Posts

Showing posts from November, 2023

Why is physical security important? A cybersecurity POV

Image
  Modern day attackers are orchestrating hybrid attacks that target physical assets. It calls for improved awareness and prioritization of physical security. Physical security is important for several reasons, as it plays a crucial role in safeguarding people, assets, and information from various threats. Here are some key reasons why physical security is essential: Asset Protection: Physical security measures are designed to protect valuable assets such as equipment, inventory, and property. This can include surveillance systems, access control systems, and barriers to prevent unauthorized access and theft. Personnel Safety: Ensuring the safety of individuals within a physical space is a primary concern. Physical security measures, such as access control systems, surveillance cameras, and security personnel, help prevent unauthorized individuals from entering a facility and posing a threat to occupants. Prevention of Unauthorized Access: Physical security measures, such as access con

Advanced Persistent Threats (APT): 5 Ways to Identify an APT Attack

Image
  APT or Advanced Persistent Threat is a type of cyber-attack where an attacker or group of attackers target highly specific targets with an intent to steal sensitive data without being detected for a long time APT stands for Advanced Persistent Threat. An APT attack is a sophisticated and targeted cyberattack where an unauthorized user gains access to a network and remains undetected for an extended period. The term "persistent" indicates that the attacker maintains a long-term presence within the targeted network to achieve specific objectives. Key characteristics of APT attacks include: 1. Advanced Techniques: APT attackers often employ advanced and sophisticated methods to breach security measures. This may involve the use of zero-day exploits (vulnerabilities that are unknown to the software vendor or the public), custom malware, or other advanced tactics. 2. Persistence: APT attackers aim to remain undetected for a prolonged period to achieve their goals, which could i

ICBC bank ransomware attack, World’s biggest bank hacked

Image
  ICBC: World’s biggest bank hacked due to suspected Citrix Bleed vulnerability (CVE-2023-4966) On November 9, 2023, the Industrial and Commercial Bank of China (ICBC), the world's largest bank, was hit by a ransomware attack that disrupted trades in the U.S. Treasury market. The attack was carried out by the ransomware group LockBit, which demanded a ransom of $10 million from ICBC. ICBC said that it was able to isolate the impacted systems and contain the incident. The bank also said that it was making progress in recovering from the attack and that it was in contact with law enforcement agencies in the United States and China. The attack on ICBC is the latest in a string of high-profile ransomware attacks against financial institutions. In recent months, ransomware groups have also targeted banks in Costa Rica, Brazil, and India. The increasing frequency of ransomware attacks against financial institutions has raised concerns about the security of the global financial system. Ra

Managed Security vs In-house Security: Which of the two is the best?

Image
  Let us take a look at the difference between establishing your own team for security - in-house security vs letting dedicated team of experts handle all your security needs - managed security. Managed Security and In-house Security are two different approaches to handling cybersecurity within an organization. Here are the key differences between them: 1. Ownership and Responsibility: Managed Security: In this model, a third-party service provider (Managed Security Service Provider or MSSP) is responsible for managing and overseeing the organization's security infrastructure and operations. The MSSP takes on the responsibility for monitoring, detecting, and responding to security incidents. In-house Security: In this model, the organization itself is responsible for all aspects of its security program. This includes hiring and training its own security team, procuring and managing security tools, and developing and implementing security policies and procedures. 2. Expertise and S

Protecting your IT infrastructure with Security Configuration Assessment

Image
  Discover how SharkStriker STRIEGO, a unified, human led, machine accelerated unified security platform makes security assessments based on CIS based benchmarks easier. A security configuration assessment is a process used to evaluate and analyze the security settings and configurations of an organization's information technology (IT) systems, networks, and applications. The goal of this assessment is to identify potential vulnerabilities and weaknesses in the configuration settings that could be exploited by attackers. During a security configuration assessment, security experts or specialized tools examine various aspects of the IT environment, including: 1. Operating Systems: This involves reviewing the settings and configurations of the operating systems (e.g., Windows, Linux) used in an organization. This includes aspects like user permissions, password policies, firewall settings, and patch management. 2. Network Devices: This includes routers, switches, firewalls, and

Get 360 degree test of your internal and external network with pen-testing

Image
  Assess the vulnerabilities of your internal and external network with SharkStriker’s network pen testing services that are carried out by certified pen-testers and cybersecurity experts. Network Penetration Testing , often referred to as "pen testing" or "ethical hacking," is a simulated cyberattack on a computer network, system, or application to identify vulnerabilities and weaknesses that could be exploited by malicious actors. The purpose of a network penetration test is to assess the security posture of an organization's network infrastructure and to help identify and mitigate potential risks. Here's an overview of the key aspects of Network Penetration Testing: Simulation of Real-world Attacks: A network penetration test simulates the tactics, techniques, and procedures (TTPs) that real attackers may use. This may include attempting to exploit known vulnerabilities, conducting reconnaissance, and attempting unauthorized access. Authorized and Leg