Who’s Afraid of Kaspersky?

In early March, at a five-star hotel in Cancun, Mexico, the lights go off, the room turns dark, and a woman wearing a shiny white dress appears on a screen that’s as wide as the stage.

Summoners of web tsunamis have moved to layer 7, says Cloudflare

Attackers have noticed that the world is getting better at fending off massive distributed denial-of-service attacks, and are trying to overwhelm application processes instead. So says DDoS-deflector Cloudflare, which reckons it’s seen a spike in cyber-assaults trying to exhaust high-level server resources, such as per-process CPU time, disk space, and memory allocations, as opposed to overwhelming lower parts of the networking stack.

GDPR Is Here: Achieve Superior Data Breach Prevention and Detection with Qualys

Turned into law in 2016, the EU’s General Data Protection Regulation (GDPR) finally goes into effect this week, slapping strict requirements on millions of businesses and subjecting violators to severe penalties. The complex regulation applies to any organization worldwide — not just in Europe — that controls and processes personal data of EU residents, whose security and privacy GDPR fiercely protects.

Anti-Bitcoin Ad Attacks Congressional Candidate for Accepting Cryptocurrency Donations

Bitcoin and other cryptocurrencies occupy a contentious place in American politics. Law enforcement agencies often see them as a criminal tool used to buy drugs, guns or other illegal items; financial regulatory bodies can’t decide whether to classify them a security; and a handful of states have proposed legislation that would allow their constituents to pay their taxes with them.

Okera raises $12M to simplify data governance within companies

As companies start to gather more and more data on their users and customers, including a firehose of information from a nigh-endless flow of tests, managing and maintaining that data isn’t the only place companies are hitting a wall — and figuring out who can actually access it is becoming just as big of a problem.

OpenPath raises $7M to help you access your office with your phone

If you’ve ever worked in an office building, chances are somebody issued you a keycard or NFC-enabled badge to open the doors to the building. Those cards and badges do their job, but they can be both cumbersome and prone to problems. OpenPath wants to do away with all of these issues and add a new level of convenience to this whole process by replacing these access cards with the phone you already have.

Malware Distributed via .slk Files, (Tue, May 22nd)

Attackers are always trying to find new ways to infect computers by luring not only potential victims but also security controls like anti-virus products. Do you know what SYLK files are? SYmbolic LinK files (they use the .slk extension) are Microsoft files used to exchange data between applications, specifically spreadsheets[1]. In Windows environments, there are represented with an icon similar to Excel:

Here is a sample I found (SHA256: a08c4235b6d93a463df543bd915407b56f4efd00f30497723fca54dccac580ad) with a very low VT store (2/59)[2]. Being a simple text file, it does not look suspicious:

$ file Payment_Invoice#287718.slk Payment_Invoice#287718.slk: ASCII text, with very long lines, with CRLF line terminators, with escape sequences

22 essential security commands for Linux

There are many aspects to security on Linux systems – from setting up accounts to ensuring that legitimate users have no more privilege than they need to do their jobs. This is look at some of the most essential security commands for day-to-day work on Linux systems.

sudo

Running privileged commands with sudo  – instead of switching user to root  – is one essential good practice as it helps to ensure that you only use root privilege when needed and limits the impact of mistakes. Your access to the sudo command depends on settings in the /etc/sudoers and /etc/group files.

CompTIA Cyber Roundtable, NYC

This past week Matthew Pascucci, Cybersecurity Practice Manager at CCSI participated in a Cyber Roundtable. Check out this article about the roundtable discussion by Teresa Varela-Lauper.

Will Two-Factor Authentication Ever Get Its Time in the Sun?

Decades into the campaign, the effort to wean users off simple password protection hasn’t gone very well. Fingerprints, iris scans, tokens… these methods have all been tried and met with only limited success. The security industry’s best chance yet? It’s a sort of half-measure that lets users keep their passwords but adds a second element (or “factor”) to logins.

Europe Hit with 80 Million Fraud Attempts in Q1 2018 as Merchants Favor Low-Friction Experiences over Security

The onset of 2018 has seen European businesses bombarded with cyberattacks, including a staggering 80 million pure fraud attempts. With a 30% increase in cybercrime year-over-year and strict new laws coming into effect this month, digital businesses in Europe – and indeed everywhere – need to make cyber-security a priority now more than ever.

Malware Distributed via .sylk Files, (Tue, May 22nd)

Attackers are always trying to find new ways to infect computers by luring not only potential victims but also security controls like anti-virus products. Do you know what SYLK files are? SYmbolic LinK files (they use the .slk extension) are Microsoft files used to exchange data between applications, specifically spreadsheets[1]. In Windows environments, there are represented with an icon similar to Excel:

Here is a sample I found (SHA256: a08c4235b6d93a463df543bd915407b56f4efd00f30497723fca54dccac580ad) with a very low VT store (2/59)[2]. Being a simple text file, it does not look suspicious:

$ file Payment_Invoice#287718.slk Payment_Invoice#287718.slk: ASCII text, with very long lines, with CRLF line terminators, with escape sequences