ENISA says System Failure is on the Rise

From trendmicro.com

The European Union Agency for Cybersecurity (ENISA) recently released two annual reports on telecom security incidents and trust security incidents for 2020. These documents provide a thorough analysis of incidental root causes and the impact of such incidents. Additionally, these evaluate multinational trends.

According to Telecom Security Incidents 2020, faulty software changes and/or updates are a major factor in terms of impact, resulting in over 300 million hours lost or 40% of the total number of hours lost.

Moreover, the report revealed that system failures continue to be the most prominent cause of incidents, leading to severe impact. It represents about half of total user hours lost or 419 user hours. System failure is also the most frequent root cause of incidents, totaling 61% of reported incidents.

Read more…

Kaseya’s universal REvil decryption key leaked on a hacking forum

From bleepingcomputer.com

REvil

The universal decryption key for REvil’s attack on Kaseya’s customers has been leaked on hacking forums allowing researchers their first glimpse of the mysterious key.

On July 2nd, the REvil ransomware gang launched a massive attack on managed service providers worldwide by exploiting a zero-day vulnerability in the Kaseya VSA remote management application.

This attack encrypted approximately sixty managed service providers and an estimated 1,500 businesses, making it possibly the largest ransomware attack in history.

After the attack, the threat actors demanded a $70 million ransom to receive a universal decryptor that could be used to decrypt all victims of the Kaseya ransomware attack.

Read more…

Beyond digital transformation: how data analysis can drive business decisions

From itproportal.com

data woman

Data-led insights can help business managers in proactive decision-making. They not only improve the day-to-day operational decision making, but also strategic decision making. Data can empower business managers significantly during business and digital transformation initiatives by helping them improve their understanding of customers, products and marketing spend. 

Read more…

Most Important Android Application Penetration Testing Checklist

From gbhackers.com

Android Penetration testing

Android is the biggest organized base of any mobile platform and developing fast—every day. Besides, Android is rising as the most extended operating system in this viewpoint because of different reasons.

However, as far as security, no data related to the new vulnerabilities that could prompt to a weak programming on this stage is being revealed, realizing that this stage has an outstanding attack surface.

Read more…

Chinese cyber spies targeted Israel posing as Iranian hackers

From therecord.media

Chinese cyber spies targeted Israel posing as Iranian hackers

A Chinese cyber-espionage group has targeted Israeli organizations in a campaign that began in January 2019, and during which the group often used false flags in attempts to disguise as an Iranian threat actor.

Detailed in a report published today by security firm Mandiant, the attacks targeted Israeli government institutions, IT companies, and telecommunication providers.

The attackers, which Mandiant said it was tracking under a codename of UNC215, typically breached organizations by targeting Microsoft SharePoint servers unpatched for the CVE-2019-0604 vulnerability.

Read more…

MSSPs Particularly Vulnerable to Cisco FDM Flaw

From securityboulevard.com

Cisco Next-Gen Firewall Sizing

Of all those who potentially face a threat from the recently disclosed vulnerability on the Cisco Firepower Device Manager (FDM), MSSPs could feel the impact the hardest if adversaries decide to exploit it.

“An MSSP may be operating Cisco Firepower Device Manager (FDM) to manage instances of Cisco Firepower [next-generation firewalls] NGFWs for customers, in which case they’d be susceptible to attacks that aim to exploit the vulnerability,” said Michael Isbitski, technical evangelist at Salt Security.

“For MSSPs taking care of several businesses, the threat of an attack on the tool they use to manage and access their clients’ systems could lead to cybercriminals infiltrating more businesses than if they were to go after them one at a time,” said Heather Paunet, senior vice president at Untangle.

Read more…