首页 > 最新文献

Network Security最新文献

英文 中文
Tracing template injection attacks to North Korea 追踪针对朝鲜的模板注入攻击
Pub Date : 2023-02-01 DOI: 10.12968/s1353-4858(23)70011-1
Thomas B. McVey
{"title":"Tracing template injection attacks to North Korea","authors":"Thomas B. McVey","doi":"10.12968/s1353-4858(23)70011-1","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70011-1","url":null,"abstract":"","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"351 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87748830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cloud databases: a breeding ground for ransomware 云数据库:勒索软件的滋生地
Pub Date : 2023-01-01 DOI: 10.12968/s1353-4858(23)70004-4
Aditya K. Sood, Michael Wiley
Attackers are targeting cloud databases to trigger ransomware infections by directly taking control of the stored data. Databases are the foundational bricks allowing us to store data and provide a uniform capability so that various applications can dynamically transact data. Compromising the data provides an edge to the attackers to extract monetary gain using stolen information. In this article, we examine the root causes of ransomware infection in cloud databases and present real-world case studies of detecting ransomware infections in Elasticsearch and MongoDB cloud instances.
攻击者以云数据库为目标,通过直接控制存储的数据来触发勒索软件感染。数据库是允许我们存储数据并提供统一功能的基础模块,以便各种应用程序可以动态地处理数据。泄露数据为攻击者提供了利用被盗信息获取金钱利益的优势。在本文中,我们研究了云数据库中勒索软件感染的根本原因,并介绍了在Elasticsearch和MongoDB云实例中检测勒索软件感染的实际案例研究。
{"title":"Cloud databases: a breeding ground for ransomware","authors":"Aditya K. Sood, Michael Wiley","doi":"10.12968/s1353-4858(23)70004-4","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70004-4","url":null,"abstract":"Attackers are targeting cloud databases to trigger ransomware infections by directly taking control of the stored data. Databases are the foundational bricks allowing us to store data and provide a uniform capability so that various applications can dynamically transact data. Compromising the data provides an edge to the attackers to extract monetary gain using stolen information. In this article, we examine the root causes of ransomware infection in cloud databases and present real-world case studies of detecting ransomware infections in Elasticsearch and MongoDB cloud instances.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"40 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80647642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Awareness and layered defences 意识和分层防御
Pub Date : 2023-01-01 DOI: 10.12968/s1353-4858(23)70001-9
Gemma Moore
{"title":"Awareness and layered defences","authors":"Gemma Moore","doi":"10.12968/s1353-4858(23)70001-9","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70001-9","url":null,"abstract":"","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"24 9 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82686754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The law that is changing the telco sector for the better 这部法律正在让电信行业变得更好
Pub Date : 2023-01-01 DOI: 10.12968/s1353-4858(23)70003-2
B. Ross
Our national infrastructure is at risk. Telecommunications companies provide essential services, but are major targets for cyber threat actors. However, new legislation in the UK is aiming to push telco organisations towards more-secure practices and technologies.
我们的国家基础设施处于危险之中。电信公司提供基本服务,但也是网络威胁行为者的主要目标。然而,英国的新立法旨在推动电信组织采用更安全的做法和技术。
{"title":"The law that is changing the telco sector for the better","authors":"B. Ross","doi":"10.12968/s1353-4858(23)70003-2","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70003-2","url":null,"abstract":"Our national infrastructure is at risk. Telecommunications companies provide essential services, but are major targets for cyber threat actors. However, new legislation in the UK is aiming to push telco organisations towards more-secure practices and technologies.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"168 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72569900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Responding to worsening web browser attacks 应对日益恶化的网络浏览器攻击
Pub Date : 2023-01-01 DOI: 10.12968/s1353-4858(23)70002-0
Jonathan Lee
The sudden increase in remote and home working has brought many benefits, not least in work/life balance. But it has also presented challenges, particularly when it comes to security. Operating models and infrastructure have undergone changes, with a significant move towards the cloud. This has put the browser front and centre as a key productivity and communications tool. And malicious actors have not been slow to take advantage.
远程办公和在家办公的突然增加带来了许多好处,尤其是在工作与生活的平衡方面。但它也带来了挑战,特别是在安全方面。运营模式和基础设施已经发生了变化,主要是向云计算发展。这使得浏览器成为重要的生产力和通信工具。恶意行为者利用这一优势的速度也不慢。
{"title":"Responding to worsening web browser attacks","authors":"Jonathan Lee","doi":"10.12968/s1353-4858(23)70002-0","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70002-0","url":null,"abstract":"The sudden increase in remote and home working has brought many benefits, not least in work/life balance. But it has also presented challenges, particularly when it comes to security. Operating models and infrastructure have undergone changes, with a significant move towards the cloud. This has put the browser front and centre as a key productivity and communications tool. And malicious actors have not been slow to take advantage.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"26 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79297990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Strengthening cyber security with digital twins 利用数字孪生加强网络安全
Pub Date : 2022-12-01 DOI: 10.12968/s1353-4858(22)70071-2
Maya Natarajan
Cyberthreats are becoming more numerous and complex. This poses a major challenge for security professionals trying to stay up to date with the latest developments. This is why many organisations are turning to graph-based digital twin technology to improve their cyber resilience management.
网络威胁正变得越来越多和复杂。这对试图跟上最新发展的安全专业人员构成了重大挑战。这就是为什么许多组织正在转向基于图形的数字孪生技术来改善他们的网络弹性管理。
{"title":"Strengthening cyber security with digital twins","authors":"Maya Natarajan","doi":"10.12968/s1353-4858(22)70071-2","DOIUrl":"https://doi.org/10.12968/s1353-4858(22)70071-2","url":null,"abstract":"Cyberthreats are becoming more numerous and complex. This poses a major challenge for security professionals trying to stay up to date with the latest developments. This is why many organisations are turning to graph-based digital twin technology to improve their cyber resilience management.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"3 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80270316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Why businesses shouldn't rely on Istio's Mutual TLS 为什么企业不应该依赖Istio的互TLS
Pub Date : 2022-12-01 DOI: 10.12968/s1353-4858(22)70068-2
Kevin M Bocek
Containers are everywhere now, and with the help of Kubernetes it has become easy to deploy complex infrastructures. This raises its own challenges regarding visibility and the application of security policies. And while tools such as Istio have appeared to help with this issue, they need to be used with care and can raise security issues of their own.
容器现在无处不在,在Kubernetes的帮助下,部署复杂的基础设施变得很容易。这就对安全性策略的可见性和应用程序提出了挑战。虽然Istio等工具似乎可以帮助解决这个问题,但它们需要小心使用,并且可能会引发自己的安全问题。
{"title":"Why businesses shouldn't rely on Istio's Mutual TLS","authors":"Kevin M Bocek","doi":"10.12968/s1353-4858(22)70068-2","DOIUrl":"https://doi.org/10.12968/s1353-4858(22)70068-2","url":null,"abstract":"Containers are everywhere now, and with the help of Kubernetes it has become easy to deploy complex infrastructures. This raises its own challenges regarding visibility and the application of security policies. And while tools such as Istio have appeared to help with this issue, they need to be used with care and can raise security issues of their own.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"75 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83376122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of a new AD vulnerability 一个新的AD漏洞分析
Pub Date : 2022-12-01 DOI: 10.12968/s1353-4858(22)70069-4
C. Clark
Microsoft's Active Directory was introduced to solve myriad networking problems. But its openness and widespread adoption have also made it a key target for cyber attacks. This article looks at one specific vulnerability and how it demonstrates the key role of AD, and its potential as a weak spot in your networks.
微软的活动目录被用来解决无数的网络问题。但它的开放性和广泛采用也使它成为网络攻击的关键目标。本文着眼于一个特定的漏洞,以及它如何展示AD的关键作用,以及它可能成为您网络中的一个弱点。
{"title":"Analysis of a new AD vulnerability","authors":"C. Clark","doi":"10.12968/s1353-4858(22)70069-4","DOIUrl":"https://doi.org/10.12968/s1353-4858(22)70069-4","url":null,"abstract":"Microsoft's Active Directory was introduced to solve myriad networking problems. But its openness and widespread adoption have also made it a key target for cyber attacks. This article looks at one specific vulnerability and how it demonstrates the key role of AD, and its potential as a weak spot in your networks.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"23 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83535255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
How to deal with MFA bypass 如何处理MFA旁路
Pub Date : 2022-12-01 DOI: 10.12968/s1353-4858(22)70070-0
Ben Jacob
Multi-factor authorisation has become essential in this era of remote working. It undoubtedly adds a significant layer of security, but it's not without its own weaknesses, which threat actors have been quick to exploit. The trick is to spot when this is happening and takes the right steps to keep your organisation secure.
在这个远程工作的时代,多因素授权变得至关重要。毫无疑问,它增加了一个重要的安全层,但它也有自己的弱点,威胁行为者很快就会利用这些弱点。诀窍在于发现这种情况何时发生,并采取正确的步骤来保证组织的安全。
{"title":"How to deal with MFA bypass","authors":"Ben Jacob","doi":"10.12968/s1353-4858(22)70070-0","DOIUrl":"https://doi.org/10.12968/s1353-4858(22)70070-0","url":null,"abstract":"Multi-factor authorisation has become essential in this era of remote working. It undoubtedly adds a significant layer of security, but it's not without its own weaknesses, which threat actors have been quick to exploit. The trick is to spot when this is happening and takes the right steps to keep your organisation secure.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"54 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73707839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Defence against the dark art of zero-day attacks 防御零日攻击的黑暗艺术
Pub Date : 2022-11-01 DOI: 10.12968/s1353-4858(22)70066-9
Matias Madou
Many organisations remain vulnerable to zero-day attacks. Zero-day attacks, by definition, give developers zero time to find and patch existing vulnerabilities that could be exploited, because the threat actor got in first. The damage is done and then it's a mad scramble to fix both the software and reputational damage to the business. Attackers are always at an advantage, and reducing that edge as much as possible is crucial.
许多组织仍然容易受到零日攻击。根据定义,零日攻击使开发人员没有时间发现和修补可能被利用的现有漏洞,因为威胁参与者抢先进入。损害已经造成,然后就需要疯狂地修复软件和商业声誉上的损害。攻击者总是处于优势地位,尽可能地减少这种优势是至关重要的。
{"title":"Defence against the dark art of zero-day attacks","authors":"Matias Madou","doi":"10.12968/s1353-4858(22)70066-9","DOIUrl":"https://doi.org/10.12968/s1353-4858(22)70066-9","url":null,"abstract":"Many organisations remain vulnerable to zero-day attacks. Zero-day attacks, by definition, give developers zero time to find and patch existing vulnerabilities that could be exploited, because the threat actor got in first. The damage is done and then it's a mad scramble to fix both the software and reputational damage to the business. Attackers are always at an advantage, and reducing that edge as much as possible is crucial.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76634404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Network Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1