More stories

  • in

    US and EU to cooperate on tech standards, supply chain security and tech development

    Image: Getty Images
    The United States and the European Union have started work on coordinating approaches across various technology areas, including AI and semiconductors, and tackling non-market policies that result in the misuse of technology.The plan was created on Wednesday after US and EU representatives, including US President Joe Biden and European Commission Vice Presidents Valdis Dombrovskis and Margrethe Vestager, met for the first time as part of the new US-EU Trade and Technology Council (TTC).The US-EU Trade and Technology Council launched in June as part of efforts to ensure sensitive technologies are not misused and cyber attacks can be prevented. At the time, the council agreed to create 10 working groups focused on addressing various technological and trade issues.”Future conflicts will be fought very differently. The fight over tech will be the new battleground of geopolitics. Security also means that we need to keep an eye on what we export and who is investing in our economies. And what they are investing in. Here, our aim is to strive for convergent export control approaches on sensitive dual-use technologies.,” Dombrovskis said prior to the inaugural TTC meeting.After the meeting, the EU and US said in a joint statement the council would look to address the misuse of technology and protect societies from information manipulation and interference.In the joint statement, the council also provided more details on what the 10 working groups will do. Among the working groups, there are ones that will focus on developing technology standards, advancing supply chain security, developing finance for secure and resilient digital connectivity in third-world countries, data governance, combatting arbitrary or unlawful surveillance, export controls, investment screening with a focus on sensitive technologies and related sensitive data, and promoting access of digital tools for small and medium-sized businesses.While China was not mentioned as being part of the council’s meeting agenda, one of the working groups created by the TTC will specifically focus on addressing challenges from non-market economic policies and practices that distort trade. The council listed examples of these non-market practices as including forced technology transfer, state-sponsored theft of intellectual property, market-distorting industrial subsidies, and discriminatory treatment of foreign companies.

    “We intend to cooperate on the development and deployment of new technologies in ways that reinforce our shared democratic values, including respect for universal human rights, advance our respective efforts to address the climate change crisis, and encourage compatible standards and regulations,” the EU and US said in a joint statement.Geopolitical movements, specifically around trade and technology, have been on the rise. The Quad earlier this week announced various non-military technology initiatives aimed at establishing global cooperation on critical and emerging technologies, such as AI, 5G, and semiconductors.Australia, the US, and the UK also recently established the AUKUS security pact, which is aimed at addressing defence and security concerns posed by China within the Indo-Pacific region through defense-related science and technological means. AUKUS’ first initiative is helping Australia acquire nuclear-powered submarines.Like the TTC, both the Quad and AUKUS took indirect swipes at China when announcing their respective sets of new initiatives.Meanwhile, China has formally applied to join the Comprehensive and Progressive Agreement for Trans-Pacific Partnership (CPTPP), one of the world’s largest trade pacts. Taiwan, which has similarly applied to join the CPTPP, has accused China of only making the application to block Taiwan from entering international trade blocs.RELATED COVERAGE More

  • in

    Best IT certifications for all career stages

    IT certifications offer a quick and relatively inexpensive way to enter or enhance an IT career. These credentials may focus on entry-level fundamentals or system and network concentrations for management and specialized careers.Information technology certifications can provide professionals with the training, skills, and credentials necessary to enter the IT field or move within it. Today, skilled IT professionals are in high demand and benefit from remote working opportunities. The Bureau of Labor Statistics (BLS) projects 13% growth for all computer occupations between 2020 and 2030. The computer and information technology sector pays median annual wages of $91,250. Throughout this page, we explore the value of IT certifications and examine some of the leading credentials for entry-level and experienced IT professionals, plus the certifications with the highest earning potential.What is information technology?Information technology includes the hardware, software, and devices that store, process, and manage information. Studies in this field cover the uses, implementation, and optimization of these technologies.Within many organizations, IT departments take on responsibilities including: Operations: Operations professionals focus on providing technical support to users, managing and maintaining network performance, and device management. 

    Infrastructure installation and maintenance: Infrastructure professionals implement and configure systems and devices. They provide troubleshooting and maintenance when required. Governance: Governance professionals oversee the IT policies and procedures within an organization. They establish IT strategies and goals and provide leadership.What is an IT certification?IT certifications exhibit a professional’s mastery over a specific discipline, technology, or field. The credentials may feature both condensed training and an exam or only one of these components. IT certifications may provide entry-level, intermediate, or advanced training and credentials.Professionals can pursue certifications to enter the IT field, change positions, or advance their careers. The credentials can showcase a professional’s expertise with a specific vendor’s technology, which may be extremely valuable for employers who use those systems.They also demonstrate determination and drive for personal and professional improvement. IT certification costThe cost of an IT certification varies. Some platforms feature a monthly fee, such as Coursera, which charges between $29-$99. First-time participants can get a free trial period.Most certifications have an exam fee between $99-$999. These credentials often allow candidates to study on their own for free, though paid study materials or instructor-led classes are usually available. What’s the difference between certifications and degrees in information technology?Though they can have similar outcomes, IT certifications and degrees feature significant differences. In contrast to highly focused and accelerated certifications, degrees combine general education and core training over 2- to 4-year periods. Many degrees offer specialization options and courses like information systems fundamentals, enterprise network design, and cybersecurity. While both associate degrees and certain certifications can lead to entry-level careers, many advanced and high-paying IT roles require a bachelor’s degree in IT or higher. What’s the difference between information technology certificates and certifications?An information technology certificate is an education program that trains learners in a specific IT field. Compared to degree-granting IT programs, an information technology certificate takes less time and does not include general education courses. Most certificate programs take 4-12 months. Certifications are granted by third-party providers who meet industry-wide specifications, while a certificate is generally earned through a college or other learning platform. Both undergraduate and graduate certificates are available. By comparison, a certification generally does not require classes. Instead, candidates meet experience or education prerequisites and pass an examination. Some certificate programs offer a credential upon completion, including the IBM Cybersecurity Analyst Professional Certificate in the list below.Must-have certifications in 2021With so many certifications to choose from, IT professionals can find the selection process challenging. To help simplify matters, we picked out the most widely recognized and sought-after credentials available. The following lists highlight some of the best entry-level, specialized, and high-earning certifications on the market.Entry-level IT certificationsEntry-level certifications can open the door to the IT industry for aspiring professionals without any previous education or experience. With a mixture of foundational and specialized training, these credentials may help candidates change careers and can lead to more advanced training and credentials in the future. 

    NicoElNino, Getty Images/iStockphoto

    Time to complete: Approximately six monthsCost: $39/month Exam required? NoDesigned to prepare graduates for entry-level IT support positions, this certificate equips participants with troubleshooting, debugging, and program installation skills. The training covers Linux, Domain Name Systems, and cloud computing. No previous experience is required. 

    (Image: Shutterstock)

    Time to complete: Approximately eight monthsCost: $39/monthExam required? NoThis certificate teaches aspiring IT support specialists how to write Python script that automates IT solutions and administrative tasks. The training also covers Git, GitHub, IT resource management, and troubleshooting and debugging. No previous experience is required.

    Time to complete: Eight days + 120-minute examCost: $300Exam required? YesDeveloped for aspiring IT and networking professionals, this certification provides participants with knowledge of Cisco network components, IP services, and security. Candidates often possess Cisco solutions experience and knowledge of network fundamentals and IP addressing.  

    By The Art of Pics — Shutterstock

    Time to complete: VariesCost: $127Exam required? YesMicrosoft Technology Associate certifications cover infrastructure fundamentals in areas including operating systems, networking, Windows server administration, and security. These certifications can lead to careers in IT support and administration for desktop, cloud computing, and servers. Candidates taking each exam should have experience and familiarity with the major concepts and fundamentals.

    Cloud technology certificationsCloud technologies give users access to various computing services whenever and wherever they need them. Certified professionals in this field can access some of the most in-demand computer occupations. The following are some of the best certifications in this field.

    By DANIEL CONSTANTE — Shutterstock

    Time to complete: Two days + 45-minute examCost: $99Exam required? YesThis certification acknowledges professionals with knowledge of Microsoft Azure services, support, and security. Candidates possess an understanding of the integrated management tools and solutions, along with the network and compliance features. There are no exam prerequisites other than understanding the material.

    Time to complete: VariesCost: $165Exam required? YesThis certification prepares professionals to govern an organization’s cloud infrastructure and resources. It demonstrates skills in implementing and managing Microsoft Azure environments.  Candidates should possess at least six months of experience using Microsoft Azure and related systems.

    IT security certificationsIT security certifications credentials prepare professionals to protect organizational information, develop advanced security programs, and establish risk management strategies. Certified professionals can pursue roles in management or as cybersecurity specialists. 

    By JLStock — Shutterstock

    Time to complete: Approximately eight months + examCost: $49/monthExam required? YesDesigned for cybersecurity analysts, this certification prepares professionals to protect data and endpoints, collect security data, and leverage open source tools. Certificate-holders learn to identify database vulnerabilities, prevent malware attacks, and detect and handle cyberthreats. No previous experience is required. 

    By JLStock — Shutterstock

    Time to complete: 90-minute exam + study timeCost: $370 – $949Exam required? Ideal for IT professionals who want to demonstrate cybersecurity expertise, this certification covers threat and vulnerability detection, program design and implementation, and incident response. Certified professionals also master organizational risk management & regulations compliance. Experience is not mandatory, but two years of IT and security experience is recommended.

    Network certificationsNetwork certifications focus on improving business communications and networks. Credentialed professionals know how to design, implement, manage, and optimize networks for organizations, leading to careers in network administration, analysis, and management.

    Time to complete: Approximately 16 days of training + two 120-minute examsCost: $400Exam required? YesThis certification prepares professionals to take on roles dedicated to enterprise networking technologies. The core training and exam equip learners to handle dual-stack architecture, network assurance, and security. Concentrations are available in advanced routing, wireless networks, and automation. There are no prerequisites, but many candidates possess between 3-5 years of experience with enterprise networking solutions. 

    Time to complete: Recommended three-day course + 90-minute examCost: $200Exam required? YesMade for networking professionals, this certification covers the Juniper Networks Junos operating system. The credential recognizes those who understand the system fundamentals and interfaces, can configure Junos devices, and can identify routing concepts and policies. An optional training course is recommended prior to taking the exam. 

    Shutterstock

    Time to complete: 90 minutes + study timeCost: $338 – $999Exam required? YesBuilt for aspiring network troubleshooters and administrators, this certification recognizes professionals who have a grasp of networking concepts, devices, security, and operations. CompTIA recommends test-takers have nine months of networking experience and a solid handle on the exam material before testing.

    Highest Paying IT CertificationsMany IT certifications lead to promising careers, but some offer greater financial rewards than others. Through a survey with 3,700 U.S.-based respondents, Global Knowledge found professionals holding the following IT certifications reported the best ROI and highest average salaries. Readers should note that salaries may be dependent on experience, employers, performance, and location. 

    Time to complete: Two-hour exam + study timeCost: $200Exam required? YesAverage salary: $171,749Created to recognize data engineering expertise, this certification acknowledges professionals who can design, build, and manage data processing systems. The credential focuses on machine learning models, compliance, and security. Google recommends that test-takers possess at least three years of professional experience and one year of experience with Google Cloud.

    By SFIO CRACHO — Shutterstock

    Time to complete: Two-hour exam + study timeCost: $200Exam required? YesAverage salary: $169,029This certification acknowledges professionals who provide business solutions using Google Cloud technologies. The exam covers cloud solutions design and planning, security, reliability, and management. Google recommends that professionals possess at least three years of industry experience and one year of Google Cloud experience before testing.

    Shutterstock

    Time to complete: 130-minute exam + study timeCost: $150Exam required? Average salary: $159,033This certification affirms professionals’ skills in AWS cloud systems and solutions. The exam covers designing and implementation of distributed systems, including AWS security, networking, and compliance requirements. AWS recommends that test-takers have at least one year of experience using AWS technologies. 

    Getty Images/iStockphoto

    Time to complete: Four-hour exam + study timeCost: $575 for members and $760 for non-membersExam required? YesAverage salary: $151,995Developed for IT risk management and security professionals, this certification demonstrates an understanding of risk monitoring and threat mitigation. The credential covers information systems governance, assessment, security, and risk response and reporting. For certification, professionals need at least three years of relevant professional experience.

    Time to complete: Three-hour exam + study timeCost: $749Exam required? YesAverage salary: $151,853Awarded to IT professionals who can design and manage effective cybersecurity programs, this certification covers risk management, architecture and engineering, assessment and testing, and software development. The requirements for certification include a minimum of five years of experience in at least two CISSP domains. 

    Time to complete: Four-hour exam + study timeCost: $575 for members and $760 for non-membersExam required? YesAverage salary: $149,246This certification recognizes professionals who can design and manage information security programs. The credential also covers governance, risk and incident management, and compliance. Qualifying for certification requires at least five years of information security management experience.

    kasto80, Getty Images/iStockphoto

    Time to complete: 35 contact hours of training + 230-minute exam + study timeCost: $405 for members and $555 for non-membersExam required? YesAverage salary: $148,906Built for experienced project managers, this certification acknowledges professionals with skills using predictive, Agile, and hybrid management methodologies. Certified professionals demonstrate expertise in planning, controlling, and closing projects. For eligibility, professionals need a four-year degree and three years of management experience or 60 months of management experience. 

    Nutanix

    Time to complete: Two-hour exam + study timeCost: $199Exam required? YesAverage salary: $142,810This certification validates a professional’s abilities to manage and troubleshoot Nutanix AOS 5.15. The exam tests on enterprise cloud concepts and managing and securing clusters. Though not required, ideal candidates have at least 3-6 months of experience with AOS and 1-2 years of experience with general systems.

    Time to complete: Four-hour exam + study timeCost: $575 for members and $760 for non-membersExam required? YesAverage salary: $134,460Acknowledging professionals who monitor, control, and assess business IT systems, this certification covers the auditing process, IT governance, systems development and implementation, and asset protection. For certification, professionals need at least five years of auditing or related experience. 

    Shutterstock

    Time to complete: 130-minute exam + study timeCost: $250Exam required? YesAverage salary: $132,947This certification demonstrates an understanding of vSphere infrastructure best practices, implementation, and management skills. Credentialed professionals can install, configure, troubleshoot, and secure the virtualization platform. 

    Which IT certification is right for you?When choosing between the many IT certifications, candidates should consider multiple factors to ensure they pick the best-suited option for them. First, they should evaluate their current level and strengths. Next, they should think about their career goals and identify what credentials and training they need in order to reach that level. Equipped with that information, candidates can search the available certifications, sorting by relevance, industry recognition and acceptance of the credential, cost, and delivery format. While IT certifications do not typically pursue or receive accreditation, they may still be recognized by noteworthy organizations, such as professional industry associations or specific vendors. Candidates can research what type of industry recognition certifications have received to ensure they get the best credential available.

    What are the best IT certs to get?

    The best IT certifications depend on the candidate’s career goals. Many employers rank certain certifications above others depending on their usefulness to the organization, such as those that provide relevant vendor- and system-specific training. 

    Can you get an IT job with just certifications?

    Yes. Professionals with an IT certification as their only relevant training can access some entry-level IT careers.

    What IT certifications pay the most?

    The highest-paying IT certifications depend on the credentialed professional’s experience, employer, and location. According to Global Knowledge, professionals holding a Google Certified Professional Data Engineer credential report some of the highest average wages at $171,749.

    ZDNet Recommends More

  • in

    Researchers discover bypass 'bug' in iPhone Apple Pay, Visa to make contactless payments

    UK academics have uncovered mobile security issues in Visa and Apple payment mechanisms that could result in fraudulent contactless payments.

    On Thursday, academics from the UK’s University of Birmingham and University of Surrey revealed the technique, in which attackers could bypass an Apple iPhone’s lock screen to access payment services and make contactless transactions.  A paper on the research, “Practical EMV Relay Protection,” (.PDF) is due to be published at the 2022 IEEE Symposium on Security and Privacy, and has been authored by Andreea-Ina Radu, Tom Chothia, Christopher J.P. Newton, Ioana Boureanu, and Liqun Chen. According to the paper, the ‘vulnerability’ occurs when Visa cards are set up in Express Transit mode in an iPhone’s wallet feature. Express mode has been designed with commuters in mind, when they may want to quickly tap and pay at a turnstile to access rail, for example, rather than hold up a line due to the need to go through further identity authentication.  The researchers say that the issue, which only applies to Apple Pay and Visa, is caused by the use of a unique code — nicknamed “magic bytes” — that is broadcast by transit gates and turnstiles to unlock Apple Pay.  By using standard radio equipment, they were able to perform a relay attack, “fooling an iPhone into thinking it was talking to a transit gate,” according to the team.An experiment was conducted using an iPhone with a Visa transit card set up, a Proxmark — to act as a reader emulator — an NFC-enabled Android phone, which acted as a card emulator, and a payment terminal: the overall aim being to make a payment on a locked device to an EMV (smart payment) reader.

    If an intended victim is in close proximity, whether held by someone or stolen, the attack can be triggered by capturing and then broadcasting the “magic bytes” and then modifying a set of other variables, as explained below: “While relaying the EMV messages, the Terminal Transaction Qualifiers (TTQ), sent by the EMV terminal, need to be modified such that the bits (flags) for Offline Data Authentication (ODA) for Online Authorizations supported and EMV mode supported are set.  Offline data authentication for online transactions is a feature used in special-purpose readers, such as transit system entry gates, where EMV readers may have intermittent connectivity and online processing of a transaction cannot always take place. These modifications are sufficient to allow relaying a transaction to a non-transport EMV reader, if the transaction is under the contactless limit.” The attack has been demonstrated in the video below. The experiment was performed with an iPhone 7 and an iPhone 12. Transactions over the contactless limit may also potentially be modified, but this requires additional value changes. 

    The experiment is an interesting one, although in the real world, this attack technique may not be feasible on a wider scale. It should also be noted that authorization protocols are only one layer of payment protection, and financial institutions often implement additional systems to detect suspicious transactions and mobile fraud. The overall fraud level on Visa’s global network is recorded as below 0.1%.Speaking to ZDNet, the researchers said that Apple was first contacted on October 23, 2020. The team then reached out to Visa in January, followed by a video call in February, and then a report was submitted to Visa’s vulnerability reporting platform on May 10, 2021. The academics say that while acknowledged by both parties, who have been spoken to “extensively,” the issue remains unfixed.”Our work shows a clear example of a feature, meant to incrementally make life easier, backfiring and negatively impacting security, with potentially serious financial consequences for users,” Radu commented. “Our discussions with Apple and Visa revealed that when two industry parties each have partial blame, neither are willing to accept responsibility and implement a fix, leaving users vulnerable indefinitely.” In a statement, Visa told us:”Visa cards connected to Apple Pay Express Transit are secure and cardholders should continue to use them with confidence. Variations of contactless fraud schemes have been studied in laboratory settings for more than a decade and have proven to be impractical to execute at scale in the real world. Visa takes all security threats very seriously, and we work tirelessly to strengthen payment security across the ecosystem.”The research was conducted as part of the TimeTrust trusted computing project and was funded by the UK National Cyber Security Centre (NCSC). Update 7.43 BST: Apple told ZDNet:”We take any threat to users’ security very seriously. This is a concern with a Visa system but Visa does not believe this kind of fraud is likely to take place in the real world given the multiple layers of security in place. In the unlikely event that an unauthorized payment does occur, Visa has made it clear that their cardholders are protected by Visa’s zero liability policy.”Seperately, DinoSec has compiled a log of lock screen bypass issues impacting Apple iOS since 2011.  Previous and related coverage Have a tip? Get in touch securely via WhatsApp | Signal at +447713 025 499, or over at Keybase: charlie0 More

  • in

    96% of third-party container applications deployed in cloud infrastructure contain known vulnerabilities: Unit 42

    A new report from Palo Alto Networks’ Unit 42 outlined the ways that the supply chain has become an emerging cloud security threat. Unit 42 conducted a red team exercise with a large SaaS provider that is a Palo Alto Networks customer and within three days, the team was able to discover critical software development flaws that could have exposed the organization to an attack similar to SolarWinds and Kaseya. Unit 42 found that 63% of third-party code used in building cloud infrastructure contained insecure configurations. If an attacker compromises third-party developers, it’s possible to infiltrate thousands of organizations’ cloud infrastructures, according to the report.The organization analyzed data from a variety of public data sources around the world in order to draw conclusions about the growing threats organizations face today in their software supply chains. They found that 96% of third-party container applications deployed in cloud infrastructure contain known vulnerabilities. In the report, Unit 42 researchers discovered that even for a customer who had what most would consider a “mature” cloud security posture, there were several critical misconfigurations and vulnerabilities that allowed the Unit 42 team to take over the customer’s cloud infrastructure in a matter of days.”In most supply chain attacks, an attacker compromises a vendor and inserts malicious code in software used by customers. Cloud infrastructure can fall prey to a similar approach in which unvetted third-party code could introduce security flaws and give attackers access to sensitive data in the cloud environment. Additionally, unless organizations verify sources, third-party code can come from anyone, including an Advanced Persistent Threat,” Unit 42 wrote. 

    “Teams continue to neglect DevOps security, due in part to lack of attention to supply chain threats. Cloud native applications have a long chain of dependencies, and those dependencies have dependences of their own. DevOps and security teams need to gain visibility into the bill of materials in every cloud workload in order to evaluate risk at every stage of the dependency chain and establish guardrails.”
    Unit 42
    BreachQuest CTO Jake Williams called the research “significant” and said it replaces anecdotes of incident responders with actual data on how common it is to find configuration issues and unpatched vulnerabilities in the public software supply chain. “At BreachQuest, we are used to working incidents where code and apps are built from Docker Hub images with pre-built security issues. While these are usually missing patches, it’s not uncommon to find security misconfigurations in these images either,” Williams said. “This is a problem the security community has dealt with since the dawn of the public cloud. Previous research found that the vast majority of publicly available Amazon Machine Images contained missing patches and/or configuration issues.”Other experts, like Valtix CTO Vishal Jain, noted that for more than a year now, spend on the cloud vastly exceeded spend on data centers. Jain added that attacks typically go where the money is, so the big, open security front for enterprises is now the cloud. He suggested organizations focus on security at build time — scanning of IaC templates used in building cloud infrastructure — and security at run time. “It is not either/or, it needs to be both. More importantly, with dynamic infrastructure and app sprawl in the public cloud, there is a new set of security problems that need to be addressed in the cloud,” Jain said. Others said code was almost impossible to secure against fast-moving functional requirements and threat models. Mohit Tiwari, CEO at Symmetry Systems, told ZDNet it is more efficient to harden the infrastructure than chase application-level bugs in hundreds of millions of lines of code. Tiwari explained that first-party code is as likely as third-party code to have exploitable bugs — like authorization errors — and these bugs expose customer data that is managed by business logic. “Blaming third party code is a red-herring — software like Linux, Postgres, Django/Rails etc…comprise most of any applications, so nearly 100% of applications have third party code with known vulnerabilities,” Tiwari said. “Organizations in practice are instead moving to get infrastructure — cloud IAM, service meshes, etc… — in order while relying on code-analysis for targeted use cases (such as the trusted code base that provides security for the bulk of application code).” More

  • in

    Microsoft announces multi-year partnership with cyber insurance firm At-Bay

    Microsoft unveiled a new partnership with cyber insurance company At-Bay on Wednesday, announcing that it was seeking to help the insurance industry “create superior and data-driven cyber insurance products backed by Microsoft’s security solutions.”

    ZDNet Recommends

    The best cyber insurance

    The cyber insurance industry is likely to go mainstream and is a simple cost of doing business. Here are a few options to consider.

    Read More

    At-Bay claimed their insureds are seven times less likely to experience a ransomware incident than the industry average and noted that they provide insights to their customers about ways they can better protect themselves. Starting on October 1, companies in the US that are already Microsoft 365 customers will be eligible “for savings on their At-Bay cyber insurance policy premiums if they implement specific security controls and solutions, including multi-factor authentication and Microsoft Defender for Office 365.”Ann Johnson, Microsoft’s corporate vice president of security, compliance & identity business development, explained that for cyber insurance to play a meaningful role in overall risk management, buyers and sellers need the benefit of data and clear visibility into what is covered and factors either minimizing or multiplying risk exposure. “Microsoft’s partnership with At-Bay brings important clarity and decision-making support to the market as organizations everywhere seek a comprehensive way to empower hybrid workforces with stronger, centralized visibility and control over cloud applications boosting security and productivity,” Johnson said. The company said in a statement that At-Bay’s portfolio companies have had their cybersecurity strengthened by certain incentives they provide, including improved policy terms and pricing.Microsoft said it will work with At-Bay to find other ways customers can limit their risk exposure and proactively address vulnerabilities.

    Microsoft noted that it is working with other insurers to protect their customers and reduce the risk of loss, which has grown significantly over the last few years, causing steep increases in premiums. “Insurance carriers, agents, reinsurers and brokers are required to understand and assess cybersecurity threats for each of their insureds. With this complexity, insurers are seeking increased visibility into each company’s security environment and hygiene to better underwrite new policies,” Microsoft said in a statement. “To address this, Microsoft is teaming with key insurance partners to offer innovative data-driven cyber insurance products allowing customers to safely share security posture information through platforms like Microsoft 365 and Microsoft security solutions.mAll data and details about a covered company’s technology environment will be owned and controlled entirely by that customer, but customers can opt-in to securely share them with providers to receive benefits like enhanced coverage and more competitive premiums.” At-Bay CEO Rotem Iram said insurance policies are effective tools that help define the cost of certain cybersecurity choices of a company. “By offering better pricing to companies that implement stronger controls, we help them understand what matters in security and how best to reduce risk,” Iram said. “Working with Microsoft enables us to educate customers on the powerful security controls that exist within Microsoft 365 and reward them for adopting those controls.” More

  • in

    Report highlights cybersecurity dangers of Elastic Stack implementation mistakes

    A new report has identified significant vulnerabilities resulting from the mis-implementation of Elastic Stack, a group of open-source products that use APIs for critical data aggregation, search, and analytics capabilities.Researchers from cybersecurity firm Salt Security discovered issues that allowed them to not only launch attacks where any user could extract sensitive customer and system data but also allowed any user to create a denial of service condition that would render the system unavailable. The researchers said they first discovered the vulnerability while protecting one of their customers, a large online business-to-consumer platform that provides API-based mobile applications and software as a service to millions of global users.Once they discovered the vulnerability, they checked other customers using Elastic Stack and found that almost every enterprise with it was affected by the vulnerability — which exposed users to injection attacks and more. Salt Security officials were quick to note that this is not a vulnerability with Elastic Stack itself but instead a problem with how it is being implemented. Salt Security technical evangelist Michael Isbitski said the vulnerability is not connected to any issue with Elastic’s software but is related to “a common risky implementation setup by users.”He noted that Elastic provides guidance about how to implement Elastic Stack instances securely but noted that the responsibility falls on practitioners to make use of the guidance. “The lack of awareness around potential misconfigurations, mis-implementations, and cluster exposures is largely a community issue that can be solved only through research and education,” Isbitski told ZDNet. 

    “Elastic Stack is far from the only example of this type of implementation issue, but the company can help educate its users just as Salt Security has been working with CISOs, security architects, and other application security practitioners to alert them to this and other API vulnerabilities and provide mitigation best practices.”The vulnerability would allow a threat actor to abuse the lack of authorization between front-end and back-end services as a way to get a working user account with basic permission levels. From there, a cyberattacker could then exfiltrate sensitive user and system data by making “educated guesses about the schema of back-end data stores and query for data they aren’t authorized to access,” according to the report. Salt Security CEO Roey Eliyahu said that while Elastic Stack is widely used and secure, the same architectural design mistakes were seen in almost every environment that uses it.”The Elastic Stack API vulnerability can lead to the exposure of sensitive data that can be used to perpetuate serious fraud and abuse, creating substantial business risk,” Eliyahu said. Exploits that take advantage of this Elastic Stack vulnerability can create “a cascade of API threats,” according to Salt Security researchers, who also showed that the Elastic Stack design implementation flaws worsen significantly when an attacker chains together multiple exploits.The problem has been something security researchers have long highlighted with a number of similar products like MongoDB and HDFS.”The specific queries submitted to the Elastic back-end services used to exploit this vulnerability are difficult to test for. This case shows why architecture matters for any API security solution you put in place — you need the ability to capture substantial context about API usage over time,” Isbitski said.”It also shows how critical it is to architect application environments correctly. Every organization should evaluate the API integrations between its systems and applications, since they directly impact the company’s security posture.”Researchers from the company said they were able to gain access to sensitive data like account numbers, transaction confirmation numbers and other information that would violate GDPR regulations. The report details other actions that could be taken through the vulnerability including the ability to perpetrate a variety of fraudulent activities, extort funds, steal identities and take over accounts. Jon Gaines, senior application security consultant at nVisium, said the Elastic Stack is “notorious for excessive data exposure” and added that a few years ago — and by default — data was exposed publicly. Since then the defaults have changed but he noted that this doesn’t mean that older versions aren’t grandfathered in or that minor configuration changes can’t lead to both of these newly unearthed vulnerabilities. “There are — and have been — multiple open source tools that lead to the discovery of these vulnerabilities that I’ve used previously and continue to use. Unfortunately, the technical barrier of these vulnerabilities is extremely low. As a result, the risk of a bad guy discovering and exploiting these vulnerabilities is high,” Gaines said. “From the outside looking in, these vulnerabilities are common sense for security professionals, authorization, rate limitations, invalidation, parameterized queries, and so forth. However, as a data custodian, administrator, or even developer, oftentimes you aren’t taught to develop or maintain with security in mind.”Vulcan Cyber CEO Yaniv Bar-Dayan added that the most-common cloud vulnerability is caused by human error and misconfigurations, and APIs are not immune.”We’ve all seen exposed customer data and denial of service attacks do significant material damage to hacked targets. Exploitation of this vulnerability is avoidable but must be remediated quickly,” Bar-Dayan said. “Other users of Elastic Stack should check their own implementations for this misconfiguration and not repeat the same mistake.” More

  • in

    Dell adds new security features and automation to ProSupport Suite

    Dell has added new features to its ProSupport Suite for PCs that offer users new endpoint security offerings and enhance their line of commercial PCs. 

    The ProSupport Suite for PCs allows IT teams to customize and automate how they manage employee devices, which has become increasingly important as companies continue to invest heavily in remote work.Dell’s updates include new catalog management and deployment capabilities while also giving IT managers the ability to update Dell BIOS, drivers, firmware and applications automatically and remotely. IT teams can also customize how the updates are grouped. The new tools also provide IT teams with a centralized platform to see their entire Dell PC fleet and monitor each device’s health, application experience, and security scores. Dell will also be offering a AI-powered services support software to provide suggestions based on performance trends. The new ProSupport Suite for PCs capabilities will be available to customers by October 19, and the Advanced Secure Component Verification is available now for US customers. The Intel ME Verification and Dell Trusted Device SIEM Integration is also available to all customers in North America, Europe and the Asia-Pacific-Japan region. Doug Schmitt, president of Services at Dell Technologies, said the company prioritised the updates because IT operations have become significantly more complicated, especially with the amount of data and opportunities at the edge. “Our approach to IT services is built on an AI-driven, adaptive, always-on foundation, taking today’s realities and future customer needs into consideration,” Schmitt said. 

    “At the end of the day, the new capabilities are about helping IT leaders see ahead and stay ahead while providing workforces around the world the ability to continue collaborating and innovating without disruption.”The company also unveiled the Dell Trusted Devices security portfolio to protect commercial PCs throughout the entire supply chain and device lifecycle. “This comprehensive suite of above- and below- the operating system (OS) security solutions leverage intelligence and help empower businesses to prevent, detect and respond to threats with improved mean-time-to-detect (MTTD) and mean-time-to-resolution (MTTR) of issues,” Dell explained. Dell is adding Advanced Secure Component Verification for PCs that helps customers make sure Dell PCs and key components arrive as they were ordered and built. The Intel Management Engine Verification checks critical system firmware and looks for evidence of tampering, targeting boot processes. IT teams will also have more critical visibility below the OS security events in dashboards offered through the new Dell Trusted Device Security Information and Event Management Integration. More

  • in

    Tomiris backdoor discovery linked to Sunshuttle, DarkHalo hackers

    Researchers have uncovered a new connection between Tomiris and the APT behind the SolarWinds breach, DarkHalo. 

    On Wednesday at the Kaspersky Security Analyst Summit (SAS), researchers said that a new campaign revealed similarities between DarkHalo’s Sunshuttle, as well as “target overlaps” with Kazuar.  The SolarWinds incident took place in 2020. FireEye and Microsoft revealed the breach, in which SolarWinds’s Orion network management software was compromised to impact as many as 18,000 customers in a software update-based supply-chain attack.  While many thousands of clients may have received a malicious update, the threat actors appeared to cherry-pick the targets worthy of further compromise — including Microsoft, FireEye, and government agencies.  Microsoft president Brad Smith dubbed the incident as “the largest and most sophisticated attack the world has ever seen.”
    Kaspersky
    Eventually, the finger was pointed at the advanced persistence threat (APT) group DarkHalo/Nobelium as the party responsible, which managed to deploy the Sunburst/Solorigate backdoor, Sunspot build server monitoring software, and Teardrop/Raindrop dropper, designed to deploy a Cobalt Strike beacon, on target systems.   The Russian, state-backed group’s campaign was tracked as UNC2452, which has also been linked to the Sunshuttle/GoldMax backdoor. 

    In June, after roughly six months of inactivity from DarkHalo, Kaspersky uncovered a DNS hijacking campaign against multiple government agencies in an unnamed CIS member state. “These hijacks were for the most part relatively brief and appear to have primarily targeted the mail servers of the affected organizations,” Kaspersky commented. “We do not know how the threat actor was able to achieve this, but we assume they somehow obtained credentials to the control panel of the registrar used by the victims.”The researchers say that the campaign operators redirected victims attempting to access an email service to a fake domain which then prompted them into downloading a malicious software update, made possible by switching legitimate DNS servers for compromised zones to attacker-controlled resolvers. This update contained the Tomiris backdoor.  “Further analysis showed that the main purpose of the backdoor was to establish a foothold in the attacked system and to download other malicious components,” Kaspersky added. “The latter, unfortunately, were not identified during the investigation.” Tomiris, however, did prove to be an interesting discovery. The backdoor is described as “suspiciously similar” to Sunshuttle. Both backdoors are written in the Golang (Go) programming language, the same English language spelling mistakes were in the payloads’ code, and each uses similar encryption and obfuscation setups for configuration and network traffic management purposes.  In addition, both Tomiris and Sunshuttle use scheduled tasks for persistence as well as sleep-based delay mechanisms. The team believes the “general workflow of the two programs” hints at the same development practices.  However, the backdoor has little function beyond the capability to download additional malware, which suggests Tomiris is likely part of a wider operator toolkit.It should also be noted that Tomiris has been found in environments also infected with the Kazuar backdoor, malware that Kaspersky has tentatively linked to Sunburst — while Palo Alto has also connected Kazuar and the Turla APT. Cisco Talos has also recently uncovered a new, simple backdoor now deployed by the Turla APT on victim systems.  Kaspersky also acknowledges this may be a case of a ‘false flag’ designed to mislead researchers and send them down the wrong analysis or attribution paths. Pierre Delcher, senior security researcher at Kaspersky, commented: “None of these items, taken individually, is enough to link Tomiris and Sunshuttle with sufficient confidence. We freely admit that a number of these data points could be accidental, but still feel that taken together they at least suggest the possibility of common authorship or shared development practices.” Previous and related coverage:Have a tip? Get in touch securely via WhatsApp | Signal at +447713 025 499, or over at Keybase: charlie0 More