Posts

Authorized Push Payment and Social Engineering: How to Fight Back

  Authorized Push Payment and Social Engineering Scams When fraud happens as due to scams and social engineering, businesses will have a difficult time stopping it.   This is due to the fact that when legitimate clients fall victim to fraudsters on the internet, for instance, when it comes to the authorized Push Payment Fraud (APP)--the consequences of losses could be devastating, not only for the individual victim but also the business where the fraud occurred. According to FTC, American consumers have reported losing more than $2.3B to fraudsters in 2021.   In the meantime, across the Atlantic, UK Finance revealed that the losses incurred due to authorized push fraud increased by 71% during the first quarter of the year 2021 UK The same report states that the amount that was stolen from this type of scam was even greater than the losses incurred by card fraud. In the end, financial institutions have to come up with ways to fight the massive losses t...

Seven Key Considerations for a ZTNA Solution

  For a long time, the majority of companies depended heavily on Virtual Private Networks (VPNs) and security techniques based on premises to secured remote access. Since 2020, the weaknesses of these strategies have become clear: They aren't able to scale easily. IT is not able to see the activities of users and their activity Performance is affected when traffic is backhauling into the security stack within the data center. It's not feasible to set up and maintain VPN clients for BYOD as well as partner devices They're difficult to integrate in cloud environments. They are not equipped with privileges Access Management (PAM) capabilities for engineering and DevOps users. Secure Access using Zero Security This is why  Zero Trust Network Access (ZTNA)  is becoming the most important element in a standard security architecture. The ZTNA design "never trusts and always verifies." When it is in place, ...

Forecasting Metaverse Threats: Will it Become Metaworse?

  The current metaverse concept is made up of many distinct and interconnected virtual spaces.   Therefore, it's impossible for one company to create the whole metaverse on its own.   One estimate that is optimistic is that the metaverse as a whole is between five and 10 years away from its fully operational.   However, over the coming 3 to 5 years we can expect to be flooded with more applications that are similar to the metaverse.   Certain, like Decentraland or Crypto Voxels, as well as games such as Minecraft or Second Life, already exist. The current metaverse-like applications are made specifically for gamers, not the general public.   In the near future we can expect daily activities like remote work entertainment as well as education and shopping will be performed in the next generation of metaverse-like apps.   A majority of these applications will be able to share cyberspace and will evolve to a single, unified metaverse as the te...

Five Black Hat 2022 Takeaways (and One Bonus!)

  The range and depth of conversations with the most important people in the industry shed illumination on today's most pressing issues. I selected the five most significant ones: 1.   The market is constantly trying to find a way to validate It seems like the understanding of the advantages of automating attack simulations that validate the security control's effectiveness is growing. The importance of traditional BAS (Breach and Security Simulation) solutions for fine-tuning security control settings and maximize effectiveness is much better understood in the present.   This has led to deeper inquiries about the possibility of running scenarios from end-to-end which simulate an attacker attempting various strategies to get around barriers. However, even though the importance of traditional BAS is more widely accepted in the present than it was before, as this category has seen a surge in acceptance in the past year and organizations are aware that the scope to...

June 2022: MaliBot, New Banking and Poses Dangerous to Mobile Banking Users

  According to the latest Global Threat Index, MaliBot is third on the list of most dangerous mobile malwares. After the May end takedown of FluBot, MaliBot emerged. MaliBot claims to be a cryptocurrency mining app under various names. To steal financial information, it targets mobile banking users. MaliBot is similar in nature to FluBot. It uses phishing SMS messages (smishing) to lure victims into clicking on malicious links that will redirect them onto a fake app. Emotet is still the most downloaded malware this month. After a significant increase in activity over the eighth place last month, Snake Keylogger now occupies third place. Snake Keylogger is primarily used to track keystrokes and send data to threat agents. Snake Keylogger was originally sent to us in PDF format in May. It has been sent to us via email as an attachment with Word attachments tagged as requests for quotations. Researchers also discovered a new version of Emote...