Pub Date : 2023-02-01DOI: 10.12968/s1353-4858(23)70011-1
Thomas B. McVey
{"title":"Tracing template injection attacks to North Korea","authors":"Thomas B. McVey","doi":"10.12968/s1353-4858(23)70011-1","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70011-1","url":null,"abstract":"","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"351 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87748830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.12968/s1353-4858(23)70004-4
Aditya K. Sood, Michael Wiley
Attackers are targeting cloud databases to trigger ransomware infections by directly taking control of the stored data. Databases are the foundational bricks allowing us to store data and provide a uniform capability so that various applications can dynamically transact data. Compromising the data provides an edge to the attackers to extract monetary gain using stolen information. In this article, we examine the root causes of ransomware infection in cloud databases and present real-world case studies of detecting ransomware infections in Elasticsearch and MongoDB cloud instances.
{"title":"Cloud databases: a breeding ground for ransomware","authors":"Aditya K. Sood, Michael Wiley","doi":"10.12968/s1353-4858(23)70004-4","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70004-4","url":null,"abstract":"Attackers are targeting cloud databases to trigger ransomware infections by directly taking control of the stored data. Databases are the foundational bricks allowing us to store data and provide a uniform capability so that various applications can dynamically transact data. Compromising the data provides an edge to the attackers to extract monetary gain using stolen information. In this article, we examine the root causes of ransomware infection in cloud databases and present real-world case studies of detecting ransomware infections in Elasticsearch and MongoDB cloud instances.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"40 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80647642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.12968/s1353-4858(23)70003-2
B. Ross
Our national infrastructure is at risk. Telecommunications companies provide essential services, but are major targets for cyber threat actors. However, new legislation in the UK is aiming to push telco organisations towards more-secure practices and technologies.
{"title":"The law that is changing the telco sector for the better","authors":"B. Ross","doi":"10.12968/s1353-4858(23)70003-2","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70003-2","url":null,"abstract":"Our national infrastructure is at risk. Telecommunications companies provide essential services, but are major targets for cyber threat actors. However, new legislation in the UK is aiming to push telco organisations towards more-secure practices and technologies.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"168 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72569900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.12968/s1353-4858(23)70002-0
Jonathan Lee
The sudden increase in remote and home working has brought many benefits, not least in work/life balance. But it has also presented challenges, particularly when it comes to security. Operating models and infrastructure have undergone changes, with a significant move towards the cloud. This has put the browser front and centre as a key productivity and communications tool. And malicious actors have not been slow to take advantage.
{"title":"Responding to worsening web browser attacks","authors":"Jonathan Lee","doi":"10.12968/s1353-4858(23)70002-0","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70002-0","url":null,"abstract":"The sudden increase in remote and home working has brought many benefits, not least in work/life balance. But it has also presented challenges, particularly when it comes to security. Operating models and infrastructure have undergone changes, with a significant move towards the cloud. This has put the browser front and centre as a key productivity and communications tool. And malicious actors have not been slow to take advantage.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"26 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79297990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-01DOI: 10.12968/s1353-4858(22)70071-2
Maya Natarajan
Cyberthreats are becoming more numerous and complex. This poses a major challenge for security professionals trying to stay up to date with the latest developments. This is why many organisations are turning to graph-based digital twin technology to improve their cyber resilience management.
{"title":"Strengthening cyber security with digital twins","authors":"Maya Natarajan","doi":"10.12968/s1353-4858(22)70071-2","DOIUrl":"https://doi.org/10.12968/s1353-4858(22)70071-2","url":null,"abstract":"Cyberthreats are becoming more numerous and complex. This poses a major challenge for security professionals trying to stay up to date with the latest developments. This is why many organisations are turning to graph-based digital twin technology to improve their cyber resilience management.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"3 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80270316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-01DOI: 10.12968/s1353-4858(22)70068-2
Kevin M Bocek
Containers are everywhere now, and with the help of Kubernetes it has become easy to deploy complex infrastructures. This raises its own challenges regarding visibility and the application of security policies. And while tools such as Istio have appeared to help with this issue, they need to be used with care and can raise security issues of their own.
{"title":"Why businesses shouldn't rely on Istio's Mutual TLS","authors":"Kevin M Bocek","doi":"10.12968/s1353-4858(22)70068-2","DOIUrl":"https://doi.org/10.12968/s1353-4858(22)70068-2","url":null,"abstract":"Containers are everywhere now, and with the help of Kubernetes it has become easy to deploy complex infrastructures. This raises its own challenges regarding visibility and the application of security policies. And while tools such as Istio have appeared to help with this issue, they need to be used with care and can raise security issues of their own.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"75 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83376122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-01DOI: 10.12968/s1353-4858(22)70069-4
C. Clark
Microsoft's Active Directory was introduced to solve myriad networking problems. But its openness and widespread adoption have also made it a key target for cyber attacks. This article looks at one specific vulnerability and how it demonstrates the key role of AD, and its potential as a weak spot in your networks.
{"title":"Analysis of a new AD vulnerability","authors":"C. Clark","doi":"10.12968/s1353-4858(22)70069-4","DOIUrl":"https://doi.org/10.12968/s1353-4858(22)70069-4","url":null,"abstract":"Microsoft's Active Directory was introduced to solve myriad networking problems. But its openness and widespread adoption have also made it a key target for cyber attacks. This article looks at one specific vulnerability and how it demonstrates the key role of AD, and its potential as a weak spot in your networks.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"23 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83535255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-01DOI: 10.12968/s1353-4858(22)70070-0
Ben Jacob
Multi-factor authorisation has become essential in this era of remote working. It undoubtedly adds a significant layer of security, but it's not without its own weaknesses, which threat actors have been quick to exploit. The trick is to spot when this is happening and takes the right steps to keep your organisation secure.
{"title":"How to deal with MFA bypass","authors":"Ben Jacob","doi":"10.12968/s1353-4858(22)70070-0","DOIUrl":"https://doi.org/10.12968/s1353-4858(22)70070-0","url":null,"abstract":"Multi-factor authorisation has become essential in this era of remote working. It undoubtedly adds a significant layer of security, but it's not without its own weaknesses, which threat actors have been quick to exploit. The trick is to spot when this is happening and takes the right steps to keep your organisation secure.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"54 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73707839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-01DOI: 10.12968/s1353-4858(22)70066-9
Matias Madou
Many organisations remain vulnerable to zero-day attacks. Zero-day attacks, by definition, give developers zero time to find and patch existing vulnerabilities that could be exploited, because the threat actor got in first. The damage is done and then it's a mad scramble to fix both the software and reputational damage to the business. Attackers are always at an advantage, and reducing that edge as much as possible is crucial.
{"title":"Defence against the dark art of zero-day attacks","authors":"Matias Madou","doi":"10.12968/s1353-4858(22)70066-9","DOIUrl":"https://doi.org/10.12968/s1353-4858(22)70066-9","url":null,"abstract":"Many organisations remain vulnerable to zero-day attacks. Zero-day attacks, by definition, give developers zero time to find and patch existing vulnerabilities that could be exploited, because the threat actor got in first. The damage is done and then it's a mad scramble to fix both the software and reputational damage to the business. Attackers are always at an advantage, and reducing that edge as much as possible is crucial.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76634404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}