One in 10 employees leaks sensitive company data every 6 months: report

Read Time:48 Second

Insider threats are an ongoing menace that enterprise security teams need to handle. It’s a global problem but especially acute in the US—with 47 million Americans quitting their jobs in 2021, the threat of ex-employees taking sensitive information to competitors, selling it to criminals in exchange for cash, and leaking files to media is making data exfiltration a growing concern.  

About 1.4 million people who handle sensitive information in their organization globally were tracked over the period from January to June 30 this year by cybersecurity firm Cyberhaven to find out when, how and who is involved in data exfiltration.

On average, 2.5% of employees exfiltrate sensitive information in a month, but over a six-month period, nearly one in 10, or 9.4% of employees, do so, Cyberhaven noted in its report. Data exfiltration incident occurs when data is transferred outside the organization in unapproved ways.

To read this article in full, please click here

Read More

Iranian cyberspies use multi-persona impersonation in phishing threads

Read Time:32 Second

One of the most prolific state-sponsored Iranian cyber espionage groups is targeting researchers from different fields by setting up sophisticated spear-phishing lures in which they use multiple fake personas inside the same email thread for increased credibility.

Security firm Proofpoint tracks the group as TA453, but it overlaps with activity that other companies have attributed to Charming Kitten, PHOSPHORUS and APT42. Incident response company Mandiant recently reported with medium confidence that APT42 operates on behalf of the Islamic Revolutionary Guard Corps (IRGC)’s Intelligence Organization (IRGC-IO) and specializes in highly targeted social engineering.

To read this article in full, please click here

Read More

8 blockchain security issues you are likely to encounter

Read Time:5 Minute, 0 Second

This blog was written by an independent guest blogger.

Blockchain technology has grown up in popularity in recent years. Excluding its initial application in cryptocurrency, it’s currently getting used in property, healthcare, smart contracts and many other fields.

The technology collects and stores information in groupings referred to as “blocks” and every block will hold a collection quantity of knowledge. Once a block is full, it’s in chains to the previous full block, forming an information chain, hence the good name “blockchain”.

Blockchain is predicated on the concepts of consensus, decentralization and cryptography to confirm dealings trust. However, several blockchain security problems have arisen thanks to faulty technology implementation.

Public vs private blockchain security

To further explain blockchain security, it’s a necessity to first grasp the difference between public and private blockchain security. In terms of participation and data access capabilities, blockchain networks can have various effects. As a result, there are two forms of labeling for blockchain networks i.e., Public and Private networks.

• Public blockchain networks are open and might allow any user to join while maintaining participant anonymity.

• In private blockchain networks, identity is used to verify membership and access privileges. Also, they only accept familiar organizations to engage.

Blockchain security issues and solutions

Many people are right after they believe blockchain is inherently secure. Blockchain is certainly beneficial to organizations, but it’s significant drawbacks because of specific security issues.

Here are the 8 top highest blockchain security issues and their solutions.

1. Sybil attack

In a Sybil attack, hackers generate various fake network nodes. using those nodes, the hacker will acquire majority consensus and disrupt the chain’s transactions. As a result, a large-scale Sybil assault is nothing quite a 51% attack.

To prevent Sybil attacks:

• Use acceptable consensus algorithms.

• Monitor alternative nodes’ behavior and check for the nodes that square measure solely forwarding blocks from one user.

While these algorithms might not fully prevent these attacks, they create a lot of hurdles & it’s almost impossible for hackers to carry out attacks.

2. Endpoint vulnerabilities

The vulnerability of blockchain endpoints is another vital security concern in blockchain security.

The blockchain network’s end is wherever users act with the blockchain: on electronic devices like computers and mobile phones. Hackers will observe user behavior and target devices to steal the user’s key. This might be one of the foremost visible blockchain security problems.

To prevent end vulnerabilities:

• Do not save blockchain keys on your laptop or mobile as text files.

• Transfer and install antivirus software packages for your electronic devices.

• Review the system often, keeping track of the time, location, and device access.

3. 51% attack

A 51% attack occurs when one individual or organization (malicious hackers) collects quite 1/2 the hash rate and seizes control of the whole system, which might be disastrous. Hackers can modify the order of transactions and forestall them from being confirmed. they’ll even reverse previously completed transactions, leading to double spending.

To prevent 51% attacks:

• Ensure that the hash rate is higher.
• Improve your mining pool monitoring.

4. Phishing attacks

The hacker’s goal in a very phishing attack is to steal the user’s credentials. they’ll send legitimate-looking emails to the owner of the wallet key. The user is required to enter login details via an attached fake hyperlink. Having access to a user’s credentials and other sensitive information might lead to damages for both the user and therefore the blockchain network. they’re also liable to follow-up attacks.

To prevent phishing attacks:

• Improve browser security by installing a verified add-on or extension to notify you about unsafe websites.

• Improve device security by putting in malicious link detection software similarly as dependable antivirus software.

• Reconfirm with the support or partner if you receive an email requesting login details regarding the problem.

• Don’t click on the links until you’ve thoroughly reviewed it. Rather than clicking on the links, enter the address into your browser’s private tab.

• Avoid open or public cafe’s Wi-Fi networks.

• Confirm your system and software is up to date.

5. Routing attacks

A blockchain network and application rely on the real-time movement of massive amounts of knowledge. Hackers can use an account’s anonymity to intercept data because it’s being transmitted to internet service providers.

In the case of a routing attack, blockchain participants are usually unaware of the threat because data transmission and operations proceed as was common. The danger is that these attacks will frequently expose confidential data or extract currency without the user’s knowledge.

To prevent routing attacks:

• Use encryption.

• Implement secure routing protocols (with certificates).

• Change passwords regularly; use strong passwords.

• Educate yourself and your workers about the risks associated with information security.

6. Private keys

Private Key or seed phrase is the main key to your funds. If your private key is weak, it can be easy for a hacker to guess. This means that they could gain access to your funds.

Private keys should be kept secret and strong enough that they can’t be easily guessed.

7. Scalability issues

Blockchain technology continues to be in its infancy and so has quantifiability problems. This implies that the network will solely handle a restricted variety of transactions at any given time. There are multiple offline solutions (L2s) & sidechains which you can use to avoid scalability issues.

8. Malicious nodes

The other security problems facing blockchain technology are the danger of malicious nodes. This will happen once a lousy actor joins the network and tries to disrupt it. They’ll try this by flooding the network with transactions or making an attempt to reverse valid transactions.

Conclusion

Although blockchain has many security vulnerabilities, cyber security professionals will do loads to remove or mitigate these problems. IT specialists with proper analytical and technical skills are well-positioned to deploy blockchain most firmly and securely. But it’s always good to have information about different attacks and the prevention techniques to secure your assets.

Read More