View Post

The non-nuclear North Korea could be as deadly as the nuclear one

In Blog post by Sam Coleman0 Comments

With mounting evidence pointing to the hermit kingdom as a nation state cybercriminal, experts wonder which battlements Kim Jong Un is wiling to use: cyber weapons or nuclear ones? Some say the tipping of the North Korean cyber army’s hand was a slight that the temperamental Dear Leader 2.0 could not let stand. In 2016, irreverent and sacred cow slayer Seth Rogan and wingman James Franco produced the filmic stocking stuffer The Interview, a spoofing comedy where Kim Jong Un is seen as a needy, petulant dictator who’s head is ceremoniously and to comic effect blown off. Had it not been for North Korea’s covert cyber reaction, the film would have …

View Post

Of Artificial Intelligence and Machine Learning: how cybersecurity needs to know the value of each to get the best of both

In Blog post by Sam Coleman0 Comments

Recent discussions within the security community point to a need to understand this two fields to apply them affectively. The increasing drumbeat of machine learning (ML) and Artificial Intelligence (AI) as it affects cybersecurity is growing, a fact that was easily seen at the recent Black Hat 2017 gathering. Of the vendors and solutions present, on the lips of many of the presenters in a myriad of sessions, AI and ML were liberally thrown about and bandied as the future of cybersecurity. And while there’s no doubt that the two technologies will be more pervasive and disruptive to the security field, it’s also true that they’re greatly understood, even in …

View Post

Summer is here and the kids are… cybersecuring?

In Blog post by Sam Coleman0 Comments

As a growing cybersecurity talent gap emerges, governments and industry recruit tomorrow’s cyber defenders at an ever younger age. Elizabeth Lewelling is—at first glance—your typical all American kid. She’s gregarious and confident, a seasoned pro as a Girl Scout, not afraid to knock on doors to sell thin mints nor be in the wilderness to get her survival badge. But these months, she’ll be participating in an all together different activity than what most people expect Girl Scouts or any young person to be doing during the hot lemonade days of summer. She—along with 1.8 million Girl Scouts—will be shooting for the latest badge offered by the Scouts: one in …

View Post

A breach of (public) trust?

In Blog post by Sam Coleman0 Comments

Two massive political fallouts—one European, one Asian—show that the tolerance for data mishandling is zero. And when GDPR arrives, the repercussions will be financial as well. This week, the Swedish government barely managed to survive one its most serious challenges. A vote of no confidence was mounted against three ministers by the opposition that—in normal situations—would’ve triggered snap elections and the government stepping down. But instead the Social Democratic government punted and did a cabinet reshuffle with two ministers exiting their jobs and the defence minister in peril. What was the trigger? Data sloppiness. The Swedish Transport Agency had given a contract to IBM to handle its data needs into …

View Post

The USD53 billion dollar threat

In Blog post by Sam Coleman0 Comments

WannaCry’s estimate of USD8 billion was a tiny fraction of what Lloyd’s of London sees as the next cost of cyber catastrophe… one that rivals hurricane Katrina in financial damages We’re used to screaming headlines of doom as we march to an increasing digitally connected world. Passwords hacked and identities stolen, ransomware, IoT DDoS, election hacking and critical infrastructure hacks fill the media on an almost deadly basis. But sometimes it takes hitting the global pocketbook to get a sense of the magnitude of cyber complacency. For that, there are few better bellwethers than the most iconic name in risk insurance, Lloyds of London. And their latest report, issued July …

View Post

Getting a bad reputation? IP reputation is the answer

In Blog post by Sam Coleman0 Comments

As Clavister launches its new IP reputation feed, powered by Webroot®, we caught up with Chad Bacher, SVP of Product Strategy and Technology Alliances at Webroot to get his views on the new cyber realities and why keeping a healthy network starts from the outside as much as inside. DeCrypted News: You’ve mentioned that the threat from cyberthreats— for the first time in years — is decreasing. Can you elaborate on the reasons why it’s decreasing and is it temporary?  Chad Bacher: For the first time, we witnessed a minor year-over-year decrease in the volume of malware. In part, the decline can be attributed to the increased security awareness, but …

View Post

The end is just the beginning

In Blog post by Sam Coleman0 Comments

The global attack of Wannacry ransomware last week was unprecedented. But that was just the opening salvo for this ShadowBrokers cyber weapon as new variants are already worming their destructive paths into systems. How did we get here and what happens next? The toll we know of is devastating enough. Over the weekend of May 12-14, when the ransomware know known as WannaCry (with others calling it Wana, WanaCrypt etc) was awoken, 200,000 machines across 150 countries had been hit. Its chilling message of pay €300 in bitcoins or lose all data on the now encrypted machine a textbook example of how ransomware behaves, pushing the term into the global vocabulary …

View Post

The NFV revolution kicks into high gear

In Blog post by Sam Coleman0 Comments

As the benefits of SDN/NFV take the market by storm, a recent Red Hat Telco Partner Summit points to the groundwork that still needs laying, with security concerns a major aspect. What had started as a slow whispering of a compelling technology and its solutions for telecom operators has now – after the initial analysis of business impact for first tier operators – is getting commitments from most of the companies surveyed according to Red Hat market research. According to Red Hat, a leader in the DevOps, Linux and OpenStack Platform (OSP) space, tier one operators reported the following. 50% of the Communications Service Providers (CSPs) already execute a NFV …

View Post

Are we still in denial about DDoS attacks?

In Blog post by Clavister Blog Staff0 Comments

$2.5 million:  that’s the average loss of revenue experienced by an organization hit with a DDoS attack, according to the latest DDoS and Cyber Security Insights Report from Neustar.  84% of the 100)+ organisations surveyed reported that they were targeted by DDoS attacks in the past year, that the number of DDoS attacks increased 15% over the past 12 months, across all industry sectors. The report found that the proportion of attacks greater than 10 gigabits per second (Gbps) was up 11% on the previous year to 45%, and that 45% of organisations targeted by DDoS attacks said they had been hit more than five times. DDoS attacks haven’t just ramped up …

View Post

Could election season mean phishing season?

In Blog post by Clavister Blog Staff0 Comments

With the first round of the 2017 French presidential election to be held on 23 April, and the British Government recently announcing a general election for June, it’s worth re-examining one of the most controversial events in the run-up to the 2016 U.S. presidential election – the publishing by Wikileaks of several thousand emails related to Hillary Clinton’s election campaign activities.  The emails were stolen in March 2016 when the personal Gmail account of John Podesta, chairman of Hillary Clinton’s 2016 U.S. presidential campaign, was hacked following a spear-phishing attack. As we blogged previously, the impact of the breach on the election’s outcome is uncertain.  But it was certainly a damaging breach …