Ransomware Is Quickly Becoming The Most Common Form Of Harmful “Ware” Attacks Levied By Threat Actors.

Cybersecurity experts commented on this week’s new report from Microsoft on global enterprise firmware attacks, New Security Signals study shows firmware attacks on the rise; here’s how Microsoft is working to help eliminate this entire class of threats.

Experts Comments

April 05, 2021
Michael Tsai
Senior Product Manager
OneLogin

This report does not surprise me at all. End-user devices, whether managed or not, are the new IT perimeter, and with the paradigm shift to work from anywhere, both IT and security teams need to consider the added threat landscape, both at the software and firmware level of these devices. This is why implementing a Zero Trust Security model is crucial now and into the future. It’s not enough to just validate the end-users' credentials, you must evaluate the trust status of the devices as

.....Read More

This report does not surprise me at all. End-user devices, whether managed or not, are the new IT perimeter, and with the paradigm shift to work from anywhere, both IT and security teams need to consider the added threat landscape, both at the software and firmware level of these devices. This is why implementing a Zero Trust Security model is crucial now and into the future. It’s not enough to just validate the end-users' credentials, you must evaluate the trust status of the devices as well, before granting access to critical resources. Coupling it with anomaly detection across device endpoints and continuing to expand the detection capability will help strengthen the protection required for this new frontier.

  Read Less
April 05, 2021
Asaf Karas
CTO
Vdoo

Firmware vendors and OEMs should not only rely on external protection mechanisms implemented at the OS level to stop exploitations, but improve their firmware and device security by design. This should be done by continuously analyzing the firmware security posture during the SDLC process and, even more importantly, in its production state before distribution because this is the state in which attackers see it when they search for vulnerabilities. Firmware analysis tools enable both vendors and

.....Read More

Firmware vendors and OEMs should not only rely on external protection mechanisms implemented at the OS level to stop exploitations, but improve their firmware and device security by design. This should be done by continuously analyzing the firmware security posture during the SDLC process and, even more importantly, in its production state before distribution because this is the state in which attackers see it when they search for vulnerabilities. Firmware analysis tools enable both vendors and asset owners to detect security issues early in the process, thus simplifying and lowering their remediation cost.

  Read Less

Submit Your Expert Comments

What do you think of the topic? Do you agree with expert(s) or share your expert opinion below.
Be part of our growing Information Security Expert Community (1000+), please register here.

Write Your Expert Comments *
Your Registered Email *
Notification Email (If different from your registered email)
* By using this form you agree with the storage and handling of your data by this web site.