Game Changing Back to School Technology From LG To Innovate Your New Routine

Posted in Commentary with tags on August 8, 2023 by itnerd

The back to school/back to work season helps to set the routine for the rest of the year. Innovate your back-to-school routine with the latest tech from LG that will help maximize your time this season offering multiple features and functions for different situations: 

  1. From Home Office to Home Gym: Helping you transition from your WFH call tom a virtual yoga class is the LG StanbyME Rollable Smart Touch Screen. The LG StanbyME is a smart touch screen geared to busy lifestyles and designed to move with the user so they can enjoy their favourite content anywhere and from virtually any angle. The new form factor Smart Screen features multiple adjustment options, including up to 180-degree rotation, 130-degree swivel, 50-degree tilt, and 20 cm height adjustments.  
  2. A+ Productivity and Design: The LG gram Style laptop is the ultimate combination of both function and form, featuring the LG gram signature portability and long battery life packaged in a sleek, iridescent finish that changes colour when viewed from different angles. You’re sure to turn heads with this stylish laptop, complete with powerful processing and a dazzling OLED display. LG continues to deliver stylish innovation so that you can hustle light and hustle right. 
  3. Kick back or kick it up a notch: Whether its working on a big assignment, building a report or settling in for a much-needed gaming session after a long day, The state-of-the-art LG 45” UltraGear™ OLED Curved Gaming Monitor is sure to elevate the experience. The 45” curved display offers next level immersion with its enhanced rendering and the world’s first 240Hz OLED panel. This monitor is the gift that keeps on giving for any avid gamer, student or hustler, with LG celebrating 10 years of OLED innovation leading up to this elevated gaming technology.  

All of these items are available now.

AnyDesk Joins The Fight Against #Scams

Posted in Commentary with tags on August 8, 2023 by itnerd

I’ve been covering scams for a long time. And the one thing that’s in common with all these scams is that the scammers will use tools like AnyDesk to get access to your PC (or Mac, or your cell phone). That’s why this blog post from AnyDesk caught my eye. Here’s what you need to know:

AnyDesk, the world’s leading provider of remote access software, announced today the creation of the AnyDesk Anti-Fraud Taskforce. “This task force is dedicated to stopping fraud in real-time. We partner with various creators and scam baiters to take a proactive approach to fraud prevention” said Matthew Caldwell, one of the company’s fraud prevention specialists.

AnyDesk has already shut down several call centers, preventing fraudulent activity by severing the connections to thousands of devices in real-time. By partnering with experienced “scam baiters” such as KitBoga, ScammerPayback, and Jim Browning, who intentionally bait the call centers and waste their time AnyDesk can take action and ban these call centers in a proactive manner.  “As always, these scammers adapt and will switch to other remote access solutions. We would love to build something bigger here, and urge other remote access companies to work with us” said Jim Browning, a prominent YouTuber and expert on scam baiting.

In collaboration with Jim Browning, the AnyDesk Anti-Fraud Taskforce has started to explore a partnership with the internationally renowned spam-fighting company, SpamHaus. “This work is expected to inspire collaboration amongst competitors and is planned to include a list of shared non-descriptive identifiers that can be used to stop fraud on a global level”, says Caldwell. Collaboration of this level will ensure when a user has been flagged for engaging in fraud, the information will be shared amongst other remote access companies, so they can collectively combat misuse.

To kick off the project, AnyDesk is establishing the Fraud Fighters Foundation as well as pledging $10,000 to fraud prevention efforts. Funds will go towards education and reimbursement of victims and will be distributed by the foundation under recommendation from the AVAH Outreach Group. The AVAH Outreach Group specializes in preventing fraud by monitoring call centers and intervening to protect victims mid scam call. Caldwell continues, “We’re looking forward to building something amazing here, and we would love to get other companies involved – A proactive approach is always better than a reactive one.” 

This is a big move. Starting with the fact that they are working with well known “scam baiters” who are people who specialize in going after scammers and collecting info on the scams so that they can expose not only the scams, but the people behind them. Now if AnyDesk can get other remote access software companies like TeamViewer for example to work with them, that will make these scams a lot harder for scammers to execute. Thus I really hope that this effort gains momentum as the scumbags behind these scams deserve to have their lives be as miserable as possible.

Guest Post: Cybersecurity is everyone’s responsibility

Posted in Commentary with tags on August 8, 2023 by itnerd

By Omdia

In our most recent Cybersecurity Decision Maker survey, we asked more than 600 organizations about the security issues that they have faced in the last 12 months. Over two-thirds of survey respondents declared they had experienced issues ranging from numerous ‘limited security issues’ to multiple ‘severe security issues.’ Cybersecurity is not a “one and done,” and over the past decade, digital innovation has moved at lightning speed, so this result comes as no surprise as organizations struggle to deliver continuous security protection.

The most challenging issue facing the security function is the staffing and skills shortage in cybersecurity, identified by 54% of survey respondents as an area of concern.

If organizations do not have sufficient people with the right skills in place, then it is difficult to follow cybersecurity best practices, and challenges will arise that will impact those trying to protect the business from security incidents and breaches. There is an increasing acceptance amongst organizations that they will suffer a security incident, or even a breach, at some point. However, these same organizations also know that they must be better prepared for the inevitable, both in prevention, and in detection and response. 

The combination of budget pressures, lack of resources, and mass public attention on cybersecurity all make for an uncomfortable time for many organizations.

With these challenges showing no signs of dissipating, the next vital step is to ensure the entire organization is vigilant about security. Cybersecurity is everyone’s responsibility and doesn’t just belong to the security function. Every employee and business function has a role to play in keeping the organization secure.

How can IT decision-makers and business leaders ensure their teams are aware of cybersecurity best practices? Regular training and proper preparation and planning can help minimize the impact of cyberattacks. Expecting that an attack will happen, knowing that your organization has done as much as possible to prevent that attack, and then being prepared for it as and when it occurs, will contribute to the organization avoiding the headlines. It’s not possible to eliminate cyberattacks, but it is possible to be prepared and continuously act in the best interests the organization and their customer.

Omdia’s annual Cybersecurity Decision Maker survey was conducted during 2Q23. The results will be revealed at the Omdia Analyst Summit at Black Hat USA on August 8, during analyst sessions, with delegates receiving the opportunity to review this exclusive data. 

For more information on Black Hat 2023 and Omdia Cybersecurity research, click here.

Abnormal Announces New Capability to Detect AI-Generated Email Attacks 

Posted in Commentary with tags on August 8, 2023 by itnerd

Abnormal Security, the leading behavioral AI-based email security platform, today announced CheckGPT, used to detect AI-generated attacks. The new capability determines when email threats, including business email compromise (BEC) and other socially-engineered attacks, have likely been created using generative AI tools.  

Cybercriminals are constantly evolving their attack tactics to evade detection by security defenses, and generative AI is the newest weapon in their arsenal. Using tools like ChatGPT or its malicious cousin WormGPT, threat actors can now write increasingly convincing emails, scaling their attacks in both volume and sophistication. In its latest research report, Abnormal observed a 55% increase in BEC attacks over the previous six months—with the potential for volumes to increase exponentially as generative AI becomes more widely adopted. 

Unlike traditional email security solutions, Abnormal takes a radically different approach to stopping advanced email attacks, making it particularly well-suited to the challenge of blocking AI-generated attacks. The unique API architecture ingests thousands of diverse signals to build a baseline of the known-good behavior of every employee and vendor in an organization based on communication patterns, sign-in events and thousands of other attributes. It then applies advanced AI models including natural language processing (NLP) to detect abnormalities in email behavior that indicate a potential attack.

After initial email processing, the Abnormal platform expands upon this classification by further processing email attacks to understand their intent and origin. The CheckGPT tool leverages a suite of open source large language models (LLMs) to analyze how likely it is that a generative AI model created the message. The system first analyzes the likelihood that each word in the message has been generated by an AI model, given the context that precedes it. If the likelihood is consistently high, it’s a strong potential indicator that text was generated by AI. 

The system then combines this indicator with an ensemble of AI detectors to make a final determination on whether an attack was likely to be generated by AI. As a result of this new detection capability, Abnormal recently released research showing a number of emails that contained language strongly suspected to be AI-generated, including business email compromise and credential phishing attacks.  

Cybersixgill Raises the Bar on Generative AI with New, Refined Organization-Specific Threat Intelligence and Enhanced Reporting

Posted in Commentary with tags on August 8, 2023 by itnerd

Cybersixgill, the global cyber threat intelligence data provider, announced today new enhancements to Cybersixgill IQ, its generative AI solution launched less than two months ago.

As generative AI undergoes rapid evolution, so is Cybersixgill continuously pushing IQ and cyber threat intelligence (CTI) into new territory. Harnessing state-of-the-art generative AI technologies, Cybersixgill IQ makes CTI accessible to organizations at any security maturity level and addresses a multitude of user personas and cybersecurity challenges.

The new Cybersixgill IQ enhancements are built on the premise that as good as CTI is, it is critical to match intelligence with insights that matter to each company’s specific context. Leveraging generative AI, Cybersixgill IQ’s unique threat intelligence, embedded with its Attack Surface Management module, delivers contextual insights, allowing organizations to make significant strides in combating the most pertinent threats. Additionally, the solution overcomes issues of data trust found in other generative AI offerings and adheres to data privacy regulations by protecting users’ data and never sharing it with the generative AI model or any third parties. 

Business-specific Insights and Custom Reports to Strengthen Cyber Defenses

Cybersixgill IQ is an end-to-end solution that seamlessly integrates into customers’ existing CTI workflows, supplementing and enhancing the company’s deep, dark web threat intelligence through its intuitive portal or API. The generative AI solution solves many pain points of overburdened security teams, such as addressing alert fatigue, sifting through overwhelming volumes of threat data, and managing and monitoring an ever-expanding attack surface. The combination of CTI, ASM – whether Cybersixgill’s ASM module or that of another provider – and generative AI means organizations can receive the most relevant data and intelligence for their business, industry, region, and other factors. 

Additional Cybersixgill IQ enhancements now available include:

  • A custom report builder to streamline data collection, analysis, and dissemination. Key capabilities include:
    • Aggregates data, including screenshots, collected across Cybersixgil’s Investigative Portal
    • Enables generation of reports based on the collected data for leaders and practitioners across the organization
  • Entity Navigator has new intuitive features to accelerate investigations, including:
    • Provides clear and consolidated information to individual threat intelligence entities, including APTs, IoCs, malware, and more
    • Improves incident response, threat analysis, and threat-hunting use cases by offering seamless cross-referencing and correlation between entities 
  • Credentials module that consolidates compromised credentials from repositories and stealer logs, arming security teams against unauthorized access risks. The module includes:
    • Complete, unified view of compromised access vectors, including stolen email credentials and accounts accessed by stealer malware
    • Advanced threat insights and analysis to uncover vital host information and identify and attribute compromised access to specific malware brands

Cybersixgill demonstrates the new IQ enhancements at Black Hat USA 2023 in Business Meeting Room #485. For more information or to schedule a meeting, please visit https://cybersixgill.com/events/black-hat-2023

 

Horizon3.ai Announces $40M Series C Funding

Posted in Commentary with tags on August 8, 2023 by itnerd

Horizon3.ai, a leading provider of autonomous security solutions, today announced $40M in Series C funding led by Craft Ventures with participation from Signal Fire. With 3x customer growth year-over-year, Horizon3.ai’s NodeZero platform has quickly become a leading industry tool for autonomous pentesting, helping customers quickly verify their security posture and reduce their exploitable attack surface.  

This funding will be used to build out Horizon3.ai’s enterprise-wide, proactive security platform, expand channel and partner presence, and meet the growing demand of customers worldwide. Founded in late 2019, Horizon3.ai has raised a total of $78.5M to date. 

The demand for NodeZero continues to skyrocket: Autonomous penetration testing was recently added as a new category in the U.S. Department of Defense Tech Watchlist. Customers using NodeZero today span 50 industries and 25 countries, including manufacturing, healthcare, financial services, education, and local government. 

With this new funding, San Francisco-based Horizon3.ai will integrate pentesting, SOAR, and detection engineering into a security platform that enables customers to proactively secure their enterprise. 

Horizon3.ai was founded in 2019 by former industry and U.S. National Security veterans with the mission to help organizations see their networks through the eyes of the attacker and proactively fix problems that truly matter, improve the effectiveness of their security initiatives, and ensure that they are prepared to respond to real cyberattacks. Visit https://www.horizon3.ai/ for a free trial.

White House Announces An Effort To Secure K-12 Schools From A Cybersecurity Standpoint

Posted in Commentary with tags on August 7, 2023 by itnerd

The White House has announced a new effort to secure K-12 schools:

According to a 2022 U.S. Government Accountability Office report, the loss of learning following a cyberattack ranged from three days to three weeks, and recovery time can take anywhere from two to nine months.  Further, the monetary losses to school districts following a cyber incident ranged from $50,000 to $1 million. That is why the Biden-Harris Administration has had a relentless focus on securing our nation’s critical infrastructure since day one, and continues to work tirelessly to provide resources that enable the U.S.’s more than 13,000 school districts to better protect and defend their students and employees against cyberattacks.

Allen Drennan, Co-Founder & Principal, Cordoniq had this to say:

As part of an overall strategy for cyber defense for K-12 schools, districts need to consider taking control over their implementation of both their LMS (learning management systems) and their virtual meeting solution. This is a necessity for controlling available, uptime and scale and handle issues related recovery management and for providing higher security standards and data privacy protection for students and teachers. Solutions that rely solely on cloud-based providers outside of control of the school district are subject to outages, availability concerns and malicious cyber threats.

As I have said previously, the education sector is a prime target for threat actors. Only through scaling the investments in cybersecurity can this sector be fully protected. Thus I applaud the White House for making this move.

UPDATE: Emily Phelps, Director, Cyware submitted this comment:   

“Since adopting digital technologies to adapt to a post-Covid world, securing public schools has become more challenging and more critical. We’re encouraged by the Department of Education’s announcement around strengthening cybersecurity resilience for K-12 entities. Working with CISA to develop practical, actionable guidelines and partnerships with private entities that can bolster K-12 public education’s defenses reinforces the commitment this administration has made to cybersecurity at federal and local levels. Collaboration and collective defense strategies are increasingly important to our public entities and citizenry, and as private-public partnerships garner attention and success, we hope these examples will motivate similar action.”  

Carol Volk, EVP, BullWall follows with this comment:    

“Google and the social media giants should be pumping money into K-12 cyber defenses and education, as they are as much the cause of this firestorm of malicious hacking as they are the benefactors of the younger generations embrace of 24-7 connectivity. With congress tightly focused on the responsibility these companies bear from social media fallout, we can expect these giants to be paying attention to this problem area.” 

UPDATE #2: Ani Chaudhuri, CEO, Dasera adds this:

The recent initiative by the Biden-Harris Administration to bolster cybersecurity in our K-12 schools is a commendable and urgently needed step. The surge in cyberattacks targeting the institutions that shape our future leaders has highlighted an alarming vulnerability. Imagine a nation where school districts are routinely disrupted, and the sensitive data of our children is compromised and auctioned off to the highest bidder.

In the 2022-23 academic year alone, we’ve seen significant cyberattacks on K-12 school districts that have compromised the personal data of students and employees. This isn’t just about data; it’s about our children’s future, their privacy, and the trust they place in the education system.

It’s heartening to see the federal government respond with vigor. The proposed pilot program, the collaboration between different governmental bodies, and the available resources to strengthen cybersecurity infrastructure are steps in the right direction. And while the involvement of education technology giants such as AWS, Google, and others is promising, it’s crucial to ask ourselves if it’s enough.

The real challenge is ensuring these policies and programs aren’t just reactive. We must be proactive, looking ahead to anticipate and thwart future cyber threats. Collaboration between public and private sectors should be constant, not just when disaster strikes. We must understand that the next generation’s education is now intrinsically linked with cybersecurity, and there is no room for complacency.

The increased attention to cybersecurity in our education system is a clear signal of our times. We need to instill a culture of cybersecurity from the classroom to the boardroom. Let’s not wait for another breach to shake us into action. The safety of our nation’s future is at stake.

Colorado Dept Of Education Warns Of Stolen Data That Spanned 13 Years

Posted in Commentary with tags on August 7, 2023 by itnerd

In a breach notification, The Colorado Department of Higher Education (CDHE) disclosed a massive data breach impacting current and past students and teachers after suffering a June, double-extortion ransomware attack.  According to the CDHE, their investigation revealed that the threat actors had access to their systems between June 11th and June 19th, and, during that time, data was stolen from the Department’s systems spanning 13 years, between 2004 and 2020.  The CDHE did not share how many people were impacted, but it likely encompasses a large number of individuals with those impacted including students, past students, and teachers who:  

  • Attended a public institution of higher education in Colorado between 2007-2020 
  • Attended a Colorado public high school between 2004-2020 
  • Had a Colorado K-12 public school educator license between 2010-2014 
  • Participated in the Dependent Tuition Assistance Program from 2009-2013 
  • Participated in Colorado Department of Education’s Adult Education Initiatives between 2013-2017 
  • Obtained a GED between 2007-2011

 The information stolen includes full names, social security numbers, dates of birth, addresses, proof of addresses, photocopies of government IDs, and potentially, police reports or complaints regarding identity theft. 

Emily Phelps, Director, Cyware:   

“Higher education institutions handle vast amounts of valuable data from a diverse user base but lack the resources and technology to effectively defend against cyber-attacks, making them attractive targets for cybercriminals. Practicing strong security hygiene, implementing regular cybersecurity awareness training, and maintaining a robust incident response plan can help mitigate the risks. Collaboration, public-private partnerships, and increased threat intelligence sharing across public entities can lead to more robust, comprehensive defenses, improving resilience and protecting both the organizations and their people.” 

The education sector has always been a target for threat actors. Thus those in that sector need to beef things up to avoid being the next organization that gets pwned.

UPDATE: I have two more comments. Starting withCarol Volk, EVP, BullWall:   

“Thirteen years of data scooped up in a single breach. There are so many available ways to protect against both the breach and the exfiltration of data. We do not know what defenses the CDHE had in place, but it is imperative that Institutions implement the full scope of defenses, as the abuse of data they hold can harm generations of students.    

Yes, schools are doing their best to stand up the best preventative security tools they can, but there will never be budget or resources to stay ahead of the attackers. Ensuring tools are in place to contain an active attack is where education should focus next.”  

Emily Phelps, Director, Cyware follows with this:   

“Higher education institutions handle vast amounts of valuable data from a diverse user base but lack the resources and technology to effectively defend against cyber-attacks, making them attractive targets for cybercriminals. Practicing strong security hygiene, implementing regular cybersecurity awareness training, and maintaining a robust incident response plan can help mitigate the risks. Collaboration, public-private partnerships, and increased threat intelligence sharing across public entities can lead to more robust, comprehensive defenses, improving resilience and protecting both the organizations and their people.”

CISA’s New Strategic Plan Builds On Existing White House Cybersecurity Strategy 

Posted in Commentary with tags on August 7, 2023 by itnerd

CISA has released its FY2024-2026 Strategic Plan which sets out a vision to change the US’ national cybersecurity risk environment trajectory and builds on the White House’s strategy published last week.    

“Where the National Cyber Strategy calls for foundational shifts to help America outpace our adversaries and set a national agenda on our terms rather than theirs, and CISA’s Strategic Plan outlines how we’ll work together as a unified agency grounded in common values, our Cyber Strategic Plan focuses on the “how” and – of critical importance – how we’ll know if we’re making progress,” a statement by Eric Goldstein, Executive Assistant Director for Cybersecurity at CISA noted.   

The plan outlines three goals: 

  • Goal 1: Address Immediate Threats.   
  • Goal 2: Harden the Terrain.   
  • Goal 3: Drive Security at Scale.                                                                                                                                                   

The Plan notes that too often threat actors succeed because of insecure environments where enterprises are “too difficult to defend, and our technology products are too vulnerable to protect.” And while the steps to overcome this are known, the design and development of products must adapt to mitigate the impact of exploitable vulnerabilities.  

“We must help organizations, particularly those that are “target rich, resource poor,” take the fewest possible steps to drive the most security impact,” the Plan states. 

Jason Keirstead, Vice President of Collective Threat Defense, Cyware had this comment:   

“CISA is taking a pragmatic and holistic approach to their 2024-2026 strategic plan. Organizations lack the resources to effectively defend against known and emerging threats, and to outpace the adversary, the industry must collaborate more often and more effectively. Even organizations with mature cybersecurity programs often struggle to adequately safeguard every vulnerability. CISA’s focus on collaboration, intelligence sharing, and scalability has potential to measurably strengthen our overall security posture.”

Roy Akerman, Co-Founder & CEO, Rezonate follows up with this:   

“It’s commendable to witness CISA advancing the cybersecurity narrative in such a strategic manner. Drawing from my experiences with cyber defense in Israel, this step accentuates the criticality of prompt detection and response. The recognition that adversaries will always seek and often find vulnerabilities underscores the importance of evolving our SecOps and Identity and Access security programs. In essence, it’s about being several steps ahead, rather than merely reacting.” – Roy Akerman, CEO of Rezonate and former head of cyber defense operations for the Israeli Government.

Having a strategy is great. But it’s all about implementing this strategy and getting people to buy into it. I’m reserving judgement until I see how well that part is done. But on paper, this is a good move by the White House.

UPDATE: Wade Ellery, Field CTO, Radiant Logic had this to say:    

“The recent update to CISA’S comprehensive plan marks a significant stride in the nation’s ongoing efforts to bolster its digital security landscape. An identity-focused strategy stands out as an indispensable and highly effective approach to fortifying systems across the U.S.

Managing identities have become more complicated for organizations, regardless of industry or size. As the government looks to implement a comprehensive plan, it must take into consideration the types of attacks plaguing the U.S. – Identity-related attacks make up the bulk of cyber-attacks, calling into question the way businesses handle their identity data. 

Having clean, unified Identity data has emerged as a central pillar in safeguarding sensitive information, fending off cyber threats and ensuring the integrity of digital environments. This approach centers on verifying and managing the identities of users and allows for full visibility and control over who can access specific resources within a system. This fine-grained access control, integrated into a Zero Trust Architecture, can help minimize the attack surface, limit the risk of unauthorized parties entering the system and detect threats early on.”

IPv4.Global Hits $1 Billion Milestone for IPv4 Sales

Posted in Commentary with tags on August 7, 2023 by itnerd

IPv4.Global, the world’s largest, most-trusted and transparent IPv4 marketplace, today announced it reached $1 billion in IPv4 address sales. 

Of the five Regional Internet Registries responsible for distributing IP addresses, most have run out of IPv4 addresses. However, there remains a robust global demand for IPv4 addresses, especially by growing networks. These assets, which rarely appear on balance sheets or asset schedules, have become a source of cash for organizations in all sectors with unused blocks of addresses.

IPv4.Global’s success and momentum in the field is a direct result of its transparent marketplace, which is the most comprehensive in the industry and the only one to publicly publish the current pricing of IPv4 blocks traded on its platform. IPv4.Global’s recent first half of 2023 trends report highlighted current pricing and trends that impacted the market. While the analysis suggests stable to rising prices in 2023 for large blocks, small blockprices have been falling. Increased and increasing worldwide volumes support the thesis that prices will rise. 

The company’s $1B transfer milestone can also be linked to the skills of the dedicated IPv4.Global team. The company’s transfer agents are well versed in navigating the complexity of IPv4 transfers and make the potentially onerous process fast and seamless for both buyers and sellers. This expertise was recently recognized by ARIN, who named IPv4.Global as one of the few companies to meet the rigorous requirements for its Qualified Facilitator Status

The company’s technical expertise also means that it can help rehabilitate the reputation of IP blocks previously hijacked by spammers. It also offers a free audit tool, ReView, that allows network operators and administrators to gain visibility of their IP address usage quickly and easily, and more effectively manage their records. 

IPv4.Global customers have also benefitted from the fact that the company is backed by Hilco Streambank – which has multiple options for financing the acquisition, sale, or leasing of IPv4 addresses.