Cybersecurity - Tagged - Security Boulevard The Home of the Security Bloggers Network Tue, 26 Nov 2024 08:00:42 +0000 en-US hourly 1 https://wordpress.org/?v=6.7.1 https://securityboulevard.com/wp-content/uploads/2021/10/android-chrome-256x256-1-32x32.png Cybersecurity - Tagged - Security Boulevard 32 32 133346385 A CISO’s Guide to Bot Protection Effectiveness – Breaking Open the Black Box https://securityboulevard.com/2024/11/a-cisos-guide-to-bot-protection-effectiveness-breaking-open-the-black-box/ https://securityboulevard.com/2024/11/a-cisos-guide-to-bot-protection-effectiveness-breaking-open-the-black-box/#respond Tue, 26 Nov 2024 08:00:42 +0000 https://www.kasada.io/?p=14847 Learn how to validate bot protection effectiveness, mitigate business risks, and ensure your defenses align with operational and regulatory needs.

The post A CISO’s Guide to Bot Protection Effectiveness – Breaking Open the Black Box appeared first on Security Boulevard.

]]>
https://securityboulevard.com/2024/11/a-cisos-guide-to-bot-protection-effectiveness-breaking-open-the-black-box/feed/ 0 2037618
Privileged Account Security in Active Directory https://securityboulevard.com/2024/11/privileged-account-security-in-active-directory/ https://securityboulevard.com/2024/11/privileged-account-security-in-active-directory/#respond Mon, 25 Nov 2024 16:01:03 +0000 https://www.enzoic.com/?p=83724 Privileged accounts in Active Directory (AD) are the keys to your organization’s most sensitive systems, data, and administrative tools. These accounts play an essential role in managing access and keeping things running smoothly, but they also come with significant security risks if not properly managed. Why Privileged Account Security in Active Directory Matters Access to […]

The post Privileged Account Security in Active Directory appeared first on Security Boulevard.

]]>
https://securityboulevard.com/2024/11/privileged-account-security-in-active-directory/feed/ 0 2037520
Understanding Privileged Access Management (PAM): A Comprehensive Guide https://securityboulevard.com/2024/11/understanding-privileged-access-management-pam-a-comprehensive-guide/ https://securityboulevard.com/2024/11/understanding-privileged-access-management-pam-a-comprehensive-guide/#respond Mon, 25 Nov 2024 15:29:49 +0000 http://securityboulevard.com/?guid=362f818e5afc4e3d530d792f818cca44 Privileged Access Management (PAM) is crucial in today's threat landscape. This guide explores what PAM is, why it's essential for your organization, and how it safeguards against unauthorized access. Learn about best practices and key features to strengthen your security posture.

The post Understanding Privileged Access Management (PAM): A Comprehensive Guide appeared first on Security Boulevard.

]]>
https://securityboulevard.com/2024/11/understanding-privileged-access-management-pam-a-comprehensive-guide/feed/ 0 2037569
In a Growing Threat Landscape, Companies Must do Three Things to Get Serious About Cybersecurity https://securityboulevard.com/2024/11/in-a-growing-threat-landscape-companies-must-do-three-things-to-get-serious-about-cybersecurity/ Mon, 25 Nov 2024 13:44:39 +0000 https://securityboulevard.com/?p=2037503 landscape, threat, securing the SMB

Several macro-trends – such as growing digital transformation, rising hybrid work and, especially, booming AI adoption – have created an increasingly sophisticated threat landscape.

The post In a Growing Threat Landscape, Companies Must do Three Things to Get Serious About Cybersecurity appeared first on Security Boulevard.

]]>
2037503
What is CICRA Audit and Why It Matters? https://securityboulevard.com/2024/11/what-is-cicra-audit-and-why-it-matters/ https://securityboulevard.com/2024/11/what-is-cicra-audit-and-why-it-matters/#respond Mon, 25 Nov 2024 05:21:28 +0000 https://kratikal.com/blog/?p=11364 Credit Information Companies (Regulation) Act was introduced in India in 2005. It was for organizations that handle customers’ credit information to promote transparency in the credit system as well as protect sensitive data. CICRA Audit makes sure the organization follows the guidelines. The following statistics show the need for concrete guidelines for credit organizations. By […]

The post What is CICRA Audit and Why It Matters? appeared first on Kratikal Blogs.

The post What is CICRA Audit and Why It Matters? appeared first on Security Boulevard.

]]>
https://securityboulevard.com/2024/11/what-is-cicra-audit-and-why-it-matters/feed/ 0 2037504
Deepfake Fraud, Data Brokers Tracking Military Personnel https://securityboulevard.com/2024/11/deepfake-fraud-data-brokers-tracking-military-personnel/ https://securityboulevard.com/2024/11/deepfake-fraud-data-brokers-tracking-military-personnel/#respond Mon, 25 Nov 2024 05:00:33 +0000 https://sharedsecurity.net/?p=101974 In Episode 356, Tom and Kevin discuss the increasing role of deepfake technology in bypassing biometric checks, accounting for 24 percent of fraud attempts. The show covers identity fraud issues and explores the controversial practices of data brokers selling location data, including tracking US military personnel. The conversation shifts to social media platforms Twitter, Blue […]

The post Deepfake Fraud, Data Brokers Tracking Military Personnel appeared first on Shared Security Podcast.

The post Deepfake Fraud, Data Brokers Tracking Military Personnel appeared first on Security Boulevard.

]]>
https://securityboulevard.com/2024/11/deepfake-fraud-data-brokers-tracking-military-personnel/feed/ 0 2037472
The Hidden Dangers of Browser Extensions: Where Google’s MV3 Still Fall Short https://securityboulevard.com/2024/11/the-hidden-dangers-of-browser-extensions-where-googles-mv3-still-fall-short/ https://securityboulevard.com/2024/11/the-hidden-dangers-of-browser-extensions-where-googles-mv3-still-fall-short/#respond Mon, 25 Nov 2024 03:57:45 +0000 https://medium.com/p/6df84dc6c09b A recent Forbes article by Davey Winder discussed a brilliant publication by Stanford researchers Sheryl Hsu, Manda Tran and Aurore Fass. It was discovered nearly 350 million Chrome extensions installed had privacy violations, vulnerable code or contained malware. Many hoped that Google Chrome’s new Manifest V3 standard would be the solution to extension based vulnerabilities. Yet, released at Defcon32 this year, our research showed that MV3 compliant extensions can still silently add GitHub repo collaborators, mirror Zoom/Google Meet video feeds and steal user credentials/data relatively easily.

Surprisingly, many of these suspicious extensions are Chrome featured, a stamp of approval that many users, and often security teams, use as an indication of legitimacy and safety of browser extensions. While Google does its best to vet these technologies, there are over 100,000 active extensions on Chrome Store, making it impossible to keep track of all updates. On average, it takes 380 days for extensions with malware to be taken down from the Chrome Store.

Attackers exploit this fact by compromising or purchasing the rights to benign, popular extensions and turn them into malicious extensions, without users being aware of updates. One such case study is seen in the PDF Toolbox and Autoskip of YouTube malicious extensions uncovered by Palant. With 2 and 9 million downloads each, these seemingly benign extensions enter adware links into search bars against the user’s will.

This is just one way that extensions can exploit users. Five common browser extension based attacks include:

  1. Data Exfiltration

Attackers can collect rich data on user behaviour, selling them to companies and targeted ad providers. More targeted attacks can involve using extensions as spyware to read confidential information such as intellectual property, emails and other sensitive information. For companies, such data breaches can lead to expensive class action lawsuits, damage to brand reputation and loss of competitive edge for IP-sensitive companies.

2. Credential stealing

Extensions can gain access to PII such as credit card numbers and social security numbers, as well as gain access to banking and social media accounts. More advanced attackers can even silently add a collaborator to a developer’s GitHub repo, taking their code repo as hostage for ransomware. Since the White House banned most ransom payments in 2023, this poses a huge dilemma when platforms and resources critical to business are being held up by ransomware.

3. Adware & misinformation spreading

Attackers often use extensions to redirect users to ad pages or embed ads into websites without the user knowing. This not only significantly impairs the user’s productivity and experience by slowing down the browser, but may lead to subsequent infection with spyware/ransomware. A similar technique can also be used to display fake search results and spread false information.

4. Cryptojacking

One of the simplest ways to steal cryptocurrency involves injecting the attacker’s wallet address into the recipient field just as the user hits the transfer button, redirecting any currency flow to the attacker’s account. This could lead to significant personal financial loss and reputational damage for crypto exchanges.

5. Malware spreading

Through extensions, attackers can initiate malware downloads without the user’s permission. Smarter attackers can even trigger these downloads when users are on trusted sites (e.g. Zoom, Salesforce) and mask them as software updates to minimise suspicion.

This got me curious about how easy it is to purchase the rights to a Chrome featured extension. Hence, posing as an EdTech founder, I approached the authors of several translation extensions to see if they were willing to sell their extensions to me. I focused on those that had not updated their extension in at least 12 months but had at least 10,000 downloads on Chrome store. It turns out, once a price is agreed upon, all it took was for the author to hand over the credentials to their Chrome account, which would give me completely free access to the extension’s code repo.

If getting access to extensions already installed on millions of devices was indeed as simple as a price negotiation, there is a huge dissonance with the risk management of browser extensions. Speaking to over a dozen security experts, it is evident that most security teams whitelist extensions once do not have an active monitoring strategy for browser extensions. Even if they do, whitelists are reviewed on a 1–3 year basis, with no way of knowing when a benign extension becomes malicious.

In this case, how can one protect oneself against malicious browser extensions? Here are a couple of best practices:

  • Read, read, read — read reviews, especially negative ones, thoroughly. Do this even for Chrome featured and popular extensions. Index on more recent reviews.
  • Check when the extension was last updated — generally, the longer a software goes without an update, the more likely it is unmanaged and vulnerable to attacks. While there is no magic number, I generally get nervous when installing extensions with no updates in more than 3–6 months.
  • Chuck it — uninstall or disable extensions when you don’t need it. I know it is a bit of extra work, but generally the less on, the safer.
  • Have runtime control — the best way to guarantee extension safety is to use a tool that automatically disables and/or alerts you whenever an extension turns malicious, is updated or goes too long without being updated (depending on your risk appetite).


The Hidden Dangers of Browser Extensions: Where Google’s MV3 Still Fall Short was originally published in SquareX Labs on Medium, where people are continuing the conversation by highlighting and responding to this story.

The post The Hidden Dangers of Browser Extensions: Where Google’s MV3 Still Fall Short appeared first on Security Boulevard.

]]>
https://securityboulevard.com/2024/11/the-hidden-dangers-of-browser-extensions-where-googles-mv3-still-fall-short/feed/ 0 2037551
Phishing 2.0: Unmasking Modern Cyber Threats and Building Proactive Defences https://securityboulevard.com/2024/11/phishing-2-0-unmasking-modern-cyber-threats-and-building-proactive-defences/ https://securityboulevard.com/2024/11/phishing-2-0-unmasking-modern-cyber-threats-and-building-proactive-defences/#respond Mon, 25 Nov 2024 03:57:33 +0000 https://medium.com/p/8ff71c61af98 Phishing has become a cornerstone of cyberattacks in the digital era, evolving into one of the most significant challenges for organizations and individuals alike. The rise of increasingly sophisticated phishing methods has reshaped how cybersecurity teams strategize defences and respond to breaches. According to recent cybersecurity reports, phishing remains responsible for a staggering percentage of data breaches worldwide, underlining its role as an entry point for major cyber incidents. In 2023 alone, the Verizon Data Breach Investigations Report found that over 36% of data breaches were linked to phishing, solidifying its reputation as a top method leveraged by cybercriminals.

Further compounding this trend is the fact that phishing attacks are becoming more targeted and complex. According to data from APWG’s Phishing Activity Trends Report, the number of unique phishing sites detected surged by over 60% in the past two years. The game of cat and mouse that is cybersecurity is proving to be a losing game for enterprises as existing tools are unable to keep up with the evolving nature of phishing attacks.

With the lack of proper web security detection tools, organizations are often unaware of the quantum and mechanism of phishing attacks targeting their employees. In fact, it is in the attacker’s best interest to have their attack path remain undiscovered as long as possible, allowing them to exploit users for a longer time, holding more data and access hostage when a breach is finally detected. Worse, it is nearly impossible for organizations to trace back exactly how the attack happened retroactively with incumbent proxy tools, essentially allowing attackers to recycle the same attack using different identities/domains.

This article delineates the mechanics behind the 5 most common modern phishing attacks seen by both our researchers and in the wild with real organizations we work with.

  1. Trusted domain attacks

Most enterprises block known malicious or suspicious domains using Secure Web Gateways (SWGs). Thus, attackers have identified several domains that would be whitelisted in almost all organizations and redirect users to phishing sites from there. These include file sharing sites (e.g. Sharepoint, Google Drive, One Drive, Box) and GitHub.

2. Captcha walls

In addition to whitelisting/blacklisting, some SWGs can automatically block domains with certain characteristics such as young domain age. However, even with the most advanced SWGs, this URL filtering does not work when there is a captcha, allowing attackers to hide phishing sites behind captchas.

3. URL masking & shortening

Many attackers leverage URL shortening services like Bitly and Twitter’s t.co, making it difficult for employees to tell if the link is malicious from the URL itself. For similar reasons to the Sharepoint based attacks, existing security tools cannot block these URLs as it will lead to many false positives from legitimate links.

4. GenAI spearphishing

One telltale sign that many employees relied on to identify phishing messages/ emails is the persistence of typos and odd grammatical errors. However, with GenAI tools at their disposal, attackers can now write high quality, highly targeted messages at a scale that is never seen before. A recent study from HBR showed that the cost of phishing attacks has now been slashed by 95%, and are seeing comparable success rates (60%) to phishing emails written by trained experts.

5. Browser in the Browser (BiTB) Attacks

This sophisticated phishing technique involves attackers creating a fake browser window within the actual browser to simulate legitimate third-party authentication pop-ups, such as those used for “Sign in with Google” or “Sign in with Facebook.” This deceptive overlay looks authentic and can trick users into entering their login credentials, giving attackers access to sensitive information. The fake window is indistinguishable from a real one at first glance, making it particularly effective and dangerous as users are led to believe they are interacting with a trusted source.

As phishing attacks continue to evolve in quantum and complexity, it is imperative for organizations to shift from having a reactive to a proactive defence strategy. In order to do so, security tools must also evolve to provide deep insight into exactly how users are being attacked, creating mechanism based policies instead of domain based policies that engage in a perpetual chase of finding and blocking phishing sites as they are discovered post-breach.


Phishing 2.0: Unmasking Modern Cyber Threats and Building Proactive Defences was originally published in SquareX Labs on Medium, where people are continuing the conversation by highlighting and responding to this story.

The post Phishing 2.0: Unmasking Modern Cyber Threats and Building Proactive Defences appeared first on Security Boulevard.

]]>
https://securityboulevard.com/2024/11/phishing-2-0-unmasking-modern-cyber-threats-and-building-proactive-defences/feed/ 0 2037553
Silent Hacks, Deadly Nights: Protect Yourself from Holiday Cyber Threats https://securityboulevard.com/2024/11/silent-hacks-deadly-nights-protect-yourself-from-holiday-cyber-threats/ https://securityboulevard.com/2024/11/silent-hacks-deadly-nights-protect-yourself-from-holiday-cyber-threats/#respond Mon, 25 Nov 2024 03:57:17 +0000 https://medium.com/p/a8cf6abefded The holiday season is coming up. As the world begins to wind down and celebrate, the holidays are a golden opportunity for cybercriminals. As online shopping surges and people become distracted by festivities, hackers exploit vulnerabilities to launch cyberattacks. Here are the five most common cybersecurity attacks to watch out for during the holidays, along with some little hacks to protect yourself against them.

  1. Holiday-themed Phishing Scams

Have you received an email from a retailer with an offer that seems “too good to be true”? Adversaries often mimic trusted retailers, shipping companies and charities, luring in victims with limited time Black Friday/Christmas “deals” or urgent messages about undelivered packages.

A recent study by F5 labs showed that phishing increased by 150% between October and November. Attackers exploit the ironic combination of a relaxed holiday spirit and mad rush for Christmas shopping to trick users into revealing their credentials. One best practice is to hover over links before clicking on them, but as discussed in my article last week, attackers often use URL shorteners, making it difficult to tell if a site is malicious from the URL alone. Thus, it is important to use tools that can automatically block phishing sites for you, including advanced ones that cannot be detected through network requests alone.

2. Fake E-commerce Websites

Fraudulent websites often pop up during the holidays, offering massive discounts on popular products and/or offering free next day deliveries. These fake e-commerce sites are designed to either steal your payment information or send counterfeit goods, if they deliver anything at all.

With the proliferation of global commerce and startups, it can sometimes be hard to tell which of these new sites are legitimate. In addition to sticking to well known-retailers and avoiding deals that seem suspiciously cheap, there are some simple checks you can do to catch less sophisticated e-commerce scams. These include double checking URLs for misspellings/typosquatting and unusual domain extensions, checking the domain age, as well as looking at public forums for user reviews.

3. Malware via Holiday-themed Apps or Downloads

During the holidays, many people download festive apps, screensavers, or digital greeting cards. Some of these downloads, however, may come bundled with malware designed to spy on your activity, steal sensitive data, or lock your files for ransom. A seemingly harmless holiday-themed game might secretly install keylogging software on your device, capturing your passwords as you type them.

To avoid falling prey to such attacks, a simple best practice is to download apps and browser extensions only from trusted stores. Even with this precaution, there may still be many malicious apps/extensions that are not flagged by the official store (see my previous article on malicious Chrome featured extensions here). Thus, the best way to protect yourself is to have a browser native solution that can inspect and detect malicious extensions and downloads live.

4. Gift Card Scams

Gift cards are a popular holiday gift, and scammers take full advantage of their popularity. Scams can involve fake gift card websites, tampered gift cards in stores, or phishing emails pretending to offer free gift cards. A scammer might send an email claiming you’ve won a gift card, asking you to enter personal information to claim it. Another common tactic involves messages or social media posts containing a QR code that brings you to a fake login site.

Similarly, the best way to avoid this is to only purchase gift cards from trusted retailers, as well as have a browser native tool to help you detect any evasive sites mimicking login pages of legitimate retailers. QR codes are more challenging to handle as attackers know that most of our personal phones, which we will most likely be scanning these QR codes from, are completely unprotected. Thus, it is important that your browser security solution can also automatically check and block malicious QR codes from being scanned on your device.

5. Account Takeovers

Attackers often use the credentials they have harvested over the year or exploit weak or reused passwords, especially as people rush to create accounts for holiday shopping, to make unauthorized purchases during the holiday season. This is because it is especially difficult for banks and credit card providers to identify anomalous transactions during the months leading up to Christmas, as people frequently purchase gifts from multiple sites they may not regularly place orders from.

The best way to prevent this is to use a unique, strong password in every new site, perhaps using a password manager to help you keep track of everything. However, if you are like me and don’t trust yourself to be disciplined, a tool like SquareX can be that forcing function that prevents you from re-using passwords by blocking logins to sites that share the same password.

The holiday season is a time of joy and celebration, so don’t let cybercriminals ruin them for you. Now that you know about common holiday attacks, I hope that with the right precautions and tools in place, you can focus on the festivities and make lasting memories with your loved ones. Stay vigilant, stay secure, and have a happy holiday season! :)


Silent Hacks, Deadly Nights: Protect Yourself from Holiday Cyber Threats was originally published in SquareX Labs on Medium, where people are continuing the conversation by highlighting and responding to this story.

The post Silent Hacks, Deadly Nights: Protect Yourself from Holiday Cyber Threats appeared first on Security Boulevard.

]]>
https://securityboulevard.com/2024/11/silent-hacks-deadly-nights-protect-yourself-from-holiday-cyber-threats/feed/ 0 2037555
Is Cyber Threat Intelligence Worthless? https://securityboulevard.com/2024/11/is-cyber-threat-intelligence-worthless/ https://securityboulevard.com/2024/11/is-cyber-threat-intelligence-worthless/#respond Sat, 23 Nov 2024 00:07:00 +0000 http://securityboulevard.com/?guid=ee3390ceceaf1c5a4d1b6f93a1d17450  

I was recently asked “What do intelligence reports
do?  They appear worthless!


I found the question both funny and ironic.  Unfortunately, I had to gently deliver some uncomfortable
news.

 

There is a fundamental difference between intelligence
and the ability to apply it effectively to make better decisions.  Intelligence is the distillation and
organization of data that is analyzed and assessed to draw meaningful
conclusions.  These insights often
highlight risks and opportunities, serving as a foundation for better
decisions.

 

However, intelligence alone doesn’t guarantee action or
success.  It takes someone with knowledge
and experience to interpret these insights within a specific context, align
them with goals, and uncover actionable strategies to address potential risks or
opportunities. This process enables smarter decisions and often provides a
competitive edge advantage.

 

Simply put: “Intelligence is useless without the wisdom
to meaningfully apply it.

 

In this case, the person dismissing threat intelligence as “worthless
failed to understand how to use it. Intelligence reports don’t necessarily dictate
actions—they empower decision-makers with the information they need to act. The
value lies not in the report itself, but in the expertise to leverage it.

The post Is Cyber Threat Intelligence Worthless? appeared first on Security Boulevard.

]]>
https://securityboulevard.com/2024/11/is-cyber-threat-intelligence-worthless/feed/ 0 2037420