Marketing Scoops

Monday, January 27, 2025

What You Need To Know About Fending Off The Latest Cyberthreat: ‘LogoFAIL’

Getty

Researchers this week disclosed a serious new cybersecurity threat that could affect nearly every PC device, including those made and sold by industry leaders. And what simple mistake puts your PC at risk from this new threat? Just pushing its “on” button. The new threat, dubbed LogoFAIL, seems much more insidious than familiar cybersecurity problems that come from clicking on a link in a questionable email, or downloading unapproved software onto your company PC……Story continues…

By: Kit Eaton

Source: Inc

.

Critics:

The process of developing cyber threat intelligence is a circular and continuous process, known as the intelligence cycle, which is composed of five phases,carried out by intelligence teams to provide to leadership relevant and convenient intelligence to reduce danger and uncertainty.The five phases are: 1) planning and direction; 2) collection; 3) processing; 4) analysis; 5) dissemination.

In planning and directing, the customer of the intelligence product requests intelligence on a specific topic or objective. Then, once directed by the client, the second phase begins, collection, which involves accessing the raw information that will be required to produce the finished intelligence product. Since information is not intelligence, it must be transformed and therefore must go through the processing and analysis phases:

In the processing (or pre-analytical phase) the raw information is filtered and prepared for analysis through a series of techniques (decryption, language translation, data reduction, etc.); In the analysis phase, organized information is transformed into intelligence. Finally, the dissemination phase, in which the newly selected threat intelligence is sent to the various users for their use.

There are three overarching, but not categorical – classes of cyber threat intelligence: 1) tactical; 2) operational; 3) strategic. These classes are fundamental to building a comprehensive threat assessment.

Tactical: Typically used to help identify threat actors. Indicators of compromise (such as IP addresses, Internet domains or hashes) are used and the analysis of tactics, techniques and procedures (TTP) used by cybercriminals is beginning to be deepened. Insights generated at the tactical level will help security teams predict upcoming attacks and identify them at the earliest possible stages.

Operational: This is the most technical level of threat intelligence. It shares hard and specific details about attacks, motivation, threat actor capabilities, and individual campaigns. Insights provided by threat intelligence experts at this level include the nature, intent, and timing of emerging threats.

This type of information is more difficult to obtain and is most often collected through deep, obscure web forums that internal teams cannot access. Security and attack response teams are the ones that use this type of operational intelligence.

Strategic: Usually tailored to non-technical audiences, intelligence on general risks associated with cyberthreats. The goal is to deliver, in the form of white papers and reports, a detailed analysis of current and projected future risks to the business, as well as the potential consequences of threats to help leaders prioritize their responses.

Cyber threats involve the use of computers, storage devices, software networks and cloud-based repositories. Prior to, during or after a cyber attack technical information about the information and operational technology, devices, network and computers between the attacker(s) and the victim(s) can be collected, stored and analyzed.

However, identifying the person(s) behind an attack, their motivations, or the ultimate sponsor of the attack, – termed attribution is sometimes difficult. Recent efforts in threat intelligence emphasize understanding adversary TTPs. A number of recent cyber threat intelligence analytical reports have been released by public and private sector organizations which attribute cyber attacks.

This includes Mandiant’s APT1 and APT28 reports, US CERT’s APT29 report, and Symantec’s Dragonfly, Waterbug Group and Seedworm reports. In 2015 U.S. government legislation in the form of the Cybersecurity Information Sharing Act encouraged the sharing of CTI indicators between government and private organizations. This act required the U.S. federal government to facilitate and promote four CTI objectives:

Sharing of “classified and declassified cyber threat indicators in possession of the federal government with private entities, nonfederal government agencies, or state, tribal, or local governments”;

Sharing of “unclassified indicators with the public”;

Sharing of “information with entities under cybersecurity threats to prevent or mitigate adverse effects”;

Sharing of “cybersecurity best practices with attention to the challenges faced by small businesses.

In 2016, the U.S. government agency National Institute of Standards and Technology (NIST) issued a publication (NIST SP 800-150) which further outlined the necessity for Cyber Threat Information Sharing as well as a framework for implementation.

Evolve Bank says ransomware gang stole personal data on millions of customers TechCrunch 4d
RansomwareCyber Security
Internet
You had a year to patch this Veeam flaw and now it’s going to hurt The Register 3d
RansomwareCyber Security
Internet
Car dealer software slinger CDK Global said to have paid $25M ransom after cyberattack The Register 20h
Car TechCyber Security
Internet
Indonesia gov ransomware chaos may be over after hack group apologizes and says it has shared decrypt keys Tom’s Hardware 16:47 Thu, 04 Jul
Data CentresIndonesia
Cyber Security
Report: Z-Library admins on the lam ahead of US extradition; officials shocked Ars Technica 4d
Argentine PoliticsArgentina
South America
Florida health department data exposed by RansomHub SC Magazine US 5d
FloridaCyber Security
Politics
Public awareness of ID security grows, but big obstacles remain ComputerWeekly 1d
AICyber Attacks
Okta
UK data regulator should investigate police cloud deployments ComputerWeekly 18:04 Thu, 04 Jul
MicrosoftScotland
Cloud Computing
Watch out, iPhone fans – a new SMS attack could steal your Apple ID. Here’s how to stay safe TechRadar 3d
iPhoneApple
Top Tech Brands
EE UK launch new Scam Guard add-on to protect mobile customers ISPreview UK 4d
MalwareAI
Internet
In the last 4 hours
How to protect your startup from email scams TechCrunch 20:39 
Earlier Today

Minnesota Law Says Cops Can’t Ask Drivers Why They’ve Been Pulled Over, But Ensures Cops Can Totally Do That Very Thing All The Time Techdirt 06:28 

Car dealer software slinger Cdk Global said to have paid $25M ransom after cyberattack The Register 03:26 

Yesterday
Drone photographer pleads guilty to Espionage Act charges The Verge 22:12 Fri, 12 Jul 

Verified Blue Checkmarks on X Are Useless and ‘Deceive Users,’ EU Finds PC Magazine 20:53 Fri, 12 Jul 

MacPaw introduces on-device phishing detection to boost macOS security AppleInsider 17:35 Fri, 12 Jul 

Public awareness of ID security grows, but big obstacles remain ComputerWeekly 17:34 Fri, 12 Jul 

Ransomware attacks take toll at Indiana counties, Dallas County SC Magazine US 17:02 Fri, 12 Jul 

Phishing attacks eased by novel FishXProxy kit SC Magazine US 16:42 Fri, 12 Jul 

Watch Out for These Prime Day Scams CNET 16:28 Fri, 12 Jul 

AT&T: ‘Nearly All’ Customer Phone, Text Records Leaked, One Arrest Made PC Magazine 15:28 Fri, 12 Jul 

Irish SMEs lost €10m to email-related scams last year, report warns Silicon Republic 14:47 Fri, 12 Jul 

AT&T says criminals stole phone records of ‘nearly all’ customers in new data breach TechCrunch 14:00 Fri, 12 Jul 

Rockyou2024 is a scam, Google has a whoopsie, and AI is giving folks indigestion – ESW #367 SC Magazine US 05:20 Fri, 12 Jul 

Thursday

Elon Musk calls for “criminal prosecution” of X ad boycott perpetrators Ars Technica 01:06 Fri, 12 Jul 

Why both businesses and scammers love India’s payment system BBC 00:48 Fri, 12 Jul 

Chris Kirchner, founder of Goldman Sachs-backed Slync, was sentenced to 20 years for fraud and laundering startup funds Business Insider 00:04 Fri, 12 Jul 

Pressure Grows in Congress to Treat Crypto Investigator Tigran Gambaryan, Jailed in Nigeria, as a Hostage WIRED 23:38 Thu, 11 Jul 

Trump threatens to send Meta’s Mark ‘Zuckerbucks’ to prison if reelected president The Register 23:16 Thu, 11 Jul 

Apple gives urgent warning to iPhone users over devastating scam The Independent 21:34 Thu, 11 Jul 

Notorious Hacker Kingpin ‘Tank’ Is Finally Going to Prison WIRED 20:15 Thu, 11 Jul 

Ransomware gangs increasingly exploiting vulnerabilities SearchSecurity.com – Information Security Magazine 19:26 Thu, 11 Jul 

Microsoft fixes zero-day vulnerability in Internet Explorer abused by cyber-criminals for over a year TechSpot 18:45 Thu, 11 Jul 

You had a year to patch this Veeam flaw and now it’s going to hurt The Register 11:04 Thu, 11 Jul 

Council ‘at mercy of criminal hackers’ – report BBC 08:48 Thu, 11 Jul 

Wednesday

Florida health department data exposed by RansomHub SC Magazine US 5d
FloridaCyber Security
Politics
Public awareness of ID security grows, but big obstacles remain ComputerWeekly 1d
AICyber Attacks
Okta
UK data regulator should investigate police cloud deployments ComputerWeekly 18:04 Thu, 04 Jul
MicrosoftScotland
Cloud Computing
Watch out, iPhone fans – a new SMS attack could steal your Apple ID. Here’s how to stay safe TechRadar 3d
iPhoneApple
Top Tech Brands
EE UK launch new Scam Guard add-on to protect mobile customers ISPreview UK 4d
MalwareAI
Internet
In the last 4 hours
How to protect your startup from email scams TechCrunch 20:39 
Earlier Today

Minnesota Law Says Cops Can’t Ask Drivers Why They’ve Been Pulled Over, But Ensures Cops Can Totally Do That Very Thing All The Time Techdirt 06:28 

Car dealer software slinger Cdk Global said to have paid $25M ransom after cyberattack The Register 03:26 

Yesterday
Drone photographer pleads guilty to Espionage Act charges The Verge 22:12 Fri, 12 Jul 

Verified Blue Checkmarks on X Are Useless and ‘Deceive Users,’ EU Finds PC Magazine 20:53 Fri, 12 Jul 

MacPaw introduces on-device phishing detection to boost macOS security AppleInsider 17:35 Fri, 12 Jul 

Public awareness of ID security grows, but big obstacles remain ComputerWeekly 17:34 Fri, 12 Jul 

Cisco Talos: Top Ransomware TTPs Exposed TechRepublic 01:01 Thu, 11 Jul 

State, local governments facing deluge of phishing attacks SC Magazine US 23:59 Wed, 10 Jul 

Watch out, iPhone fans – a new SMS attack could steal your Apple ID. Here’s how to stay safe TechRadar 23:34 Wed, 10 Jul 

Universities list LimeWire, Kazaa, and other defunct software in piracy warning Tom’s Hardware 20:42 Wed, 10 Jul 

Microsoft emails that warned customers of Russian hacks criticized for looking like spam and phishing TechCrunch 19:26 Wed, 10 Jul 

Girlfriend, 22, is charged with murdering her 53-year-old ‘Sugar Daddy’ before cutting his thumb off and using it to access his phone’s banking appsMailOnline 18:55 Wed, 10 Jul 
Evolving ransomware attack techniques examined SC Magazine US 18:33 Wed, 10 Jul 

These banks to retire one-time passwords for customers with digital tokens ZDNet 18:30 Wed, 10 Jul 

Malware that is ‘not ransomware’ wormed its way through Fujitsu Japan’s systems The Register 17:21 Wed, 10 Jul 

Political ads on social media rife with misinformation and scams, new research finds ABC News 17:15 Wed, 10 Jul 

Top 9 phishing scams to watch out for in 2024 PC World 14:02 Wed, 10 Jul 

Ransomware crews investing in custom data stealing malware The Register 13:31 Wed, 10 Jul 

The $11 Billion Marketplace Enabling the Crypto Scam Economy WIRED 10:33 Wed, 10 Jul 

Apple Gives Tips on Avoiding Phishing Scams Amid Warnings of New SMS Threat MacRumors 03:03 Wed, 10 Jul 

Martin Lewis issues warning over celebrity profiles commonly misused in scams The Independent 02:53 Wed, 10 Jul 

Tuesday

Labels: antivirus, cybersecurity, defend, disclose, hacking, industry, insidious, leaders, logofail, machine, pc, perspective, protections, researchers, risks, sensitive, systems, threat, vulnerable, worming

Location: F464+QJ Raymond, IN, USA

Share this:

  • Click to Press This! (Opens in new window)
  • Click to email a link to a friend (Opens in new window)
  • Click to share on Reddit (Opens in new window)
  • Click to share on Telegram (Opens in new window)
  • Click to share on Stumbleupon (Opens in new window)
  • Click to share on Tumblr (Opens in new window)
  • Click to share on WhatsApp (Opens in new window)
  • More

Customize buttons

antivirus Cybersecurity defend disclose hacking industry insidious leaders logofail machine pc perspective protections researchers risks sensitive systems threat vulnerable worming

Comments

Leave a Reply

Write a comment...

←Previous: SPARK The Biggest Competitive Advantage On Cloud Hosting Service
at January 27, 2025
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Labels: antivirus, cybersecurity, defend, disclose, hacking, industry, insidious, leaders, logofail, machine, pc, perspective, protections, researchers, risks, sensitive, systems, threat, vulnerable, worming
Location: 11 St Margaret's Rd, Balcurris, Dublin, D11 FW18, Ireland

No comments:

Post a Comment

Newer Post Older Post Home
Subscribe to: Post Comments (Atom)

CryptoGram Profits Growing Passive Income Through Crypto Referrals

Credit to:  arminhamidian Imagine a simple, repeatable system that lets you earn significant income from the crypto boom WITHOUT:  Trading c...

  • Search & Unlock Any AI Model In The World Through EVERY AI
    EveryAI is the world’s first universal AI app that lets you search, unlock, and use any AI model — instantly, from one simple dashboard. Jus...

Armin Hamidian

My photo
marketingscoops
View my complete profile

Blog Archive

  • June 2025 (58)
  • May 2025 (125)
  • April 2025 (136)
  • March 2025 (142)
  • February 2025 (103)
  • January 2025 (169)
  • December 2024 (148)
  • November 2024 (147)
  • October 2024 (124)
  • September 2024 (117)
  • August 2024 (96)
  • July 2024 (53)

Search This Blog

Contact Form

Name

Email *

Message *

Report Abuse

  • Home
Watermark theme. Theme images by Storman. Powered by Blogger.