Information Security Buzz
  • HOME
  • Domains
    • Data Breach
    • Malware
    • Application Security
    • IoT
    • Cloud Security
    • Privacy
  • InfoSec Deals
  • Companies
  • Security Experts
  • ISB Conference 2021
  • Register
  • Log In
Top Posts
Iran Nuclear Facility Potential Cyber Attack – What...
Industry Leaders On Android.Joker Malware
Expert Reaction On Pulse Secure VPN Users Can’t...
New Vulnerabilities Put Millions Of IoT Devices At...
Expert Comment On Darktrace Set For IPO
Fake App Attacks On The Rise, As Malware...
Expert On Study That Brits Using Pets’ Names...
Expert Reaction On Europol Publishes Its Serious And...
Fake Netflix App Allows Hackers to Hijack WhatsApp
Hackers Pretend To Be Your Friend In The...
Information Security Buzz
Connecting Security Experts
  • HOME
  • Domains
    • Data Breach
    • Malware
    • Application Security
    • IoT
    • Cloud Security
    • Privacy
  • InfoSec Deals
  • Companies
  • Security Experts
  • ISB Conference 2021
  • Register
  • Log In
Expert(s): November 30, 2020
Bob Rudis
Chief Data Scientistfeature_status*/ ?>
Rapid7

Comments Dotted : 4
May 07, 2020

Fresenius Hit By Ransomware – Expert Insight

Organisations should apply the same logic they would to any incoming request for link clicking, document downloading, or charitable giving.
With Covid-19 pressing down upon us, we are again reminded of how critically important it is to secure our devices and networks so we can avoid impacting our currently over-strained hospital care environments further. These types of ransomware campaigns prey upon the fear, generosity and curiosity of the chosen victims to gain access to something of value, be it banking credentials or your device or laptop to launch further campaigns or to gain access to your network. Organisations should.....Read More
With Covid-19 pressing down upon us, we are again reminded of how critically important it is to secure our devices and networks so we can avoid impacting our currently over-strained hospital care environments further. These types of ransomware campaigns prey upon the fear, generosity and curiosity of the chosen victims to gain access to something of value, be it banking credentials or your device or laptop to launch further campaigns or to gain access to your network. Organisations should apply the same logic they would to any incoming request for link clicking, document downloading, or charitable giving. Do not trust at all initially, consider deleting outright, and use every means as your disposal to validate the legitimacy of any mail. Do not accept any pandemic-related communication at face value until you perform this validation. IT and security teams should reach out to their trusted information-sharing communities to gain access to trusted lists of malicious pandemic-related domains and ensure the defence technologies are configured to use them. To help resolve these issues, healthcare organisations should look to mitigate risk via network. To accomplish this, hospitals and medical care environments should consider segmenting their network into three general categories: medical business operations networks (run the hospital network), medical care network (general medical care appliances), life-critical care (ICU, appliances used to sustain life or administer drugs). By following these network segmentation principles, the risk to patients’ health and safety would be greatly reduced allowing more time for properly validate, update and patch devices.  Read Less
Like(1)  (0)

Linkedin Message

@Bob Rudis, Chief Data Scientist, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Organisations should apply the same logic they would to any incoming request for link clicking, document downloading, or charitable giving. ..."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/fresenius-hit-by-ransomware-expert-insight

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Bob Rudis, Chief Data Scientist, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Organisations should apply the same logic they would to any incoming request for link clicking, document downloading, or charitable giving. ..."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/fresenius-hit-by-ransomware-expert-insight

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.
April 01, 2020

Industry Leaders And Cybersecurity Experts Insight On Marriott International Data Breach

Current disruptions in traditional work patterns also increase the likelihood of more frequent and clever attacks occurring every day.
If there is an insight to be gleaned from the recent, second breach at Marriott International that is to remain vigilant for new attacks even if you've just experienced one. Successful phishing campaigns can happen to anyone and any organisation, and the use of stolen, legitimate credentials is still one of the most popular attack vectors for our adversaries. Current disruptions in traditional work patterns also increase the likelihood of more frequent and clever attacks occurring every day......Read More
If there is an insight to be gleaned from the recent, second breach at Marriott International that is to remain vigilant for new attacks even if you've just experienced one. Successful phishing campaigns can happen to anyone and any organisation, and the use of stolen, legitimate credentials is still one of the most popular attack vectors for our adversaries. Current disruptions in traditional work patterns also increase the likelihood of more frequent and clever attacks occurring every day. Even though your staff may be more dispersed than usual, this is no time to hold back on regular awareness training. It is also paramount that you continue to watch for anomalous behaviour of systems and accounts to reduce the time attackers have to accomplish their goals if they do manage to breach your defences.  Read Less
Like(0)  (0)

Linkedin Message

@Bob Rudis, Chief Data Scientist, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Current disruptions in traditional work patterns also increase the likelihood of more frequent and clever attacks occurring every day. ..."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/industry-leaders-and-cybersecurity-experts-insight-on-marriott-international-data-breach

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Bob Rudis, Chief Data Scientist, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Current disruptions in traditional work patterns also increase the likelihood of more frequent and clever attacks occurring every day. ..."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/industry-leaders-and-cybersecurity-experts-insight-on-marriott-international-data-breach

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.
February 03, 2020

Social Captain Instagram Account Exposed And Experts Reactions

Social Captain should have worked with Instagram to have whatever functionality they needed baked into the API-proper vs.
Individuals should think twice before letting a third-party site, service, or application use actual credentials for things like Twitter, Instagram, Facebook (et al) since such a requirement inherently means those credentials will be stored in a way to be reused (i.e. the passwords will not be hashed). Furthermore, the OAuth standards were developed to enable support for third-party workflows without the need to give unrestricted access via the use of user-credentials. If a site's API does not.....Read More
Individuals should think twice before letting a third-party site, service, or application use actual credentials for things like Twitter, Instagram, Facebook (et al) since such a requirement inherently means those credentials will be stored in a way to be reused (i.e. the passwords will not be hashed). Furthermore, the OAuth standards were developed to enable support for third-party workflows without the need to give unrestricted access via the use of user-credentials. If a site's API does not provide sufficient functionality these third-party services should work with the primary application — i.e. Social Captain should have worked with Instagram to have whatever functionality they needed baked into the API-proper vs. bypass these safety measures by requiring user-credentials. Hopefully this will be a learning opportunity for other third-party services who still rely on user-credentials for access and instrumentation to services like Twitter, Instagram, or Facebook.  Read Less
Like(0)  (0)

Linkedin Message

@Bob Rudis, Chief Data Scientist, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
" Social Captain should have worked with Instagram to have whatever functionality they needed baked into the API-proper vs. ..."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/social-captain-instagram-account-exposed-and-experts-reactions

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Bob Rudis, Chief Data Scientist, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
" Social Captain should have worked with Instagram to have whatever functionality they needed baked into the API-proper vs. ..."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/social-captain-instagram-account-exposed-and-experts-reactions

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.
January 31, 2020

Experts On Data Breach At Indian Airline SpiceJet Affects 1.2 Million Passengers

Social Captain should have worked with Instagram to have whatever functionality they needed baked into the API-proper vs.
Individuals should think twice before letting a third-party site, service, or application use actual credentials for things like Twitter, Instagram, Facebook (et al) since such a requirement inherently means those credentials will be stored in a way to be reused (i.e. the passwords will not be hashed). Furthermore, the OAuth standards were developed to enable support for third-party workflows without the need to give unrestricted access via the use of user-credentials. If a site's API does not.....Read More
Individuals should think twice before letting a third-party site, service, or application use actual credentials for things like Twitter, Instagram, Facebook (et al) since such a requirement inherently means those credentials will be stored in a way to be reused (i.e. the passwords will not be hashed). Furthermore, the OAuth standards were developed to enable support for third-party workflows without the need to give unrestricted access via the use of user-credentials. If a site's API does not provide sufficient functionality these third-party services should work with the primary application — i.e. Social Captain should have worked with Instagram to have whatever functionality they needed baked into the API-proper vs. bypass these safety measures by requiring user-credentials. Hopefully this will be a learning opportunity for other third-party services who still rely on user-credentials for access and instrumentation to services like Twitter, Instagram, or Facebook.  Read Less
Like(0)  (0)

Linkedin Message

@Bob Rudis, Chief Data Scientist, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Social Captain should have worked with Instagram to have whatever functionality they needed baked into the API-proper vs...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/experts-on-data-breach-at-indian-airline-spicejet-affects-1-2-million-passengers

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Bob Rudis, Chief Data Scientist, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Social Captain should have worked with Instagram to have whatever functionality they needed baked into the API-proper vs...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/experts-on-data-breach-at-indian-airline-spicejet-affects-1-2-million-passengers

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.

SECURELY DOTTED BY

Steve Forbes, Government Cyber Security Expert, Nominet States

"It is vital that governments pay close attention to the resilience of their critical infrastructures. "

Iran Nuclear Facility Potential Cyber Attack – What Expert Says

Saryu Nayyar, CEO, Gurucul

"The good news is that it appears the only damage is financial, and likely temporary. "

Industry Leaders On Android.Joker Malware

Eddie Glenn, Senior Product Manager, Venafi

"These timestamps indicate that the code signing certificate was valid at the time it was used to sign the code. "

Expert Reaction On Pulse Secure VPN Users Can’t Login Due To Certificate Related Outage

Jake Moore, Cybersecurity Specialist, ESET

"IoT remains a huge burden on potential victims, but the industry is slowly catching up. "

New Vulnerabilities Put Millions Of IoT Devices At Risk

Sri Sundaralingam, VP of Security and Cloud Solutions, ExtraHop

"The growth of the NDR category underscores the unique value that the network vantage point can provide for security teams. "

Expert Comment On Darktrace Set For IPO

Doug Davis, Senior Product Manager, Semperis

"Hybrid Identity Management Requires Critical Security Adjustments "

Experts Comments On Identity Management Day – Tuesday 13th April

Alan Grau, VP of IoT , Sectigo

"Attackers dupe individuals through a number of methods. "

Fake App Attacks On The Rise, As Malware Hides In Plain Sight

David Emm, Principal Security Researcher , Kaspersky

"Our passwords are the gateway to a plethora of valuable personal data that should never be openly shared. "

Expert On Study That Brits Using Pets’ Names As Online Passwords

Colin Truran, Senior Risk, Compliance and Governance Advisor , Quest

"Many of us recognise this problem, but as human beings we will continue to opt for easy passwords. "

Expert On Study That Brits Using Pets’ Names As Online Passwords

Ian Pitt, CIO, LogMeIn

"Online security risks have risen substantially over the past year. "

Expert On Study That Brits Using Pets’ Names As Online Passwords

Ilia Kolochenko, CEO, ImmuniWeb

"It is likewise a myth that governments cannot control cryptocurrencies. "

Expert Reaction On Europol Publishes Its Serious And Organised Crime Threat Assessment 2021

Jake Moore, Cybersecurity Specialist, ESET

"Being able to send rogue messages from another app installed on a device is impressive and extremely dangerous. "

Fake Netflix App Allows Hackers to Hijack WhatsApp

Burak Agca, Security Engineer, Lookout

"It is imperative that individuals and organisations keep their mobile operating systems and apps up to date. "

Hackers Pretend To Be Your Friend In The Latest WhatsApp Scam.

Adenike Cosgrove, Cyber Security Strategist, International, Proofpoint

"A password’s complexity is irrelevant if people use the same password for everything. "

Millions Of Brits Still Using Pet’s Names As Passwords Despite Risk

Richard Blech, Founder & CEO, XSOC CORP

"The LI capability was co-opted and exploited by one or more malicious actors. "

Advertised Sites May Appear Genuine On First Glance

WORKING WITH US

About Us

Advertise With Us

Information Security Companies

Contact Us

ISB CONFERENCE

ISB Conference 2021

THE PAGES

Privacy Policy

Terms & Conditions

RSS Feeds

INFORMATION SECURITY EXPERTS

Information Security Experts: Comments Dotted

Register and Comments

Categories

  • Facebook
  • Twitter

Copyright © 2020 ISBuzz Pty Ltd is a company registered in Australia with company number 605 203 772 whose registered office is 14 Alanvale Street, Harrison, ACT 2914.


Back To Top
Information Security Buzz
  • Home
  • Experts Comments on News
  • Security Articles
  • Vendor News
  • Study & Research
  • ISBuzz Expert Panel