Finding Vulnerabilities in Open Source Projects

Read Time:45 Second

The Open Source Security Foundation announced $10 million in funding from a pool of tech and financial companies, including $5 million from Microsoft and Google, to find vulnerabilities in open source projects:

The “Alpha” side will emphasize vulnerability testing by hand in the most popular open-source projects, developing close working relationships with a handful of the top 200 projects for testing each year. “Omega” will look more at the broader landscape of open source, running automated testing on the top 10,000.

This is an excellent idea. This code ends up in all sorts of critical applications.

Log4j would be a prototypical vulnerability that the Alpha team might look for ­– an unknown problem in a high-impact project that automated tools would not be able to pick up before a human discovered it. The goal is not to use the personnel engaged with Alpha to replicate dependency analysis, for example.

Read More

Tenable Launches Suite of New Product Features to Deliver Full Lifecycle Cloud-Native Security

Read Time:3 Minute, 0 Second

Our newest Tenable.cs product features are designed to enable organizations to stay agile while reducing risk.

A suite of upgrades to Tenable.cs, our cloud-native application protection platform, are designed to enable organizations to secure cloud resources, container images and cloud assets to provide end-to-end security from code to cloud to workload.

Even as organizations are adopting the cloud at exponential rates, they continue to face the challenges of protecting and securing resources and workloads in the public cloud. And, as the responsibilities of modern security teams continue to evolve and increase in complexity, the pressure to meet workload demands while minimizing security risks continues to mount. Implementing a new framework, one that allows organizations to remain agile while strengthening security is key. Enter Tenable.cs.

Tenable.cs delivers full lifecycle cloud-native security to address cyber risks from build to runtime. It enables organizations to programmatically detect and fix cloud infrastructure misconfigurations in the design, build and runtime phases of the Software Development Lifecycle (SDLC) to prevent unresolved insecure configuration or exploitable vulnerabilities from reaching production.

Tenable.cs secures infrastructure as code (IaC) before deployment, maintains a secure posture in runtime and controls drift by synchronizing configuration between runtime and IaC. It enables IaC to remain the single source of truth, eliminating the need for complex and manual processes.

Newest capabilities in Tenable.cs

Tenable.cs offers continuous visibility to assess cloud hosts and container images for vulnerabilities without the need to manage scan schedules, credentials, or agents. It provides Frictionless Assessment and Nessus Vulnerability Assessment for cloud workloads as well as Tenable.io container Security.

With Tenable.cs, all cloud assets —including ephemeral assets —- are continuously reassessed as new vulnerability detections are added and as new assets are deployed. This always-on approach allows organizations to spend more time focusing on the highest priority vulnerabilities and less time on managing scans and software.

Tenable.cs now also supports Tenable.ep

Tenable.cs further expands the scope of Tenable’s comprehensive cyber exposure management platform. Now, with the addition of Tenable.cs to Tenable.ep, organizations can determine the cyber risks of their cloud resources alongside other assets, such as IT assets, web apps, containers and operational technology (OT) devices.

With Tenable.cs, Tenable now delivers an integrated, end-to-end cloud security solution and a complete picture of cyber risks across the modern attack surface with unified visibility into code, configurations, assets and workloads.

Accessing the new features

Tenable.cs gives DevSecOps teams pragmatic, cloud native security solutions to continue the mission of helping organizations innovate in the cloud with confidence.

It is available as both a standalone solution and as a part of Tenable.ep. Additionally, Tenable has further expanded Tenable.ep, adding Tenable.ad for Active Directory environments to its platform’s single and flexible asset-based license for simple procurement and deployment. Tenable.ad will also continue to be sold as a separate solution and will be available Feb. 2

Schedule your free consultation and demo

If you’re not already a Tenable customer, please schedule a free consultation and demo to discuss how we can help you improve your security program and results.

For more information about Tenable.cs, visit tenable.com/products/tenable-cs or join us on March 2nd at 2:00 p.m. EST for a webinar on Introducing Tenable.cs: Cloud-Native Security From Code to Cloud.

Learn more

Visit the Tenable.cs product page
View the Tenable.cs press release
Attend the webinar, Introducing Tenable.cs: Cloud-Native Security From Code to Cloud

Read More

#Enigma2022: Pandemic Misinformation Reveals Challenges for Online Health Information

Read Time:3 Minute, 9 Second

#Enigma2022: Pandemic Misinformation Reveals Challenges for Online Health Information

The fact that misinformation is rampant online is not a new phenomenon. Perhaps less understood is the intersection between how often an individual sees a piece of misinformation and how likely they are to believe it.

In a session at the Enigma 2022 conference on February 1, Patrick Gage Kelley, trust and safety researcher at Google, outlined the results of a two-year study conducted by Google about online misinformation. The study was conducted throughout 2020 and 2021 and involved a series of regular surveys that included feedback from over 50,000 people from 16 countries worldwide.

Kelley explained that the researchers had two basic lines of questioning. The first focused on exposure. The researchers asked about a certain statement of information and whether the survey participant heard the information once, many times or not at all. The second line of questioning focussed on beliefs. Respondents could tell the researchers if they strongly believe a specific statement, if they kind of believe it or if they strongly don’t believe it.

Pandemic Conspiracy Misinformation and Beliefs

The Google-led research asked about a series of pandemic-specific conspiracies and found a shocking level of awareness and belief in them.

“We asked people if Bill Gates, George Soros or some other powerful person is behind COVID-19, and 16% globally had that belief,” Kelley said. “We asked people if injecting cleaning products or UV light into people is an effective treatment for COVID-19 – that had an 11% belief.”

Kelley noted that the research wasn’t conducted as just a single point-in-time study but conducted with researchers doing the survey and asking similar questions every few months.

“One of the effects that we find over and over again is that although the narratives move quickly, once these fringe beliefs take hold, they’re difficult to change,” he said.

The researchers also tested views about multiple conspiracies related to the COVID-19 vaccinations, including the falsehood that the COVID-19 vaccine has microchips and is used to track those who get vaccinated secretly. In 2020, 11% of global respondents believed that falsehood to be true, dropping to 10% in 2021.

Reasons for Optimism

While there is much to worry about in terms of online misinformation, there is also some cause for optimism, according to Kelley.

Kelley said that overall, there was a higher level of belief in several positive public health statements that the researchers tested than in the more clear-cut misinformation statements tested.

One such statement was that wearing a face-covering in public is an effective way for slowing the spread of COVID-19. 73% of people globally believed that statement in 2020. Another tested statement was that social distancing, by staying at least six feet from people not in your household, effectively slows the spread of COVID-19, which was believed by 70% of respondents globally. In 2021 however, the results dropped by 5% for face masks and 7% for social distancing.

“While this keeps both above the 60% belief range, it shows how much effort is required to maintain these extremely high levels of belief,” Kelley said. “We take this to show how important continued unified proactive health messaging is.”

Kelley concluded his presentation by noting that Google overall continues to see substantial populations in every country believing in various misinformation and low-quality information statements after widespread exposure to that information.

“People are going to believe a wide range of things and what we need to make sure is that we continue to get access to good information,” Kelley said. “There’s going to be misinformation, and one of the things we can do is measure and understand that so that we can best respond.”

Read More

Third of Employees Admit to Exfiltrating Data When Leaving Their Job

Read Time:2 Minute, 7 Second

Third of Employees Admit to Exfiltrating Data When Leaving Their Job

Nearly one-third (29%) of employees admitted taking data with them when they leave their job, according to new research from Tessian.

The findings follow the ‘great resignation’ of 2021, when workers quit their jobs in huge waves following the COVID-19 pandemic. Unsurprisingly, close to three-quarters (71%) of IT leaders believe this trend has increased security risks in their organizations.

In addition, nearly half (45%) of IT leaders said they had seen incidents of data exfiltration increase in the past year due to staff taking data with them when they left.

The survey of 2000 UK workers also looked at employees’ motives for taking such information. The most common reason was that the data would help them in their new job (58%). This was followed by the belief that the information belonged to them because they worked on the document (53%) and to share it with their new employer (44%).

The employees most likely to take data with them when leaving their job worked in marketing (63%), HR (37%) and IT (37%).

The research also found that 55% of workers are considering leaving their jobs in 2022, while two in five (39%) are currently working their notice or actively looking for a new job in the next six months, meaning organizations remain at high risk of data exfiltration.

Josh Yavor, chief information security officer at Tessian, commented: “It’s a rather common occurrence for employees in certain roles and teams to take data when they quit their job. While some people do take documents with malicious intent, many don’t even realize that what they are doing is wrong. Organizations have a duty to clearly communicate expectations regarding data ownership, and we need to recognize where there might be a breakdown in communication which has led to a cultural acceptance of employees taking documents when they leave.

“The great resignation, and the sharp increase in employee turnover, has exposed an opportunity for security and business leaders to consider a more effective way of addressing insider risk. It comes down to building better security cultures, gaining greater visibility into data loss threats and defining and communicating expectations around data sharing to employees – both company-wide and at departmental level. Being proactive in setting the right policies and expectations is a key step before investing in preventative controls.”

study last year found that over three-quarters (78%) of insider data breaches involved unintentional data exposure or loss rather than any malice.

Read More

The ultimate guide to Cyber risk management

Read Time:6 Minute, 17 Second

This blog was written by an independent guest blogger.

Ambitious information security experts serve as a critical part of cyber risk management.

The corporation is responsible for structuring IT and information security activities to protect its data resources, such as hardware, software, and procedures.

To stay competitive, enterprises must design and establish secure environments that retain confidentiality and privacy while also ensuring the integrity of corporate information. This can be achieved through the use of cyber risk management approaches.

This article explores the need for security and provides an overview of cyber risk assessment. We’ll discuss control categorization and approaches with an example.

Need for security

Organizations have long encountered various types of risk. Still, cyber risk has emerged as a critical component – evaluating risks to corporations, their information, and their financial results is a priority.

Malicious hackers are taking advantage of technological advancements and developments to hack and exploit the resources of businesses.

Cyber risk is the third critical corporate risk in 2021, as per the latest Allianz Risk Barometer.
Cybercrime costs approximately $600 billion per year, accounting for over 1% of global GDP, as per The Center for Strategic and International Studies (CSIS), and 300,562,519 people were affected by publicly disclosed security breaches the previous year, as per the Identity Theft Resource Center.

The following table shows some classifications that reflect realistic and prominent threats to a company’s personnel, data, and technology.

Each organization must prioritize the risks it confronts depending on the security scenario in which it works, its organizational risk approach, and the vulnerability levels at which its resources execute.

Cyber risk management

Risk management is the method of identifying vulnerabilities to a company’s data resources and architecture and implementing strategies to reduce that risk to tolerable levels.

The three primary steps of cyber risk management are:

Risk identification
Risk assessment
Risk control

Cyber risk assessment example

Let’s understand the stages of risk assessment with the help of an example.

For instance, your department head assigns you to perform risk management and shares the network architecture, employee lists, software list, etc., with you.

Risk identification

The first step of identification is to identify the assets, categorize, prioritize and store them in the inventory.

It is simple to identify numerous assets first by glancing at network architecture, but preserving them together in memory is difficult, so why not categorize the assets with the components of information security management.

Traditional Components

SecSDLC Components

Examples

People

Employees

Support Staff
Developers
Application Admin

 

Non-Employees

Stakeholders
Vendors
Operational users

Software, Hardware, Network

System Devices/Networking Components

Server
Firewall
IP
Utilities
Application Layer
Database
Routers

Procedure

Procedure

Network elements
Policies and Procedures
SLA
NDA
Reports

Data

Information

Data Owner
Size of Data
Backups
Who will manage the data?
Transmission
Processing

After identifying and categorizing assets, we need to create an inventory of all assets.

We must not prejudge the worth of every asset when compiling an inventory of data assets.
Whether automated or manual, the inventory approach needs significant planning.
It must also include the sensitivity and security level of each item in the inventory.

After inventory, we perform relative assessments to guarantee that we assign the most significant assets top priority. You can also ask several questions to allocate weight to assets for risk assessment. Questions, such as:

What resource is associated with the highest revenue margin?
Which of the assets is the costliest to replace or to safeguard?
Which asset’s removal or corruption might be the most distressing or expose you to the greatest risk?

After performing initial identification, we start an assessment of the risks affecting the company.

If you presume that every risk will indeed target every asset, the project scope suddenly grows so vast that planning becomes impossible.

We should assess each threat for its ability to put the company in jeopardy. This is threat assessment. Answering a few simple questions can help you start a threat assessment:

What threats pose the greatest hazard to a company’s assets?
How much will the attack cost if data recovery is required?
Which threats pose high risks to the data owned by a company?

Risk assessment

You may assess the comparative risk for each vulnerability now that you’ve identified the organization’s assets and threats. We refer to this as risk assessment. Now, identify the vulnerability associated with assets and threats.

Assets

Threats

Vulnerability

Server

Exploitation
System failure
Overheating in Room
Out of Electricity

Backdoors
Unauthorized Access
Open Ports
Old Cooling Devices (AC)

Websites

Malicious Payloads
DDOS
XSS

Policies & Procedures
Firewall
IDPS

Rogue Devices

Spoofing
MITM
Sniffing

Misconfiguration
Not updating devices

 

Each asset is given a risk level or grade during risk assessment. While this number has no exact value, it helps determine the relative risk associated with every sensitive asset.

There is also a basic formula we use to assess the risk.

Risk = likelihood of occurrence of vulnerability * value of the information asset – the percentage of risk mitigated by current controls + uncertainty of current knowledge of the vulnerability.

Let’s utilize this formula with an example.

We have an “asset A” with a value of 40 and one vulnerability with a probability of 1.0 with no security controls. Your facts are 80% credible*.

(If the reliability is 95%, the uncertainty is 5%.)

(40 × 1.0) – 0% + 5% = 45

So, the vulnerability of asset A ranks as 45.

You’ll most likely have listings of assets with information by the end of the risk assessment. The aim was to discover assets’ information with security flaws and create a compilation of them, graded from most vulnerable to least vulnerable.

You gathered and stored a plethora of facts about the assets, the risks they pose, and the risks they disclose while compiling this list and so on.

Risk control

After completing the risk identification, and risk assessment process, we end the risk management with risk control.

Risk control give us five strategies to deal with the risks, and they are:

Defend
Transfer
Mitigate
Accept
Terminate

Let’s see the below table to learn the control strategies in depth.

Risk Control Strategies

Definition

Examples

Defend

The defend strategy tries to eliminate the vulnerability from being exploited.

a cryptographic-based verification technique RADIUS

Transfer

Using the transfer control technique, we shift the risks to other resources, activities, or companies.

Rethink how services are working and offered.

 

Revising deployment models.

 

Rechecking outsources services.

Mitigate

With planning and response, the mitigation control technique seeks to lessen the effect of vulnerability exploitation.

Incident Response Plan (IR).

 

Disaster Recovery Plan (DRP).

 

Business Continuity Plan (BCP)

Accept

The accept control strategy is doing less to prevent a vulnerability from being exploited and accepting the result of such an attack.

Risk acceptance is related to the risk level and the threat value of the risk.

 

Is the risk risky enough to accept it and do nothing for a while?

Terminate

The company’s terminate control strategy encourages it to eliminate commercial operations that pose unmanageable risks.

 

Instead of applying risk controls, the organization terminates the activity/product, which brings risks.

Risk reporting

The very last step we have is risk reporting. It’s a crucial part of risk assessment. After performing the entire risk management process, you have to document it. Risk reports are a technique of informing those that need to know about the project and company’s risks.

Conclusion

In a nutshell, as you progress along the risk management process, you’ll have a greater understanding of your corporation’s architecture, your most important data, and how you can improve your management and security.

Read More

CVSS 9.9-Rated Samba Bug Requires Immediate Patching

Read Time:1 Minute, 45 Second

CVSS 9.9-Rated Samba Bug Requires Immediate Patching

A critical vulnerability in a popular open-source networking protocol could allow attackers to execute code with root privileges unless patched, experts have warned.

Samba is a popular free implementation of the SMB protocol, allowing Linux, Windows and Mac users to share files across a network.

However, a newly discovered critical vulnerability (CVE-2021-44142) in the software has been given a CVSS score of 9.9, making it one of the most dangerous bugs discovered in recent years. Log4Shell was given only a slightly higher score of 10.0.

“All versions of Samba prior to 4.13.17 are vulnerable to an out-of-bounds heap read-write vulnerability that allows remote attackers to execute arbitrary code as root on affected Samba installations that use the VFS module vfs_fruit,” Samba explained.

“The specific flaw exists within the parsing of EA metadata when opening files in smbd. Access as a user that has write access to a file’s extended attributes is required to exploit this vulnerability. Note that this could be a guest or unauthenticated user if such users are allowed write access to file extended attributes.”

Patches have been released, and Samba updates 4.13.17, 4.14.12 and 4.15.5 have been issued to fix the problem, with administrators being urged to upgrade to these releases or apply the patch as soon as possible. The vulnerability has not yet been exploited in the wild at the time of writing, but this is likely to change.

An additional workaround is possible if sysadmins remove the “fruit” VFS module from the list of configured VFS objects in any “vfs objects” line in the Samba configuration smb.conf.

The new vulnerability comes at a busy time for administrators, many of whom spent time over the holidays hunting for instances of vulnerable Log4j hidden in Java dependencies across their organization.

Last year was another record-setter in terms of the number of CVEs published to the National Vulnerability Database (NVD), the fifth year in a row this has happened.

Read More

Managing security in hybrid Windows 11 and Windows 10 environments

Read Time:1 Minute, 2 Second

You’ve been given the task for 2022 to start a pilot project for deploying and managing Windows 11.  Any platform is only as secure as how well you can manage it. Microsoft has stated that managing Windows 11 will be just like managing Windows 10. However, some distinct nuances in management may make you reconsider the security management tools that you’ll use for Windows 11 and possibly even Windows 10.

Many firms use a traditional Active Directory infrastructure to manage a mixture of Windows machines – for example, Group Policy to manage security settings as well as to set security settings for Windows Software Update Services or Windows Update for Business.  As a recent Microsoft blog noted, you may need to determine which ADMX templates you need to deploy in your Group Policy central store. If your firm will be staying on Windows 10 for the near future, it’s recommended that you stay with Windows 10 ADMX templates rather than installing and using the Windows 11 templates. If you will be primarily using Windows 11, even if you still have some machines on Windows 10, you’ll want to roll out the Windows 11 ADMX templates.

To read this article in full, please click here

Read More

5 steps to run a successful cybersecurity champions program

Read Time:45 Second

Cybersecurity champions programs nurture and encourage cybersecurity awareness within a business, combining education with peer-to-peer collaboration to embed a culture of security understanding, support, and positive behavior among a workforce. A typical program consists of individuals from different departments who act as security advocates for their function and help to shape an organization’s cybersecurity approach internally.

Growing in popularity across a wide range of industries, cybersecurity champions programs have proven so beneficial that they became integral components of some organizations’ cybersecurity awareness strategies.

An effective and productive cybersecurity champions program requires several key elements to achieve its goals and avoid being a wasted investment. Here are the advantages of running a cybersecurity champions program for CISOs with five steps to doing so, including advice from security leaders and experts who have first-hand experience in this area.

To read this article in full, please click here

Read More

Ninety Percent of Security Leaders Warn of Skills Shortage

Read Time:2 Minute, 8 Second

Ninety Percent of Security Leaders Warn of Skills Shortage

Most IT security decision-makers are struggling to recruit workers to address a shortage of skilled professionals, despite business backing to do so, according to new research.

Global cybersecurity recruitment firm Stott and May teamed up with venture investor Forgepoint Capital to compile the Cyber Security in Focus study. It features responses from cybersecurity directors, security operations directors and VPs of product security in EMEA and North America.

Some 87% of respondents admitted they are suffering skills shortages, with over a third (35%) claiming positions were left unfilled after a 12-week period.

As a result, in-house skills (43%) were cited as the most significant barrier to strategy execution, above budget (35%), technology (13%) and board-level buy-in (9%).

The challenges around hiring have also led to a surge in salaries: 54% of hiring managers believe that these have increased more than 11% year on year in the sector.

The study also highlighted something of a contradiction. Security is gaining board-level buy-in. Some 80% of security leaders said their business perceives the function as a “strategic priority,” up from 54% last year. In addition, 100% agree that the business feels the function plays a role in improving the overall value proposition to customers.

However, over half (51%) of respondents argued that cybersecurity investment is still not keeping pace with digital transformation.

As investments in digital increase, sourcing the right engineering-centric CISOs will be the key to success, according to Forgepoint Capital managing director William Lin.

“A lot of digital transformation is inherently going to be driven by engineering, and finding a CISO that can empower developers with knowledge, tooling and experience will enable outcomes to be achieved faster and more securely,” he argued.

Heather Paunet, SVP at Untangle, argued that closing the cyber skills gap will require the industry to promote itself to would-be recruits better.

“There also needs to be organizational change that recognizes the severity and devastation cyber-attacks can cause and makes cybersecurity a priority. Companies need to ensure this investment isn’t just in technology, but also in their current workforce with continual training, advancement opportunities and recognition,” she added.

“In addition, IT education programs need to do the profession justice and emphasize the different roles and careers available in cybersecurity.”

According to the latest ISC2 survey, global skills shortages fell for the second consecutive year in 2021 to 2.7 million, including a shortfall of 377,000 in the US and 33,000 in the UK.

Read More

Scottish Agency Still Recovering from 2020 Ransomware Attack

Read Time:1 Minute, 41 Second

Scottish Agency Still Recovering from 2020 Ransomware Attack

A ransomware attack on a Scottish regulator in 2020 continues to significantly impact operations, with the true cost of the incident still unknown, an audit has found.

The double extortion attack hit the Scottish Environment Protection Agency (SEPA) on Christmas Eve 2020, forcing IT services offline.

According to a new report from Audit Scotland, the initial attack vector appears to have been a phishing email, although it’s still not 100% clear.

Despite following best practice backup guidelines, with one copy stored offline, the “sophisticated nature of the attack” meant online copies were quickly targeted, and there was no way of accessing historical records quickly, the spending watchdog claimed.

As a result, the “majority” of SEPA’s data was encrypted, stolen or lost.

Despite claiming the agency had a “high” level of cyber-maturity, independent reviews since the attack have also made 44 recommendations for enhancing the agency’s cyber-readiness and resilience.

According to Audit Scotland, it will be particularly alarming to Scottish taxpayers that more than a year on from the attack, the agency is still reinstating some of its systems.

The auditor took the rare step of issuing a “disclaimer of opinion” on SEPA’s annual accounts for 2020/21, claiming it couldn’t access enough evidence to substantiate £42m of income from contracts.

The agency still doesn’t know the total financial impact of the cyber-attack, although it has already been forced to write off over £2m in bad debts because of records lost to the incident.

“Based on management forecasts during the year, the Scottish Government gave SEPA authority to overspend by £2.5m to cover the impact of Covid19 and the cyber-attack if required,” the report claimed.

“SEPA recognizes that the cyber-attack has increased the medium to longer-term financial pressures on the organization. Its financial strategy 2020-24 had already identified potential variability in future income and expenditure streams of up to £17.9m as a worst-case scenario.”

Read More