New Research Reveals 15+ Million Vulnerable Instances That Are Susceptible To APTs From CISA’s KEV Catalog

Posted in Commentary with tags on March 30, 2023 by itnerd

Rezilion has released its latest research report, a comprehensive analysis of the CISA Known Exploited Vulnerabilities (KEV) Catalog that reveals the vast attack surface created by software vendors’ lack of awareness and action regarding KEV vulnerabilities. These are prime targets for APT groups and financially motivated threat actors.

Rezilion’s research identifies over 15 million vulnerable instances, primarily Microsoft Windows instances, and emphasizes prioritizing patching based on exploitability. 

  1. These vulnerabilities account for less than 1% of the total vulnerabilities discovered by organizations yearly.
  2. Most vulnerabilities are rated as critical or high (250 marked as CRITICAL and 535 marked as HIGH).

APT groups and profit-driven threat actors frequently exploit these vulnerabilities, often connecting to or receiving sponsorship from nation-states such as Russia, Iran, China, and North Korea. Millions of systems remain vulnerable to KEV, despite the availability of patches to resolve them.

You can read the report here.

Geotab Publishes Their Sustainability and Impact Report

Posted in Commentary with tags on March 30, 2023 by itnerd

Geotab Inc., a global leader in connected transportation solutions — today released its 2022 Sustainability and Impact Report, titled “Unlocking the power of data for a sustainable future,” which outlines the company’s environmental, social and ethical impact, and highlights how data intelligence is a key driver of success in the carbon reduction journey. The report also includes examples of how organizations in the transportation sector are starting and managing carbon reduction initiatives using data intelligence to inform their decision-making and transition.

Accelerating decarbonization in the transportation industry

With over 3.2 million connected vehicles around the world, Geotab is uniquely positioned to help accelerate decarbonization in the transportation sector by providing a full suite of data-driven tools and insights to support fleets on their sustainability journeys (including the EV Suitability Assessment (EVSA) and Green Fleet Dashboard), scaling electrification and technology innovation through education (such as the Geotab Fleet Electrification Knowledge Center), and collaborating on research projects.

Fleet sustainability is a win-win

For many fleets, sustainability is proving to have financial advantages. Electrification studies featured in the report show the potential to save millions of dollars through lower fuel and maintenance costs while reducing CO2 emissions. A recent Geotab survey of U.S. fleet professionals found that 63% of respondents confirmed that their fleet sustainability data helped their organization reduce operating costs in the past year. 

Driving forward on our own sustainability journey

With a target of net zero emissions by 2040, Geotab is on its own sustainability journey, minimizing the environmental footprint of its operations and supply chain across all three scopes and developing sustainability-focused products and solutions for fleets. Geotab is developing a supplier program to increase supply chain sustainability. At the end of 2022, 50% of Geotab’s top 10 suppliers (by spend) were reporting their environmental data to CDP. Geotab’s goal is to have 100% of its top 10 suppliers make a public commitment to reduce greenhouse gas (GHG) emissions by 2030.

2022 Report highlights: 

  • In September 2022, Geotab was the first dedicated telematics company to receive validation from the Science Based Targets Initiative (SBTi) for its emissions reduction targets.
  • Geotab was awarded a Bronze medal from EcoVadis, ranking in the top 50% of companies scored by EcoVadis according to their criteria.
  • Geotab joined the UN Global Compact, the world’s largest corporate sustainability initiative.
  • Scope 2 emissions were reduced by 34% compared to our 2019 baseline.
  • Updated Geotab GO Recycle Program providing take-back services for customers in North America and the EU. 
  • Research collaborations demonstrating the potential of electrification and accelerating EV adoption at scale, including the North American fleet electrification study and Profitable Sustainability: The Potential of European Fleet Electrification
  • Next-generation STEM program with over 200 participants in the company’s Internship and Co-op programs.

View the full report at: https://www.geotab.com/about/corporate-sustainability/

Wozniak, Musk & More Call For AI Development Pause

Posted in Commentary with tags on March 29, 2023 by itnerd

There’s an open letter signed by over 1200 people who are asking for an immediate six-month halt on AI technology more powerful than ChatGPT-4. The open letter was created by an organization called the Future of Life Institute. The aim of this organization is to “steer transformative technology towards benefitting life and away from extreme large-scale risks.” Among those who signed are Steve Wozniak who co-founded Apple, Elon Musk the clown prince of tech and the guy who runs Twitter, SpaceX, and Tesla among other companies. This does bring up all sorts of questions about AI and how it should be used.

I have a number of comments on AI in general and specifically this open letter. The first is from Baber Amin, COO, Veridium:

Thoughts on AI development and application:

“For great leaps in technology, we often need to establish safety measures and regulations – for example, when we split the atom to harness nuclear power. While nuclear energy has provided many advantages in fields like medicine and energy, it has also given rise to the terrible threat of nuclear weapons. However, the difficulty of accessing and managing nuclear materials has provided a natural form of protection.

“AI model development and training, on the other hand, lack these same natural barriers, making it easier to develop without appropriate safety measures in place. That’s why it’s important to take a step back and create responsible systems that are accurate, transparent, trustworthy, and potentially even capable of self-regulation.

Risks for companies using the OpenAI API.

      “As organizations turn to OpenAI’s API for their artificial intelligence needs, it’s important to keep in mind the following considerations:

  1. Data Privacy: OpenAI’s models are trained on large amounts of data, which until recently could have included sensitive information from organizations. Starting March 1, OpenAI will no longer use customer data submitted via API to train their models without explicit consent. However, the data will still be kept for 30 days for monitoring purposes.
  2. Bias: OpenAI’s training data comes from the real world, which means it may contain biases that are reflected in their models. Organizations using OpenAI should be aware of this possibility and take corrective measures.
  3. Misinformation and Fake Data: OpenAI’s generative models can create text that is indistinguishable from real data, which could be used to generate fake news or blog posts. Organizations need to be cautious of inadvertently spreading misinformation.
  4. Phishing Attacks: OpenAI’s generative models can also be used to create sophisticated phishing attacks or deepfakes, which could lead to propaganda and possible slander.
  5. Spam: Lastly, OpenAI’s generative AI can be used to generate spam, resulting in unsolicited emails or social media posts, causing reputational damage to an organization

     “By keeping these considerations in mind, organizations can use OpenAI’s API effectively and responsibly.

      “For security protections, looking at OpenAI, they do have the following security controls in place, which all seem very reasonable.  

  • Data encryption at rest and in transit.
  • Access control around data and models.
  • Monitoring for suspicious activity.
  • Patching for latest security patches.
  • Auditing of access to data and models.

Matt Mullins, Senior Security Researcher, Cybrary is next:

   “There are a number of benefits to AI and its applications that are being explored. While there are a great deal of efficiencies created there, other non-beneficial aspects arise. The disruption of a number of industries being the most profound, in ways that were not easily predictable. Things associated (typically) with “human-ness” are being found to be more vulnerable than other aspects.

   “For example… art, music, essays, and other things that were an established trope of human creativity as normality are significantly being destabilized as AIs are able to quickly ingest, seed, and innovate in ways that were not previously predicted.

   “Aside from these disruptions, the potential for attacks on baseline ‘truth’ have been established as well. Consider the modification of voice, visual imagery, and video which can all be done so effectively that a zoom call could potentially be spoofed. The ramifications of such realistic mimicry have direct threats to establishments of truth and sub sequentially democratic process itself.

Overall, AI is presenting a removal of entry level aspects to IT and security. Beyond this entry level the veil seems to be easy to pierce with a critical eye for understanding code. The bigger issues presented are the capabilities that AI presents to disrupt how we see the world.”

David Maynor, Senior Director of Threat Intelligence, Cybrary has this to add:

Addressing major tech calling for a 6 mo. AI moratorium:

   “It is funny that technologist that have been disruptive to industries and use mantras like “fail fast” are aligning against AI research. While conspiracy theories point to worrying about a Skynet like AI turning on humans I personally feel that AI availability will disrupt the disruptors and make their fiefdoms ripe for replacement.”

It will be interesting to see how this play out. I for one do not see the AI arms race as I call it stopping anytime soon unless governments get interested in terms of slowing down AI development.

UPDATE: Dr. Chenxi Wang (she/her), Founder and General Partner, Rain Capital added this comment:

A pause in the AI fever is needed, not just from the business standpoint, but also from the point of view of security and privacy. Until we understand how to assess data privacy, model integrity, and the impact of adversarial data, continued development of AI may lead to unintended social, technical, and cyber consequences. 

Lumen Technologies Gets Pwned. Installs “Enhanced Security Software” And Discovers Another Attack

Posted in Commentary with tags on March 29, 2023 by itnerd

On Monday, Lumen Technologies filed two cybersecurity incidences with the SEC, both of which occurred within a week of each other. 

Last week Lumen discovered that a malicious actor had installed ransomware in on its servers, degrading the operations of a “handful of our enterprise customers.” Additionally, the company’s installation of “enhanced security software,” allowed them to discover that a separate intruder had accessed a number of their internal systems, conducted reconnaissance, installed malware and extracted data.

Based on the ongoing investigation, Lumen said it does not believe the incident will have a material impact on its financials, operations or ability to serve customers.

Dave Ratner, CEO, HYAS had this comment:

   “The unfortunate truth in today’s world is that everyone will be breached. It’s clear today, now more than ever, that visibility into any and all anomalous communication across both IT and OT environments needs to be a critical part of a modern security architecture. Since malware and other nefarious intrusions must communicate with their external adversary infrastructure, real-time visibility and early detection into any and all anomalous communication can be the difference between rapid containment and true business resiliency or data exfiltration and costly business impacts.”

I’d love to know what this “enhanced security software” was that Lumen installed as it allowed them to find another intruder in their internal systems. Whatever it is, maybe other companies should copy what Lumen has done to keep themselves safe and secure.

HP Unveils Bold New Offerings and Partner Program Updates at Amplify Partner Conference

Posted in Commentary with tags on March 29, 2023 by itnerd

HP has another announcement from its Amplify Partner Conference today. The theme of the carbon-neutral event – Future Ready, Together We Win – invites partners to join HP to take advantage of opportunities across high-growth segments including gaming, hybrid work, workforce services, security, and sustainability.

The key highlights are (with links to more detailed announcements):

  • Doubles Down on Partner Growth with Groundbreaking Program Enhancements: As of November 1, all HP products, solutions and distribution across its vast portfolio will be integrated into the HP Amplify Program, delivering one global platform as the foundation for partner engagement.
  • Debuts Advanced Sustainable Printing Solutions Designed for Growing Businesses: Launched the new HP Color LaserJet 4200/4300 and the HP Color LaserJet Enterprise 5000/6000 and X500/X600 printing solutions for businesses of all sizes. All new HP Color LaserJet series printers are powered by HP’s next generation sustainable toner, which delivers up to 27% reduced energy use and up to 78% less plastic in the packaging.
  • Leads in Hybrid Work with Future-Ready Portfolio: HP today announced new products and solutions to usher in the next era of hybrid work for everyone with the world’s most comprehensive set of computing solutions for hybrid flexibility.
  • Expands Boundaries for Remote PC Management through HP Wolf Connect: Wolf Connect, an IT management connectivity solution that provides a highly resilient and secure connection to remote PCs, enabling IT to manage devices even when powered down or offline. Using a cellular-based network, HP Wolf Connect’s robust connectivity helps ensure IT teams can readily manage a dispersed hybrid workforce.
  • Boosts Gaming Solutions for Awe-Inspiring Experiences: The new OMEN Transcend 16 Laptop, OMEN 16 Laptop, Victus 16 Laptop, and a vast range of stunning OMEN monitors offer casual, hobbyist, lifestyle, and hardcore gamers the power and flexibility to play and work hard. To bring everything together, new enhancements in OMEN Gaming Hub offer a variety of performance and personalization features.

Trend Micro Details How Cybercriminals Use LinkedIn to Victimize Users and Companies

Posted in Commentary with tags on March 29, 2023 by itnerd

Trend Micro has put out research on how LinkedIn has become a great target for cybercriminals.

LinkedIn is considered the largest platform catering to professionals and companies’ information with approximately 875 million users in over 200 countries.

As in other social networks, sharing data is the principal activity done on this platform, and this opens people to threats targeting all kinds of users – from a cybercriminal perspective, LinkedIn is an optimal platform to gather information on potential targets and for initial reconnaissance given its large user base and business orientation.

From utilizing AI-generated headshots to create real-looking profiles to using LinkedIn messaging to target marketing and HR professionals, threat actors have found new ways to exploit the platform’s information to build sophisticated attacks that could result in personal, professional, social, and organizational damage.

To learn more about how data is been stolen and used against users and organizations you can read the full report here: A Growing Goldmine: Your LinkedIn Data Abused For Cybercrime

HP Wolf Connect expands PC management to help close security gaps

Posted in Commentary with tags on March 29, 2023 by itnerd

Today at its Amplify™ Partner Conference, HP Inc announced HP Wolf Connect, an IT management connectivity solution that provides a highly resilient and secure connectionto remote PCs, enabling IT to manage devices even when powered down or offline. 

Using a cellular-based network, HP Wolf Connect’s robust connectivity helps ensure IT teams can readily manage a dispersed hybrid workforce. It can reduce the time and effort needed to resolve support tickets, secure data from loss or theft to mitigate a potential breach and optimize asset management.

HP Wolf Protect and Trace with Wolf Connect is the world’s first software service capable of locating, locking and erasing a PC remotely, even when it’s turned off or disconnected from the Internet. This capability protects sensitive data on the move and helps lower IT costs by reducing the need for PC remediation or replacement.

Securing and managing the hybrid workforce is a top priority for organizations. New global research from HP Wolf Security found 82% of security leaders operating a hybrid work model have gaps in their organization’s security posture. The global study of 1,492 security leaders found:

  • 61% say protecting their hybrid workers will get harder in the year ahead.
  • 70% say that hybrid work increases the risk of lost or stolen devices.

Securing the endpoint is ground zero for attacks on hybrid workers

Beyond PC loss and theft, the endpoint i.e., laptops, PCs or printers – continue to face serious threat from ransomware and is ground zero for attacks on hybrid workers. This requires the creation of new cybersecurity strategies and innovative security tools in response to changing employee behaviors.

  • 84% of security leaders say the endpoint is the source of most security threats and where the most business-damaging security threats happen.
  • 66% say the greatest cybersecurity weakness is the potential for hybrid employees to be compromised; with phishing, ransomware, and attacks via unsecured home networks cited as the top risks.
  • 65% say it is challenging to update their threat detection measures (e.g., Endpoint Detection & Response and Security Information and Event Management tools) to reflect the behavior of hybrid employees, making it harder to spot attacks.
  • Three-quarters (76%) of security leaders agree application isolation is key to protect hybrid worker devices, but only 23% are benefiting from using it at present; with 32% planning to deploy in the next 12 months.

Hybrid work security is a key focus for 2023

HP’s new hybrid security research details how security teams are prioritizing securing the hybrid workplace:

  • Four-in-five (82%) security leaders have increased their cybersecurity budget specifically for hybrid workers. 71% expect this hybrid investment focus to increase further in 2023.
  • 80% have deployed a different set of tools and policies to protect hybrid employees.
  • 70% are limiting network access of people working remotely to minimize the risk of a breach.

To learn more, download HP Wolf Security’s latest report for IT decision makers and for Security Leaders.

Methodology

HP surveyed more than 1,492 IT and security leaders in hybrid organizations globally across 5 markets (US, UK, France, Germany, and Japan) in July-August 2022. All are decision makers for endpoints, network, cloud, or privacy management, and oversee or manage a cybersecurity operations team and/or IT hardware and software within their organization.  Hybrid organizations are defined as having a range of employees who either work in the office, work remot

StrikeReady Wins AI Excellence Award For Natural Language Processing For The Second Consecutive Year

Posted in Commentary with tags on March 29, 2023 by itnerd

StrikeReady, an AI-driven security company, has won the Business Intelligence Group’s Artificial Intelligence Excellence Award in the Natural Language Processing category for the second consecutive year. Out of 52 product winners, StrikeReady was the only company in the cybersecurity industry to be recognized for demonstrating excellence and innovation in using AI. 

The most recognized security product and service industry-wide with over 60 awards and honors, StrikeReady CARA stood out with its innovative AI-based Virtual Security Assistant, which provides context-based responses and actions by leveraging underlying embedded technologies, such as threat intelligence platform (TIP), breach and attack simulation (BAS), SOAR, and more. StrikeReady has always envisioned that conversational AI is the foundation for empowering cybersecurity analysts. With ChatGPT coming into the limelight, it has reinforced their belief that AI-based assistance will be the biggest disruption in cybersecurity. They are the only company offering this solution.

The Artificial Intelligence Excellence Awards honor companies that have demonstrated excellence, innovation, and leadership in using AI to improve their products and services. Winners are selected by an independent panel of judges who evaluate the nominees based on their AI technologies and their contributions to the AI industry.

Rapid7 Says That An IBM Aspera Vulnerability Has Been Used To Install Ransomware

Posted in Commentary with tags on March 29, 2023 by itnerd

Security researchers with Rapid7 have disclosed threat actors are exploiting a critical vulnerability in an IBM file-exchange application to install ransomware on servers. The IBM Aspera Faspex critical vulnerability, tracked at CVE-2022-47986, was patched by IBM in January.

Sylvain Cortes, VP of Strategy at Hackuity had this comment:

     “It is unsettling to note that for the same vulnerability (CVE-2022-47986) many cyber security companies have their own information that remains fragmented. It is important to be able to unify this information from several vendors in order to maximize its defense operations and trigger the right response. Solutions that aggregate vulnerability-related data from vulnerability scanners, EDRs or even service practices provide organizations with the critical visibility they depend on.”

This reminds me of the  GoAnywhere file transfer solution vulnerability that has led to multiple organizations being pwned by the Cl0p ransomware group. Except that we haven’t seen threat exploit this to the same degree that Cl0p has. If you use IBM Aspera, you should be applying these patches ASAP, assuming you haven’t already so this doesn’t turn into another GoAnywhere situation.

Guest Post: Apple overtook Samsung with the most smartphone users

Posted in Commentary with tags on March 29, 2023 by itnerd

In today’s world, smartphones have become essential to our daily lives. From checking emails to browsing social media, we rely on these devices for communication, entertainment, and information.

According to the data analyzed by the Atlas VPN team, Apple overtook Samsung as the most popular smartphone in the first months of 2023. It is a significant shift in the global smartphone market, as Samsung has been the dominant player for several years. However, is this change part of a bigger tendency or only a short-term trend?

Nearly through all of 2022, Samsung had the highest market share of all smartphones.

In October, Apple surpassed Samsung’s market share by 0.2%. Despite that, Samsung regained its position at the top the next month, claiming 28.33% of the market share. Apple’s market share in November and December stayed just slightly behind, with 27.48% and 26.98%, respectively.

At the start of 2023, two months in a row, iPhones are now the leading smartphone. In January, Apple made up 27.6%, while Samsung had 27.09% of the market share. Next month, Apple’s share dropped slightly to 27.1%, and so did Samsung’s to 26.75%.

Currently, the world has about 6.84 billion smartphone users, of which 1.85 billion are using iPhones and 1.82 billion have chosen a Samsung. However, it is essential to note that these numbers are just estimates, as some people might have multiple phones and use both Apple and Samsung devices.

Xiaomi phones comprised 12.29% of the market in February, while Oppo had a 6.86% share. Huawei’s smartphones have declined for the past 6 months and reached a market share of 4.84% last month.

​​Cybersecurity writer at Atlas VPN, Vilius Kardelis, shares his thoughts on Apple overtaking Samsung as the most popular smartphone:

“While it is impossible to predict the future with certainty, Apple’s success will likely continue due to its strong brand image, customer loyalty, and effective marketing. While Samsung is undoubtedly a formidable rival, it will need to innovate and differentiate itself to catch up to Apple.”

To read the second part and the full article, head over to: https://atlasvpn.com/blog/apple-overtook-samsung-with-the-most-smartphone-users

apple-overtook-samsung-with-the-most-smartphone-users