Using Security Intelligence to Detect Insider Threats From Cloud-Based Applications

Security intelligence solutions such as QRadar UBA enable analysts to detect potentially malicious activity on Microsoft Office 365 cloud-based apps.

The post Using Security Intelligence to Detect Insider Threats From Cloud-Based Applications appeared first on Security Intelligence.

Continue reading Using Security Intelligence to Detect Insider Threats From Cloud-Based Applications

Unwrapping the Mystery: Did a Big, Slimy Internet Worm Make Hundreds of Organizations WannaCry?

IBM X-Force revealed that WannaCry spread to its targets like a computer worm. But unlike a classic worm, it carried a malicious payload of ransomware.

The post Unwrapping the Mystery: Did a Big, Slimy Internet Worm Make Hundreds of Organizations WannaCry? appeared first on Security Intelligence.

Continue reading Unwrapping the Mystery: Did a Big, Slimy Internet Worm Make Hundreds of Organizations WannaCry?

Security Is an Organizational Behavior Problem

Security is often viewed as a technology problem, but many vulnerabilities can be traced back to flaws and inconsistencies in organizational behavior.

The post Security Is an Organizational Behavior Problem appeared first on Security Intelligence.

Continue reading Security Is an Organizational Behavior Problem

Is remote access technology leaving you vulnerable?

Insider and third-party access are growing security threats facing organizations and enterprise IT systems, according to Bomgar. Proliferation of security issues Despite rising awareness of the threats posed by users with privileged access permissions, most organizations still allow a myriad of internal and external parties to access their most valuable systems and data. Many are placing trust in both employees and third parties without a proven means of managing, controlling, and monitoring the access that … More Continue reading Is remote access technology leaving you vulnerable?

200 million financial services records breached in 2016, 900% increase from 2015

The financial services industry was attacked more than any other industry in 2016 – 65 percent more than the average organization across all industries, according to the IBM X-Force Research team. Injection-type attacks were the clear leader in the financial services sector in 2016. Source: IBM Managed Security Services data, January 1 – December 31, 2016. As a result, the number of financial services records breached skyrocketed 937 percent in 2016 to more than 200 … More Continue reading 200 million financial services records breached in 2016, 900% increase from 2015

Former Expedia IT support worker gets prison time for hacking execs’ emails, insider trading

A IT support technician formerly employed at Expedia offices in San Francisco was sentenced to 15 months in prison for securities fraud, plus three years supervised release. 28-year-old San Francisco resident Jonathan Ly admitted that he used his position in tech support at Expedia to access emails of Expedia executives so that he could trade in Expedia stock and illegally profit from non-public information. According to records filed in the case, between 2013 and 2015, … More Continue reading Former Expedia IT support worker gets prison time for hacking execs’ emails, insider trading

Oracle databases at risk because of a leaked NSA hacking tool, researcher says

The recent leak of NSA hacking tools designed to compromise SWIFT Service Alliance servers comes with a key to pry open thousands of Oracle databases around the globe, new research suggests. While most of the hacking tools revealed April 14 by the group known as the Shadow Brokers target vulnerabilities in outdated versions of Microsoft Windows operating systems, the release also contained an implant and two scripts apparently engineered by the NSA to breach and exfiltrate data from Oracle databases. Those tools were part of an expansive U.S. espionage operation aimed at hacking into Middle Eastern SWIFT service bureaus. SWIFT is an international computer network that acts as a ledger and enables financial institutions to send and receive information about financial transactions. Some banks rely on service bureaus to effectively access SWIFT’s architecture. Service bureaus in the Middle East commonly host and manage transaction data from regional banks on Oracle databases. These Oracle […]

The post Oracle databases at risk because of a leaked NSA hacking tool, researcher says appeared first on Cyberscoop.

Continue reading Oracle databases at risk because of a leaked NSA hacking tool, researcher says

Leaked NSA hacking tools are a hit on the dark web

A shadowy cast of random hackers are now sharing, promoting and working to adopt executable computer code evident in NSA documents that were published last week by the Shadow Brokers, private sector intelligence analysts tell CyberScoop. Underground hacking communities began developing and uploading tutorials on how to utilize some of the tools the same day the NSA documents were originally published, according to researchers at Israel-based dark web intelligence firm SenseCy. Forum members have shown a particular interest in a leaked framework similar to Metasploit that’s unique to the NSA called Fuzzbunch. SenseCy, a firm focused on the dark web staffed by former intelligence officials, identified a series of conversations occurring in a hidden Russian cybercrime forum discussing how members could exploit a bug in Windows Server Message Block, a network file sharing protocol. “Hackers [have] shared the leaked [NSA] information on various platforms, including explanations [for how to use the tools] published by Russian-language […]

The post Leaked NSA hacking tools are a hit on the dark web appeared first on Cyberscoop.

Continue reading Leaked NSA hacking tools are a hit on the dark web

Shadow Brokers leaks show U.S. spies successfully hacked Russian, Iranian targets

The leaked NSA documents and tools published in recent months by the mysterious Shadow Brokers group have provided rare insight into the clandestine digital espionage operations pursued by the spy agency over the past few years, including information on operations aimed at Iran and Russia. Last Friday the rogue group released a new package of NSA files, this time detailing numerous tools designed to break into older versions of Microsoft Windows and a campaign to compromise banking networks in the Middle East. Additional targets were also mentioned one week prior in a separate archive that was largely ignored by most media outlets. Yet the document cache published April 8 provides evidence that the NSA had once launched a series of successful computer-based intrusions against multiple high-profile foreign targets, including the Office of the President of Iran and the Russian Federal Nuclear Center, said two former intelligence officials who spoke to CyberScoop on the condition of […]

The post Shadow Brokers leaks show U.S. spies successfully hacked Russian, Iranian targets appeared first on Cyberscoop.

Continue reading Shadow Brokers leaks show U.S. spies successfully hacked Russian, Iranian targets

Shadow Brokers leak NSA documents that may reveal operation aimed at Middle Eastern banks

The Shadow Brokers published a cache Friday of supposed NSA documents, 23 executable hacking tools targeting Windows and perhaps most notably, evidence showing the secretive agency compromised offices connected to a global banking transaction system in order to spy on Middle Eastern banks. The cache holds authentic NSA documents and contains legitimate information, according to former intelligence officials who spoke on condition of anonymity. “TheShadowBrokers showing you cards theshadowbrokers wanting you to be seeing. Sometime peoples not being target audience. Follow the links for new dumps. Windows. Swift. Oddjob. Oh you thought that was it? Some of you peoples is needing reading comprehension,” a message written by the group reads. After publishing and promoting leaked documents for several months, Friday’s release by the mysterious group is the first to contain NSA Powerpoint presentation slides — prior to today, only files released by NSA whistleblower Edward Snowden offered such material. Security researchers […]

The post Shadow Brokers leak NSA documents that may reveal operation aimed at Middle Eastern banks appeared first on Cyberscoop.

Continue reading Shadow Brokers leak NSA documents that may reveal operation aimed at Middle Eastern banks