Cybercriminals will continue to exploit new technologies like machine learning and blockchain in 2018:
- Ransomware and digital extortion will remain lucrative criminal business models, fueled by ransomware-as-a-service and cryptocurrencies like bitcoin.
- Vulnerabilities in IoT devices will expand the attack surface as more devices connect to networks.
- Losses from business email compromise scams will exceed $9 billion globally as these scams prove effective through social engineering.
- Cyberpropaganda efforts will spread using tried-and-true spam techniques on social media to manipulate public opinion.
- Threat actors will leverage machine learning and blockchain to advance their evasion techniques and stay one
Grift horse money stealing trojan takes 10m android users for a ride
Watch the full episode on Youtube: https://youtu.be/M5Gsjwsnxtg
More than 10 million Android users have been saddled with a malware called GriftHorse that’s trojanizing various applications and secretly subscribing victims to premium mobile services – a type of billing fraud that researchers categorize as “fleeceware.”
Zimperium uncovered more than 130 GriftHorse apps being distributed through both Google Play and third-party application stores, across all categories. Some of them have basic functionality, and some of them do nothing, researchers said. In either case, once installed, they lead to victims being billed for premium services – but phone-owners are usually none the wiser until they take a look at their mobile bills.
This document discusses implementing security on Android applications. It begins with an introduction to the Android operating system and its open source nature. It then discusses some security issues with Android OS, cellular networks, and telephone networks that could allow unauthorized access to sensitive data.
The document proposes a model for developing a secure Android application to encrypt phone call logs. It describes creating an application that isolates each app in a sandbox, packages the app in an .apk file, and uses encryption/decryption to secure call log data from potential hackers or if a phone is lost or stolen. Screenshots of the app design are provided, including a welcome screen, login screen, call log home screen, and screens for viewing and selecting call logs to encrypt
Adil Burak Sadıç - Siber Güvenlik mi, Bilgi Güvenliği mi, BT Güvenliği mi?
Elektrik kesintisinden kredi kartı hırsızlığına, filmlerden dizilere; siber güvenlik başlığı haberler ve magazin gündeminde baş köşelere yerleşmeye başladı. Peki kurumlar ve devlet yönetimleri hangi alanlara odaklanmalı? Ya da bu başlığın tam adı ne olmalı ve kavram karmaşasına nasıl yaklaşmalıyız? Information Security Forum raporları ile son yıllarda Türkiye ve Dünya'daki kurumların gündeminde en ön sıralarda yer alan başlıklardan yola çıkarak hazırlanan bu sunumda, önümüzdeki yıllarda sadece siber güvenlik camiasının değil, kurum ve devlet yönetimlerinin de odaklanması gereken alanlara ışık tutulmaya çalışılacak.
The document provides 15 security predictions for 2017. Some predictions include that internet of things devices will continue to be targeted due to security issues, cybercrime tools will be increasingly available as a service, ransomware attacks will grow more advanced, hacking will be used in political campaigns, cyber attacks will target critical infrastructure, and automation will be used to address the cybersecurity skills gap.
company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
Cyber attacks pose a serious threat to both private sector organizations and governments. Advanced persistent threats can stealthily infiltrate systems over long periods of time without detection. As more business is conducted virtually, cyber crime has become increasingly sophisticated and difficult to combat. In response, there is a growing need for cyber security professionals in India to protect the country's internet economy and users. Cyberfort Technologies offers several industry-driven cyber security courses and certifications to help develop skilled cyber security experts and meet this demand.
The document summarizes cyber threat trends in 2018 according to a Symantec report. It saw a rise in formjacking attacks that steal payment card data, though cryptojacking activity declined along with cryptocurrency values. Ransomware infections decreased overall but rose for enterprises. Living off the land attacks using tools like PowerShell increased substantially. Targeted attacks grew more sophisticated with groups targeting operational systems and destructive malware.
Botnets have grown larger, more resilient, and better camouflaged. They are finding new ways to generate revenue through ransomware and bitcoin mining. Android malware is also evolving, with threats becoming more sophisticated at avoiding detection and removal. While no single Android malware is dominant, the most widespread is Andr/BBridge-A, which has demonstrated longevity since first being detected in 2012. There are some signs of progress, such as Google improving Android security and the arrest of an exploit kit author, but threats continue advancing techniques.
Emerging Threats to Digital Payments - Is Your Business Ready
The document discusses emerging threats to digital payments and outlines steps businesses can take to protect themselves. It notes that cyber attacks are a major security risk and new payment methods are fueling more attacks. The problems section details how criminals exploit new technologies, learning resources, and expanded access points. It asks questions around detecting and responding to attacks. The solutions section recommends training, vulnerability scanning, network segmentation, access control, monitoring, and intelligence sharing to help close security gaps against sophisticated attackers.
Cybersecurity Challenges in Retail 2020: How to Prevent Retail Theft
While retailers keep opening new stores, hackers continue mastering their skills.
What cybersecurity challenges should the retail industry expect in 2020? It is time to reveal trends and prepare to fight upcoming attacks.
Learn the details: https://www.intellias.com/retail-security-challenges-in-2020-in-depth-security-coverage-to-prevent-retail-theft/
The Best Online Security Service for
CIM – Central Management
Log Monitoring
Intrusion Detection Systems
Firewall Monitoring System
Host based IDSs
Vulnerability Scanning
Evidence Retention
CIM Intelligence
A must to see for all,......!!!
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...Symantec
Internet Security Threat Report 2014 :: Volume 19 :: Appendices
Hardcore data from Symantec’s Internet Security Threat Report.
Real number crunching on Threat Malicious Code, Fraud & Vulnerability trends including
Threat Activity Trends
• Malicious Activity by Source
• Malicious Web-Based Attack Prevalence
• Analysis of Malicious Web Activity by Attack Toolkits
• Analysis of Web-Based Spyware, Adware, and Potentially Unwanted Programs
• Analysis of Web Policy Risks from Inappropriate Use
• Analysis of Website Categories Exploited to Deliver Malicious Code
• Bot-Infected Computers
• Analysis of Mobile Threats
• Quantified Self – A Path to Self-Enlightenment or Just Another Security Nightmare?
• Data Breaches that could lead to Identity Theft
• Threat of the Insider
• Gaming Attacks
• The New Black Market
Malicious Code Trends
• Top Malicious Code Families
• Analysis of Malicious Code Activity by Geography, Industry Sector, and Company Size
• Propagation Mechanisms
• Email-Targeted Spear-Phishing Attacks Intelligence
Spam and Fraud Activity Trends
• Analysis of Spam Activity Trends
• Analysis of Spam Activity by Geography, Industry Sector, and Company Size
• Analysis of Spam Delivered by Botnets
• Significant Spam Tactics
• Analysis of Spam by Categorization
• Phishing Activity Trends
• Analysis of Phishing Activity by Geography, Industry Sector, and Company Size
• New Spam Trend: BGP Hijacking
Vulnerability Trends
• Total Number of Vulnerabilities
• Zero-Day Vulnerabilities
• Web Browser Vulnerabilities
• Web Browser Plug-in Vulnerabilities
• Web Attack Toolkits SCADA Vulnerabilities
The document provides CYFIRMA's predictions for cybersecurity threats and risks in 2022. Some of the top predictions include:
1) Cybercriminals will increasingly arm IoT/IIoT devices and operational technology for cybercrime as the number of connected devices grows dramatically.
2) Cybercrime will become more specialized and targeted, behaving more like a legitimate industry and making cybercrime an investment-worthy asset class.
3) Cybercriminals may embark on kinetic cyberattacks that cause real-world physical damage beyond just non-violent attacks.
4) The war for intellectual property theft will intensify as state-sponsored groups target industries like health research and pharmaceuticals.
Grift horse money stealing trojan takes 10m android users for a rideRoen Branham
Watch the full episode on Youtube: https://youtu.be/M5Gsjwsnxtg
More than 10 million Android users have been saddled with a malware called GriftHorse that’s trojanizing various applications and secretly subscribing victims to premium mobile services – a type of billing fraud that researchers categorize as “fleeceware.”
Zimperium uncovered more than 130 GriftHorse apps being distributed through both Google Play and third-party application stores, across all categories. Some of them have basic functionality, and some of them do nothing, researchers said. In either case, once installed, they lead to victims being billed for premium services – but phone-owners are usually none the wiser until they take a look at their mobile bills.
This document discusses implementing security on Android applications. It begins with an introduction to the Android operating system and its open source nature. It then discusses some security issues with Android OS, cellular networks, and telephone networks that could allow unauthorized access to sensitive data.
The document proposes a model for developing a secure Android application to encrypt phone call logs. It describes creating an application that isolates each app in a sandbox, packages the app in an .apk file, and uses encryption/decryption to secure call log data from potential hackers or if a phone is lost or stolen. Screenshots of the app design are provided, including a welcome screen, login screen, call log home screen, and screens for viewing and selecting call logs to encrypt
Elektrik kesintisinden kredi kartı hırsızlığına, filmlerden dizilere; siber güvenlik başlığı haberler ve magazin gündeminde baş köşelere yerleşmeye başladı. Peki kurumlar ve devlet yönetimleri hangi alanlara odaklanmalı? Ya da bu başlığın tam adı ne olmalı ve kavram karmaşasına nasıl yaklaşmalıyız? Information Security Forum raporları ile son yıllarda Türkiye ve Dünya'daki kurumların gündeminde en ön sıralarda yer alan başlıklardan yola çıkarak hazırlanan bu sunumda, önümüzdeki yıllarda sadece siber güvenlik camiasının değil, kurum ve devlet yönetimlerinin de odaklanması gereken alanlara ışık tutulmaya çalışılacak.
The document provides 15 security predictions for 2017. Some predictions include that internet of things devices will continue to be targeted due to security issues, cybercrime tools will be increasingly available as a service, ransomware attacks will grow more advanced, hacking will be used in political campaigns, cyber attacks will target critical infrastructure, and automation will be used to address the cybersecurity skills gap.
company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
Cyber attacks pose a serious threat to both private sector organizations and governments. Advanced persistent threats can stealthily infiltrate systems over long periods of time without detection. As more business is conducted virtually, cyber crime has become increasingly sophisticated and difficult to combat. In response, there is a growing need for cyber security professionals in India to protect the country's internet economy and users. Cyberfort Technologies offers several industry-driven cyber security courses and certifications to help develop skilled cyber security experts and meet this demand.
The document summarizes cyber threat trends in 2018 according to a Symantec report. It saw a rise in formjacking attacks that steal payment card data, though cryptojacking activity declined along with cryptocurrency values. Ransomware infections decreased overall but rose for enterprises. Living off the land attacks using tools like PowerShell increased substantially. Targeted attacks grew more sophisticated with groups targeting operational systems and destructive malware.
Botnets have grown larger, more resilient, and better camouflaged. They are finding new ways to generate revenue through ransomware and bitcoin mining. Android malware is also evolving, with threats becoming more sophisticated at avoiding detection and removal. While no single Android malware is dominant, the most widespread is Andr/BBridge-A, which has demonstrated longevity since first being detected in 2012. There are some signs of progress, such as Google improving Android security and the arrest of an exploit kit author, but threats continue advancing techniques.
The document discusses emerging threats to digital payments and outlines steps businesses can take to protect themselves. It notes that cyber attacks are a major security risk and new payment methods are fueling more attacks. The problems section details how criminals exploit new technologies, learning resources, and expanded access points. It asks questions around detecting and responding to attacks. The solutions section recommends training, vulnerability scanning, network segmentation, access control, monitoring, and intelligence sharing to help close security gaps against sophisticated attackers.
Cybersecurity Challenges in Retail 2020: How to Prevent Retail TheftIntellias
While retailers keep opening new stores, hackers continue mastering their skills.
What cybersecurity challenges should the retail industry expect in 2020? It is time to reveal trends and prepare to fight upcoming attacks.
Learn the details: https://www.intellias.com/retail-security-challenges-in-2020-in-depth-security-coverage-to-prevent-retail-theft/
Multiple intelligence reports have identified significant cybersecurity threats to global email networks from coordinated cyber criminals. Email remains the primary form of business communication, but the rapid growth has fueled security threats like spam, malware, ransomware, and phishing. The document recommends immediate actions for companies to improve their email security such as deploying email security services, blocking suspicious file attachments, educating users, and considering upgrading defenses.
This brief presentation gives you a quick overview on how the Cyber Threat Landscape is shaping up in 2017 for individuals and business owners alike. It puts forth some important trends and predictions.
This document discusses the need to rethink security approaches in the modern boundaryless digital landscape. Traditional perimeter-based security relying on firewalls and passwords has proven ineffective with numerous large breaches occurring. The document advocates adopting an identity-centric security model that secures user access and privileges across applications and infrastructure on and off-premises. Centrify is presented as a platform to help organizations implement identity services to better defend against threats in today's complex environment.
Cyberspace is rapidly transforming our lives – how we live, interact, govern and create value. With the JAM (Jan Dhan, Aadhaar and Mobile) trinity, India is at the forefront of global digital transformation. “Digital India” is being hailed as the world's largest technology led programme of its kind.
While internet, smartphones and modern information and
communication devices have been great force multipliers, endless connectivity and proliferation of IoT devices is giving rise to vulnerabilities, risks and concerns. Cyber security is today ranked among top threats by governments and corporates. Heightened concerns about data security and privacy have resulted in a spate of regulations in India and across the world. India is in the process of discussing and enacting its own comprehensive data security and privacy regulation, as well as vertical specific ones. Cyber security is an ecosystem where laws, organisations, skills, cooperation and
technical implementation would need to be in harmony to be
effective.
Overall, a robust regulatory framework based on global and
country-specific regulations, development of a holistic cyber
security eco-system (academia and industry as well as
entrepreneurial) and a coordinated global approach through
proactive cyber diplomacy would help to secure cyber space and promote confidence and trust of key stakeholders including
citizens, businesses, political and security leaders.
CII has been actively working in the cyber security space. The CII Task Force on Public Private Partnership for Security of the Cyber Space has been set up to bring about improvements in the legal framework to strengthen and maintain a safe cyberspace ecosystem by capacity building through education and training programmes. We would facilitate collaboration and cooperation between Government and Industry in the area of cyber security in general and protection of critical information infrastructure in particular, covering cyber threats, vulnerabilities, breaches, potential protective measures, and adoption of best practices.
2024 Cyber Threats: What's New and What You Should Keep an Eye On!Alec Kassir cozmozone
Individuals, businesses, whether small or big, governments, and groups have adopted the computer system to ease work. These systems have to be protected from various threats on the internet or people with ill intentions to infiltrate the systems.
The document outlines 15 security predictions for 2017 from various vendors and analysts. Some of the key predictions included increased attacks using IoT devices, growth of cybercrime tools available as a service, escalating DDoS attacks using IoT bots, more companies moving workloads to the cloud but needing to shift security focus, and continued prevalence of ransomware targeting various sectors. Overall security challenges are predicted to continue rising with hackers finding more ways to exploit technologies and human vulnerabilities.
The Top Five Cybersecurity Trends In 2023Bernard Marr
Cybersecurity is a fast-evolving area. Here, we look at the most important trends to watch out for in 2023, including the increased threats from connected IoT devices, hybrid working, and state-sponsored attacks.
The Five Biggest Cyber Security Trends In 2022Bernard Marr
Cyber security is evolving rapidly and is becoming one of today's most important technology areas. In 2022, we will see many new developments and advances. Here are some trends that will reshape the cyber security space over the next year.
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA RegulationPECB
This session discusses the top cyber threats for 2020 world-wide, where our presenters will discuss the top security priorities in their states for cybersecurity, followed by a Q/A session at the end of the presentation.
What topics are hot for Chief Security Officers in 2020? Which cyber threats are demanding the most attention for top government cybersecurity leaders? What projects are the U.S. states of Washington and Illinois applying resources to address security priorities? Where next with privacy legislation and implementation of regulations likes the California Consumer Privacy Act (CCPA)?
The webinar covers:
• Top security predictions for 2020 from global security vendors – along with CISO reactions and feedback
• Security trends (in specific areas such as ransomware) seen at the end of 2019 and in the first weeks of 2020
• CISO project priorities from Washington State and the State of Illinois
• Panel discussion of privacy actions and CCPA implementation nationwide
Date: February 19, 2019
Recorded webinar: https://youtu.be/QN35YHEA_4E
Cybersecurity in BFSI - Top Threats & Importancemanoharparakh
Cybersecurity has been the major area of concern throughout 2022 and now 2023 is all set to witness a new version of cyber-attacks with advanced technologies.
Five Network Security Threats And How To Protect Your Business Wp101112Erik Ginalick
The document discusses 5 of the most costly network security threats faced by enterprises: 1) botnets, 2) phishing, 3) malware, 4) distributed denial of service (DDoS) attacks, and 5) increasingly sophisticated attacks. It recommends implementing key layers of control through network perimeter protections, cloud-based security services, mobile device security, and partnering with a managed security provider to help prevent threats and do more with less.
The document discusses 5 of the most costly network security threats faced by enterprises: 1) botnets, 2) phishing, 3) malware, 4) distributed denial of service (DDoS) attacks, and 5) increasingly sophisticated attacks. It recommends implementing key layers of control through network perimeter protections, cloud-based security services, mobile device security, and endpoint compliance to effectively prevent and mitigate these threats. Outsourcing security functions to a managed security services provider can help organizations do more with less by avoiding in-house technology and staffing costs.
The document discusses cyber threats and forecasts for 2016. It predicts that ransomware, attacks on critical infrastructure, payment systems, automobiles, and wearables will increase. Nation-state cyber espionage and hacktivism will also continue. The document recommends increasing cybersecurity training and awareness, establishing international cooperation on cybercrime prosecution, and improving cyber resilience rather than just defense. It encourages pursuing a career in cybersecurity and lists example cybersecurity jobs.
This document summarizes key trends seen in malware and security threats in 2013 according to a security threat report from Sophos. Some of the main trends discussed include botnets growing larger and more stealthy through the use of techniques like decentralized command and control and hiding in the dark web. Android malware also evolved to be more sophisticated at avoiding detection. Ransomware, including the widespread Cryptolocker variant, emerged as a growing threat delivered by botnets.
DDoS awareness grows with the attack state shifting towards the healthy state of the Internet. DDoS attacks are like sharks in the ocean—you know they are there, even if you do not see any shark fins above the water. This picture describes what’s happening in the modern internet, where DDoS attacks occur every minute—they become the new normal, and those serving accessibility are adapting by including such services in their bundles. In 2017 an internet business without DDoS mitigation and WAF is ceased to exist.
Social engineering and phishing attacks are the largest threats to companies, as attackers are increasingly relying on tricking users to gain access to systems. Mobile malware and internet-connected devices are also growing vulnerabilities, as more business is conducted and data is stored on mobile and cloud systems. Companies need to invest in protections against these emerging threats like social engineering, mobile malware, cloud vulnerabilities, and weaknesses in the growing Internet of Things. Staying ahead of changing attack types can help reduce vulnerabilities, but protecting against current and future risks is a ongoing challenge.
The document discusses cybersecurity trends for 2018, focusing on ransomware, attacks on critical infrastructure, malware analysis, electoral cyberthreats, and privacy issues. It summarizes the major ransomware attacks of 2017 like WannaCry and describes how ransomware is evolving to target more devices and infrastructure. The document advises regularly backing up important data offline as the best protection against ransomware.
Cybersecurity Trends 2018: The costs of connectionESET Middle East
To help the reader navigate through the maze of current threats, ESET’s thought leaders have zeroed in on several areas that top the priority list in our exercise in looking forward.
The document provides an overview of cybersecurity trends predictions for 2023 based on a report by Quick Heal Security Researchers. It summarizes trends that played out in 2022 accurately, including the increased sophistication of Cobalt Strike, rise in supply chain attacks, exploitation of old vulnerabilities, and growth of ransomware-as-a-service. The document then predicts that in 2023, vishing attacks, spyloan apps, banking trojans using on-device fraud, RDP brute force attacks, Rust-based malware, and man-on-the-side attacks will continue to be prominent cybersecurity threats.
Top 10 Cybersecurity Trends to Watch Out For in 2022ManviShukla4
With the Digital revolution around all businesses, small or large, corporates, organizations and even governments are relying on computerized systems to manage their day-to-day activities and thus making cybersecurity a primary goal to safeguard data from various online attacks or any unauthorized access. Continuous change in technologies also implies a parallel shift in cybersecurity trends as news of data breach, ransomware and hacks become the norms. Here are the top cybersecurity trends for 2022.
White Paper Example - Brafton for NIP Group.pdfBrafton
The document discusses the growing threat of cyberattacks faced by companies. It notes that cyberattacks increased significantly during the COVID-19 pandemic as employees worked remotely on less secure networks. Common types of attacks discussed include ransomware, which encrypts files and demands payment, and phishing, which steals login credentials. The document recommends companies take proactive steps to strengthen cybersecurity through improved employee training, updated software, and business continuity planning.
Ransomware-as-a-Service: The business of distributing cyber attacksΔρ. Γιώργος K. Κασάπης
Ransomware is proving to be a profitable endeavor for cyber criminals. It is also what is fueling a newer trend: the business of offering management of ransomware attacks, or Ransomware-as-a-Service (RaaS).
Fueled in part by the ability to use cryptocurrency to avoid detection, cyber criminals are setting up shop as a managed service provider, helping other cyber criminals conduct business on their platforms for a fee. For that fee, cyber criminal groups get personalize access to platforms, complete with dashboard capabilities, that allow them to easily distribute their ransomware. Also included – technical support. Such full-service offerings mean that nearly anyone with internet access can launch a ransomware attack without any technical knowledge needed.
And why not? The estimated return on investment from ransomware campaigns can easily reach 1400%. The lure of a lucrative return could well attract beginners or anyone with a grudge. For organizations, the threat coming from a well-backed beginner is as damaging as one coming from a career criminal.
The Unseen Threats_ Exploring the Darknet's Latest Cyber Crime Trends.pptxjiyalouis
The document discusses several trends in cybercrime on the darknet, including the rise of ransomware attacks, underground markets selling stolen data and hacking tools, the evolution of botnets, cryptojacking secretly mining cryptocurrency on victims' computers, and the use of social engineering to manipulate human behavior. It notes that cyber criminals are becoming more organized, technical skills, targeting valuable industries and individuals, and that their tactics are constantly evolving while cyber crime barristers work to bring perpetrators to justice and enhance security.
The 2018 Internet Crime Report from the FBI's Internet Crime Complaint Center (IC3) summarizes internet crime complaints received in 2018. It reports that IC3 received over 351,936 complaints involving losses over $2.7 billion. The top crime types reported were non-payment/non-delivery, extortion, and personal data breach. In 2018, IC3 established a Recovery Asset Team to help recover funds from business email compromise schemes and created new Victim Specialist positions to provide support to victims of internet crimes.
The document discusses threats to manufacturing environments in the era of Industry 4.0. It finds that networks in the manufacturing industry are exposed to similar external threats as other industries due to factors like the prevalent use of outdated operating systems like Windows XP, as equipment in manufacturing has much longer replacement cycles. It also finds that network worms are more pervasive in manufacturing networks compared to others. The convergence of IT, OT, and IP networks under Industry 4.0 introduces new challenges to secure these systems from cyber threats.
This document summarizes the Android security landscape in 2018. It discusses improvements to protections on the Android platform, Google Play, and Google Play Protect that helped reduce the presence of potentially harmful applications (PHAs) on devices. Some key accomplishments include 84% more devices receiving security updates, Google Play Protect scanning over 50 billion apps daily, and preventing 242 builds containing PHAs from being released.
The DealBook is our annual overview of the Ukrainian tech investment industry. This edition comprehensively covers the full year 2023 and the first deals of 2024.
Best Practices for Effectively Running dbt in Airflow.pdfTatiana Al-Chueyr
As a popular open-source library for analytics engineering, dbt is often used in combination with Airflow. Orchestrating and executing dbt models as DAGs ensures an additional layer of control over tasks, observability, and provides a reliable, scalable environment to run dbt models.
This webinar will cover a step-by-step guide to Cosmos, an open source package from Astronomer that helps you easily run your dbt Core projects as Airflow DAGs and Task Groups, all with just a few lines of code. We’ll walk through:
- Standard ways of running dbt (and when to utilize other methods)
- How Cosmos can be used to run and visualize your dbt projects in Airflow
- Common challenges and how to address them, including performance, dependency conflicts, and more
- How running dbt projects in Airflow helps with cost optimization
Webinar given on 9 July 2024
The Rise of Supernetwork Data Intensive ComputingLarry Smarr
Invited Remote Lecture to SC21
The International Conference for High Performance Computing, Networking, Storage, and Analysis
St. Louis, Missouri
November 18, 2021
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdfNeo4j
Presented at Gartner Data & Analytics, London Maty 2024. BT Group has used the Neo4j Graph Database to enable impressive digital transformation programs over the last 6 years. By re-imagining their operational support systems to adopt self-serve and data lead principles they have substantially reduced the number of applications and complexity of their operations. The result has been a substantial reduction in risk and costs while improving time to value, innovation, and process automation. Join this session to hear their story, the lessons they learned along the way and how their future innovation plans include the exploration of uses of EKG + Generative AI.
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...Toru Tamaki
Jindong Gu, Zhen Han, Shuo Chen, Ahmad Beirami, Bailan He, Gengyuan Zhang, Ruotong Liao, Yao Qin, Volker Tresp, Philip Torr "A Systematic Survey of Prompt Engineering on Vision-Language Foundation Models" arXiv2023
https://arxiv.org/abs/2307.12980
Coordinate Systems in FME 101 - Webinar SlidesSafe Software
If you’ve ever had to analyze a map or GPS data, chances are you’ve encountered and even worked with coordinate systems. As historical data continually updates through GPS, understanding coordinate systems is increasingly crucial. However, not everyone knows why they exist or how to effectively use them for data-driven insights.
During this webinar, you’ll learn exactly what coordinate systems are and how you can use FME to maintain and transform your data’s coordinate systems in an easy-to-digest way, accurately representing the geographical space that it exists within. During this webinar, you will have the chance to:
- Enhance Your Understanding: Gain a clear overview of what coordinate systems are and their value
- Learn Practical Applications: Why we need datams and projections, plus units between coordinate systems
- Maximize with FME: Understand how FME handles coordinate systems, including a brief summary of the 3 main reprojectors
- Custom Coordinate Systems: Learn how to work with FME and coordinate systems beyond what is natively supported
- Look Ahead: Gain insights into where FME is headed with coordinate systems in the future
Don’t miss the opportunity to improve the value you receive from your coordinate system data, ultimately allowing you to streamline your data analysis and maximize your time. See you there!
Quality Patents: Patents That Stand the Test of TimeAurora Consulting
Is your patent a vanity piece of paper for your office wall? Or is it a reliable, defendable, assertable, property right? The difference is often quality.
Is your patent simply a transactional cost and a large pile of legal bills for your startup? Or is it a leverageable asset worthy of attracting precious investment dollars, worth its cost in multiples of valuation? The difference is often quality.
Is your patent application only good enough to get through the examination process? Or has it been crafted to stand the tests of time and varied audiences if you later need to assert that document against an infringer, find yourself litigating with it in an Article 3 Court at the hands of a judge and jury, God forbid, end up having to defend its validity at the PTAB, or even needing to use it to block pirated imports at the International Trade Commission? The difference is often quality.
Quality will be our focus for a good chunk of the remainder of this season. What goes into a quality patent, and where possible, how do you get it without breaking the bank?
** Episode Overview **
In this first episode of our quality series, Kristen Hansen and the panel discuss:
⦿ What do we mean when we say patent quality?
⦿ Why is patent quality important?
⦿ How to balance quality and budget
⦿ The importance of searching, continuations, and draftsperson domain expertise
⦿ Very practical tips, tricks, examples, and Kristen’s Musts for drafting quality applications
https://www.aurorapatents.com/patently-strategic-podcast.html
An invited talk given by Mark Billinghurst on Research Directions for Cross Reality Interfaces. This was given on July 2nd 2024 as part of the 2024 Summer School on Cross Reality in Hagenberg, Austria (July 1st - 7th)
Transcript: Details of description part II: Describing images in practice - T...BookNet Canada
This presentation explores the practical application of image description techniques. Familiar guidelines will be demonstrated in practice, and descriptions will be developed “live”! If you have learned a lot about the theory of image description techniques but want to feel more confident putting them into practice, this is the presentation for you. There will be useful, actionable information for everyone, whether you are working with authors, colleagues, alone, or leveraging AI as a collaborator.
Link to presentation recording and slides: https://bnctechforum.ca/sessions/details-of-description-part-ii-describing-images-in-practice/
Presented by BookNet Canada on June 25, 2024, with support from the Department of Canadian Heritage.
Comparison Table of DiskWarrior Alternatives.pdfAndrey Yasko
To help you choose the best DiskWarrior alternative, we've compiled a comparison table summarizing the features, pros, cons, and pricing of six alternatives.
Best Programming Language for Civil EngineersAwais Yaseen
The integration of programming into civil engineering is transforming the industry. We can design complex infrastructure projects and analyse large datasets. Imagine revolutionizing the way we build our cities and infrastructure, all by the power of coding. Programming skills are no longer just a bonus—they’re a game changer in this era.
Technology is revolutionizing civil engineering by integrating advanced tools and techniques. Programming allows for the automation of repetitive tasks, enhancing the accuracy of designs, simulations, and analyses. With the advent of artificial intelligence and machine learning, engineers can now predict structural behaviors under various conditions, optimize material usage, and improve project planning.
Quantum Communications Q&A with Gemini LLM. These are based on Shannon's Noisy channel Theorem and offers how the classical theory applies to the quantum world.
Advanced Techniques for Cyber Security Analysis and Anomaly DetectionBert Blevins
Cybersecurity is a major concern in today's connected digital world. Threats to organizations are constantly evolving and have the potential to compromise sensitive information, disrupt operations, and lead to significant financial losses. Traditional cybersecurity techniques often fall short against modern attackers. Therefore, advanced techniques for cyber security analysis and anomaly detection are essential for protecting digital assets. This blog explores these cutting-edge methods, providing a comprehensive overview of their application and importance.
How RPA Help in the Transportation and Logistics Industry.pptxSynapseIndia
Revolutionize your transportation processes with our cutting-edge RPA software. Automate repetitive tasks, reduce costs, and enhance efficiency in the logistics sector with our advanced solutions.
Support en anglais diffusé lors de l'événement 100% IA organisé dans les locaux parisiens d'Iguane Solutions, le mardi 2 juillet 2024 :
- Présentation de notre plateforme IA plug and play : ses fonctionnalités avancées, telles que son interface utilisateur intuitive, son copilot puissant et des outils de monitoring performants.
- REX client : Cyril Janssens, CTO d’ easybourse, partage son expérience d’utilisation de notre plateforme IA plug & play.
Kief Morris rethinks the infrastructure code delivery lifecycle, advocating for a shift towards composable infrastructure systems. We should shift to designing around deployable components rather than code modules, use more useful levels of abstraction, and drive design and deployment from applications rather than bottom-up, monolithic architecture and delivery.
1. P A R A D I G M
S H I F T S
Trend Micro Security Predictions for 2018
2. Skills and resources — these are the two elements that make up an attacker’s
arsenal. An attacker, however, cannot set out to break security or even perform
sophisticated attacks without finding weak points in a system first. Massive
malware attacks, email-borne heists, hacked devices, and disrupted services
— all of these require a vulnerability in the network, whether in the form of
technology or people, in order to be pulled off.
Increased connectivity and interaction over insecure networks are a given.
Unfortunately, poor implementation of technologies adds to the likelihood
of threats being realized. Having protection where and when it’s needed will
become the backbone of security in this ever-shifting threat landscape.
In 2018, digital extortion will be at the core of most cybercriminals’ business
model and will propel them into other schemes that will get their hands
on potentially hefty payouts. Vulnerabilities in IoT devices will expand
the attack surface as devices get further woven into the fabric of smart
environments everywhere. Business Email Compromise scams will ensnare
more organizations to fork over their money. The age of fake news and
cyberpropaganda will persist with old-style cybercriminal techniques. Machine
learning and blockchain applications will pose both promises and pitfalls.
Companies will face the challenge of keeping up with the directives of the
General Data Protection Regulation (GDPR) in time for its enforcement. Not
only will enterprises be riddled with vulnerabilities, but loopholes in internal
processes will also be abused for production sabotage.
These are the threats that will make inroads in the 2018 landscape. As such,
they will serve as further proof that the days of threats being addressed
with traditional security solutions are behind us. As environments become
increasingly interconnected and complex, threats are redefining how we
should look at security.
Trend Micro has looked into the current and emerging threats, as well as the
security approaches tailored for the landscape. Read on to find out how to
make informed decisions with regard to the security focus areas that will
figure prominently in 2018.
3. THE RANSOMWARE BUSINESS
MODEL WILL STILL BE A CYBERCRIME
MAINSTAY IN 2018, WHILE OTHER
FORMS OF DIGITAL EXTORTION WILL
GAIN MORE GROUND.
4. For 2017, we predicted that cybercriminals would diversify ransomware into other attack methods. True enough,
the year unfolded with incidents such as WannaCry and Petya’s rapidly propagated network attacks, Locky and
FakeGlobe’s widespread spam run, and Bad Rabbit’s watering hole attacks against Eastern European countries.
We do not expect ransomware to go away anytime soon. On the contrary, it can only be anticipated to make
further rounds in 2018, even as other types of digital extortion become more prevalent. Cybercriminals have
been resorting to using compelling data as a weapon for coercing victims into paying up. With ransomware-
as-a-service (RaaS) still being offered in underground forums, along with bitcoin as a secure method to collect
ransom, cybercriminals are being all the more drawn to the business model.
Ransomware maturity as a catalyst
for digital extortion campaigns
If the evolution of cybercriminal tactics over the years is any
indication, cybercriminals are now going straight for the money
instead of tricking users into giving up their credentials. The
early online threats were heavy on infostealers and malware
that hijacked banking transactions to steal private information.
Then, the breed of threats went out to disguise themselves as
anti-malware solutions (FAKEAV), whereby users were duped
into downloading the software and paying up to regain access
to the victimized computers. Emulating this behavior of FAKEAV,
ransomware took the stage from then on.
The current success of ransomware campaigns — especially their
extortion element — will prompt cybercriminals looking to make
generous profits out of targeting populations that will yield the
most return possible. Attackers will continue to rely on phishing
campaigns where emails with ransomware payload are delivered
en masse to ensure a percentage of affected users. They will
also go for the bigger buck by targeting a single organization,
possibly in an Industrial Internet of Things (IIoT) environment, for
a ransomware attack that will disrupt the operations and affect
the production line. We already saw this in the fallout from the
massive WannaCry and Petya outbreaks, and it won’t be long
until it becomes the intended impact of the threat.
Extortion will also come into play when GDPR gets imposed. Cybercriminals could target private data covered
by the regulation and ask companies to pay an extortion fee rather than risk punitive fines of up to 4 percent
of their annual turnover. Companies will have ransom prices associated with them that cybercriminals can
determine by taking publicly available financial details and working out the respective maximum GDPR fines the
companies could face.This will drive an increase in breach attempts and ransom demands. Moreover, we expect
GDPR to be used as a social engineering tactic in the same way that copyright violations and police warnings
were used in past FAKEAV and ransomware campaigns.
Users and enterprises can stay resilient against these digital extortion attempts by employing effective web
and email gateway solutions as a first line of defense. Solutions with high-fidelity machine learning, behavior
monitoring, and vulnerability shielding prevent threats from getting through to the target. These capabilities are
especially beneficial in the case of ransomware variants that are seen moving toward fileless delivery, in which
there are no malicious payloads or binaries for traditional solutions to detect.
SOURCES:
http://blog.trendmicro.com/trendlabs-security-intelligence/threat-morphosis/
https://www.trendmicro.com/vinfo/us/security/definition/ransomware
https://documents.trendmicro.com/assets/rpt/rpt-setting-the-stage.pdf
Prominent Cybercriminal
Business Models Over the Years
Ransomware and DIGITAL EXTORTION
will be the land of milk and honey for
cybercriminals.
Unprecedented ransomware outbreaks occur
through WANNACRY and PETYA.
New ransomware families spike by 752%,
RANSOMWARE-AS-A-SERVICE (RaaS) emerges.
Ransomware steadily grows, and continues to
encrypt and demand payment.
Ransomware BITCRYPT encrypts files and
demands bitcoin payment.
Ransomware CRYPTOLOCKER encrypts files, locks
systems, and demands $300 payment.
Trojan SPYEYE steals millions of dollars.
First Android Trojan, DROIDSMS, emerges.
Trojans spread via malicious links on Twitter.
Worm KOOBFACE targets Facebook users.
FAKEAV steals credit card information using fake
antivirus scare messages.
Infostealer ZEUS is discovered.
Online banking malware that logs keystrokes or
changes banking interfaces flourishes.
6. The massive Mirai and Persirai distributed denial-of-service (DDoS) attacks that hijacked IoT devices, such as
digital video recorders (DVRs), IP cameras, and routers, have already elevated the conversation of how vulnerable
and disruptive these connected devices can be. Recently, the IoT botnet Reaper, which is based on the Mirai
code, has been found to catch on as a means to compromise a web of devices, even those from different device
makers.
We predict that aside from performing DDoS attacks, cybercriminals will turn to IoT devices for creating proxies
to obfuscate their location and web traffic, considering that law enforcement usually refers to IP addresses
and logs for criminal investigation and post-infection forensics. Amassing a large network of anonymized
devices (running on default credentials no less and having virtually no logs) could serve as jumping-off points
for cybercriminals to surreptitiously facilitate their activities within the compromised network.
We should also anticipate more IoT vulnerabilities in the market as many, if not most, manufacturers are going
to market with devices that are not secure by design. This risk will be compounded by the fact that patching
IoT devices may not be as simple as patching PCs. It can take one insecure device that has not been issued a
fix or updated to the latest version to become an entry point to the central network. The KRACK attack proved
that even the wireless connection itself could add to the security woes. This vulnerability affects most, if not all,
devices that connect to the WPA2 protocol, which then raises questions about the security of 5G technology,
which is slated to sweep connected environments.
Devices that will be targeted for disruptions and cybercrime
With hundreds of thousands of drones entering the U.S. airspace alone, the prospect of overseeing the aerial
vehicles can be daunting. We expect that reports of drone-related accidents or collisions are only the start of
it, as hackers have already been found to access computers, grab sensitive information, and hijack deliveries.
Likewise, pervasive home devices such as wireless speakers and voice assistants can enable hackers to
determine house locations and attempt break-ins.
We also expect cases of biohacking, via wearables and medical devices, to materialize in 2018. Biometric activity
trackers such as heart rate monitors and fitness bands can be intercepted to gather information about the
users. Even life-sustaining pacemakers have been found with vulnerabilities that can be exploited for potentially
fatal attacks.
What adopters and regulators should recognize now is that not all IoT devices have built-in security, let alone
hardened security. The devices are open to compromise unless manufacturers perform regular risk assessments
and security audits. Users are also responsible for setting up their devices for security, which can be as simple
as changing default passwords and regularly installing firmware updates.
7. GLOBAL LOSSES FROM BUSINESS
EMAIL COMPROMISE SCAMS WILL
EXCEED US$9 BILLION IN 2018.
8. According to the Federal Bureau of Investigation (FBI), BEC scams have been reported in over a hundred countries
and had a marked increase of 2,370 percent in identified exposed losses between January 2015 and December
2016. This isn’t surprising since BEC scams are to cybercriminals what burglary is to “offline” criminals. BEC
scams are quick, require very little scouting, and can yield big gains depending on the target, as evidenced by
the US$5 billion recorded losses.
We predict that BEC incidents will only multiply in 2018, leading to more than US$9 billion* in global losses.
This hike in the projected reported losses will be brought on partly by a growing awareness around BEC and
the tactics used, which will result in better identification and increased reporting of the scams. Mainly, it will be
rooted in how BEC scams bank on phishing approaches that time and again have proved to be effective. We will
continue to see BEC scams that involve company executives being impersonated to wire sums of money. We’ve
been observing it in the increase of BEC attack attempts involving CEO fraud. It’s also interesting to note that
instead of planting keyloggers, BEC scammers are turning to phishing PDFs and sites, which are cheaper than
keyloggers with crypting services. With phishing, they can still compromise accounts, and at lower costs at that.
The simplicity of knowing a target organization’s hierarchy (which may even be publicly available on social
media and corporate websites) and the brevity of the emails make a case for BEC as an efficient ploy to funnel
money. There is, however, another financially driven enterprise threat that is expected to still be wielded by
crybercriminals, especially those who are willing to do the long con: Business Process Compromise (BPC). With
BPC, cybercriminals learn the inner workings of the organization, particularly in the financial department, with
the aim of modifying internal processes (possibly via corporate supply chain vulnerabilities) and hitting the
mother lode. But given that it requires long-term planning and more work, BPC is less likely to make headlines
in 2018, unlike the much simpler BEC.
BEC can be deflected if employee training is in place, as it is reliant on social engineering. Companies should
implement strict protocols on internal processes, especially when making any kind of transaction. Small-
and medium-sized businesses, as well as enterprises, should employ multiple verifications, whereby another
established communication channel, such as a phone call, is at one’s disposal for double-checking. Web and
gateway solutions that provide accurate detection of social engineering tactics and forged behaviors may also
be able to block BEC threats.
* US$9 billion is based on computing the monthly average of reported losses from June to December 2016 and
multiplying it by 12. This only assumes that there is a flat growth for reported BEC incidents and victims.
Cumulative BEC Losses
US$9.1B
US$5.3B
US$3.1B
2013 20172014 2015 2016
SOURCES:
https://www.ic3.gov/media/2016/160614.aspx
https://www.ic3.gov/media/2017/170504.aspx
10. The fake news triangle consists of: motivations the propaganda is built on, social networks that serve as a
platform for the message, and tools and services that are used to deliver the message. In 2018, we expect
cyberpropaganda to spread via familiar techniques: those that were once used to spread spam via email and
the web.
Do-it-yourself (DIY) kits in the form of software, for instance, can perform automated social media spamming.
Even black hat search engine optimization (SEO) has been adapted to social media optimization (SMO), with
a user base of hundreds of thousands able to provide traffic and numbers to different platforms. From spear-
phishing emails sent to foreign ministries to the blatant use of documents to discredit authorities, dubious
content can spread freely and spark forceful opinions or even real protests.
Fabricated information, additionally, can put businesses in a bad light and even hurt their performance and
reputation. Researchers are even looking into audio and video manipulation tools that allow realistic-looking
footage to further blur the line between authentic and fake. Manipulated political campaigns will continue
to mount smear tactics and deliberately shift public perception, as allowed by the tools and services readily
available in underground marketplaces.
It is likely that the upcoming Swedish general election will not be exempt from attempts to influence the voting
outcome through fake news. The interest will also be hot on the heels of the U.S. midterm elections, as social
media can be wielded to amplify divisive messages, as in the alleged meddling in the previous U.S. presidential
election and the “troll farm” behind a Twitter influencer.
Each time fake news gets posted and reposted, a reader encountering the same content grows familiar with it
and takes it as truth. Having the eye to distinguish fake news from not will be tough, as propagandists use old
techniques that have proved effective and reliable.
Fake news and cyberpropaganda will press on because there has been no dependable way to detect or block
manipulated content. Social media sites, most notably Google and Facebook, have already pledged a crackdown
on bogus stories propagating across feeds and groups, but it has had little impact so far. That being the case,
the final screening will still be dependent on the users themselves. But as long as users are not educated in
flagging false news, such content will continue to permeate online and be consumed by unsuspecting and
undiscerning readers.
Countries That Will Hold General, Parliamentary or Presidential Elections in 2018
SOURCES:
http://www.electionguide.org/elections/upcoming/
https://www.thelocal.se/20170911/what-you-need-to-know-about-swedens-party-leaders-2018-election
https://www.usatoday.com/story/news/politics/2017/09/07/2018-midterm-elections-senate-races-to-watch/597965001/
Africa
Cameroon
Madagascar
Mali
Mauritiana
Sierra Leone
South Sudan
Zimbabwe
Cambodia
Maldives
Pakistan
Turkmenistan
Czech Republic
Cyprus
Finland
Georgia
Italy
Montenegro
Russia
Sweden
Cuba
Mexico
United States
Paraguay
Venezuela
Asia Europe North America South America
11. THREAT ACTORS WILL RIDE ON
MACHINE LEARNING AND BLOCKCHAIN
TECHNOLOGIES TO EXPAND THEIR
EVASION TECHNIQUES.
12. Knowing what is unknown. That’s one of the key promises of machine learning, the process by which computers
are trained but not deliberately programmed. For a relatively nascent technology, machine learning shows great
potential. Already, however, it’s become apparent that machine learning may not be the be-all and end-all of
data analysis and insights identification. Machine learning lets computers learn by being fed loads of data. This
means that machine learning can only be as good and accurate as the context it gets from its sources.
Going into the future, machine learning will be a key component of security solutions. While it uncovers a lot
of potential for more accurate and targeted decision-making, it poses an important question: Can machine
learning be outwitted by malware?
We’ve found that the CERBER ransomware uses a loader that certain machine learning solutions aren’t able to
detect because of how the malware is packaged to not look malicious. This is especially problematic for software
that employs pre-execution machine learning (which analyzes files without any execution or emulation), as in
the case of the UIWIX ransomware (a WannaCry copycat), where there was no file for pre-execution machine
learning to detect and block.
Machine learning may be a powerful tool, but it is not foolproof. While researchers are already looking into the
possibilities of machine learning in monitoring traffic and identifying possible zero-day exploits, it is not far-
fetched to conjecture that cybercriminals will use the same capability to get ahead of finding the zero-days
themselves. It is also possible to deceive machine learning engines, as shown in the slight manipulation of
road signs that were recognized differently by autonomous cars. Researchers have already demonstrated how
machine learning models have blind spots that adversaries can probe for exploitation.
While machine learning definitely helps improve protection, we believe that it should not completely take over
security mechanisms. It should be considered an additional security layer incorporated into an in-depth defense
strategy, and not a silver bullet. A multilayered defense with end-to-end protection, from the gateway to the
endpoint, will be able to fight both known and unknown security threats.
Another emerging technology that is poised to reshape businesses and that we see being abused is the
blockchain. Blockchain technology has generated a lot of buzz in the context of digital cryptocurrencies and as
a form of no-fail security. Adoption of the decentralized ledger is projected to be widespread in five to 10 years.
Currently, however, many initiatives are already being built on blockchain, ranging from technology and finance
industry startups and giants to entire governments – all with the goal of revolutionizing business models.
Blockchain works by having a required consensus among the participants, which makes unauthorized changes
or deliberate tampering with the blockchain difficult to do. The more transfers there are, the more the series
becomes complex and obfuscated. This obfuscation, likewise, can be seen as an opportunity by cybercriminals
looking into enhancing their attack vectors. They have already managed to target the blockchain in the Ethereum
DAO hack, which led to over US$50 million worth of digital currency lost.
Like most promising technologies that were thought secure at one point, machine learning and blockchain
warrant close attention.
13. MANY COMPANIES WILL TAKE
DEFINITIVE ACTIONS ON THE GENERAL
DATA PROTECTION REGULATION
ONLY WHEN THE FIRST HIGH-PROFILE
LAWSUIT IS FILED.
14. The European Union (EU) will finally be rolling out GDPR in May 2018, with an expected extensive impact on data
handling of companies that engage with EU citizens’ data – even if the said companies are outside Europe. In our
research, we found that the majority of C-level executives (in 57 percent of businesses) shun the responsibility
of complying with GDPR, with some unaware of what constitutes personally identifiable information (PII) and
even unbothered by potential monetary penalties.
Laggards will fully heed the brunt of GDPR
only when the retributions are imposed by
the regulators. Data privacy watchdogs
can interfere with business operations
by altogether banning companies from
processing certain data. There is also
the possibility that lawsuits, both from
the authorities and from the citizens
themselves, will come into the picture.
The American credit reporting agency
Equifax, for instance, would have faced a
staggering fine, as some U.K. consumers
were reportedly affected too, if the
breach had happened after the GDPR
implementation had gone into effect and
it hadn’t come forward with the incident
sooner than it chose to. A considerable
penalty would have also been imposed
on the international ride-hailing company
Uber, which announced a data breach over
a year after the fact. Noncompliance with
breach notification will prompt regulators
to issue fines of up to €20 million, or up to
4 percent of the company’s global annual
turnover of the preceding financial year,
whichever is greater.
Companies waking up to the GDPR enforcement, therefore, will find the importance of having a dedicated data
protection officer (DPO) who can spearhead data processing and monitoring. DPOs are particularly needed in
enterprises and industries that handle sensitive data. Companies will be required to review their data security
strategy, including classifying the nature of data and distinguishing EU data from data associated with the rest
of the world.
Other regions will have to catch up with their data regulations by having a similar framework of wide-ranging
scope and tougher penalties for compliance failure. The U.S. Food and Drug Administration (FDA) has already
recognized several European drug regulatory authorities to improve its inspections. Australia is gearing up to
enact its own data breach notification laws based on the Privacy Amendment (Notifiable Data Breaches) Act
2017, while U.K.’s Data Protection Bill is getting updated to match EU’s laws after Brexit. Meanwhile, the EU-U.S.
Privacy Shield deal will have to prove how binding it is in spite of concerns expressed by the EU.
of businesses appear to be
dismissive of the extent
of GDPR fines.
of businesses don’t know
email marketing databases
contain PII.
of businesses have
invested in technology to
identify intruders.
GDPR Is Coming. Are You Prepared?
66%
34%
42%
SOURCE:
http://newsroom.trendmicro.com/press-release/commercial/trend-micro-research-reveals-c-level-executives-are-not-prepared-gdpr-imple
16. In today’s environment, where the Industry 4.0 makes cyber-physical systems and production processes
increasingly interconnected and software-defined, risks can stem from several areas within. The notion of having
a digital twin, a virtual replica or simulation of the real-world production or process, is enabling enterprises to
address performance issues that may arise in real physical assets. However, we believe that while it’s poised to
transform operations, the production network can be infiltrated by malicious actors aiming to manipulate the
system and cause operational disruptions and damages. By manipulating the digital twin itself, these actors
can make production processes look legitimate when they have, in fact, been modified.
In addition, production data that is directly (or indirectly) handed over via manufacturing execution systems
(MES) to SAP or other enterprise resource planning (ERP) systems is also in danger of being compromised. If
a manipulated piece of data or wrong command is sent to an ERP system, machines will be liable to sabotage
processes by carrying out erroneous decisions, such as delivery of inaccurate numbers of supplies, unintended
money transfers, and even system overloads.
Enterprise systems will not be the only ones targeted; in 2018, we expect to continue to see security flaws in
Adobe and Microsoft platforms. What’s going to be particularly interesting, though, is the renewed focus on
browser-based and server-side vulnerabilities.
For years, the vulnerabilities of well-known browser plug-ins like Adobe Flash Player, Oracle’s Java, and Microsoft
Silverlight have been targeted. We predict that in 2018, however, weaknesses in JavaScript engines will beset
the modern browsers themselves. From Google Chrome’s V8 crashing issues to Microsoft Edge’s Chakra being
open source, JavaScript-based browser vulnerabilities will make more appearances in 2018 given the wide use
of the script on the web.
Attackers will also take a renewed focus on using server-side vulnerabilities to deliver malicious payloads. We
predict that the use of Server Message Block (SMB) and Samba exploits that deliver ransomware will be more
pronounced in 2018. SMB vulnerabilities, in particular, can be exploited without any direct interaction with the
user. In fact, an SMB vulnerability was used in the EternalBlue exploit that crippled many networks running on
Windows during the WannaCry and Petya ransomware attacks, and in the more recent Bad Rabbit attacks that
exploited EternalRomance. The open-source Samba on Linux, similarly, is capable of exploiting vulnerabilities
in the SMB protocol.
Attacks against production processes through SAP and ERP mean that enterprises will need to take the security
of related applications as priority. Access to the applications will need to be managed and monitored to avoid
any unauthorized access.
Users and enterprises are advised to routinely check for software updates and apply patches once they are
available. However, as administrators can stumble over immediate deployment of updates, we recommend
integrating vulnerability shielding into systems so that platforms are protected against unpatched and zero-
day vulnerabilities. Network solutions should also secure connected devices from potential intrusions through
virtual patching and proactive monitoring of web traffic.
17. Tackling Security in 2018
Given the broad range of threats the landscape currently bears and will expect to face in 2018 – from
vulnerabilities and ransomware to spam and targeted attacks – what enterprises and users alike can best do is
to minimize the risk of compromise at all layers.
Better visibility and multilayered security defense for enterprises
To combat today’s expansive threats and be fortified against those yet to come, organizations should employ
security solutions that allow visibility across all networks and that can provide real-time detection and protection
against vulnerabilities and attacks. Any potential intrusions and compromise of assets will be avoided with a
dynamic security strategy that employs cross-generational techniques appropriate for varying threats. These
security technologies include:
• Real-time scanning. Active and automatic scans allow highly efficient malware detection and
improved machine performance.
• Web and file reputation. Malware detection and prevention through web reputation, anti-spam
techniques, and application control protect users from ransomware attacks and exploits.
• Behavioral analysis. Advanced malware and techniques that evade traditional defenses are
proactively detected and blocked.
• High-fidelity machine learning. Human inputs augmented with threat intelligence data allow rapid
detections and accurate defenses against known and unknown threats.
• Endpoint security. Security that employs sandboxing, breach detection, and endpoint sensor
capabilities detect suspicious activities and prevent attacks and lateral movement within the network.
Best practices and sustained protection for end-users
Having different devices and applications to access information is becoming second nature in today’s
increasingly connected world. Regardless of device, application, or network, users will be able to fill the security
gaps with proper configurations:
• Change default passwords. Use unique and complex passwords for smart devices, especially for
routers, to significantly reduce the possibility of attackers hacking into the devices.
• Set up devices for security. Modify devices’ default settings to keep privacy in check and implement
encryption to prevent unauthorized monitoring and use of data.
• Apply timely patches. Update the firmware to its latest version (or enable the auto-update feature if
available) to avoid unpatched vulnerabilities.
• Deflect social engineering tactics. Always be mindful of emails received and sites visited as these
can be used for spam, phishing, malware, and targeted attacks.
Enterprises and users are better positioned if protections in place are able to cover the entire threat life cycle
with multiple security layers. From the email and web gateway to the endpoint, having a connected threat
defense ensures maximum protection against the constantly evolving threats of 2018 and beyond.