• Home
  • About Us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms & Conditions
HOT
Buzzy Flow
No Result
View All Result
  • Home
  • Animals
    Video: Jim Irsay on Life With His Dog, His ‘Blue Vegan’ Leather-Free Jet, and More

    Video: Jim Irsay on Life With His Dog, His ‘Blue Vegan’ Leather-Free Jet, and More

    Commonly asked questions about RVT’s

    Commonly asked questions about RVT’s

    Hold Onto Your Stripes!!!

    Endangered Fish Population Declines as 760k Gal Fire Retardant for Wildfires Dropped on California Waterways

    Endangered Fish Population Declines as 760k Gal Fire Retardant for Wildfires Dropped on California Waterways

    Whole Foods’ Ties to Monkey Labor to Have PETA Dumping Coconuts at Store

    Whole Foods’ Ties to Monkey Labor to Have PETA Dumping Coconuts at Store

    Working together to bring pet loss support to grieving families

    Working together to bring pet loss support to grieving families

    Spiky Bundle of Joy 

    Viruses From Poop Of Giraffes, Lemurs Can Be Used To Kill Drug-Resistant Bacteria, Study Says

    Viruses From Poop Of Giraffes, Lemurs Can Be Used To Kill Drug-Resistant Bacteria, Study Says

    ‘Don’t Leave Them,’ Says Danai Gurira: Hot Cars Are Fatal for Dogs

    ‘Don’t Leave Them,’ Says Danai Gurira: Hot Cars Are Fatal for Dogs

  • Buzz
    David & Victoria Beckham Talk Affair Allegations On Netflix

    David & Victoria Beckham Talk Affair Allegations On Netflix

    Great British Bake Off Premiere Animal Cakes Side-By-Sides

    Great British Bake Off Premiere Animal Cakes Side-By-Sides

    Anya Taylor-Joy Marries Malcolm McRae In Beige Wedding Dress

    Anya Taylor-Joy Marries Malcolm McRae In Beige Wedding Dress

    Easy To Make TikTok Sorbet That’s Only 2 Ingredients

    Easy To Make TikTok Sorbet That’s Only 2 Ingredients

    Actors Who Gained And Lost Weight For Roles

    Actors Who Gained And Lost Weight For Roles

    19 Poor Souls Who Just Had A Week That Was Way, Way, Way, Way, Way, Way, Way, Way, Way, Way, Way, Way Worse Than Yours

    19 Poor Souls Who Just Had A Week That Was Way, Way, Way, Way, Way, Way, Way, Way, Way, Way, Way, Way Worse Than Yours

    Sia Shows Off Facelift

    Sia Shows Off Facelift

    I Reviewed New 2023 Trader Joe’s Pumpkin Products

    I Reviewed New 2023 Trader Joe’s Pumpkin Products

    17 Actors Who Tried To Get Their Costars Fired

    17 Actors Who Tried To Get Their Costars Fired

  • Celebs
    The Blind Side Author Gets SAVAGE Attacking Michael Oher Over Lawsuit!

    The Blind Side Author Gets SAVAGE Attacking Michael Oher Over Lawsuit!

    The House Speaker Might Change—But GOP Dysfunction Will Stay the Same

    The House Speaker Might Change—But GOP Dysfunction Will Stay the Same

    Celebrity couples who have been together for a long time including Tom Hanks and Rita Wilson, Keith Urban and Nicole Kidman and more

    Grimes sues Elon Musk, claims he won’t let her ‘see my son’ – National

    Grimes sues Elon Musk, claims he won’t let her ‘see my son’ – National

    Ke Huy and Echo Quan Relationship Timeline

    Ke Huy and Echo Quan Relationship Timeline

    Amplify Pictures Joins Broadway ‘Gutenberg!’ Musical As Co-Producer – Deadline

    Amplify Pictures Joins Broadway ‘Gutenberg!’ Musical As Co-Producer – Deadline

    11 Best Perfumes for Men in the World

    11 Best Perfumes for Men in the World

    Jamie Lee Curtis Praised the Star – StyleCaster

    Jamie Lee Curtis Praised the Star – StyleCaster

    The Voice’s Gwen Stefani’s teenage son asks for support as he follows in famous parents footsteps

    The Voice’s Gwen Stefani’s teenage son asks for support as he follows in famous parents footsteps

  • Life
    The Blind Side Author Gets SAVAGE Attacking Michael Oher Over Lawsuit!

    The Blind Side Author Gets SAVAGE Attacking Michael Oher Over Lawsuit!

    The House Speaker Might Change—But GOP Dysfunction Will Stay the Same

    The House Speaker Might Change—But GOP Dysfunction Will Stay the Same

    Celebrity couples who have been together for a long time including Tom Hanks and Rita Wilson, Keith Urban and Nicole Kidman and more

    Grimes sues Elon Musk, claims he won’t let her ‘see my son’ – National

    Grimes sues Elon Musk, claims he won’t let her ‘see my son’ – National

    Ke Huy and Echo Quan Relationship Timeline

    Ke Huy and Echo Quan Relationship Timeline

    Amplify Pictures Joins Broadway ‘Gutenberg!’ Musical As Co-Producer – Deadline

    Amplify Pictures Joins Broadway ‘Gutenberg!’ Musical As Co-Producer – Deadline

    11 Best Perfumes for Men in the World

    11 Best Perfumes for Men in the World

    Jamie Lee Curtis Praised the Star – StyleCaster

    Jamie Lee Curtis Praised the Star – StyleCaster

    The Voice’s Gwen Stefani’s teenage son asks for support as he follows in famous parents footsteps

    The Voice’s Gwen Stefani’s teenage son asks for support as he follows in famous parents footsteps

  • Tech
    Canva’s New AI Design Tools Aim to Help You Create and Edit Like a Pro

    Canva’s New AI Design Tools Aim to Help You Create and Edit Like a Pro

    Generative AI Is the Newest Tool in the Dictator’s Handbook

    Generative AI Is the Newest Tool in the Dictator’s Handbook

    Samsung Galaxy S23 FE, Tab S9 FE, Buds FE (2023): Features, Specs, Price

    Samsung Galaxy S23 FE, Tab S9 FE, Buds FE (2023): Features, Specs, Price

    ChatGPT Vision lets you submit images in your prompts: 7 wild ways people are using it

    ChatGPT Vision lets you submit images in your prompts: 7 wild ways people are using it

    OnePlus Open: all the news and rumors about the company’s first foldable

    OnePlus Open: all the news and rumors about the company’s first foldable

    Tom Hanks warns of AI-generated ad using his likeness

    Tom Hanks warns of AI-generated ad using his likeness

    The Inner Beauty of Basic Electronics

    Creating Domestic Robots That Really Help

    A New Satellite Outshines Some of the Brightest Stars in the Sky

    A New Satellite Outshines Some of the Brightest Stars in the Sky

    AI assistants boost productivity but paradoxically risk human deskilling

    AI assistants boost productivity but paradoxically risk human deskilling

  • Video
    • All
    • Cooking
    • Fitness
    • Gaming
    • Lifestyle
    • Music
    • Podcasts
    • Travel
    • Vlogs
    BiggBossBuzzz – Watch Geetu's Exclusive Interviews on Recent Bigg Boss Evictions | Daily 10AM & 6 PM

    BiggBossBuzzz – Watch Geetu's Exclusive Interviews on Recent Bigg Boss Evictions | Daily 10AM & 6 PM

    100 Rupees Useful Gadgets #shorts #gadgets

    100 Rupees Useful Gadgets #shorts #gadgets

    Guli Happy lifedan Samarqandcha mehmondorchilik🍲🧡🫶🏻

    Guli Happy lifedan Samarqandcha mehmondorchilik🍲🧡🫶🏻

    Cute little cat 😺 animals 2022 video catvideos

    Cute little cat 😺 animals 2022 video catvideos

    Zoo – Happy Animals – level 1, 2

    Zoo – Happy Animals – level 1, 2

    DRX BuZz insane 1v3 clutch vs ASE | VCT Masters Tokyo

    DRX BuZz insane 1v3 clutch vs ASE | VCT Masters Tokyo

    6 vivo Tech Will Blow Your Mind #vivoTechDay #shorts

    6 vivo Tech Will Blow Your Mind #vivoTechDay #shorts

    happy life status | happy quotes | #viral #shorts #youtube

    happy life status | happy quotes | #viral #shorts #youtube

    Buzz Designed The New Space Ranger Suits!

    Buzz Designed The New Space Ranger Suits!

Buzzy Flow
No Result
View All Result
Advertisement Banner
Home Tech

Cyber resilience through consolidation part 1: The easiest computer to hack

buzzyflow by buzzyflow
September 17, 2023
in Tech
0 0
0
Cyber resilience through consolidation part 1: The easiest computer to hack
0
SHARES
0
VIEWS
Share on FacebookShare on Twitter


Head over to our on-demand library to view sessions from VB Transform 2023. Register Here


Many of us connected to the internet are in constant unease about the growing threat of cyberattacks. Malware, phishing and social engineering are all tactics that can easily target the average user.

It’s normal to be worried about how cyber threats can be carried out, but the stereotypical hackers portrayed in the media — using advanced programming and malicious programs to harass and victimize their targets out of a dark basement — are mostly fiction. Real attacks are more mundane but just as consequential.  

The harsh reality is that most of today’s cyberattacks are not as sophisticated as once thought, especially compared to earlier tactics that grew as the popularity of interconnected devices rose. Although some attack methods have matured in sophistication, many vectors of attack have not changed in years but are still very successful, largely due to social engineering and human error. 

Being (and staying) cyber-resilient

Cyber resiliency is an organization’s ability to anticipate, withstand and recover from potential threats without severely compromising or disrupting the business’s productivity. By taking advantage of emerging technologies, staying “cyber fit” and creating a comprehensive restoration and recovery system with the right tools and resources, it’s possible to stay ahead of the cybercriminals.

Event

VB Transform 2023 On-Demand

Did you miss a session from VB Transform 2023? Register to access the on-demand library for all of our featured sessions.

 


Register Now

In short, being — and staying — cyber-resilient is one of the most important steps one can take to protect themselves and their organization.

In this two-part series, I’ll outline some of the biggest risks in cybersecurity across the industry and how to mitigate them. This starts with the easiest computer to hack: People. 

The easiest computer to hack

The human brain has always been one of the easiest computers to hack. Even though some attack methods evolved through the years, the use of social engineering to carry out most attacks has stayed consistent.

Most cyberattacks succeed because of simple mistakes caused by users, or users not following established best practices. For example, having weak passwords or using the same password on multiple accounts is critically dangerous, but unfortunately a common practice.

When a company is compromised in a data breach, account details and credentials can be sold on the dark web and attackers then attempt the same username-password combination on other sites. This is why password managers, both third-party and browser-native, are growing in utilization and implementation. Two-factor authentication (2FA) is also growing in practice. This security method requires users to provide another form of identification besides just a password — usually via a verification code sent to a different device, phone number or e-mail address.

Zero trust access methods are the next step. This is where additional data about the user and their request is analyzed before access is granted. These measures can help ensure password security, either by storing encrypted passwords or by adding an extra layer of security via secondary authorization. 

Phishing still prevalent

The human tendency to be easily manipulated is also evident in the consistent deployment and success of malicious phishing e-mails. No matter how much security awareness training a business’ staff has under their belt, there will always be at least one very inquisitive user who will fall for a scam and click a phishing link.

These malicious links direct to a well-designed website impersonating another known site and tricking users into giving up credentials or opening unknown attachments that may contain malware. These emails are usually not very sophisticated, but social engineering can be quite convincing, with up to 98% of cyberattacks carried out via social engineering tactics.

Social engineering is when attackers victimize their targets by exploiting the instability of human error through social interaction, usually by impersonating the personnel of a trusted organization. This is why users need to have a multi-level cyber protection approach to keep their systems truly safe.

Sophisticated Advanced Persistent Threat (APT) groups

That being said, there are some extremely sophisticated attack methods out there, predominantly conducted by Advanced Persistent Threat groups (APTs). For example, in software supply chain attacks, threat actors use malicious code to compromise legitimate software before distribution. These types of attacks are not easy to block and are not new: There are plenty of examples, including CCleaner, ASUS and SolarWinds.

With this type of attack method, threat actors try to compromise a trusted vendor and use their channel to infiltrate their target. This can happen in various degrees, the most sophisticated being when an attacker fully compromises the software vendor and manages to implant a backdoor in the next software release.

If successful, this can be very sneaky, as the malicious update is now sent from the original vendor’s website and is even listed with official release notes and a valid digital signature. Unfortunately, until that point, there is no way that a user can know that the update is malicious.

Even if the victim only installs the update on a handful of computers to test compatibility, this might still not reveal the malicious payload, as it’s common for such malware to “sleep” for a few weeks after installation before unleashing its payload. Because of this, the only feasible way to protect against such attacks is to monitor the behavior of every application on a system in real-time, even if it is believed that the program is legitimate. 

Beyond Trojans

Attacks through the supply chain are not limited to embedding Trojans into software. Last year, application service provider Okta was compromised by the Lapsus$ attacker group. The malicious group gained access to some of the administrator panels, allowing them to reset passwords, thus allowing the attacker to bypass the strong authentication. This led to data breaches for some of Okta’s customer base, including high-profile customers such as Microsoft. 

Similarly, we do see more and more living-off-the-infrastructure attacks against MSPs. With this method, attackers compromise the very software tools used by service providers to roll out new software packages, deploy patches or monitor various endpoints.

If, for example, an attacker can guess the email password of the administrator or get it from a phishing attack, then they might be able to reset the password for the software deployment console — at least if no multi-factor authentication is enabled. Once access is gained, cybercriminals can distribute their own malware through the same process.

Then, not only can the attacker abuse the efficient ways of software control to compromise all customers of the MSPs, but they can use the same methods to disable security and monitoring tools or to delete backups. 

In part two, we’ll discuss some of the other types of attacks that remain so common across industries, such as subscription-based attacks and the new threat that AI brings to the table.

Candid Wüest is VP of research at Acronis.

DataDecisionMakers

Welcome to the VentureBeat community!

DataDecisionMakers is where experts, including the technical people doing data work, can share data-related insights and innovation.

If you want to read about cutting-edge ideas and up-to-date information, best practices, and the future of data and data tech, join us at DataDecisionMakers.

You might even consider contributing an article of your own!

Read More From DataDecisionMakers



Source_link

Advertisement Banner
buzzyflow

buzzyflow

Trending Posts

Scarlett Johansson Comments On Ryan Reynolds Marriage
Buzz

Scarlett Johansson Comments On Ryan Reynolds Marriage

by buzzyflow
April 22, 2023
0

Scarlett Johansson Comments On Ryan Reynolds Marriage Scarlett Johansson has been married three times — but you might only be...

Read more
The Deadly Iditarod Race Should Be Terminated: Here’s Why

The Deadly Iditarod Race Should Be Terminated: Here’s Why

July 31, 2023
Action: Stop Legislation to Strip Gray Wolves of Endangered Species Act Protections

Action: Stop Legislation to Strip Gray Wolves of Endangered Species Act Protections

July 7, 2023
Tribal, Conservation Leaders, Congressional Champions Recognized During Celebration of Endangered Species Act’s 50th Anniversary

Tribal, Conservation Leaders, Congressional Champions Recognized During Celebration of Endangered Species Act’s 50th Anniversary

September 18, 2023
Jim Jefferies | Happy Wife Happy Life #shorts

Jim Jefferies | Happy Wife Happy Life #shorts

September 6, 2023
পতিতা মেয়েটার কাণ্ড দেখুন | Shorts Buzz | #shorts

পতিতা মেয়েটার কাণ্ড দেখুন | Shorts Buzz | #shorts

February 1, 2023

Buzzy Flow

Welcome to Buzzy Flow The goal of Buzzy Flow is to give you the absolute best news sources for any topic! Our topics are carefully curated and constantly updated as we know the web moves fast so we try to as well.

Follow Us

Categories

  • Animals
  • Buzz
  • Celebs
  • Cooking
  • Fitness
  • Gaming
  • Life
  • Lifestyle
  • Music
  • Podcasts
  • Tech
  • Travel
  • Video
  • Vlogs

Recent Post

  • The Blind Side Author Gets SAVAGE Attacking Michael Oher Over Lawsuit!
  • BiggBossBuzzz – Watch Geetu's Exclusive Interviews on Recent Bigg Boss Evictions | Daily 10AM & 6 PM
  • Video: Jim Irsay on Life With His Dog, His ‘Blue Vegan’ Leather-Free Jet, and More
  • David & Victoria Beckham Talk Affair Allegations On Netflix
  • Home
  • About Us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms & Conditions

Copyright © 2022 Buzzyflow.com | All Rights Reserved.

No Result
View All Result
  • Home
  • Animals
  • Buzz
  • Celebs
  • Life
  • Tech
  • Video

Copyright © 2022 Buzzyflow.com | All Rights Reserved.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
What Are Cookies
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
Cookie SettingsAccept All
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT