How enterprises are using gen AI to protect against ChatGPT leaks

There’s growing interest in generative AI Isolation and comparable technologies to keep confidential data out of ChatGPT, Bard and other gen AI sitesRead More

Security News | VentureBeat – ​Read More

Newly Discovered Ivanti Secure VPN Zero-Day Vulnerabilities Allow Chinese Threat Actor to Compromise Systems

Most of the exposed VPN appliances are in the U.S., followed by Japan and Germany. Read the technical details about these zero-day vulnerabilities, along with detection and mitigation tips.

Security | TechRepublic – ​Read More

Cybersecurity Incidents Consistently Increase in UAE

Malicious insider threats are increasingly becoming a cause for concern among businesses in the United Arab Emirates.

darkreading – ​Read More

Hyundai MEA X Account Hacked, Followed by Crypto Promotion

Attackers hit more X accounts to promote Overworld Bitcoin registration.

darkreading – ​Read More

Medusa Ransomware Turning Your Files into Stone

The Medusa ransomware group has escalated its activities by introducing a dedicated leak site called the Medusa Blog, where they disclose sensitive data from non-compliant victims.

Cyware News – Latest Cyber News – ​Read More

CVE-2023-36025 Exploited for Defense Evasion in Phemedrone Stealer Campaign

The Phemedrone Stealer campaign exploits the Windows Defender SmartScreen Bypass vulnerability (CVE-2023-36025) to infect users and steal data from web browsers, cryptocurrency wallets, and messaging apps.

Cyware News – Latest Cyber News – ​Read More

Texas School Safety Software Data Leak Endangers Student Safety

By Deeba Ahmed

From Background Checks to Bedroom Layouts: Data Breach Strips Bare School Security System.

This is a post from HackRead.com Read the original post: Texas School Safety Software Data Leak Endangers Student Safety

Hackread – Latest Cybersecurity News, Press Releases & Technology Today – ​Read More

UAE Faces Fresh Plague of Phishing Scams, Poisoned Searches

Phishing scams in the UAE are on the rise, with fake websites posing as legitimate authorities and tourist sites. Scammers are using black hat SEO techniques to manipulate search engine rankings and promote fraudulent websites.

Cyware News – Latest Cyber News – ​Read More

What is the principle of least privilege? | Kaspersky official blog

One of the most important concepts in information security is the principle of least privilege. In this post, we explore what it is, how it works, how adhering to this principle benefits businesses, and how to implement the principle of least privilege in practice.

How the principle of least privilege works

The principle of least privilege (PoLP) is also known as the principle of minimal privilege (PoMP) or, less commonly, the principle of least authority (PoLA).

The main idea is that access to resources in a system should be organized in such a way that any entity within the system has access only to those that the entity requires for its work, and no more.

In practice, this could involve different systems and different entities within a system. Either way, in terms of applying the principle of least privilege to enterprise security, this can be restated as follows: Any user of the organization’s information infrastructure should only have the right to access the data that is necessary for performing their work tasks.

If, in order to perform certain tasks, a user requires access to information they currently don’t have, their permissions can be elevated. This elevation can be permanent – if required by the user’s role, or temporary – if it’s only necessary for a specific project or task (in the latter case, this is called “privilege bracketing”).

Conversely, when a user no longer requires access to certain information for some reason, their permissions should be lowered in accordance with the principle of least privilege.

In particular, the principle implies that regular users should never be granted administrator or superuser rights. Not only are such privileges unnecessary for the duties of the average employee, but they also significantly increase risks.

Why is the principle of least privilege needed?

The principle of least privilege helps improve access management, and generally hardens the security of the company’s information infrastructure. Here are some of the important security objectives that can be achieved by applying the principle of least privilege.

Risk mitigation. By restricting access to the minimum necessary for users to perform their tasks, the likelihood of accidental or intentional misuse of privileges can be significantly reduced. This, in turn, helps lower the risks of successful perimeter penetration and unauthorized access to corporate resources.
Data protection. Limiting access helps protect confidential data. Users only have access to the data required for their work, thereby reducing the likelihood of their gaining access to sensitive information or, worse, causing its leakage or theft.
Minimizing the attack surface. Restricting user privileges makes it more difficult for attackers to exploit vulnerabilities and use malware and hacking tools that rely on the user’s privileges, thereby reducing the attack surface.
Localizing security incidents. If an organization’s network is breached, the principle of least privilege helps limit the scope of the incident and its consequences. Because any compromised accounts have minimal rights, potential damage is reduced, and lateral movement within the compromised system or network is impeded.
Identifying users responsible for an incident. Minimizing privileges significantly narrows down the circle of users who could be responsible for an incident. This speeds up the identification of those accountable when investigating security incidents or unauthorized actions.
Compliance with standards and regulations. Many regulatory requirements and standards emphasize the need for access control – particularly the principle of least privilege. Adhering to industry standards and best practices helps organizations avoid unpleasant consequences and sanctions.
Increasing operational efficiency. Implementing the principle of least privilege reduces risks for the organization’s information infrastructure. This includes reducing downtime associated with security incidents, thus improving the company’s operational efficiency.

How to implement the principle of least privilege in your organization

Implementing the principle of least privilege in an organization’s information infrastructure can be broken down into a few basic steps and tasks:

Conduct an inventory of resources, and audit the access rights users currently have.
Classify resources and create an access management model based on roles – each with specific rights.
As a starting point, assign users roles with minimal rights, and elevate their privileges only if necessary for their tasks.
Regularly conduct audits and review permissions – lowering privileges for users who no longer need access to certain resources for their tasks.
Apply the principle of privilege bracketing: when a user needs access to a larger number of resources for a task, try to elevate their privileges temporarily – not permanently.

And don’t forget about other protective measures

Of course, applying the principle of least privilege alone isn’t enough to secure a company’s information infrastructure. Other measures are also required:

Regular security audits.
Timely software updates.
Employee training on the basics of cybersecurity.
Deploying reliable protection on all corporate devices.

Kaspersky official blog – ​Read More

Team Liquid ’s E-Sports Platform Exposes 118,000 Users’ Personal Information

Liquipedia, an e-sports platform run by Team Liquid, experienced a data breach that exposed users’ email addresses and other details. The breach was caused by a publicly accessible and passwordless MongoDB database.

Cyware News – Latest Cyber News – ​Read More