Category Archives: Security Websies

Kubescape helps admins manage Kubernetes securely

Kubescape is an open-source tool for testing if Kubernetes is deployed securely, as defined in the recently released Kubernetes Hardening Guidance by NSA and CISA. About Kubernetes (“K8s”) Kubernetes is an open-source platform for automating the deployment, scaling, and management of application containers across clusters of hosts. “Kubernetes is commonly targeted for three reasons: data theft, computational power theft, or denial of service. Data theft is traditionally the primary motivation; however, cyber actors may attempt … More ? The post Kubescape helps admins manage Kubernetes securely appeared first on Help Net Security .

Original post:
Kubescape helps admins manage Kubernetes securely

Splunk spots malware targeting Windows Server on AWS to mine Monero

RDP-enabled instances attacked, perhaps via Iran and China, then use Telegram desktop client for command and control Data analysis firm Splunk says it’s found a resurgence of the Crypto botnet – malware that attacks virtual servers running Windows Server inside Amazon Web Services.…

More:
Splunk spots malware targeting Windows Server on AWS to mine Monero

ThreatX API Catalog enables enterprises to reduce risk and protect critical APIs

ThreatX announced new API Catalog capabilities to provide enterprises with a clear view of their API’s attack surface, as well as the operational health of APIs in production. ThreatX supports DevOps and Security teams by assessing traffic in real-time to reduce risk and protect critical APIs from misconfiguration, DDoS, BOT attacks and malicious use. APIs are under constant assault by sophisticated attackers. Any downtime or data loss experienced as a result of an API attack … More ? The post ThreatX API Catalog enables enterprises to reduce risk and protect critical APIs appeared first on Help Net Security .

Read this article:
ThreatX API Catalog enables enterprises to reduce risk and protect critical APIs

Blocked DDoS attack volumes up, tech, healthcare and finance most targeted

Second quarter blocked DDoS attack volumes were up more than 40% compared to the same period in 2020, a Radware report reveals. The report provides an overview of DDoS attack trends by industry, as well as across applications and attack types. Notable takeaways On average, a company had to detect and block nearly 5,000 malicious events and a volume of 2.3TB per month during the second quarter of 2021. During the second quarter of 2021, … More ? The post Blocked DDoS attack volumes up, tech, healthcare and finance most targeted appeared first on Help Net Security .

Read the article:
Blocked DDoS attack volumes up, tech, healthcare and finance most targeted

Corero Network Security expands DDoS protection portfolio with ETD capability

Corero Network Security announces additional flexibility when deploying its SmartWall solution, with a new Edge Threat Defense (ETD) capability. Corero’s mission is to make the internet a safer and more reliable place to do business by protecting against the downtime and disruption caused by DDoS attacks. Corero enables organizations around the globe to maintain business continuity in the event of a DDoS attack, by deploying the award-winning and intelligently automated SmartWall DDoS protection solution that … More ? The post Corero Network Security expands DDoS protection portfolio with ETD capability appeared first on Help Net Security .

View original post here:
Corero Network Security expands DDoS protection portfolio with ETD capability

DDoS attacks increased 33% in H1 2021

There has been a 33% increase in the number of DDoS attacks in H1 2021, according to a report published by Link11. Between January and June, there were record numbers of attacks compared to the same period last year. The report also found that between Q1 2021 and Q2 2021 there was a 19% increase in DDoS campaigns, some of which were over 100 Gbps in attack volume; further evidence that hackers are continuing to … More ? The post DDoS attacks increased 33% in H1 2021 appeared first on Help Net Security .

Read the original:
DDoS attacks increased 33% in H1 2021

8-month suspended sentence for script kiddie who DDoS’d Labour candidate in runup to 2019 UK general election

Now banned from using Tor or VPNs – and ‘vanity’ handles on social media A British script kiddie who DDoS’d a Labour Party parliamentary candidate’s website in the runup to the last general election has been banned from using the Tor browser.…

Read More:
8-month suspended sentence for script kiddie who DDoS’d Labour candidate in runup to 2019 UK general election

DDoS attacks increase 341% amid pandemic

During the pandemic, cyber attackers targeted industries providing connectivity, services and entertainment to populations forced to shelter-in-place, resulting in a 341% year-over-year increase in distributed denial-of-service (DDoS) attacks, according to Nexusguard. The massive shift in online behavior and reliance on connectivity strained communications service providers (CSPs) and internet service providers (ISPs) that provided the backbone for this remote work, including spikes in ransom DDoS (RDDoS) attacks to extort organizations for payment in exchange for staying … More ? The post DDoS attacks increase 341% amid pandemic appeared first on Help Net Security .

Follow this link:
DDoS attacks increase 341% amid pandemic

Nexusguard unveils anti-DDoS protection program for CSPs

Nexusguard has announced a new program that empowers CSPs to easily launch anti-DDoS protection for their customers. Nexusguard will provide 10,000 Gbps of DDoS-mitigating hardware to CSPs around the world (100 Gbps each across 100 CSPs). The TAP100 Program accelerates the time-to-market for CSPs to deploy anti-DDoS services and protect end customers worldwide. Paired with Nexusguard’s extensive expertise of helping CSPs transform into MSSPs (managed security service providers), the TAP100 removes the hardware barriers associated … More ? The post Nexusguard unveils anti-DDoS protection program for CSPs appeared first on Help Net Security .

More:
Nexusguard unveils anti-DDoS protection program for CSPs

Critical Infrastructure Under Attack

Several recent cyber incidents targeting critical infrastructure prove that no open society is immune to attacks by cybercriminals. The recent shutdown of key US energy pipeline marks just the tip of the iceberg. Critical infrastructure is becoming more dependent on networks of interconnected devices. For example, only a few decades ago, power grids were essentially operational silos. Today, most grids are closely interlinked — regionally, nationally, and internationally as well as with other industrial sectors. And in contrast to discrete cyberattacks on individual companies, a targeted disruption of critical infrastructure can result in extended supply shortages, power blackouts, public disorder, and other serious consequences. According to the World Economic Forum (WEF), cyberattacks on critical infrastructure posed the fifth-highest economic risk in 2020, and the WEF called the potential for such attacks “the new normal across sectors such as energy, healthcare, and transportation.” Another report noted that such attacks can have major spillover effects. Lloyd’s and the University of Cambridge’s Centre for Risk Studies calculated the prospective economic and insurance costs of a severe cyberattack against America’s electricity system could amount to more than $240 billion and possibly more than $1 trillion. Given these potential far-reaching consequences, cyberattacks on critical infrastructure have become a big concern for industry and governments everywhere — and recent events haven’t done much to allay these fears. A Worldwide Phenomenon In May 2021, a huge distributed denial-of-service (DDoS) attack crippled large sections of Belgium’s Internet services, affecting more than 200 organizations, including government, universities, and research institutes. Even parliamentary debates and committee meetings were stalled since no one could access the online services they needed to participate. A few days later, a ransomware attack shut down the main pipeline carrying gasoline and diesel fuel to the US East Coast. The Colonial Pipeline is America’s largest refined-products pipeline. The company says it transports more than 100 million gallons a day of fossil fuels, including gasoline, diesel, jet fuel, and heating oil — or almost half the supply on the East Coast, including supplies for US military facilities. In August 2020, the New Zealand Stock Exchange (NZX) was taken offline for four trading days after an unprecedented volumetric DDoS attack launched through its network service provider. New Zealand’s government summoned its national cybersecurity services to investigate, and cyber experts suggested the attacks might have been a dry run of a major attack on other global stock exchanges. In October 2020, Australia’s Minister for Home Affairs, Peter Dutton, said his country must be ready to fight back against disastrous and extended cyberattacks on critical infrastructure that could upend whole industries. Obvious Uptick in DDoS Attacks During the pandemic, there’s been a huge increase in DDoS attacks, brute-forcing of access credentials, and malware targeting Internet-connected devices. The average cost of DDoS bots has dropped and will probably continue to fall. According to Link11’s Q1/2021 DDoS report, the number of attacks witnessed more than doubled, growing 2.3-fold year-over-year. (Disclosure: I’m the COO of Link11.) Unlike ransomware, which must penetrate IT systems before it can wreak havoc, DDoS attacks appeal to cybercriminals because they’re a more convenient IT weapon since they don’t have to get around multiple security layers to produce the desired ill effects. The FBI has warned that more DDoS attacks are employing amplification techniques to target US organizations after noting a surge in attack attempts after February 2020. The warnings came after other reports of high-profile DDoS attacks. In February, for example, the largest known DDoS attack was aimed at Amazon Web Services. The company’s infrastructure was slammed with a jaw-dropping 2.3 Tb/s — or 20.6 million requests per second — assault, Amazon reported. The US Cybersecurity and Infrastructure Security Agency (CISA) also acknowledged the global threat of DDoS attacks. Similarly, in November, New Zealand cybersecurity organization CertNZ issued an alert about emails sent to financial firms that threatened a DDoS attack unless a ransom was paid. Predominantly, cybercriminals are just after money. The threat actors behind the most recent and ongoing ransom DDoS (RDDoS or RDoS) campaign identify themselves as state-backed groups Fancy Bear, Cozy Bear, Lazarus Group, and Armada Collective — although it remains unclear whether that’s just been a masquerade to reinforce the hacker’s demands. The demanded ransoms ranged between 10 and 20 Bitcoin (roughly worth $100,000 to $225,000 at the time of the attacks), to be paid to different Bitcoin addresses. Mitigating the Risk Critical infrastructure is often more vulnerable to cyberattacks than other sectors. Paying a ransom has ethical implications, will directly aid the hackers’ future operations (as noted by the FBI), and will encourage them to hunt other potential victims. Targeted companies are also urged to report any RDoS attacks affecting them to law enforcement. Organizations can’t avoid being targeted by denial-of-service attacks, but it’s possible to prepare for and potentially reduce the impact should an attack occur. The Australian Cyber Security Centre notes that “preparing for denial-of-service attacks before they occur is by far the best strategy; it is very difficult to respond once they begin and efforts at this stage are unlikely to be effective.” However, as the architecture of IT infrastructure evolves, it’s getting harder to implement effective local mitigation strategies. Case in point: Network perimeters continue to be weak points because of the increasing use of cloud computing services and devices used for remote work. Also, it is increasingly infeasible to backhaul network traffic, as legitimate users will be banned, too — potentially for hours or days. To minimize the risk of disruption and aim for faster recovery time objectives (RTOs) after an attack, organizations should become more resilient by eliminating human error through stringent automation. These days, solutions based on artificial intelligence and machine learning offer the only viable means of protection against cyberattacks. Marc Wilczek is a columnist and recognized thought leader, geared toward helping organizations drive their digital agenda and achieve higher levels of innovation and productivity through technology. Over the past 20 years, he has held various senior leadership roles across … View Full Bio Source: https://www.darkreading.com/attacks-breaches/critical-infrastructure-under-attack-/a/d-id/1340960

Original post:
Critical Infrastructure Under Attack