Normal view

There are new articles available, click to refresh the page.
Today — 26 June 2024Main stream

Understanding and Mitigating Jump Server Security Risks

25 June 2024 at 22:47

Many organizations today use a jump server (also known as jump box or jump host) as the intermediary device to access a remote network securely. It is the go-to solution for remote administration of servers and devices and for development and testing environments. It is also commonly used to control vendor access to an organization’s internal systems and to meet compliance in certain industries.

While this is definitely a step up in security from using VPNs, jump server can sometimes create a false sense of security because there still exists security risks and loopholes.

In this blog post, we will first explore the security benefits and risks of a jump server. Finally, we will unveil strategies to mitigate those security risks. 

TABLE OF CONTENTS

Top 5 Security Benefits of a Jump Server

Top 5 Security Risks of a Jump Server

How to Mitigate Jump Server Security Risks Using Best Practices

Mamori Adds Two Additional Layers of Security to Your Jump Host

Top 5 Security Benefits of a Jump Server

1. Central Access Point for Easy Management

When access is centralized, it is easy monitor and manage who access their network, ensuring all access to protected networks are authorized. Centralized access also simplifies managing permissions and security policies. while also making it easier to monitor and log activities.

2. Easy Monitoring and Session Management

With centralized access, monitoring traffic and logging activities are simplified. Jump servers also allow session recording, session timeout, and the ability terminate sessions to enhance control and security.

3. Reduce Attack Surface from external threats

Jump servers should be isolated from the internet and shouldn’t be able to browse the intranet. This reduces the attack surface and adds a layer of defense against external threats.

4. Reduced Exposure

By limiting direct access to critical systems and databases, jump servers minimize the risk of unauthorized access from any unauthorized sources.

5. Simplifying Audit and Compliance

User activity and traffic passing through the controlled central access point can be logged and recorded, which helps meet regulatory.

Top 5 Security Risks of Jump Server

1. Single Point of Failure

A compromised jump server can jeopardize the entire network. Also, a compromised user account, a privileged user, or an infected device can jeopardize the entire system and database the jump server protects.

2. Setup Complications

A simple jump server contains a Windows Server with RDP and user accounts from Active Directory. Additional setup and tools can be used to create more secure policies. In some cases, coding and debugging is required, which makes it difficult to add additional security policies.

3. Misconfigured Architecture and Database Security

A misconfigured architecture can completely bypass the jump server and access privileged resources, as indicated in the image below with the non-privileged resource. If the non-privileged resource is compromised, then the privileged resource can be accessed, bypassing the jump server. Because privileged resources are usually databases, many mistakenly think that jump server protects the database. Although jump servers do protect database access (in a way), it is NOT database security, as you’ll see later in this article.

Above: Workstation can circumvent access to privileged resources when the security architecture is misconfigured. Image source: Improsec.

4. Outdated Software and Credentials Management

Running outdated software on the jump server is known to expose the jump server to vulnerabilities. Default and weak passwords should be changed, and strong authentication policies should be enforced.

5. Insider Threats and Incident Response

Disgruntled or malicious employees who have access can cause data loss and data breaches. Although all traffic can be monitored, jump servers by default lack the ability immediately respond to insiders who are mass downloading or deleting data.

How to Mitigate Jump Server Security Risks Using Best Practices

Simply put, the easiest and simplest way to mitigate jump server security risks is to implement security best practices on your jump server. However, that is easily said than done.

Here at Mamori.io, we make it extremely easy to implement jump server security best practices (including ransomware prevention and cybersecurity best practices).

Below lists the jump server security best practices and how they mitigate the security risks mentioned earlier.

1. Implement Two-Factor Authentication (2FA)

2FA adds another layer of security even when your password is compromised, or if you’re using default password.

Security Risk Mitigated: Credentials Management, Database Security

Mamori’s Approach: Mamori.io uses a zero-trust approach that assumes your password has already been compromised. Every access is secured by MFA, from accessing the network using Zero Trust Network Access (ZTNA) to accessing the database using our Database Privileged User Access (DB PAM) via SSO. Even certain operations within the database, such as mass deleting data, can be authorized to certain individuals and secured using 2FA.

2. Regular Updates and Patch

Regularly patching and updating the software and operating system on the jump server is the quickest and easiest way to close security gaps against known vulnerabilities and exploits.

Security Risk Mitigated: Outdated Software

Mamori’s Approach: Even if an external threat uses a known vulnerability to compromise your jump server, your critical resources and database can still be protected by database privileged access controls secured by 2FA.

3. Enforce Role-Based Access

Only grant access to those who need access. Enforce role-based access so users have the minimal necessary permissions (least-privileged access). This limits the number of potential attack vectors and reduces insider threats.

Security Risk Mitigated: Setup Complications, Misconfigured Architecture and Database Security, Insider Threats

Mamori’s Approach: Mamori provides Privileged Access Management (PAM) to limit jump server access to only those who need access. Once the user connects to the database or privileged resource, Mamori provides Database Privileged Access Management (DB PAM) to limit the user’s access to resource, his visibility (eg. data masking) and the types of operations (eg. read, write, delete, etc.) the user can perform onto those resources.

4. Ensure Comprehensive Logging and Monitoring

Comprehensive logging and monitoring allow for the detection of suspicious activities and help with IT audits and compliance. Logging and monitoring also facilitates forensic analysis post-incident, enhancing the overall security posture.

Security Risk Mitigated: Insider Threats, Incident Response

Mamori’s Approach: At Mamori, we believe logging and monitoring is NOT comprehensive if users are able to share accounts. That is why we use a zero-trust approach, where the user, device, location, (and more) needs to be authenticated for access and for certain database operations. Thus, when each session is monitored, logged, and recorded, we ensure that each session can easily be traced back and be used as forensics or incident response.

5. Enforce Strong Password Policies

Strong password policies, such as password complexity, regular changes, and restricting reuse, make it harder for attackers to guess or crack passwords. This strengthens the first line of defense against unauthorized access.

Security Risk Mitigated: Credentials Management and weak passwords

Mamori’s Approach: We encourage the use of strong password policies, but we emphasize on Two Factor Authentication (2FA). That’s because we use a zero-trust approach, where we assume every password is already compromised or will be compromised one day.

6. Segmenting the Network

Jump servers should only have access to select servers. One practice is to isolate the jump server from other parts of the network, which limits the potential damage of the jump server is compromised. Segmenting a network prevents attacks from moving laterally across the network to access other critical systems.

Security Risk Mitigated: Setup Complications, Misconfigured Architecture

Mamori’s Approach: Mamori uses Zero Trust Network Access (ZTNA) to microsegment a network. The microsegmented network can then be used for the jump server to ensure an isolated, secure environment.

Mamori Adds Two Additional Layers of Security to Your Jump Host

Layer 1: Securing Access to the Jump Server

Mamori ensures that only the right user with the right permission has access to the jump server using the following modules and features:

Zero Trust Network Access (ZTNA) – Before a user gets connects to the network, the user’s device and identity is verified using 2FA. Other security policies, such as access restrictions by IP address, can also be enforced.

Privileged Access Management (PAM) – Once a user connects onto the network, policies set forth in the PAM module will restrict or allow that user’s access to the jump server.

Layer 2: Securing Access from the Jump Server to Your Databases

After a person connects onto a jump server, the following Mamori modules and features ensure that the person can only view, access, and perform operations that is needed to do his job:

Database Privileged Access Management (DB PAM) – Once a user connects onto a database via a jump server, DB PAM will determine what resources the user has access to and what database operations the user can execute.

SQL Firewall – DB PAM can create rules and privileges on what SQL commands a user can run. You can choose to block all SQL commands or allow specific types of SQL commands.

Data Privacy Policies – You can easily create policies such as data masking policies, who has access to which tables, rows, or columns, and how users can work with those data.

Bonus Layer: Controlling Uploads and Downloads from Jump Server

By default, jump servers do not allow you to control uploads and downloads to and from the jump server. When someone needs to upload or download, admins might choose to share passwords, or create a new account with excess privileges that is to be a forgotten account – both of which introduce considerable security risks.

With Mamori’s PAM features, you can set permissions that allow what user(s) is able to upload, download, or do both from the jump server. Permission include having the user request access on-demand, limit access by IP address, or setting a time frame where the user account is granted access. This is another form of securing access that improves both security and workflow efficiency.

Deploy Both Layers Using a Simple Dashboard with No Coding Required

Unlike the configuring a jump server, using Mamori requires no coding. We offer a simple dashboard and user interface that even the most non-technical users can create security policies that can mitigate the security risks of your jump server.


Request a demo

Conclusion

By understanding the benefits and addressing the risks associated with jump servers, you can enhance the security of your network while maintaining efficient, controlled, and secure access to critical systems. If you have further questions or need assistance in securing your jump server, feel free to reach out for a detailed consultation.

Schedule a demo with Mamori.io or request your free trial. If you’re a small business with fewer than 20 users, you can use Mamori.io for free.

The post Understanding and Mitigating Jump Server Security Risks appeared first on Security Boulevard.

Efficiency is Key to Cybersecurity in the Post-Cloud Era

By: NSFOCUS
25 June 2024 at 20:38

SANTA CLARA, Calif., June 26, 2024 — At the 16th Information Security Forum and 2024 RSAC Hot Topics Seminar held on June 7, 2024, Richard Zhao, Chief Operating Officer of International Business at NSFOCUS, presented the new picture of cybersecurity in the post-cloud era with his professional insights. Key Highlights Richard’s speech focused on three […]

The post Efficiency is Key to Cybersecurity in the Post-Cloud Era appeared first on NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyber attacks..

The post Efficiency is Key to Cybersecurity in the Post-Cloud Era appeared first on Security Boulevard.

Proxies as a Service: How to Identify Proxy Providers via Bots as a Service

25 June 2024 at 14:08

See how DataDome learns about proxy networks from bots as a service, how BaaS can be detected, and what kind of IP addresses are behind BaaS.

The post Proxies as a Service: How to Identify Proxy Providers via Bots as a Service appeared first on Security Boulevard.

Yesterday — 25 June 2024Main stream

USENIX Security ’23 – Catch You and I Can: Revealing Source Voiceprint Against Voice Conversion

25 June 2024 at 15:00

Authors/Presenters:Jiangyi Deng, Yanjiao Chen, Yinan Zhong, Qianhao Miao, Xueluan Gong, Wenyuan Xu

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access.
Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.

Permalink

The post USENIX Security ’23 – Catch You and I Can: Revealing Source Voiceprint Against Voice Conversion appeared first on Security Boulevard.

SonarQube 10.6 Release Announcement

25 June 2024 at 13:00

The 10.6 release of SonarQube includes some significant changes, such as autoscaling in Kubernetes, auto-configuration for C and C++ projects, support for running in a FIPS-enforced environment, set rule priority to uphold your coding standards, easy setup of monorepos, monitoring the time it takes to upgrade, and expanded library coverage for AI/ML developers.

The post SonarQube 10.6 Release Announcement appeared first on Security Boulevard.

Use This 100-Year-Old Productivity Method to Get More Done

25 June 2024 at 13:00

When you want to be more productive, you should look to someone who has productivity down pat. Financial blogs are forever interviewing contemporary CEOs about their work habits, but those aren’t that inspirational; they’re always claiming that meditation and not answering emails are the keys to success, which isn’t really helpful to the average person who doesn’t have the time or resources to meditate or the luxury of an assistant to open the unanswered emails. For real inspo, you might want to try looking back in time: Ivy Lee, the founder of modern public relations, came up with a productivity method so good that it’s lived on for 100 years—and it still bears his name. Here’s how to try it.

What is the Ivy Lee method?

My dream in life is to do something so unique and awesome that my name gets attached to it for all eternity but my more short-term goals involve just getting my basic tasks done every day. Good old Ivy Lee somehow managed to do both. He came up with his productivity method in an effort to help big businesses in the 1920s get more done. It’s all about creating manageable, prioritized to-do lists and sticking with them until they’re complete. 

How do you use the Ivy Lee method?

The method itself is simple. At the end of every work day, write down six tasks you have to complete tomorrow. (If it’s Friday, write down what you need to do Monday. Don’t forget that taking breaks over the weekend is important for productivity, too.) Do not write down more than six. The goal here is for the list to be manageable, not never-ending, so use your immediate judgement to determine which six things are most important for the next day. Next, prioritize them. You can do this however you see fit, but consider using a method like the Eisenhower Matrix to figure out which tasks are the timeliest and most urgent. 

Hand-writing the to-do list is beneficial. You can do this in a digital note or doc, but writing by hand really sticks it in your brain, so you might consider using an old-fashioned planner, like this one:

The next day, it’s time to start on the list. Begin with the first task in the morning and see it all the way through before jumping to the second one. Keep going until the end of the workday, tapping into your capacity for doing deep work by focusing on just one task or project at a time. When your day is over, anything that is incomplete should be moved to tomorrow’s list and new tasks should be added to it until you reach six. 

By rolling the tasks over, you ensure they’ll get done, but by being aware that you have the option to roll them over at all, you won’t feel overwhelmed. Do try to keep the tasks as granular as possible, though. Instead of writing “end-of-quarter report” as one list item, break it down. If pulling and analyzing the data is a step to writing the report, make it one task. If inputting it into a presentation is another, that’s one task, too. 

As mentioned, you can do this in a planner, a digital note, or even your calendar, but the most important elements are maintaining that low number of tasks, prioritizing them, and not abandoning them if they are unfinished. Be sure to prioritize whatever you roll over to the next day above any new tasks, so everything gets done. 

Airbnb’s Ban on Indoor Security Cameras: What It Means for Your Personal Cybersecurity

By: Leigh Dow
25 June 2024 at 11:48

Effective April 30, 2024 Airbnb, the global vacation rental giant, announced a significant policy change: the prohibition of all indoor security cameras in its listings worldwide. This decision, aims to bolster the privacy of guests and address longstanding concerns about hidden cameras. While the majority of Airbnb’s over 7 million listings did not report having […]

The post Airbnb’s Ban on Indoor Security Cameras: What It Means for Your Personal Cybersecurity appeared first on BlackCloak | Protect Your Digital Life™.

The post Airbnb’s Ban on Indoor Security Cameras: What It Means for Your Personal Cybersecurity appeared first on Security Boulevard.

USENIX Security ’23 – Ethical Frameworks and Computer Security Trolley Problems: Foundations for Conversations

25 June 2024 at 11:00

Distinguished Paper Award Winner

Authors/Presenters:Tadayoshi Kohno, Yasemin Acar, Wulf Loh

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access.
Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.

Permalink

The post USENIX Security ’23 – Ethical Frameworks and Computer Security Trolley Problems: Foundations for Conversations appeared first on Security Boulevard.

Our CTO joins AMTSO Board

25 June 2024 at 10:09

Stefan Dumitrascu Brings Expertise to AMTSO Board We are delighted to announce that our Chief Technology Officer, Stefan Dumitrascu, has been elected as a Board Member of the Anti-Malware Testing Standards Organisation (AMTSO). What is AMTSO? AMTSO is an international non-profit association dedicated to improving the objectivity, quality, and relevance of anti-malware testing methodologies worldwide. […]

The post Our CTO joins AMTSO Board appeared first on SE Labs Blog.

The post Our CTO joins AMTSO Board appeared first on Security Boulevard.

Top 6 Compliance Reporting Tools in 2024

25 June 2024 at 07:15

What is a Compliance Report? A compliance report describes how successfully or poorly a company complies with security and business-related regulations. It is distributed to various audiences, including the board, senior executives, regulators, business partners, third-party vendors, etc. Whatever compliance requirements a company may already have, a good rule of thumb is to ensure the […]

The post Top 6 Compliance Reporting Tools in 2024 appeared first on Centraleyes.

The post Top 6 Compliance Reporting Tools in 2024 appeared first on Security Boulevard.

Addressing Node.js Vulnerabilities in Ubuntu

25 June 2024 at 05:00

Node.js is an open-source, cross-platform JavaScript runtime environment built on the powerful V8 engine from Chrome. It allows you to run JavaScript code outside a web browser, making it popular for building real-time applications and data streaming services. However, like any software, it is not immune to security vulnerabilities. Recently, multiple vulnerabilities were discovered in […]

The post Addressing Node.js Vulnerabilities in Ubuntu appeared first on TuxCare.

The post Addressing Node.js Vulnerabilities in Ubuntu appeared first on Security Boulevard.

What is Cyberbullying: Parents Guide

25 June 2024 at 04:19

Our guide provides essential insights on cyberbullying, helping parents recognize signs and take steps to protect their children's online.

The post What is Cyberbullying: Parents Guide appeared first on SternX Technology.

The post What is Cyberbullying: Parents Guide appeared first on Security Boulevard.

TuxCare Extended Lifecycle Support Services Now Offered through Virtuozzo

25 June 2024 at 04:00

PALO ALTO, Calif. – June 25, 2024 – TuxCare, the enterprise solutions division of CloudLinux and a global innovator in cybersecurity for Linux, today announced that Virtuozzo, the alternative cloud platform leader, now offers TuxCare’s CentOS 7 Extended Lifecycle Support (ELS).    Virtuozzo solutions enable virtualization and cloud for service providers and enterprises. For customers […]

The post TuxCare Extended Lifecycle Support Services Now Offered through Virtuozzo appeared first on TuxCare.

The post TuxCare Extended Lifecycle Support Services Now Offered through Virtuozzo appeared first on Security Boulevard.

Alert: Australian Non-Profit Accuses Google Privacy Sandbox

25 June 2024 at 03:00

Google’s initiative to phase out third-party tracking cookies through its Google Privacy Sandbox has encountered criticism from Austrian privacy advocacy group noyb (none of your business). The non-profit alleges that Google’s proposed solution still facilitates user tracking, albeit in a different form. Allegations of Misleading Practices   According to noyb, Google’s Privacy Sandbox, marketed as […]

The post Alert: Australian Non-Profit Accuses Google Privacy Sandbox appeared first on TuxCare.

The post Alert: Australian Non-Profit Accuses Google Privacy Sandbox appeared first on Security Boulevard.

Securing the Journey to AI with Thales Sovereign Solutions for AWS

Securing the Journey to AI with Thales Sovereign Solutions for AWS
josh.pearson@t…
Mon, 06/24/2024 - 22:28

Securing GenAI Workloads on AWS with Sovereign Solutions
David OrtegaDavid Ortega | Principle Solution Architect
More About This Author >

Amazon Web Services (AWS) is the world's largest cloud service provider. Unsurprisingly, they are committed to providing tools, solutions, and best practices that allow their customers to leverage Generative Artificial Intelligence (GenAI) workloads on AWS securely. Organizations are rapidly employing GenAI to bring increased productivity and creativity to businesses. In nearly all uses of GenAI, the AI models require access to data and that data can be nonpublic and private to the organization. Private and nonpublic data can include trade secrets, personal identifying information, and compliance data.

Thales and AWS have a strong partnership of working together to provide sovereign solutions for AWS customers. In 2022, Thales and AWS jointly unveiled external key management as a Hold Your Own Key (HYOK) strategy in AWS. AWS and Thales continue to jointly engineer and develop enhanced data protection capabilities, focusing on advanced encryption solutions and secure key management to support organizations working to secure their hybrid enterprises.

What Are GenAI Security Challenges?

GenAI is now being rapidly deployed across many verticals along a widely diverse set of use cases. Organizations, large and small, across many industries are looking to gain benefits from GenAI. A partial list of already identified benefits include:

  • Improving customer experiences (chatbots and virtual assistants)
  • Boosting employee productivity (employee assistants)
  • Enhancing creativity & content creation (marketing)
  • Accelerating process optimization (document processing)
  • Transforming industries from responsive to proactive (healthcare)

A majority of GenAI options are powered by Large Language Models (LLMs) that are pre-trained with source input data to perform desired tasks such as content generation and code generation.

The AI lifecycle typically encompasses three phases:

  1. Sourcing (data and model)
  2. Training
  3. Inference

Each phase of the AI lifecycle is a potential exposure point for threat actors to engage in cyberattacks. Two methods to limit data exposure and mitigate the risk to cyberattacks for organizations training LLMs in GenAI include:

  • Limiting the source data that will be used to train the AI models. Close monitoring is needed when dealing with nonpublic (organizational confidential) data sets.
  • Ensuring that data is only used in an authorized manner and as needed.

Before organizations expose nonpublic data to an AI model, they should verify the sensitivity of the data that the GenAI can access is verified. Tools such as Thales Data Discovery and Classification ensure that only properly classified and identified data is available to the AI model and are integral to ensuring that sensitive data is not exposed to or being queried by the AI model.

Each year Thales co-authors the Global Data Threat Report, where over 3,000 security professionals and executives around the world share their security concerns. In the 2023 study, a major concern highlighted was about data leakage regarding AI creating code, regulatory compliance, data privacy, and lack of control. The report found that 68% of the respondents expressed concerns that rapid changes in AI are challenging existing organizational plans.

The chart below summarizes additional organizational concerns about data leakage, privacy concerns, and lack of control over the rapid implementation of AI.

Securing GenAI Workloads on AWS with Sovereign Solutions

How is AWS Securing GenAI?

Amazon Q, Bedrock, and SageMaker are a few of the primary AWS offerings that allow AWS customers to quickly develop GenAI solutions, including the AWS AI–powered assistant. Amazon Q is aimed primarily at supporting business use cases and offers solutions that allow organizations the opportunity to integrate and leverage their internal data. Whether that data includes commercial intellectual property, trade secrets, supplier, or customer nonpublic data, organizations must understand how to limit the sensitive data visible to Amazon Q. It is imperative that precautions are taken to ensure no unauthorized apps, processes, or individuals, such as bots or threat actors, can access the nonpublic data.

AWS employs the Nitro System and Nitro Enclaves as their computing backbone, with unparalleled security and performance. AWS has announced extended support for Nitro Systems that will be optimized for GenAI and AI workloads, notably GPU intensive processes. AWS Nitro Enclaves offer an integrated solution with AWS Key Management System (KMS) that enables AWS customers to manage and encrypt sensitive data using encryption keys that the organization owns and controls. The ownership of the keys is managed using the Thales CipherTrust Manager which provides Enterprise Key Management and enables digital sovereignty for AWS customers. In a recent blog, AWS outlined their approach to securing data used for Generative AI.

How does AWS Nitro Enclaves Integrate with Key Management?

AWS has developed the Nitro System to fulfill the principles of Secure AI Infrastructure. The first principle isolates your AI data from AWS operators, ensuring its security. The second principle allows you to remove administrative access, enhancing control over your AI data. With Nitro Enclaves and AWS KMS, you can encrypt your sensitive AI data using your keys, store it securely, and transfer it to an isolated compute environment for inferencing. Throughout the process, your data remains encrypted and isolated from your users, software, and AWS operators.

How Can Thales Secure Generative AI Workloads on AWS?

AWS KMS External Key Store (XKS) is integrated with the Thales CipherTrust Cloud Key Management (CCKM) solution so that organizations can keep their encryption keys outside of AWS KMS. This approach is also called Hold Your Own Key (HYOK), which provides sovereign controls. When deploying GenAI solutions, AWS customers can manage the encryption of their nonpublic data using AWS XKS with Thales CCKM.

The XKS collaboration between Thales and AWS has led to the development of services that help organizations maintain control over their encryption keys and manage access to sensitive data securely. These technologies enable organizations to address challenges related to cloud migration, digital sovereignty, and the secure handling of sensitive information across various cloud platforms. Understanding when and how to employ AWS external key management with Thales is a crucial use case for organizations developing in-house AI capabilities and maintaining data security and compliance across different regulatory environments.

How Do Thales and AWS Ensure Sovereign Controls?

Developed with Thales since its inception, the AWS XKS combined with CCKM offers organizations looking to use critical workloads in AI a way to maintain sovereign control of sensitive data throughout their AI journey. Thales enables external key management and is an integral part of a digital sovereignty strategy for organizations that leverage AWS XKS to enhance data security.

How to Leverage External Key Management

By leveraging the Thales external key manager with AWS XKS to manage cryptographic keys securely, organizations have complete confidence that data encryption keys are handled and stored securely, can be backed up and managed external to the Cloud Provider, and use of policy prevents unauthorized access to encrypted data. By managing keys external to the Cloud Provider KMS, organizations can selectively apply encryption based on organizational policy and enterprise key lifecycle management. This organizational enterprise external key management allows organizations to isolate data protection, including the option to store the encryption keys external to the Cloud Provider. This isolation is a key risk mitigation strategy. Using Thales for external key management in AWS supported platforms, organizations who may be concerned about data loss or leakage can disable access to the cryptographic keys, providing an additional layer of security and assurance. With the wrapping keys being inaccessible, organizations ensure that encrypted data remains encrypted even if other online defenses are compromised.

How To Comply with Auditing and Monitoring Requirements

Thales external key manager implements robust auditing and monitoring capabilities. Monitoring is crucial for detecting unauthorized access or anomalies in data usage, which is often an early or first indicator of a security breach or detection of anomalous behavior. Thales CipherTrust Manager provides audit logging that enables organizations to track how and when data is accessed and by whom.

As a cybersecurity aligned solution, Thales increases the protection of organizational data that is an essential foundational building block to AI research and models. Thales and AWS work together to provide a robust framework for securing sensitive data used by AI systems, ensuring compliance with data protection regulations, and maintaining the integrity and confidentiality of the data.

How To Protect Hybrid Workloads

For organizations looking to secure their confidential data, whether on-prem, in a cloud provider or in the hybrid enterprise, Thales offers CipherTrust Transparent Encryption (CTE). CTE facilitates Bring Your Own Encryption (BYOE) for organizations by maintaining nonpublic data in an encrypted state until the time of use by an authorized service or entity. The Thales transparent data encryption solution automatically encrypts and decrypts data as it is read and written to storage, operating invisibly to applications and business processes. Thales CTE enables organizations to protect their data without altering existing workflows.

Cybersecurity best practices dictate that organizations employ enterprise key lifecycle management including issuing, rotating, and backing up the encryption keys used to protect nonpublic data. The Thales CTE solution along with CipherTrust Manager allows organizations to own, instantiate, and use their keys, which they manage and store independently, crucial for maintaining control in BYOE scenarios. Thales transparent encryption provides granular access controls, enhancing security by ensuring data cannot be decrypted without appropriate permissions. The Thales BYOE solution provides comprehensive auditing capabilities that support regulatory compliance by monitoring encrypted data access and key usage. With support for various environments, including cloud, hybrid, and on-premises, Thales CTE ensures organizations can apply BYOE consistently across all supported platforms and locations.

How to Audit the Authorization for the AI Service to Access Nonpublic Data

Managing how the GenAI can access nonpublic data is essential. Organizations need to ensure only authorized processes can access and monitor the processes that are accessing or attempting to access the nonpublic data. A best practice and risk mitigation approach is to use dynamic credential rotation to ensure human or machine credentials cannot be obtained and improperly used. Advantages to organizations using dynamic credential rotation include:

  • Enhanced Security: By frequently changing credentials, dynamic rotation minimizes the damage if an attacker manages to steal a credential, making stolen credentials less valuable to attackers.
  • Reduced Attack Surface: Dynamic credentials limit the window of vulnerability. Since they are only valid for a brief time, there is less chance of them being exposed through leaks or misconfiguration.
  • Automated Management: Dynamic credential rotation can be automated, eliminating the need for manual intervention and reducing the risk of human error.
  • Improved Auditing and Compliance: Because dynamic credentials are generated on demand, easy tracking of who has accessed, can be helpful for auditing purposes, and can also help organizations meet compliance requirements.
  • Scalability: Dynamic credential management systems manage a large set of credentials with complex rule sets more efficiently than manual systems. This makes them a viable choice for organizations with complex IT environments.

Thales CipherTrust Secrets Management provides a solution to support automated dynamic credential management. Employing just-in-time or dynamic credential rotation can significantly improve an organization's security posture and improve the overall security of an AI initiative by making it more difficult for attackers to exploit stolen credentials. It also results in improved audit results to ensure only authorized services are accessing nonpublic data.

Do Not Let Security Concerns Stop Your AI Transformation

We understand that GenAI is important to our customers. Where security and compliance are concerned, Thales and AWS are here for your journey. Thales has over 50 corporate AI related initiatives and we follow a secure AI development methodology to ensure we are benefiting from AI without jeopardizing data integrity or privacy.

Thales encryption and key management solutions are used to protect organizational data as the organization commences on internal AI development efforts. Thales offers a wide range of security solutions. The broad range of Thales security solutions include those offered by Imperva that enables enterprises protect their applications and APIs anywhere at scale.

Thales data security solutions provide granular protection of applications and credentials -- protecting both human and machine identities, and data at rest, in use, and in motion.

Learn More About Sovereign Controls with Thales and AWS

Schema
studio
Thales BLOG

Securing the Journey to AI with Thales Sovereign Solutions for AWS

JUNE 20, 2024

The post Securing the Journey to AI with Thales Sovereign Solutions for AWS appeared first on Security Boulevard.

What’s New in PCI DSS Version 4.1?

25 June 2024 at 01:43

In today’s business landscape, adhering to the Payment Card Industry Data Security Standard (PCI DSS) is essential. As a business owner, have you ever considered how secure your client’s credit card information is? In the modern digital age, safeguarding sensitive data is crucial. Protecting your clients’ card information not only maintains their trust in your […]

The post What’s New in PCI DSS Version 4.1? appeared first on Kratikal Blogs.

The post What’s New in PCI DSS Version 4.1? appeared first on Security Boulevard.

The volunteer scheme taking first-timers to Glastonbury 2024: ‘We’re reaching people who wouldn’t get to go’

24 June 2024 at 06:59

For financial or cultural reasons there are many who may never get the chance to enjoy the magic of Glastonbury. But now, a volunteer scheme is aiming to change that by offering places to refugees and others

Glastonbury Festival means many different things to the 210,000 people who turn up in Pilton, Somerset, for five days at the end of June. There’s the Pyramid stage lot, hyped to secure their front-of-crowd spot for the headline acts; and the ravers who shake off the stresses of regular life on the dancefloor up in Block9. There’s the blissed-out crowd watching the sunrise from the Stone Circle; the culture vultures making a beeline to hear talks from artists and other great thinkers; or those who crave peace and healing who head straight to the Green Fields.

It’s the immense size and scope of this creative wonderland that makes it one of the country’s most loved events – and why the £355 tickets always sell out in record time. However, this year, a group of festival first-timers will get to take in the wonder and spectacle of Glastonbury as volunteers and have their expenses covered.

Continue reading...

💾

© Composite: Getty

💾

© Composite: Getty

‘It’s my 18th consecutive Glastonbury – and this year we’re doing it as a three generation family’

17 June 2024 at 09:15

Jill Ratoff, from West Sussex, has attended every Glastonbury Festival since 2002 – and this year, three generations aged from one to 60 will be joining in the fun

“At 60 years old, 2024 will see me attending my 18th Glastonbury. It’s hard to put into words how important the festival has become to me and my family, because we’ve gathered so many incredible memories from our experiences on Worthy Farm.

“The first time I went was back in 2002, along with my brother and his family, who lived locally, my then-husband and our daughter Abigail, who was three. I wasn’t too sure about it at first – things like using the infamous ‘long-drop’ loos take some getting used to – but on my last night, I remember looking back across the campsite at the twinkling lights and realising that I absolutely had to go back.

Continue reading...

💾

© Composite: Jill Ratof

💾

© Composite: Jill Ratof

‘Like winning a golden ticket’: how Glastonbury’s traders thrive off of good vibes

17 June 2024 at 09:14

We spoke to two of the traders heading to Glastonbury 2024 about their behind-the-scenes prep, what they’re most looking forward to, and why, when it comes to speedy payments, Vodafone’s onsite connectivity is king …

A five-day event spread over more than 360 hectares at Worthy Farm in Somerset, the Glastonbury Festival takes a full year of planning, with about 3,000 staff and volunteers working behind the scenes to help make the festival a bucket-list event for 200,000 or more revellers.

Among the staff are almost 800 vendors selling everything from food and drink to upcycled clothing, handmade jewellery and art. Whether they’re busy building up stock and testing new products or making sure the payment network at the festival won’t let them down, these vendors spend weeks planning their crucial contribution to the Glastonbury experience.

Continue reading...

💾

© Composite: Jamie Lai

💾

© Composite: Jamie Lai

Back to the Future: What AppSec Can Learn From 30 Years of IT Security

By: Lior Arzi
24 June 2024 at 15:50

History doesn’t repeat itself, but it often rhymes. As AppSec evolves towards a new playbook, here’s what we can learn from IT’s journey. Just over 20 years ago, Watts Humphrey declared that every business was a software business. Not everyone agreed. No one would image that, sports shoe manufacturers, automakers and even barbecue brands are […]

The post Back to the Future: What AppSec Can Learn From 30 Years of IT Security appeared first on OX Security.

The post Back to the Future: What AppSec Can Learn From 30 Years of IT Security appeared first on Security Boulevard.

What is AI TRiSM? And Why Is It Important?

24 June 2024 at 14:39

According to Gartner, who coined the term, AI TRiSM (AI Trust, Risk and Security Management) ensures an AI model’s governance, trustworthiness, fairness, reliability, robustness, efficacy, and data protection. This includes solutions and techniques for model interpretability and explainability, AI data protection, and attack resistance.  “Organizations that do not consistently manage AI risks are exponentially more […]

The post What is AI TRiSM? And Why Is It Important? appeared first on Centraleyes.

The post What is AI TRiSM? And Why Is It Important? appeared first on Security Boulevard.

Before yesterdayMain stream

Prioritize Your To-Do List By Imagining Rocks in a Jar

24 June 2024 at 14:30

Sometimes, it's not the tasks on your to-do list that overwhelm you, but simply the act of sorting them out and figuring out where to start. Before you can prioritize your responsibilities and setting out a schedule for getting everything done (using strategies like "eating the frog" or creating a 1-3-5 to-do list), you have to identify what those big tasks are and what capacity you have to take them on. If you are the type of person that finds it helpful to visualize these things, I like to refer to a pair of strategies that both involve imagining tasks as rocks: The "pickle jar theory" and the "big rocks theory."

What is the pickle jar theory?

The pickle jar theory is an excellent mental exercise for anyone who thinks or processes things visually. It was conceptualized by Jeremy Wright in 2002, based on the idea that a pickle jar holds a finite amount of content. So, too, does your day. There is only so much you can do in a day, as there is only so much you can stuff into a pickle jar. 

When thinking of your day as a pickle jar, imagine it full of three things: Rocks, pebbles, and sand. These represent your daily responsibilities, but as you can see, they’re different sizes. You can fit more of the smaller stuff, like sand and pebbles, than you can rocks, but rocks can still take up half the jar. 

How does the pickle jar theory work?

To use this kind of thinking, you need to categorize your day’s tasks. Start by writing them all down, then prioritizing them using the Eisenhower Matrix, which is useful for figuring out which tasks are urgent and important, urgent and not important, not urgent but important, and not urgent and not important. 

Then, assign each task to a rock, pebble, or sand, like this: 

  • Rocks are the big tasks that are important, necessary to get on right away, and/or will take up a major chunk of time. Studying for a test, finalizing a major project at work, or cleaning the house can be rock-sized tasks, for instance. 

  • Pebbles are the things that are important to do, but not immediately necessary or massively time-consuming. You can fit quite a few of them in the jar, depending on how many rocks you have in there. 

  • Sand represents the small things that you need to do to keep your day moving along or just want to do. It enters the jar last and fills up the gaps between the bigger items. Sand can be anything from answering emails, going to meetings, calling your mom, or relaxing. These aren’t necessarily urgent or time-consuming, but they’re still important to your work or mental wellbeing. 

Visualize yourself putting one to three rocks in the jar, three to five pebbles, and as much sand as can fit. Understanding that not every single thing you need to do can always fit in there, you can make decisions about which rocks, pebbles, and sand pieces to hold over for the next day’s jar. 

This works because it gives you a tangible example of your own capacity, but also reminds you that even when your day is full of “rocks” and “pebbles,” you still have room for “sand.” Don’t forget to let some of the sand be enjoyable, because breaks are integral to productivity. Don’t over-stuff your jar with rocks and pebbles to the point that you have no room for sand at all, and don’t forget that other people have their own jars that might not be as full. Consider delegating some “pebble” tasks to a teammate, whether it’s a coworker or your spouse, or eliminating the unnecessary tasks altogether. (On your Eisenhower Matrix, these will be the ones that are neither urgent nor important.)

What is the big rocks theory?

There is a simplified version of the idea above that can work for you, too, if you don't want to categorize your tasks into rocks, pebbles, and sand, but want something a little more streamlined.

You might be familiar with the concept of "big rocks" if you've read Stephen Covey's popular book, The Seven Habits of Highly Effective People. Essentially, as with the pickle-jar mindset, you should think of your time, energy, and resources like a big container and the things you need to do as rocks or gravel. You can't fit very many big rocks in there, but you can fit a few and still have room for the smaller tasks. The big ones take away from the space—your resources and time—so you have to be intentional about how many you really try to fit in.

Visualizing is important, but you still have to use that to make a plan and get things done. First, write down everything you need to do on one page, whether in a digital word processor or a physical notebook. Then, consider how much time, energy, and other resources each thing will take and mark it as either a rock or gravel. Unlike other task prioritization methods, like the Eisenhower matrix mentioned above, this can be pretty loose. Just put down your best guess about how much each task will drain you. (When you're short on time, opt for this big rocks approach over the pickle jar approach because of its relative simplicity.)

Once you have everything designated as a rock or gravel, schedule the rocks first. Here's where you can use timeboxing to clearly carve out dedicated time for each thing you have to do. Keep in mind that if you schedule and work on gravel activities—emails, phone calls, doing the dishes, whatever—without taking on the big rocks first, you'll never get around to the big rocks; the smaller tasks are usually pretty endless, so you need to prioritize the big ones. Go back to your visualization: If you put all the gravel into your vessel before the big rocks, you'd fill it up and leave no room, but if you put in the big rocks first, then add the gravel, the gravel will fall between the rocks and settle in where it can.

Identifying the resource-heavy, demanding tasks and prioritizing those ahead of the more menial stuff will allow you to actually make time to tackle it so you can fit the rest in where you can. But be a little judicious with that scheduling: Don't load a full day of big rocks into your schedule. You'll burn yourself out. Instead, choose only one or two per day, then allocate the rest of your time to those maintenance tasks.

StealC & Vidar Malware Campaign Identified

24 June 2024 at 15:08

Weekly Threat Intelligence Report

Date: June 24, 2024

Prepared by: David Brunsdon, Threat Intelligence - Security Engineer, HYAS

Malware developers will use all sorts of techniques to obfuscate their C2 location and keep security analysts from being able to understand the operation of their malware. One common technique is to have the malware communicate with a popular online service, such as Pastebin, where the malware will contact a URL that responds with the IP address of the C2 server. This type of design keeps the C2 address out of the malware, and allows the C2 operator to change or remove the C2 destination as needed. If the right service is chosen, then this request might go unnoticed because it’s seen as regular traffic.

We detonated a malware sample on Windows 7 that was identified as containing both StealC and Vidar, and we found the same technique being used on the gaming platform, Steam. In this case, the malware requests the page of a specific user account. The steam user account name contains the IP address of a component of the C2 infrastructure. Steam even shows a history of the username, so we can see previous IPs that have existed in this field.

Steam is an interesting choice as a vector for retrieving a C2 destination because it’s a gaming platform that isn’t typically used on corporate infrastructure, except perhaps in gaming companies. It is commonly used in residential communications however. A more traditional choice would be a service that is typically seen within an organization's network traffic, like a Microsoft service.

Although a direct relationship has not been confirmed, Vidar is a stealer known to be used by Scattered Spider, aka UNC3944. They are a criminal organization responsible for many high profile victims, including MGM Grand, Caesars, Snowflake, LastPass, Apple, Walmart, and Zendesk. Recently the head of the organization was arrested by the FBI, but their operations continue

Learn more about the
HYAS Insight threat intelligence solution.

Malware Sample Information

MD5: 8cfe70cf4f35c7f9b4ddba327d44c1f8
https://tria.ge/240617-fvryqazelj/behavioral1
https://steamcommunity.com/profiles/76561199699680841

(Image: Malicious usage of a Steam profile that contains the C2 location)

65.109.240.138 (Currently offline)

ISP:Hetzner Online GmbH
Country: Finland
ASN: AS24940

65.109.243.78 (Currently offline)

ISP:Hetzner Online GmbH
Country: Finland
ASN: AS24940

95.216.142.162

ISP:Hetzner Online GmbH
Country: Finland
ASN: AS24940

With this address we can see there is a single port open, 443, which has a banner that contains a recent date/time stamp. We can attempt to pivot off of this potentially unique banner using free accounts with Shodan or Censys.

With Censys we can take that banner in hex (to avoid problems with formatting) and create a custom search query to look for matches on that ASN.

Censys Query:
(services.banner_hex="485454502f312e3120333032204d6f7665642054656d706f726172696c790d0a5365727665723a206e67696e780d0a446174653a20203c52454441435445443e0d0a436f6e74656e742d547970653a20746578742f68746d6c0d0a436f6e74656e742d4c656e6774683a203133380d0a436f6e6e656374696f6e3a206b6565702d616c6976650d0a4c6f636174696f6e3a2068747470733a2f2f676f6f676c652e636f6d0d0a") and autonomous_system.name=`HETZNER-AS`

Link to the above search.

From our search, we end up with a list of sixteen IP addresses on this ASN that present the same service banner and are mostly-if-not-entirely Vidar C2.

Vidar C2 IOCs:
95.216.165.53
116.203.13.231
195.201.47.189
116.203.166.11
116.203.167.34
116.203.4.20
49.13.32.109
162.55.53.18
195.201.248.182
95.216.142.162
95.216.182.224
78.47.205.62
116.203.13.42
116.203.13.51
195.201.46.4

That same malware also contacted Telegram which is using a similar technique to host a different address.

https://t.me/memve4erin
https://tria.ge/240617-fvryqazelj/behavioral2

162.55.53.18:9000
ISP:Hetzner Online GmbH
ASN:AS24940
Country: Germany

5.42.67.8
ISP: LetHost LLC
Location: Russia
ASN: AS210352

In our detonation, after Telegram was contacted, another IP was contacted, which may have come from a prior entry in the Telegram field (unconfirmed, no historical record for this field). HYAS Insight, our threat intelligence solution, was able to provide some recent information about C2 usage on this server. This login screen is for Risepro malware, however, so it’s possible that multiple actors or campaigns are using this same server. It’s not uncommon for a malicious server to be used in such a way.

Date: 2024/06/15 19:48:21 UTC (Most recent data)
C2 Admin URL: http://5.42.67.8:8081/
Actor IP: 109.95.78.5
Geo: 55.434553 36.696945
Device User Agent: Mozilla/5.0 (Linux; Android 14; 23021RAA2Y Build/UKQ1.230917.001; wv) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/125.0.6422.165 Mobile Safari/537.36

 

(Image: Login screen of Risepro C2 hosted on server)

 

(Image: Actor who logged into C2 server’s GPS location, southwest of Moscow)

Want to see some malware detonated? View our
webinar on-demand.

Want more threat intel on a weekly basis?
Follow HYAS on LinkedIn
Follow HYAS on X

Read past reports:
Tracking an Active Remcos Malware Campaign

Revealing LOTL Techniques Used by An Active Remcos Malware Campaign

Agent Tesla Unmasked: Revealing Interrelated Cyber Campaigns

Risepro Malware Campaign On the Rise

 

Sign up for the free HYAS Insight Intel Feed

 

Learn More About HYAS Insight

An efficient and expedient investigation is the best way to protect your enterprise. HYAS Insight provides threat and fraud response teams with unparalleled visibility into everything you need to know about the attack.This includes the origin, current infrastructure being used and any infrastructure.

Read how the HYAS Threat Intelligence team uncovered and mitigated a Russian-based cyber attack targeting financial organizations worldwide.

 

More from HYAS Labs

Polymorphic Malware Is No Longer Theoretical: BlackMamba PoC.

Polymporphic, Intelligent and Fully Autonomous Malware: EyeSpy PoC.

Five Proven Techniques to Optimize Threat Intelligence

Leveraging ASNs and Pivoting to Uncover Malware Campaigns

Disclaimer: This Threat Intelligence Report is provided “as is” and for informational purposes only. HYAS disclaims all warranties, express or implied, regarding the report’s completeness, accuracy, or reliability. You are solely responsible for exercising your own due diligence when accessing and using this Report's information. The analyses expressed in this Report reflect our current understanding of available information based on our independent research using the HYAS Insight platform. The Report’s inclusion of any companies, organizations, or ASNs does not imply any wrongdoing on their part; it is simply an indication of where digital threat activities have been observed. HYAS reserves the right to update the Report as additional information is made known to us.

The post StealC & Vidar Malware Campaign Identified appeared first on Security Boulevard.

Securing AI-Native Platforms: A Comprehensive Approach with SecureFLO

By: service
24 June 2024 at 15:07

Securing AI-Native Platforms: A Comprehensive Approach with SecureFLO Securing AI-Native Platforms: A Comprehensive Approach with SecureFLO In the rapidly evolving landscape of artificial intelligence, ensuring robust cybersecurity measures is more critical than ever. AI-native platforms, which leverage advanced machine learning and data analytics, are at the forefront of technological innovation. However, they also face unique […]

The post Securing AI-Native Platforms: A Comprehensive Approach with SecureFLO appeared first on Cyber security services provider, data privacy consultant | Secureflo.

The post Securing AI-Native Platforms: A Comprehensive Approach with SecureFLO appeared first on Security Boulevard.

USENIX Security ’23 – A Two-Decade Retrospective Analysis of a University’s Vulnerability to Attacks Exploiting Reused Passwords

24 June 2024 at 15:00

Distinguished Paper Award Winner

Authors/Presenters: Alexandra Nisenoff, Maximilian Golla, Miranda Wei, Juliette Hainline, Hayley Szymanek, Annika Braun, Annika Hildebrandt, Blair Christensen, David Langenberg

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access.
Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.

Permalink

The post USENIX Security ’23 – A Two-Decade Retrospective Analysis of a University’s Vulnerability to Attacks Exploiting Reused Passwords appeared first on Security Boulevard.

Passkeys: The Future of Passwordless Authentication

Say goodbye to passwords! Passkeys are the next generation of authentication, offering enhanced security and convenience. Learn how passkeys work, their benefits over passwords, and why they are the future of secure online access.

The post Passkeys: The Future of Passwordless Authentication appeared first on Security Boulevard.

USENIX Security ’23 – No More Reviewer #2: Subverting Automatic Paper-Reviewer Assignment Using Adversarial Learning

24 June 2024 at 11:00

Authors/Presenters:Thorsten Eisenhofer, Erwin Quiring, Jonas Möller, Doreen Riepel, Thorsten Holz, Konrad Rieck

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access.
Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.

Permalink

The post USENIX Security ’23 – No More Reviewer #2: Subverting Automatic Paper-Reviewer Assignment Using Adversarial Learning appeared first on Security Boulevard.

CMMC Tools for Compliance + Assessment

Achieving CMMC compliance can feel like a daunting task, but there are tools available to help expedite the process, saving time and money. The tools explored here help address the 110 security controls outlined in NIST SP 800-171, which is the basis for CMMC Level 2. Below are 5 categories of tools to explore, alongside […]

The post CMMC Tools for Compliance + Assessment appeared first on PreVeil.

The post CMMC Tools for Compliance + Assessment appeared first on Security Boulevard.

Make a Better To-Do List With the 1-3-5 Method

24 June 2024 at 12:00

No matter what kind of productivity goals you have and which techniques you plan to use to get it all done, you still probably start with a to-do list. Learning to formulate a solid to-do list is the key first step to being productive, since you need it to move on to other planning stages, like using the Eisenhower matrix to prioritize tasks or Kanban to organize them. Try using the 1-3-5 rule for a while and see how this to-do list system works for you. 

What is the 1-3-5 rule of productiity?

The 1-3-5 rule acknowledges that in a typical day, you just don’t have time to do it all. What you do reasonably have time for is one major task, three medium-sized tasks, and five little ones. 

These can be related or they can be separate. For instance, a big task might be going to your tax appointment, which is unrelated to your three mid-sized tasks: grocery shopping, preparing for a meeting at work, and picking up a gift for a friend’s birthday. Small tasks can be anything from answering emails to laying out your clothes for the week, depending on what you consider large, medium, and small. 

Conversely, the rule can also apply to major tasks and involve batching them into smaller groups. Say you’re planning a vacation. The 1-3-5 rule can help you break up everything you need to do. The big task can be booking flights and hotel accommodations. Three medium tasks might be getting tickets to whatever you’ll be doing while you’re at the destination, shopping for what you’ll need, and securing a pet sitter. Little tasks can be anything from setting an OOO to emailing your travel partners the itinerary. 

How to use the 1-3-5 rule to be productive

Start each day by making a to-do list, then go through and pull out anything especially timely. (Here’s where a knowledge of that Eisenhower matrix, which helps you prioritize responsibilities by urgency and importance, is going to be useful.) From that group, identify one big task, three medium ones, and five little ones. That’s your to-do list for the day. Acknowledging upfront that you can’t and won’t get it all done in a single day helps you stay focused on what you can and will do, rather than stressing about the remainder that you’re saving for tomorrow. It's helpful to see everything written out or represented visually, so try using a physical planner, like this one:

Next, block out time in your calendar for each task, whether you do it in that planner or on a digital calendar. Use timeboxing, or the technique of giving every single thing you need to do in a day a designated time on your calendar, and consider giving yourself just a smidge less time than you think you need for everything, to defeat Parkinson’s law, which is the idea that you’ll waste time if you give yourself too long to do anything. Once you’ve laid out your day, start with that big task. Known as “eating the frog,” the big-task-first approach will give you a sense of accomplishment on completion, propelling you forward into those mid- and smaller-sized tasks. Plus, it stands to reason that the major responsibility will take the most time and resources, so knocking it out first ensures you have the time and resources to give it. 

Finally, be flexible. Unexpected assignments or duties crop up all the time and may not be easily categorized into the 1-3-5 boxes. You may also not finish one of your tasks for the day. The goal here isn’t to beat yourself up or be super strict. Rather, it’s to help you feel less overwhelmed by the sheer volume of things you need to do, prioritize them, and get a good amount done every day. If something doesn’t get taken care of, make sure to stick it back on the list the next day and keep going. 

Millions and Millions of Fraud Domains: China attacks Illegal Gambling and Telecom Fraud

24 June 2024 at 11:10

Last week I was reviewing a publication by the United Nation Office on Drugs and Crime published in January 2024, titled "Casinos, Money Laundering, Underground Banking, and Transnational Organized Crime in East and Southeast Asia: A Hidden and Accelerating Threat."

(URL to the UNODC report: UNODC: Casinos, Money Laundering, Underground Banking ... full report)

(URL to the USIP report: https://www.usip.org/node/160386 )


The reason I was looking into the report is that this 106 page report is about how Chinese organized crime has planted themselves in Casino complexes across Cambodia, Indonesia, Lao PDR, the Philippine, Thailand, and Viet Nam. The same modus operandi that we associate with the crypto investment scams that use the horrible name "pig butchering" to describe the financial grooming that leads to the complete financial devastation of so many Americans. In fact, I discovered the UN report, only by seeing it quoted in he report by the United States Institute of Peace, "Transnational Crime in Southeast Asia: A Growing Threat to Global Peace and Security" where it was mentioned in a footnote.

Examining Chinese Ministry of Public Security reports

The UNODC report shares statistics from a Ministry of Public Security of China note, without providing a URL, that "between January to November 2023, authorities in the country successfully resolved 391,000 cases related to telecommunications and network fraud, totaling the arrest of 79,000 suspects, including 263 'backbone members or paymasters' of cyberfraud groups" (in the countries mentioned above.) This included:

  • interception of 2.75 BILLION fraud calls
  • interception of 2.28 BILLION fraud messages
  • the removal of 8.36 million fraud-related domain names
  • and 328.8 billion yuan (US $46 billion) in funds related to fraud cases.

Since I am working on a project that we call "Twenty Targets for Takedown" that is attempting to shut own illicit websites by terminating their domain registrations and hosting arrangements, the number "8.36 million fraud-related domains" made me shudder.
I am fortunate to count among my network some of the leading experts in domain-name related fraud and abuse, the number seemed overwhelmingly high, and I asked my colleagues from CAUCE, the Coalition Against Unsolicited Commercial Email, for assistance in looking into it. One quick opinion was that this could include a definition of domain name that would be more akin to a hostname, similar to what we have on Blogspot. "garwarner.blogspot.com" is a hostname on the domain "blogspot.com" ... but some would call it a "fully qualified domain name" and consider it a separate FQDN than other xyz.blogspot.com or abc.blogspot.com "domains."

John Levine helped me solve the "did they really mean millions, or is this possibly a bad translation" by helping me find the Ministry of Public Security site where the article was coming from and share several updated versions of these statistics.



18 Million Websites! 

The latest article we can find, dated 31MAY2024, quotes Li Guozhong ( 李国中 ) the Spokesman for China's Ministry of Pubic Security describing their successes over the past five years.  In 2021, they established a National Anti-Fraud Center which sent out 660 million notices and were able to help stop fraud against 18.44 million people. This most recent article, which is focused on fraud and doesn't mention gambling at all, says that they have "handled 18 million domain names and websites."  That's a machine translation of ( 处置涉案域名网址1800万个 ).  I can confirm the 18 million ... written as 1800 ten thousands - 1800万个.  Handled is perhaps better rendered "disposed of" 处置  (Chǔzhì).  Still unsure how to interpret 域名 ( Yùmíng - Domain name) 网址 (Wǎngzhǐ - website), but I think for now, I'm going to assume it means "URLs" or "FQDNs" as opposed to only registered domains 

The Anti-Fraud Center has intercepted 6.99 billion fraud calls and 6.84 billion text messages and intercepted 1.1 trillion yuan of funds. At current exchange rates, that would be around $151 Billion US Dollars!   

Just since July 2023, 49,000 cyber fraud suspects have been transferred to China from northern Myanmar. 82,000 criminal suspect have been arrested, including 426 key "financial backers" behind the fraud groups.  


Several maps help to demonstrate what's going on in Southeast Asia: 
(Source: Figure 1 from the afore-mentioned USIP report) 

Source: afore-mentioned UNODC report -- note the Myanmar/China border, which is where most of the Chinese rescues and raids have been conducted.


How Much Fraud? $64 Billion to $157 Billion per year!


The US Institute of Peace report estimates that there are as many as 500,000 scammers deployed in the region, earning potentially $64 Billion per year in fraud. The methodology they used for this calculation came from the UNODC report above. On p. 55 of that report, the UN said that they estimated each scammer was earning between $300 and 400 per day, and that they believed there were 80,000 to 100,000 scammers working six days per week in one unnamed Mekong country.  Using that estimate, they gave a "range" of $7.5 Billion to $12.5 billion in scam revenue for that country.  These numbers were calculated consistently with a Chinese MPS report about an initiative they called "Operation Chain Break" which estimated that scam compounds, including gambling and cyber scams, were generating $157 Billion per year. 

China's Ministry of Public Security is actively conducting military style raids to help recover these fraud suspects from northern Myanmar, where China shares a long border with the country, which remains deeply embroiled in a state of civil war. MPS is also working collectively with other Southeast Asian countries and says it has "destroyed 37 overseas fraud dens." 

China Launches Month of National Anti-Fraud Action

Today (24JUN2024) China launched a new month-long "National Anti-Fraud Action" with a nation-wide campaign that declares "Beware of new fraud methods and don't be a tool for telecom fraud."  The campaign uses what China calls a "Five-In" approach, meaning that Chinese citizens will see and spread anti-fraud messages in Communities, Rural Areas, Families, Schools, and Businesses.  Students will be provided materials to share with their families, Employees will be encouraged to share anti-fraud messages and materials with their families and communities, and Chinese Communist Party offices in rural areas and civic organizations will make sure the message is spread in those areas as well. The materials being prepared will be written separately to address the awareness needs of merchants, accounting personnel, minors, and the elderly, describing each fraud typology and helping to describe methods to safeguard from these typologies. A major objective will also be to help understand how to avoid becoming a "tool" or an "accomplice" of these fraud rings, who prey on the financially vulnerable to help them launder the proceeds of their crime.  The Ministry of Public Security will jointly publish the "Overseas Telecom Network Fraud Prevention Handbook with the Ministry of Foreign Affairs and the Ministry of Education to help improve prevention awareness especially for overseas students and diaspora Chinese communities. Major news media and new media platforms will continuously feature anti-fraud reports to strengthen and educate the public on fraud prevention and "continue to set off a new wave of anti-fraud among the whole people the whole society." 

Gee, doesn't that sound like REACT's Erin West and Operation Shamrock -- but with the full cooperation of the Government and Society? 


The announcement of the month of National Anti-Fraud Action concludes with some more recent statistics about the work of the National Anti-Fraud Center.  Just since 2023, today's report says that they have: 
  • pushed out 420 million warning and dissuasion instructions
  • met with 14.77 million people face-to-face to give warnings 
  • made 310 million phone calls to warn vitims 
  • sent 230 million dissuasion text messages
  • intercepted 3.7 billion fraud calls 
  • intercepted 2.96 billion fraud-related text messages
  • blocked 11.619 million fraud-related domain names -- BLOCKED - this may mean "prevented access via Chinese Internet -- which may mean the sites are still available to victimize foreigners
  • intercepted 452.9 billion yuan of funds ($62 Billion USD) 
What does this mean to those of us in the United States?  If China is doing an all-hands "Five-In" awareness campaign and deploying police for face-to-face dissuasion, the fraudsters may very realistically need to INCREASE their targeting of overseas victims to make up for the projected revenue hit this new effort may create. 

To quote Director Easterly at CISA: SHIELDS UP! 

The post Millions and Millions of Fraud Domains: China attacks Illegal Gambling and Telecom Fraud appeared first on Security Boulevard.

How to renew SSL certificates & how to automate the process

24 June 2024 at 10:17

SSL/TLS certificates secure data exchange between servers and browsers, essential for online transactions. Periodic renewal is necessary to avoid service disruptions; automation is recommended.

The post How to renew SSL certificates & how to automate the process appeared first on Security Boulevard.

Real-time Ubuntu 24.04 LTS is Available

24 June 2024 at 05:00

Canonical, the company behind Ubuntu, released real-time Ubuntu 24.04 LTS on May 30, 2024. This latest offering from Canonical promises to revolutionize real-time computing by delivering an enhanced, low-latency, and deterministic operating system tailored to meet the stringent demands of modern, time-sensitive applications.   What is Real-time Ubuntu?   Real-time Ubuntu is a variant of […]

The post Real-time Ubuntu 24.04 LTS is Available appeared first on TuxCare.

The post Real-time Ubuntu 24.04 LTS is Available appeared first on Security Boulevard.

Intrusion Detection in Linux: Protecting Your System from Threats

24 June 2024 at 04:00

Safeguarding your Linux environment from potential threats is more critical than ever. Whether you’re managing a small server or an extensive network, having hands-on knowledge of intrusion detection systems (IDS) is essential. IDS tools play a vital role in maintaining the security and integrity of your system. This guide will walk you through the practical […]

The post Intrusion Detection in Linux: Protecting Your System from Threats appeared first on TuxCare.

The post Intrusion Detection in Linux: Protecting Your System from Threats appeared first on Security Boulevard.

Google Pixel Firmware Zero-Day Flaw Exploited And Patched

24 June 2024 at 03:00

Google has recently issued a warning regarding a critical security flaw affecting Google Pixel Firmware, which has been actively exploited as a zero-day vulnerability. Identified as CVE-2024-32896, this high-severity issue involves an elevation of privilege, potentially allowing attackers to gain unauthorized access on affected devices. Nature of the Memory-Related Vulnerability   The zero-day exploit in […]

The post Google Pixel Firmware Zero-Day Flaw Exploited And Patched appeared first on TuxCare.

The post Google Pixel Firmware Zero-Day Flaw Exploited And Patched appeared first on Security Boulevard.

❌
❌