-based REvil hacking group has triggered extensive disruption.

Microsoft Set to Buy Cybersecurity Startup RiskIQ

Technology giant Microsoft confirmed it was set to drop a whopping $500mn in cash to buy RiskIQ, a cybersecurity company that provides threat intelligence and cloud-based software as a service for organizations.

Microsoft, however, declined to confirm the reported figure.

Terms of the deal, which will see the San Francisco-based company’s threat intelligence services combined into Microsoft’s flagship security offerings, were not revealed.

 

The announcement came amid a hyper-security landscape as businesses move to remote and hybrid working strategies.

 

Microsoft said that by embedding RiskIQ’s technologies into its main products, its customers would be able to build a more inclusive view of the international threats to their organizations as workforces continue to work outside of the outdated office milieu.

Russian hacker group Went Offline, Sparking Speculations

A Russian-based hacker group, responsible for a huge ransomware assault, went offline, prompting rumors whether it was an action taken by the government.

 

The “dark web” page of the group known as REvil vanished some two weeks after an assault which affected networks of hundreds of businesses globally and led to a ransom demand of $70 million.

A security expert, Allan Liska, with the firm Recorded Future, said: “REvil has seemingly vanished from the dark web, as its website has gone offline.”

 

The news came on the heels of the US President Joe Biden’s repeated warning to his Russian counterpart Vladimir Putin about harboring threat actors while suggesting the United States could take action in the face of rising ransomware attacks.

Government Entities Targeted by Chinese Hackers

As per a new report from anti-malware vendor Kaspersky, a newly revealed advanced persistent threat (APT) drive targeted legions of users in South Asia, including government organizations.

Termed LuminousMoth, the activity involved cyberespionage attacks on entities since at least October 2020 but, unlike similar attacks that are highly targeted, this drive stands out thanks to its size: almost 100 victims in Myanmar and 1,400 in the Philippines.

 

 

However, the key focus of the attacks was only a subset of victims that comprised prestigious organizations, including government entities both within the two countries and overseas.

TAGS

  • Cyber Crime
  • Security Updates
  • RiskIQ

Recent Blogs

Share this article

Ready to Get Started?

Our specialists are ready to tailor our security service solutions to fit the needs of your organization.


    By submitting the form, you agree to the Terms of Use and Privacy Policy

    a-brief-weekly-review-of-top-stories-that-dominated-the-cyberworld
    Posted in Cyber Security

    A Brief Weekly Review of Top Stories that Dominated the Cyberworld

    Latest Blogs

    a-brief-weekly-review-of-top-stories-that-dominated-the-cyberworld

    By AMSAT July 9,2021

    A Brief Weekly Review of Top Stories that Dominated the Cyberworld

    Many developments took place in the cybersecurity landscape in the outgoing week. From software company Kaseya hit by supply chain ransomware assault to hackers demanding a staggering $70mn as Kaseya ransomware affected hundreds of firms, the cyberspace scene was awash with some earth-shattering events that grabbed world headlines.

     

    Here’s a brief review of what occurred in the outgoing week.   

     

    Supply Chain Ransomware Attack Hit IT Software Company Kaseya

     

    Software maker Kaseya Limited came under a widespread supply chain ransomware attack, with the company advising users of its VSA endpoint management and network monitoring tool to immediately shut down VSA servers.

     

    Kaseya said that while the incident only seems to affect on-premises customers, SaaS servers have also been shut down as a preventive measure.

     

    Meanwhile, the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA) said that it was taking action to comprehend and address the attack against Kaseya VSA.

     

    Hackers Demanded $70 Million as Kaseya Ransomware Attack Impacted 1,500 Firms

     

    IT management software maker Kaseya said the recent ransomware attack affected as many as 1,500 firms; it, however, claimed that there was no sign of malicious modifications to product source code.

     

    The company also urged customers to immediately shut down on-premises servers running its VSA endpoint management and network monitoring tool because of a cyberattack, which exploited a zero-day flaw in the product.

     

    Kaseya has provided consistent updates about the incident. While it primarily said that less than 40 of its 36,000 customers were affected, the number rose to fewer than 60 a few days later.

     

    Ransomware Attack Hit Rural Alabama Electric Cooperative

     

    A ransomware attack hit an Alabama power provider, leaving customers without access to their account information.

     

    Wiregrass Electric Cooperative, which serves nearly 25,000 members, announced that no data was impacted by the attack, but member account information and payment systems were taken offline for maintenance as a precaution.

     

    Chief operating officer Brad Kimbro said that the company did not pay a ransom and didn’t have any data compromised in the attack, adding that electrical service wasn’t disrupted.

    TAGS

    • Cyber Crime
    • Ransomware Attack
    • Cyberworld

    Recent Blogs

    Share this article

    Ready to Get Started?

    Our specialists are ready to tailor our security service solutions to fit the needs of your organization.


      By submitting the form, you agree to the Terms of Use and Privacy Policy

      a-brief-weekly-review-of-top-stories-that-dominated-the-cyberworld
      Posted in Cyber Security

      A Brief Weekly Review of Top Stories that Dominated the Cyberworld

      Latest Blogs

      a-brief-weekly-review-of-top-stories-that-dominated-the-cyberworld

      By AMSAT July 2,2021

      A Brief Weekly Review of Top Stories that Dominated the Cyberworld

      The outgoing week saw a number of events that had long-term effects on the cybersecurity landscape. From Bit Discovery raising a whopping $4mn Series B funding round to a vendor inadvertently disclosing customer information of Mercedes-Benz USA, there were many minor and major incidents that made headlines.

       

      Here’s a brief review of what took place in the outgoing week.   

      Bit Discovery Raised $4 Million Series B Funding Round 

      Jeremiah Grossman’s Bit Discovery announced it has obtained another $4 million in Series B financing spearheaded by Mighty Capital and return investor Aligned Partners.


      Jeremiah Grossman, co-founder and CEO of Bit Discovery, said that enterprises are increasingly viewing attack surface management as vital to vulnerability management, recognizing areas of unidentified risk, M&A processes, IoT device identification, and much more.


      Bit Discovery’s founding mission is to help companies comprehend the cruciality of attack surface management. History suggests that companies that let this area lapse have faced huge data breaches, issues with hardware or software licensing, mismanaged M&A activity, and undesirable financial effect due to unconsolidated and ill managed IT infrastructure.

      Vendor Inadvertently Revealed Customer Information: Mercedes-Benz USA

      Last week, Mercedes-Benz USA said that a vendor inadvertently divulged important personal information relating to its customers.


      Initially revealed by the affected vendor on June 11, the incident involved more than 1.6 million records, a vast majority of which include names, addresses, email addresses, phone numbers, and some details on purchased vehicles.


      Nevertheless, only “less than 1,000 Mercedes-Benz customers and interested buyers” had what the German luxury carmaker labelled as “sensitive personal information” affected.


      The company has started informing those whose additional information was accessible.

      Vendor Inadvertently Revealed Customer Information: Mercedes-Benz USA

      According to a warning from security vendor Detectify, several large organizations were affected by an authentication bypass in Adobe Experience Manager CRX Package Manager.


      The Adobe Experience Manager (AEM) is a content management solution (CMS) used for the creation of websites and mobile applications; it also allows developers to manage marketing content and assets.


      Discovered by Detectify Crowdsource community researchers Ai Ho and Bao Bui, the authentication bypass could be abused by threat actors to access the CRX Package Manager, which is used for handling packages on the local AEM installation.


      Some of the organizations affected include LinkedIn, MasterCard, Sony’s PlayStation, and McAfee.

      Facebook Filed Lawsuits against Four Vietnamese Nationals for Hacking Accounts

      Social media giant Facebook announced it had sued four Vietnamese individuals over advertising-related schemes.

      According to Facebook, four individuals living in Vietnam hired session/cookie theft systems to compromise the accounts of employees at advertising and marketing agencies, leveraging them to run unlawful ads.

      As part of their scheme, the defendants purportedly used a malicious Android application, called “Ad Manager for Facebook,” to take control of the accounts. The app was hosted on Google Play, but it has been eliminated from the storefront.

      TAGS

      • Cyber Crime
      • Security Updates

      Recent Blogs

      Share this article

      Ready to Get Started?

      Our specialists are ready to tailor our security service solutions to fit the needs of your organization.


        By submitting the form, you agree to the Terms of Use and Privacy Policy

        Posted in Cyber Security

        A Brief Weekly Review of Top Stories that Dominated the Cyberworld

        Latest Blogs

        By AMSAT June 25,2021

        A Brief Weekly Review of Top Stories that Dominated the Cyberworld

        The outgoing week saw a number of events that had long-term effects on the cybersecurity landscape. But the news that eclipsed many notable events was the tragic death of antivirus pioneer John McAffee, who was found dead in a Spanish prison. Other important developments of the week included revelation of a data breach by UK law firm Gateley and the US’s seizure of several Iran-linked news sites.

         

        Here’s a brief review of the major developments of the outgoing week.

        British Law Firm Gateley Revealed Data Breach

        Gateley, a legal and professional services group in the UK, disclosed it was probing a cybersecurity event that led to the revelation of some data, including client information.

         

        Listed on the London Stock Exchange (GTLY), Gatley said its IT team spotted a breach from an external resource. The company took some systems offline after the intrusion was exposed, but said it swiftly restored core systems.

         

        Based on the information the company gathered, it believed the effect of the incident was limited and the cybercriminals only managed to access almost 0.2% of its data.

        Attacks against Container Infrastructures on the Rise

        As per reports, attacks against the container infrastructure, including supply chain attacks, are on the increase in both frequency and sophistication. A new vulnerable container using internet scanning tools can be detected in just a few hours.

         

        Aqua Security’s Team Nautilus has found that rivals could spot a new misconfigured container within an average of five hours. In 50pc of cases, the new container was spotted in less than one hour. The implication: if a new container is established today with a view to safeguarding it tomorrow, it will be too late. The probability is that the container will already be affected.

         

        More than 90pc of the attacks are intended to capture resources for cryptomining. Most of these are related to the Kinsing malware drive, which downloads a cryptominer.

        US Seized Several Iran-linked News Sites, Accused of Disinformation

        In a move that appeared to be a sweeping crackdown on Iran media, the United States seized a range of Iran’s state-linked news website domains that were accused of spreading disinformation.

         

        According to the US Justice Department, 33 of the held websites were used by the Iranian Islamic Radio and Television Union, which was singled out by the U.S. government last October for what officials branded as efforts to spread disinformation and create discord among American voters ahead of the 2020 presidential election.

         

        The website domains are owned by U.S. firms, but notwithstanding the sanctions, neither the IRTVU nor KH obtained the required licenses from the U.S. government before using the domain names.

        Antivirus Creator John McAfee Found Dead in Spanish Prison

        The news of John McAfee, the creator of McAfee antivirus software, was found dead in his jail cell near Barcelona in what officials claimed was an apparent suicide. The tragic news, which shook the technology world to its core, came hours after a Spanish court approved his repatriation to the United States to face tax charges punishable by several years in prison.

         

        The peculiar cryptocurrency promoter and tax adversary whose history of legal battle spanned from Tennessee to Central America to the Caribbean was found at the Brians 2 prison in northeastern Spain. As per the regional Catalan government, security personnel tried to resuscitate him, but the prison’s medical team finally confirmed his death.

         

        The antivirus guru, who was arrested last year, had been in the Spain prison awaiting the extradition proceedings. The arrest followed charges in Tennessee for dodging taxes after being unable to report income from endorsing cryptocurrencies. The criminal charges carried a prison sentence of up to 30 years.

         

         

        TAGS

        • John McAfee Death
        • McAfee Antivirus

        Recent Blogs

        Share this article

        Ready to Get Started?

        Our specialists are ready to tailor our security service solutions to fit the needs of your organization.


          By submitting the form, you agree to the Terms of Use and Privacy Policy

          the-tragic-death-of-a-technology-genius
          Posted in Cyber Security

          The Tragic Death of a Technology Genius

          Latest Blogs

          the-tragic-death-of-a-technology-genius

          By AMSAT June 24,2021

          The tragic death of a technology genius

          On Thursday, the news of John McAfee, the creator of McAfee antivirus software, broke over the world like a thunderbolt. The technology enthusiast and entrepreneur was found dead in his jail cell near Barcelona in what officials claim was an apparent suicide. The tragic news, which shook the technology world to its core, came hours after a Spanish court approved his repatriation to the United States to face tax charges punishable by several years in prison.

           

          The peculiar cryptocurrency promoter and tax adversary whose history of legal battle spanned from Tennessee to Central America to the Caribbean was found at the Brians 2 prison in northeastern Spain. As per the regional Catalan government, security personnel tried to resuscitate him, but the prison’s medical team finally confirmed his death.

           

          The antivirus guru, who was arrested last year, had been in the Spain prison awaiting the extradition proceedings. The arrest followed charges in Tennessee for dodging taxes after being unable to report income from endorsing cryptocurrencies. The criminal charges carried a prison sentence of up to 30 years.

           

          In one of his last interviews, with The Independent, McAfee said his time in jail was an exciting experience, adding he was constantly amused and excited. He also insisted he never wanted to return to the US. The man told the newspaper that he was identified by inmates and guards, adding that his key point of contact outside the jail was his wife, Janice McAfee. 

           

          In a tweet, his wife wrote that McAfee had spent the last eight months in complete agony and that he underwent considerable mental and physical, as well as financial trouble. She said that despite suffering immensely, he remained undeterred from continuing to speak the truth to power.

          California chipmaking giant Intel, which bought McAfee’s company in 2011 for $7.68bn, for some time purposely dissociated the brand from its contentious creator by folding it into its larger cybersecurity unit. But the rebranding was fleeting, and Intel in 2016 protracted the cybersecurity division into a new company called McAfee.

           

          In a statement, Jaime Le, a McAfee company spokesperson, said: “Although John McAfee founded the company, he has not been associated with our company in any capacity for over 25 years. That said, our thoughts go to his family and those close to him.”

           

          The unfortunate death of one of the world’s leading technology icon, who made an indelible imprint on the cybersecurity landscape by dint of his sheer brilliance and ingenuity, is a huge and irreparable loss. The authorities would do well to conduct an immediate inquiry into this huge tragedy and determine if he indeed committed suicide or whether his death is the result of a larger conspiracy.  

           

          TAGS

          • John Mcafee News
          • John McAfee Death

          Recent Blogs

          Share this article

          Ready to Get Started?

          Our specialists are ready to tailor our security service solutions to fit the needs of your organization.


            By submitting the form, you agree to the Terms of Use and Privacy Policy

            how-to-protect-your-remote-workforce-in-view-of-constant-change​
            Posted in Cyber Security

            How to Protect Your Remote Workforce in View of Constant Change

            Latest Blogs

            how-to-protect-your-remote-workforce-in-view-of-constant-change​

            By AMSAT June 21,2021

            How to Protect Your Remote Workforce in View of Constant Change

            Let’s face it. A remote workforce under persistent threat requires continuous execution and opportune responses. Although network and online security are serious issues, for most infosec teams, there is real cynicism about whether all the security features they’ve installed and all the rules they follow are actually discouraging threat actors. Is anyone really safe, especially in the wake of the terrible SolarWinds and Microsoft Exchange hacks? But assume you’re one of the few who haven’t spotted any network invasions. Is it because your security tools are working really well? Does it mean that hackers have thrived, but managed to hide their invasion? Or could it be that you’ve, one way or another, been spared by cybercriminals?


            Theoretically, it could be any of these. But you have possibly heard the famous claim that there are only two types of network owners: those who’ve been hacked, and those who’ve been hacked but are still not aware of it. While that may be a bit of exaggeration, the fact is that the online world is awash with mean actors and bots — always finding ways to slip into organizations’ networks and cause harm. So even if you haven’t spotted any attacks or breaches, that doesn’t mean it’s time to kick back and relax. Ensuring data security and protection is key.


            A study at the University of Maryland found that network attacks are basically constant — and that every computer with internet access is being attacked, typically, once every 40 seconds.


            Nevertheless, that’s just the tip of the iceberg: hacks are far more prevalent if your network contains high-value information.


            These statistics, though alarming, only tell half the story. They were collected prior to the Covid-19 pandemic, suddenly driving millions of office workers to work from their homes. Since that time, cyber-attacks have become a dime a dozen. Using the extended attack surfaces and end points offered by work from home (WFH) remote connections, threat actors have found a stockpile of new flaws to exploit. The situation has been further exacerbated by the ensuing excess on corporate VPNs, as well as the consistent shortcuts that remote workers have felt indebted to take in order to reach their colleagues — shortcuts which mainly circumvent existing security protocols.


            Today, over a year after the Covid-induced lockdowns first arisen, there appears to be an agreement that many employees will not return to their earlier full-time office environment. Some businesses have even gone to the extreme of closing down or selling their office buildings in recognition of what may be a permanent shift to home-based work. Far more believe that a hybrid pattern — in which employees come into the workplace on alternate days or on special occasions, but mostly work from home — will be a lasting legacy of the pandemic.


            IT teams around the globe have done an astonishing job of turning support away from familiar centralized work settings and towards their newly decentralized remote workforces.

            Several reports claim that employees’ output and work-life balance have improved since the start of the WFH drive. But it also means that certain security measures now need to be re-engineered into more organized, robust, and high-capacity methods.


            With so much changing, security teams need to frequently, or even unceasingly, evaluate their security posture to find and remediate any possible flaws. Change is continuous, and the last year has taught us that security teams ought to be agile and ready to acclimatize to the new normal at all times. Security is never inert, and networks will always be evolving, so ensure you’re constantly validating your security stance and ready for whatever comes next.

            TAGS

            • DLP Solution
            • Remote Workforce
            • Data Security

            Recent Blogs

            Share this article

            Ready to Get Started?

            Our specialists are ready to tailor our security service solutions to fit the needs of your organization.


              By submitting the form, you agree to the Terms of Use and Privacy Policy

              Posted in Cyber Security

              A Brief Weekly Review of Top Stories that Dominated the Cyberworld

              Latest Blogs

              a-brief-weekly-review-of-top-stories-that-dominated-the-cyberworld

              By AMSAT June 18,2021

              Dealing with cyber-threat: a complex challenge

              The outgoing week saw a number of events that had far-reaching implications on the world of cybersecurity. From Volkswagen America divulging a huge data breach to Chinese hackers accused of orchestrating SITA cyberattack, there were many minor and major incidents that shook the cyberworld. 

               

              Here’s a brief review of what took place in the week. 

              Volkswagen America Revealed Data Breach Might Have Affected 3.3 Million

              Volkswagen Group of America disclosed that a data breach that affected Audi of America as well as Volkswagen of America might have impacted nearly 3.3 million people.

               

               

              Volkswagen said that the incident was exposed on March 10, 2021 and a law enforcement probe was immediately launched into the issue.

               

               

              The probe divulged that a third party gained access to various information collected between 2014 and 2019 and which was left bare at some point between August 2019 and May 2021, when the source of the leak was identified.

               

               

              In a letter to the Maine Attorney General, the auto giant said that VWGoA revealed the information at issue included more sensitive personal information on or about May 24, 2021.

               

              Chinese Hackers Orchestrated SITA Cyberattack: Researchers 

              Security researchers at detection and prevention firm Group-IB said that a Chinese nation-state threat actor, APT41, carried out the cyberattack on SITA that affected numerous airlines worldwide, including  Air India, Air New Zealand, Finland’s Finnair, Singapore Airlines, Malaysia Airlines, and Jeju Air in South Korea. 

               

               

              SITA has nearly 2,500 customers and provides services in over 1,000 airports around the globe.

              Air India, one of the affected airlines, announced in May that roughly 4,500,000 data subjects were impacted worldwide. Compromised data includes names, dates-of-birth, passport information, contact information, and additional data.

               

               

              The Indian airline revealed that the attack was related to SITA PSS, which processes personally identifiable information (PII).

               

              Polish Govt Targeted by ‘Unprecedented’ Cyber-attacks

              The government of Poland said it was concerned by a wave of cyber-attacks against the EU member that were termed as “unprecedented”.

               

               

              Deputy Speaker Malgorzata Kidawa-Blonska said that they would listen to explanations and information from the prime minister (Mateusz Morawiecki).

               

               

              Government spokesman Piotr Muller said that Morawiecki planned to present secret documents regarding the “wide scale” of the attacks, adding that “lately we’ve been subject to an unprecedented cyber-attack against Poland, against Polish institutions and against individual email account users”.

               

              EU Law May Destroy iPhone Security: Warned Apple 

              Apple chief Tim Cook warned that the EU’s proposed new rules to hold back tech giants risk undermining the security of the iPhone.

               

               

              Last year, the European Union revealed strict draft rules targeting tech conglomerates like Apple, Google, Amazon and Facebook that could shake up the way Big Tech does business.

               

               

              Cook said existing proposals “would force side loading on the iPhone, and so this will be an alternative way of getting apps onto the iPhone.”

              TAGS

              • Cyber Crime
              • Security Updates

              Recent Blogs

              Share this article

              Ready to Get Started?

              Our specialists are ready to tailor our security service solutions to fit the needs of your organization.


                By submitting the form, you agree to the Terms of Use and Privacy Policy

                all-about-antivirus-and-its-importance
                Posted in Application Security

                All You Should Know about Antivirus and Its Importance

                Latest Blogs

                By AMSAT June 07,2021

                all-about-antivirus-and-its-importance

                All You Should Know about Antivirus and Its Importance

                What is Endpoint Security?

                Endpoint security is a procedure of protecting the corporate network when accessed through laptops or other wireless and movable devices. With the spread of mobile devices like laptops, smartphones, tablets, notebooks etc., a huge surge in the number of devices being lost or stolen has been noticed. These incidences possibly translate as enormous loss of important data for companies which allow their staffs to bring in these mobile devices into their enterprise. Endpoint security is projected to protect each endpoint on the network these devices create.

                Why You Need Antivirus Software 

                Next-generation antivirus software helps organizations spot, respond to and thwart all kinds of cyberattack strategies, methods and procedures. Antivirus software will always be needed for as long as computers have been and will be around, regardless of their connectivity to the Internet. There will never be a time when people, whether unscrupulous youths seeking an adventure or a hardened cyberthieves seeking to abuse large corporations, will no longer find ways to commit scam and cause extensive damage. 

                 

                Antivirus software is a significant tool to help frustrate such attacks. While it’s hard to foil every type of cyberattack with antivirus software, it can be a great strength when trying to prevent intrusion into a computer. Although not every disruption into a computer is meant to cause damage or steal key information, that doesn’t mean that the attack isn’t risky. Once even the most innocuous of an interruption exploits a flaw, it basically sends a signal to others that this computer has been intruded. 

                 

                When looking to buy antivirus software, ensure to purchase a reliable and renowned, subscription-based program. This is significant, as the creators of this type of software will be able to keep their subscribers’ computers protected with real-time updates that watch out the latest threats.

                What Antivirus Software Can Protect Against

                As the name indicates, antivirus safety is not just a way to block computer viruses. Some individuals believe that all disruptions into a computer are called viruses, but that is a contradiction. For example, here is a list of the ways a good antivirus program can help defend a computer with data on it:

                 

                Antivirus – Beginning with the obvious, an AP will protect against computer viruses, or attacks that mean to harm a computer.

                 

                Rootkit protection – This prevents rootkits, which are entrenched deep inside a computer in order to disguise other malware, from setting up in a computer.

                 

                Bot protection – A subscriber is warned when a hacker is trying to remotely take over a computer to use as a source for automatic spamming and other wrongdoings. 

                 

                Worm safety – Typically, networks are attacked by worms rather than computers themselves. Nevertheless, worms can carry payloads of malware that can be placed onto computers, which will be damaging. Antivirus software can prevent this kind of attack.

                 

                Trojan horses – Antivirus software is unable to halt an individual from being fooled into believing that a wanted downloaded program or file is genuine. Nevertheless, antivirus software can caution them when malware is diagnosed within a Trojan horse file.

                 

                Spyware – Antivirus software is capable of detecting when spyware has infected a computer even when the source turned out to be trustworthy and authentic. It is worth noting that antivirus software is not just for computer that is attacked from the Internet; viruses can be spread through portable storage drives. 

                How Antivirus Works

                This software scans the file equating precise bits of code against information in its database and if it discovers a pattern replicating one in the database, it is regarded as a virus, and it will isolate or erase that specific file.

                 

                How to do away with malware?

                 

                • Signature-based detection

                • Heuristic-based detection

                • Behavioral-based detection

                • Sandbox detection

                • Data mining techniques

                 

                Signature-based detection – This is most common antivirus software that checks all the .EXE files and authenticates it with the recognized list of viruses and other types of malware. Files, programs and applications are essentially skimmed when they are being used. Once an executable file is downloaded, it is scanned for any malware promptly. 

                 

                Heuristic-based detection – This type of uncovering is most usually used alongside signature-based detection. Heuristic technology is used in most of the antivirus programs, which helps the antivirus software to perceive new or a modified or an altered version of malware.

                 

                Behavioral-based detection – Used in Intrusion Detection mechanism, behavioral-based detection focusses more on detecting the features of the malware during implementation. This mechanism senses malware only while the malware executes malware actions.

                 

                Sandbox detection – It works most possibly to that of behavioral-based detection technique, executing any applications in the virtual setting to track what kind of actions it conducts. Confirming the actions of the program that are logged in, the antivirus software can recognize whether or not the program is malicious.

                 

                Data mining methods – Data mining is one of the up-to-date trends in detecting a malware. With a set of program features, data mining helps find if the program is malicious or not.

                Conclusion

                Next-generation firewalls play a critical role in cybersecurity architectures the all over the globe. Antivirus software works by recognizing parallel designs from its database, or using equipment to help forecast when an attack will happen—and halting it before it does. It exploits a multi-dimensional technique, because viruses can adjust, convert, and get stronger over time. Therefore, your risk of exposure doesn’t reduce over time, but only surges dramatically. 

                 

                 

                The software isn’t always foolproof, however. There are numerous malicious programs that disguise as something that will help you in order to actually damage you. That’s why it’s absolutely important to only use the best antivirus software on the market. Using mediocre software to save a few bucks is counterproductive. The best form of protection is to prevent it from happening in the first place. The internet has offered several ways for virus attacks and thousands of threats do exist. To be secure from these, it is important to monitor the computer and protect at all times. The significance of antivirus software cannot be taken for granted. 

                TAGS

                • Cyber Crime
                • Security Updates

                Recent Blogs

                Share this article

                Ready to Get Started?

                Our specialists are ready to tailor our security service solutions to fit the needs of your organization.


                  By submitting the form, you agree to the Terms of Use and Privacy Policy

                  top-stories-that-dominated-the-cyberworld
                  Posted in Cyber Security

                  A Brief Weekly Review of Top Stories that Dominated the Cyberworld

                  Latest Blogs

                  top-stories-that-dominated-the-cyberworld

                  By AMSAT June 4,2021

                  A Brief Weekly Review of Top Stories that Dominated the Cyberworld

                  The outgoing week saw a number of events that catapulted the world of cybersecurity. From US agencies that largely fended off the Russian hack to disease database targeted in cyberattacks, the cybersecurity domain was replete with developments that made headlines. 

                  Here’s a brief review of what took place in the past week.   

                  Agencies Largely Preempted Latest Russian Hack: US

                  The United States said it believed U.S. government agencies largely warded off the latest cyberespionage assault thought to be committed by Russian intelligence personnel.

                   

                  The White House added that the spear-phishing drive should not further harm relations with Moscow leading up to next month’s planned presidential summit.

                   

                  Officials modulated the cyber-attack as “basic phishing” in which threat actors used malware-loaded emails to attack the computer systems of U.S. and foreign government agencies, think tanks and humanitarian groups. 

                   

                  Microsoft, which revealed the effort late Thursday, said it believed most of the emails were blocked by automated systems that marked them as spam.

                  Disease Database Targeted in Cyberattacks: Swedish Public Health Agency

                  The Swedish Public Health Agency, Folkhälsomyndigheten, said it was probing numerous attempts to hack into SmiNet, a database that stores reports of transmittable diseases, including COVID-19 cases.

                   

                  SmiNet was shut down after the agency recognized several attempts to gain unauthorized access to the database, but it was restored by Friday night.

                   

                  The Public Health Agency announced that it had shut down the database to avert hacking attempts, and immediately launched a probe into the matter. The incident was also reported to the relevant authorities.

                  Flaw in Lasso Library Affected Products from Cisco, Akamai

                  A critical flaw exposed lately in an open-source library named Lasso has been discovered to affect products from Cisco and Akamai, as well as Linux distributions.

                   

                  Tracked as CVE-2021-28091, the vulnerability was originally reported to Akamai as it was found in the company’s Enterprise Application Access (EAA) product.

                   

                  Further analysis by Akamai disclosed that the fault, which lets an attacker mimic valid user, was introduced by the use of Lasso and products from other vendors are also impacted. 

                  TAGS

                  • Cyber Crime
                  • Security Updates
                  • Russian Hack

                  Recent Blogs

                  Share this article

                  Ready to Get Started?

                  Our specialists are ready to tailor our security service solutions to fit the needs of your organization.


                    By submitting the form, you agree to the Terms of Use and Privacy Policy

                    a-brief-weekly-review-of-top-stories-that-dominated-the-cyberworld
                    Posted in Cyber Security

                    A Brief Weekly Review of Top Stories that Dominated the Cyberworld

                    Latest Blogs

                    a-brief-weekly-review-of-top-stories-that-dominated-the-cyberworld

                    By AMSAT May 28,2021

                    Dealing with cyber-threat: a complex challenge

                    The outgoing week saw a number of events that shook the world of cybersecurity. From Air India divulging data of 4.5m passengers that were stolen in SITA cyberattack to a malicious cyberattack on Belgium interior ministry, the cybersecurity realm was full of headline-grabbing developments.

                     

                    Here’s a brief review of what took place in the past week.

                     

                    Air India revealed data of 4.5m passengers were stolen in SITA cyberattack

                     

                    Three months after global aviation industry IT supplier SITA was hit by a cyberattack, Air India divulged the event resulted in the data of around 4.5 million of its passengers being stolen.

                     

                     

                    Air India said that the breach involved personal data spanning almost 10 years, from 26 August 2011 to 3 February 2021. The stolen information included name, date of birth, contact information, passport information, ticket information, Star Alliance and Air India frequent flyer data, and credit card data.

                     

                     

                    No frequent flyer passwords or CVV/CVC data were stolen, however, as this information was not held by SITA. While the SITA cyber-attack was first exposed at the end of February, Air India said it only appreciated the severity of the cyber-attack last month.

                     

                    Nearly 70% of Australians concerned about privacy using new technology

                    A survey conducted by the Australian Communications and Media Authority (ACMA) suggested that nearly 70% of Australians, irrespective of their age, are worried about their privacy when using new technology.

                     

                     

                    ACMA said that such deep involvement in the online world also brings with it an array of risks and challenges, from privacy and security worries to exposure to misinformation and propaganda, rip-offs, online harassment, and other problems.

                     

                    Belgium interior ministry said it was hit by a cyberattack

                     

                    The Belgian interior ministry was hit by a “sophisticated” cyberattack, a spokesman told RTBF public television.

                     

                     

                    Olivier Maerens, the Federal Public Service Interior’s communications director, however, said that the ministry’s servers were highly secured and that the threat actors failed to get hold of the most sensitive data.

                     

                     

                    Federal prosecutors had conducted a probe to identify the origin of the operation, which data had been hacked and whether a foreign state was involved.

                    TAGS

                    • Cyber Crime
                    • Security Updates

                    Recent Blogs

                    Share this article

                    Ready to Get Started?

                    Our specialists are ready to tailor our security service solutions to fit the needs of your organization.


                      By submitting the form, you agree to the Terms of Use and Privacy Policy