❌

Normal view

There are new articles available, click to refresh the page.
Yesterday β€” 4 May 2024Main stream

Airsoft Data Breach Exposes Data of 75,000 Players – Source: securityboulevard.com

airsoft-data-breach-exposes-data-of-75,000-players-–-source:-securityboulevard.com

Source: securityboulevard.com – Author: Nathan Eddy Failure to properly configure authentication led to malicious actors exploiting the database backups of Airsoftc3.com, a popular Airsoft enthusiast community site, according to Cybernews researchers, who discovered the breach in December. The breach exposed sensitive user data, affecting approximately 75,000 individuals within the community involved with Airsoft, a team-based […]

La entrada Airsoft Data Breach Exposes Data of 75,000 Players – Source: securityboulevard.com se publicΓ³ primero en CISO2CISO.COM & CYBER SECURITY GROUP.

Before yesterdayMain stream

GitLab β€˜Perfect 10’ Bug Gets a CISA Warning: PATCH NOW

3 May 2024 at 13:05
Extreme closeup of β€œTEN” on US$10 note

Password reset FAILURE: The U.S. Cybersecurity and Infrastructure Security Agency warns GitLab users of a 100-day-old, maximum severity vulnerability.

The post GitLab β€˜Perfect 10’ Bug Gets a CISA Warning: PATCH NOW appeared first on Security Boulevard.

Cybersecurity Insights with Contrast CISO David Lindner | 5/3/24

Insight #1

Here we go again: Verizon’s new Data Breach Investigations Report (DBIR) is out, and once again,Β  unauthorized uses of web application credentials and exploits of vulnerabilities in web applications are among the top three on the breach list. It’s the same, lame story every single year. At what point will the industry figure out that Application Security (AppSec) status quo methods β€” Static Application Security Testing (SAST), Dynamic Application Security Testing (DAST), web application firewall (WAFs), etc. β€” aren't working? Why not give something new β€” like Runtime Security β€” a chance?

The post Cybersecurity Insights with Contrast CISO David Lindner | 5/3/24 appeared first on Security Boulevard.

Tackling Data Security Challenges in Hybrid and Cloud Banking Environments

2 May 2024 at 10:42

Financial institutions are among the most regulated businesses in the world. That’s understandable given their role in a key critical infrastructure sector and rising threat levels across the industry. It’s why in the EU, the Digital Operational Resilience Act (DORA) will soon take effect, to improve baseline security efforts in the sector. Yet even as investment in cybersecurity increases, breaches continue to occur. The IMF warned recently that cyber-incidents over the past 20 years have cost the sector $12bn.

The post Tackling Data Security Challenges in Hybrid and Cloud Banking Environments appeared first on Security Boulevard.

Lawsuits After Ransomware on the Rise, Comparitech Says

1 May 2024 at 15:24
ransomware lawsuits court

Ransomware attacks are an expensive proposition for any company. For example, a report this week by cybersecurity firm Sophos found that while the percentage of companies that were victims of ransomware this year has dropped slightly, the recovery costs – which don’t include a ransom payment – have jumped to $2.73 million, a 50% increase..

The post Lawsuits After Ransomware on the Rise, Comparitech Says appeared first on Security Boulevard.

Data Breaches in April 2024 – Infographic

1 May 2024 at 06:10

Data breaches are like uninvited guests at a party – they show up unexpectedly, take what they want, and leave a big mess behind. This April, the party crashers were particularly busy, leaving a trail of exposed information in their […]

The post Data Breaches in April 2024 – Infographic appeared first on WeSecureApp :: Simplifying Enterprise Security.

The post Data Breaches in April 2024 – Infographic appeared first on Security Boulevard.

PIPEDA Compliance with Accutive Data Discovery and Masking: Understanding and protecting your Canadian sensitive data

30 April 2024 at 16:02

What is PIPEDA, Canada’s Personal Information Protection and Electronic Documents Act? PIPEDA, or the Personal Information Protection and Electronic Documents Act, is Canada’s primary federal privacy law governing the collection, use, and disclosure of personal information by private-sector organizations. PIPEDA establishes ten fair information principles to guide organizations in their handling of personal data. What […]

The post PIPEDA Compliance with Accutive Data Discovery and Masking: Understanding and protecting your Canadian sensitive data first appeared on Accutive Security.

The post PIPEDA Compliance with Accutive Data Discovery and Masking: Understanding and protecting your Canadian sensitive data appeared first on Security Boulevard.

Brits Ban Default Passwords β€” and More IoT Stupidity

30 April 2024 at 14:12
β€˜Union Jack’ bunting in Balham after the Queen’s Platinum Jubilee celebrations, June 2022

Nice Cup of IoTea? The UK’s Product Security and TeleΒ­commΒ­uniΒ­cations InfraΒ­strucΒ­ture Act aims to improve the security of net-connected consumer gear.

The post Brits Ban Default Passwords β€” and More IoT Stupidity appeared first on Security Boulevard.

Privacy Challenges in Relationships, Phishing Down but Vulnerabilities Up?

By: Tom Eston
29 April 2024 at 00:00

In episode 327 Tom, Scott, and Kevin discuss the findings from Mandiant’s M-Trends 2024 report, highlighting a significant rise in traditional vulnerability exploitation by attackers while observing a decline in phishing. Despite phishing’s decreased prevalence, it remains the second most popular method for gaining initial network access. Discussions include the impact of high-profile vulnerabilities and […]

The post Privacy Challenges in Relationships, Phishing Down but Vulnerabilities Up? appeared first on Shared Security Podcast.

The post Privacy Challenges in Relationships, Phishing Down but Vulnerabilities Up? appeared first on Security Boulevard.

πŸ’Ύ

Nemesis 1.0.0

25 April 2024 at 14:28

In August of last year, @tifkin_, @0xdab0, and I released Nemesis, our offensive data enrichment platform. After lots of feedback, operational testing, hundreds of commits, and another solid dev cycle, we’re proud to finally announce Nemesis’ 1.0.0 release. This post will detail several of the major changes we’re excited about, from host modeling, to a streamlined installation process, dashboard improvements, andΒ more!

Host Modeling

Since the beginning of development, one of our visions for Nemesis has been for it to provide guidance to operators agnostic of their C2 tooling. If we want Nemesis to be able to perform analysis like PowerUp’s privilege escalation, we have to build a proper offline data model to handle the analysis we want. Part of this involves the very specific problem of host β€œuniqueness” when you have data coming in from a number of different C2Β sources.

This, however, ended up being a more challenging task than we anticipated. We will be releasing a detailed post diving into all of the nuances of this problem in the next few weeks, but we wanted to at least highlight the problem as we viewed it. We also have a specific temporal issue that we’ll touch on briefly asΒ well.

The host uniqueness problem is a consequence of the variety of ways host data can be ingested into Nemesis. In order to perform host-based analysis, we have to collapse data from potentially multiple ingested sources into a single host abstraction so we don’t miss any details. I.e., consider the situation of having multiple C2 agent types on the same host. C2 agents can report a host’s short name(e.g., NetBIOS name), fully qualified name, or IP addresses. We might be performing an action against a remote host from a C2 agent, i.e., downloading a file from a host that doesn’t have an agent on it, but the connection is being routed through an existing agent. And finally, we might have manual data we’re uploading through the Nemesis interface in case there isn’t an existing connector.

With all of these options, the way to elegantly (well, at least as elegantly as possible) combine data from multiple ingestion sources in a way that we can break sections back apart if there is a mapping mistake was…tricky. We also ran across a β€œtemporal problem” for specific types of data like file or process listings where these data are ephemeral and can be influenced by operator events. For example, if you took a file listing but then uploaded or deleted a file on the host, the ground truth (as far as you know) for the filesystem state has to be built from multiple pieces. This data may also be ingested out of order (e.g., ingesting long-term collection output from a tool running on another host). Luckily, we believe we have a solution for thisΒ too!

If you’re as interested in this type of problem as we are (Bueller? Bueller?) keep an eye out for our upcoming modeling deep diveΒ post.

HELM Charts!

Helm toΒ 108!

One of the most common pieces of negative, yet legitimate, feedback we received about Nemesis was the complexity of its installation. Previously, setting up Nemesis required a number of prerequisites like Docker, Helm, and Kubernetes via Minikube. In response to this feedback, we’ve now adopted k3s, which can be installed with one command and doesn’t depend on Docker. Our updated quickstart guide outlines the full installation process in just five steps, making it quicker to get up andΒ running.

We’ve significantly improved the deployment process of Nemesis with the transition from Skaffold to Helm. Max worked hard on creating three new Helm charts: quickstart, nemesis, and monitoring. The quickstart chart is designed to configure all the secrets and dependencies necessary for Nemesis, providing an easy setup for most users. Advanced users, who might want to manually manage these settings or integrate with a Kubernetes secrets manager will want to replicate the functionality of the quickstart chart themselves. The nemesis chart sets up all the required Nemesis services like before. The monitoring chart is an optional installation that deploys monitoring services like Fluentd, Grafana, and Prometheus for those who want more insight into logging and performance. Additionally, this change has allowed us to eliminate the need for the janky nemesis-cli.py script!

Additionally, we have builds of Nemesis Docker images pushed to Dockerhub, meaning users no longer have to go through the build process. The entire setup process is described here in the documentation, but involves setting up the prerequisites, running the Nemesis quickstart chart to configure a handful of secrets/configs, and running the Nemesis Helm chart from a local clone or the remote repo. Here’s how the actual core Nemesis deployment looks like from running the local HelmΒ chart:

Nemesis installation with a local HelmΒ chart.

Another nice side effect of this is that Max was able to get self-signed TLS working, so communication to the Nemesis endpoint is now all over HTTPS. Additionally, the monitoring infrastructure is now optional, which can help save on resources. Big thanks to @M_alphaaa for helping us out with some HelmΒ issues!

And finally, for those who really like Minikube or Docker Desktop, we do have documentation for setting up Nemesis using the new installation procedure. Note that we will only be officially supporting k3s going forward (it’s way easier, we promise!).

Text Search Modifications

The β€œSummoning RAGnarok With Your Nemesis” post we released in March has complete details on these modifications, but TL;DR we completely redid how text search works under the hood forΒ Nemesis.

In the Document Search page, there are now two tabs. The first, β€œFull Document Search”, searches for text phrases over the entire text extracted from any compatible document, Γ  laΒ Google:

Full DocumentΒ Search

The main difference here is that we now have search filters that let you include or exclude specific paths, name patterns, or file extensions:

Include pathΒ filter.
Exclude pathΒ filter.

We also collapsed the old β€œSource Code Search” tab into β€œFull Document Search”. In order to search indexed source instead of extracted document text, select source_code as the index in the expanded search filterΒ section:

Changing searchΒ indexes.

The β€œText Snippet Search” tab now replaces the old β€œSemantic Search” tab and has received a complete overhaul. This tab searches over snippets of text extracted from compatible documents, where each snippet/chunk is ~400–500 words. If you want to know more about why this chunking was used, check out the β€œSummoning RAGnarok With Your Nemesis” post!

When you type a term or question into this search, the query is passed to the new https://<NEMESIS>/nlp/ endpoint, specifically the /nlp/hybrid_search route. Nemesis calculates the embedding vector for the query and searches the closest vector/text pairs, as well as performing a more classic BM25 β€œfuzzy” search of the text and the indexed document title. These results are fused together through Reciprocal Rank Fusion and returned reordered to theΒ user:

Hybrid search.

Note: deselecting β€œUse Hybrid Vector Search” will remove the embedding vector approach and use just the BM25 β€œfuzzy” search. β€œSnippet Search” also has the same include/exclude filters that the β€œFull Document Search” tabΒ has.

If you want to use a local LLM to chat over text extracted from Nemesis documents, check out RAGnarok!

Hasura API

Nemesis has a very rich backend data model that’s presented in two ways: a semi-structured and easily searchable form in Elasticsearch, and a highly structured form in PostgreSQL. While Kibana/Elastic have been accessible in Nemesis since the beginning, one piece of feedback we commonly heard was there was no way to easily access the structured data. We have had pgAdmin present for basic troubleshooting but nothing programmatically accessible.

Hasura fixes that! Hasura lets us easily construct GraphQL and REST APIs on top of our existing PostgreSQL database. Once it’s deployed, we get an awesome interface where we can play around with query and subscription construction:

Hasura interface.

This also means we can do some basic scripting to process existing data or new data as it comes in. We have some improved documentation (another 1.0.0 β€œfeature”!) which includes information about scripting with HasuraΒ here:

Basic Hasura scripting.

Dashboard Changes

As the Nemesis /dashboard/ route is the main way operators interact with Nemesis, it’s one of the pieces we received the most feedback on. There are nearly too many quality-of-life changes to count, but we’ll highlight a few of themΒ here:

The File Viewer page was broken out which displays syntax-highlighted text, or raw hex of a binary file. This page is accessible via the i icon on the main filesΒ page:

Link for detailed file information.
Detailed fileΒ viewer.

The File Upload was broken out into its own page with values saved in cookies for persistence betweenΒ runs:

New File UploadΒ page.

We finally exposed the Custom Cracklist endpoint in the interface. This service keeps a unique list of non-dictionary words extracted from documents and lets you download the X mostΒ common:

Custom Cracklist download.

If there are any Yara rule matches against a downloaded file, the match is displayed in a new sub-tab along with the matching rule text. The appropriate icon on the Files page will link you directly to these results now asΒ well:

Hyperlinked YaraΒ tag.
Yara results.

The NoseyParker tab was revamped and hyperlinked from the displayed tag bubbles asΒ well:

NoseyParker resultΒ display.

Countless Miscellaneous Changes

There were, of course, countless other bug fixes and tweaks as well. We’ll run through a grabbag of themΒ here:

  • Added additional documentation, including (finally) a usage guide to get peopleΒ started.
  • Streamlined NLP indexing to prevent choking and exposed a /nlp/ route forΒ search.
  • Removed the Tensorflow model hosting and DeepPass as the model just wasn’t accurate enough to beΒ useful.
  • Streamlined hash cracking and added in deduplication so hashes aren’t crackedΒ twice.
  • Added a `monitor` command to submit_to_nemesis.sh for continual file submission.
  • Any compatible file is now handled by Apache Tika instead of aΒ subset.
  • Detection of already processed files and suppression ofΒ alerts.
  • Automatic expunging of expired data via the `data_expunge` task.
  • Added Jupyter notebooks back into theΒ stack.
  • Processing for Chromium JSON cookieΒ dumps.
  • Countless other bug fixes and small usability changes.

Wrapup

We’ve put a lot of blood, sweat, and tears (mostly at k8s) into Nemesis, and we’re incredibly excited for this official 1.0.0 release! With the quality of life changes and ease of installation with Helm, we’re looking forward to more people getting to play with Nemesis handsΒ on.

If you play around with Nemesis, let us know what works and what doesn’t! Come join us in the #nemesis-chat channel of the BloodHound Slack! We (the main Nemesis devs- @tifkin_, @harmj0y, and @Max Harley) are all active in thatΒ channel.


Nemesis 1.0.0 was originally published in Posts By SpecterOps Team Members on Medium, where people are continuing the conversation by highlighting and responding to this story.

The post Nemesis 1.0.0 appeared first on Security Boulevard.

The CISO’s Top Priority: Elevating Data-Centric Security

25 April 2024 at 11:06

The shift to cloud computing has enhanced the resilience and security of most organizations. In this era of unparalleled agility and scalability, data-centric security can offer transformational opportunities for Chief Information Security Officers (CISOs) to improve data protection, compliance, and operational efficiencies, thereby strengthening customer trust. Despite this, a layered defense model is still necessary […]

The post The CISO’s Top Priority: Elevating Data-Centric Security appeared first on Blog.

The post The CISO’s Top Priority: Elevating Data-Centric Security appeared first on Security Boulevard.

It’s All About Data: How to Drive Secure Use of AI

25 April 2024 at 10:42

Although artificial intelligence (AI) has been with us for some time, the technology seems to be everywhere these days, as vendors and end users get more vocal about its benefits. They’re right to be enthused. McKinsey estimates that AI could unlock trillions of dollars’ worth of value globally across functions in 19 sectors. In some areas, it’s no longer about even carving out competitive differentiation, but merely delivering what is expected by customers and employees.

The post It’s All About Data: How to Drive Secure Use of AI appeared first on Security Boulevard.

Transforming Customer Experience: Enhancing CX through CIAM and Insights

24 April 2024 at 20:00

Learn how to elevate your CX strategies with CIAM and data-driven insights. From seamless digital experiences to proactive customer engagement, discover the key to driving growth and loyalty in a competitive market.

The post Transforming Customer Experience: Enhancing CX through CIAM and Insights appeared first on Security Boulevard.

CCPA Compliance with Accutive Data Discovery and Masking: Understanding and protecting your sensitive data

24 April 2024 at 17:21

What is the CCPA, the California Consumer Privacy Act? CCPA, or the California Consumer Privacy Act, is a law in California data privacy law that came into effect in early 2020. The CCPA grants California residents several key rights about how businesses collect, use and share their personal information.Β  The CCPA contains 4 key protections […]

The post CCPA Compliance with Accutive Data Discovery and Masking: Understanding and protecting your sensitive data first appeared on Accutive Security.

The post CCPA Compliance with Accutive Data Discovery and Masking: Understanding and protecting your sensitive data appeared first on Security Boulevard.

CoralRaider Group Delivers Three Infostealers via CDN Cache

24 April 2024 at 14:35
infostealer malware data

A threat group that’s been around since last year and was first identified earlier this month is using three high-profile information stealers in a wide-ranging campaign to harvest credentials, financial information, and cryptocurrency wallets from targets around the world who were downloading the malware that masqueraded as movie files. Researchers with Cisco’s Talos threat intelligence..

The post CoralRaider Group Delivers Three Infostealers via CDN Cache appeared first on Security Boulevard.

LabHost Phishing Platform is Latest Target of International Law Agencies – Source: securityboulevard.com

labhost-phishing-platform-is-latest-target-of-international-law-agencies-–-source:-securityboulevard.com

Source: securityboulevard.com – Author: Jeffrey Burt The takedown this week of a massive phishing-as-a-service (PhaaS) operation spanned law enforcement agencies from both sides of the Atlantic and is the latest example of an increasingly aggressive approach by authorities to disrupt the operations of high-profile cybercriminal gangs. Agencies from 19 countries participated in the operation against […]

La entrada LabHost Phishing Platform is Latest Target of International Law Agencies – Source: securityboulevard.com se publicΓ³ primero en CISO2CISO.COM & CYBER SECURITY GROUP.

Taking Time to Understand NIS2 Reporting Requirements – Source: securityboulevard.com

taking-time-to-understand-nis2-reporting-requirements-–-source:-securityboulevard.com

Source: securityboulevard.com – Author: Brian Robertson The newest version of the European Union Network and Information Systems directive, or NIS2, came into force in January 2023. Member States have until October 2024 to transpose it into their national law. One of the most critical changes with NIS2 is the schedule for reporting a cybersecurity breach.Β  […]

La entrada Taking Time to Understand NIS2 Reporting Requirements – Source: securityboulevard.com se publicΓ³ primero en CISO2CISO.COM & CYBER SECURITY GROUP.

Data Security Firm Cyera Raises $300 Million at $1.4 Billion Valuation

9 April 2024 at 11:31

Data security company Cyera’s latest $300 million funding round brings the total raised by the firm to $460 million, at unicorn valuation.

The post Data Security Firm Cyera Raises $300 Million at $1.4 Billion Valuation appeared first on SecurityWeek.

❌
❌