Archive for May 2, 2024

Siri On The HomePod Is Currently Broken As It Can’t Tell You What Time It Is

Posted in Commentary with tags on May 2, 2024 by itnerd

Siri is sometimes pretty useless as a digital assistant. But you know it has hit peak uselessness when it can’t even tell time. This is currently happening to HomePod users everywhere at the moment:

Seeing as this is functionality that usually works fine, and there have been no software updates from Apple lately, this has to be a server side issue. Thus one has to assume that Apple will fix this eventually. But in the meantime, this won’t help Siri’s reputation in the slightest.

UPDATE: As of 5PM EST, this is now fixed.

Almond Releases The Second Edition Of Its Threat Landscape

Posted in Commentary with tags on May 2, 2024 by itnerd

Almond, a major French independent player in cybersecurity, publishes the second edition of its Threat Landscape.

This 2023-2024 edition reveals an alarming reality: The threat is intensifying and no longer distinguishes between sectors.

While three groups of hackers dominate the DDoS ‘market’, Almond notes a growing trend among cybercriminals towards the professionalisation of their organisations.  Once resembling an SME, they now resemble a hierarchical structure, like large corporations, with substantial human and financial resources,

In a year marked by numerous conflicts, and with several major elections – in Europe and the United States – and the Olympic Games on the horizon, this Threat Landscape offers a wealth of key figures and insights into these topical issues.

The acceleration of attacks is accompanied by unprecedented sophistication, forcing us to rethink the paradigms of cyber defence. In particular, AI is becoming an essential tool in the cybercriminals’ arsenal, as the use of a Large Language Model (LLM), which aggregates millions of pieces of data, makes it possible to design malicious content very simply through automation.

In a nutshell : Almond’s team has analysed the threats that organisations need to prepare for:

  • An update on new attack techniques
  • Energy and telecommunications: infrastructures under threat
  • An overview of geopolitical risks
  • The Paris Olympics, tense elections: the burning challenges of 2024

You can grab a copy of these insights here (English translation here).

LinkedIn Announces LinkedIn Games

Posted in Commentary with tags on May 2, 2024 by itnerd

LinkedIn has announced the launch of the brand-new LinkedIn games,  a daily lineup of three new thinking-oriented games, for the company’s more than 1 billion users worldwide (23.7 million users in Canada). There’s no question puzzle based games are popular and LinkedIn’s new Pinpoint, Queens and Crossclimb aremeant to encourage people to take a quick break and exercise their minds.  The games create moments of camaraderie that help professionals find common ground, break the ice, and spark conversations.

More details are available from LinkedIn Editor in Chief, Dan Roth and Lakshman Somasundaram, Director of Product Management at LinkedIn who both announced the launch on LinkedIn. 

Sharp HealthCare Partners with AHEAD for Cloud Transformation

Posted in Commentary with tags on May 2, 2024 by itnerd

 AHEAD, a leading national provider of cloud, data, and digital engineering solutions, announces that it is engaged with Sharp HealthCare, a not-for-profit integrated health system based in Southern California, to define and implement a cloud strategy together with Amazon Web Services (AWS).

The AHEAD team was tasked with creating a 10-year total cost of ownership (TCO) / return on investment (ROI) of cloud services, including Compute, Storage, Backup, Disaster Recovery, Networking, and additional costs to provide Sharp HealthCare with a comparison to their pre-existing on-premises and co-location operating costs.

AHEAD then initiated the setup of an AWS cloud environment to extract data from a cloud-hosted Epic database to an AWS account and then load into Snowflake. Completing this rapid environment design and setup in six weeks led Sharp to choose AHEAD for the next phase of the project, which involved completing the build-out of their AWS landing zone.

Key benefits of the work completed by AHEAD include:

  • A better understanding of the economics of Sharp’s cloud journey, creating the foundation on which targeted initiatives could be planned and executed.
  • Technical guidance and mentoring that enabled Sharp’s development team to learn from AHEAD experts.
  • The ability for Sharp to leverage the power of AWS without compromising on security, compliance, or operational efficiency.

Through AHEAD’s guidance and training, they have put Sharp HealthCare in an advantageous position to leverage the full spectrum of AWS services, including networking, governance, security, automation, and infrastructure as code (IaC). This enablement of Sharp’s engineering and development teams will pave the way for future innovation while delivering consistent value to their patients and stakeholders on AWS.

Cyware Announces Cyware Quarterback

Posted in Commentary with tags on May 2, 2024 by itnerd

Cyware, a leading provider of threat intelligence management, security orchestration and automation, and cyber fusion solutions, today introduced Cyware Quarterback, a simple-to-use AI-powered interface which will provide its enterprise customers and network members (ISACs, ISAOs, CERTs, MSSPs) a new way to efficiently perform actions on their security infrastructure. 

Cyware Quarterback aims to democratize AI by adding an artificial intelligence layer on any organization’s set of disparate cybersecurity tools to assist in complex decision-making and effectiveness.

It’s understood to be the only AI platform in the cybersecurity industry and AI ecosystem that’s designed to scale, optimize, and accelerate an organization’s security team’s effectiveness to reduce risks.

Cyware Quarterback can perform actions such as investigation and hunting, policy management, threat quarantine, case escalation, and more across 400+ cybersecurity and IT tools in reusable and composable playbooks, reducing overall mean time to respond (MTTR) and increasing threat-hunting productivity. It is purpose-built to empower analysts to make faster, more informed decisions, automating incident response by connecting applications, systems, and people as well as turning threat intel into intelligent actions. 

Investigating large volumes of incidents with specialized custom interfaces of different products is tedious, time consuming, and replete with complex manual processes to locate and distribute pertinent intelligence – creating delays that degrade an organization’s security posture. 

Cyware Quarterback gives security teams another team player that works with security analysts to elevate their capabilities and aid in complex threat response, saving time and effort while keeping them (humans) in control.

Horizon3.ai Announces Matt Hartley As CRO

Posted in Commentary with tags on May 2, 2024 by itnerd

Horizon3.ai today announced the appointment of Matt Hartley as Chief Revenue Officer (CRO), effective immediately. With a robust background in sales and cybersecurity, he joins at a crucial phase to help drive the company’s global expansion and reinforce its market leadership in autonomous security solutions.

Hartley brings over 20 years of sales and operations excellence with a proven track record of building go-to-market (GTM) teams that achieve rapid scale and predictability across the revenue lifecycle. He is passionate about helping customers leverage technology to generate demonstrable business value, and his experience in cybersecurity and managing sales organizations in mid-stage companies is unmatched.

Matt joins Horizon3.ai during a period of rapid expansion, driven by its pioneering role as the premier provider of autonomous penetration testing solutions. This innovation empowers IT, cybersecurity, and Managed Security Service Providers (MSSPs) to minimize security risks effortlessly and continuously. NodeZero™ assists in identifying exploitable vulnerabilities, provides precise recommendations for prioritizing and addressing these issues, and facilitates immediate validation of the effectiveness of their remedies.

Driven by its consistent revenue growth, Horizon3.ai is actively increasing its workforce in all areas, including additional key leadership roles. The company expressed sincere thanks to Bob Cariddi, the former CRO, who led all GTM initiatives through this tremendous growth period before moving on to a key advisory role within the company.

Hartley’s appointment continues his role in leading key growth aspects for companies with solutions that are widely adopted by Fortune 1000 organizations and targeted sectors. Prior to joining Horizon3.ai, Matt served as the Chief Revenue Officer at HYPR, a leader in phishing-resistant authentication, and at iboss, a company focused on SASE/SSE. Before iboss, he was a sales leader at Forescout, where he built their US Federal unit and later scaled the business as the VP of Americas Sales. Earlier, he was General Manager at Optio Labs, head of Federal sales at MobileIron, and held regional sales positions at various technology companies.

Today Is World Password Day

Posted in Commentary with tags , , on May 2, 2024 by itnerd

World Password Day is today. It started as a sort of Valentine’s Day (i.e., a completely made-up day) to remind everyone to pay extra close attention to log-ins so as not to fall prey to bad actors. Nowadays, the day just seems like more of a reminder of how hackable we all are.

Below are the thoughts of some industry experts on World Password Day:

Ted Miracco, CEO, Approov

https://www.linkedin.com/in/tedmiracco

“Despite the availability of more secure methods, too many systems still rely solely on passwords for protection. This makes them vulnerable to textbook attacks such as phishing, keylogging, and credential stuffing. Combining mobile attestation with token-based API access presents a more robust and user-friendly alternative to traditional password-based authentication, particularly in mobile environments. By shifting the security focus from something the user knows (password) to something the user has (a secure device) and something the user can access (a token), the security model becomes inherently multi-factor, without the added friction typically associated with 2FA methods. This approach effectively addresses both security and usability, which are critical for mobile device interactions and the protection of sensitive data in mobile applications.”

Craig Harber, Security Evangelist: Open Systems

https://www.linkedin.com/in/craig-harber-531883188/

“Strong passwords are essential but cannot be a standalone defense mechanism to deter threat actors. The optimal length for a password depends on various factors, but security experts generally agree that a longer password is more secure. However, if the passwords are too long and too complex, users will write them down, defeating the purpose. Strong passwords must be paired with Multi-Factor Authentication (MFA) to provide a significant hurdle to stop threat actors. 

“So, as we celebrate another World Password Day, it’s important to remember that without a unique, random, and complex password acting as the first line of defense, the additional protection of MFA is weakened.”

Albert Martinek, cyber threat intelligence analyst, Horizon3.ai
https://www.linkedin.com/in/albert-martinek-6267aa227/

“As the trend remains from last year, cyber threat actors don’t typically use sophisticated hacking tools and techniques like zero-day exploits to gain access to a network; they simply log in with legitimate user credentials. Once they gain initial access, threat actors then appear as legitimate users and can move laterally within a network to gain further access and establish persistence, steal sensitive data, bring down systems, and/or hold the organization hostage through ransomware.

“To help harden organizational systems and networks, as well as your personal accounts, implementing strong password policies are key. This includes sophistication and length requirements as described in the latest recommendations from NIST Special Publication 800-63B to include: 12 characters or more; no passwords matching the list of known breached passwords, no passwords derived from dictionary terms, contextual terms (company name, products name, etc.), or user information (first name, username, DOB, etc.); and uniqueness.” 

Verizon Data Breach Investigations Report For 2024 Is Out

Posted in Commentary with tags on May 2, 2024 by itnerd

Verizon has released the 2024 Data Breach Investigations Report (DBIR). The report, as always has a wealth of great statistics to choose from. Here’s the key takeaways:

  • Vulnerability exploitation surged by nearly 3X (180%) last year.
  • Ransomware and the meteoric rise of extortion techniques accounted for a third (32%) of all breaches.
  • More than two-thirds (68%) of breaches involve a non-malicious human element.
  • 30,458 security incidents and 10,626 confirmed breaches were analyzed in 2023—a two-fold increase over 2022.
  • Verizon security by the numbers: 4,200+ networks managed globally, 34 trillion raw logs processed/year, and 9 security operation centers around the globe.

Ted Miracco, CEO, Approov Mobile Security:

   “The fact that it takes 55 days for organizations to remediate 50% of critical vulnerabilities listed in the CISA’s KEV catalog after patches are available points to a significant gap, that presents a critical window of opportunity for attackers to exploit known vulnerabilities. it is crucial for organizations to streamline their vulnerability scanning and patching procedures to outpace malicious activities. Without timely and comprehensive vulnerability information, organizations are at an extreme disadvantage in securing their systems against known exploits.”

I would register to get this report and spend some time reading it in detail. It will give you a roadmap as to secure your organization from the ever growing threats that seem to be everywhere these days.

UPDATE: Darren Williams, CEO and Founder, BlackFog adds this comment:

     “Mirroring BlackFog’s own data this report shows a significant increase in attacks over previous years. While this report indicates 32% of all breaches involved extortion, BlackFog’s own data shows that 92% of all ransomware involves extortion, an important distinction in this subset. It is also important to point out once the data is stolen it can, and is often used to target multiple victims from the original source down to the individual themselves. This data is also used to target other victims months or years into the future and highlights the importance of preventing data exfiltration.”