Cisco Unveils New AI Application Security Solution

Cisco has unveiled AI Defense, a solution designed to help organizations protect development and use of AI applications. 

The post Cisco Unveils New AI Application Security Solution appeared first on SecurityWeek.

SecurityWeek – ​Read More

The best password manager for families in 2025: Expert tested and reviewed

The best password managers provide security, privacy, and ease of use for a reasonable price. We tested the best ones to help you find what’s best for your family.

Latest stories for ZDNET in Security – ​Read More

Russian Cyberspies Caught Spear-Phishing with QR Codes, WhatsApp Groups

Microsoft researchers catches Russia’s Star Blizzard hackers spear-phishing with QR codes and WhatsApp group chats.

The post Russian Cyberspies Caught Spear-Phishing with QR Codes, WhatsApp Groups appeared first on SecurityWeek.

SecurityWeek – ​Read More

Risk, Reputational Scores Enjoy Mixed Success as Security Tools

Part predictive analysis, part intuition, risk and reputation services are imperfect instruments at best — and better than nothing for most organizations and insurers.

darkreading – ​Read More

Strategic Approaches to Threat Detection, Investigation & Response

By staying vigilant, agile, and prepared, organizations can turn TDIR from a defensive strategy into a proactive enabler of security and operational excellence.

darkreading – ​Read More

Millions of Internet Hosts Vulnerable to Attacks Due to Tunneling Protocol Flaws

New research shows that over 4 million systems on the internet, including VPN servers and home routers, are vulnerable to attacks due to tunneling protocol flaws.

The post Millions of Internet Hosts Vulnerable to Attacks Due to Tunneling Protocol Flaws appeared first on SecurityWeek.

SecurityWeek – ​Read More

Clop ransomware gang names dozens of victims hit by Cleo mass-hack, but several firms dispute breaches

The Russia-linked ransomware group is threatening to leak data stolen from almost 60 Cleo Software customers if ransoms aren’t paid

© 2024 TechCrunch. All rights reserved. For personal use only.

Security News | TechCrunch – ​Read More

Government Sector Bears the Brunt of Cyberattacks in Ukraine: Report 

Cybe Inc | ukrain-cyberthreat

Overview 

Ukraine’s fight against cyberthreats has reached new heights, with its top cybersecurity agency releasing the 2024 annual cyberthreat landscape report detailing its efforts to protect critical infrastructure and government systems.  

The report, prepared by the State Cyber Defense Center under the State Service for Special Communications and Information Protection, outlines key findings, incident statistics, and strategies employed to counteract persistent cyber threats. 

Key Findings 

Ukraine processed a staggering 3 million security events in 2024, a reflection of the heightened activity in its cyber domain. Of these, over 1,000 incidents were confirmed as direct cyberthreats.  

The year saw a surge in advanced persistent threats (APTs) and state-sponsored cyber espionage campaigns, with attackers leveraging legitimate services to obfuscate their malicious activities. 

  • Malware Dominance: Over 58% of incidents involved malicious software, ranging from ransomware to spyware designed for prolonged infiltration. These attacks targeted data exfiltration and operational disruption. 

  • Sectoral Breakdown: Government agencies accounted for 90% of reported incidents, making them a primary target for the year. The energy sector, critical to Ukraine’s resilience, and the defense sector, pivotal in ongoing geopolitical conflicts, also faced significant threats. 

  • Primary Attack Vectors: Phishing campaigns remained the predominant method of attack. Threat actors exploited spear-phishing emails laden with malicious attachments or links, leveraging human error as an entry point. 

The Major Threat Clusters 

Ukraine identified three major threat actor clusters, each with distinct methodologies and objectives that remained most active in the year gone by: 

  1. UAC-0010 (Gamaredon/Trident Ursa): 

  • Activity: Conducted over 270 documented incidents in 2024. 
  • Tactics: Utilized tailored malware delivery mechanisms, including infected removable media and phishing emails. 
  • Targets: Government institutions, military organizations, and diplomatic entities. 
  • Objective: Cyber espionage aimed at gathering intelligence on Ukraine’s governance and defense. 

  1. UAC-0006: 

  • Activity: Responsible for 174 attacks, particularly in the financial sector. 
  • Tactics: Employed SmokeLoader malware to infiltrate systems and extract sensitive data. 
  • Objective: Financial gain through data theft and subsequent ransom demands. 

  1. UAC-0050: 

  • Activity: Linked to 99 incidents with a mix of espionage and sabotage. 
  • Tactics: Relied heavily on phishing and malware propagation via compromised email accounts. 
  • Objective: Espionage with a secondary focus on spreading disinformation. 

Advanced Tools and Techniques 

To combat increasingly sophisticated threats, Ukraine’s SOC deployed a range of advanced tools and methodologies: 

  • Network Detection and Response (NDR): SOC teams monitored anomalies in traffic patterns across 69 sensors strategically placed in critical networks. These sensors facilitated early detection of intrusions. 
  • Endpoint Detection and Response (EDR): Secured over 28,000 devices, providing a critical layer of defense against endpoint-based attacks. 
  • Attack Surface Management (ASM): Regular scans of over 1,200 assets enabled the identification and mitigation of vulnerabilities before they could be exploited. 
  • SOAR and AI Integration: The integration of Security Orchestration, Automation, and Response (SOAR) with AI algorithms streamlined incident response processes, reducing detection-to-remediation times significantly. 

Sector Specific Insights 

Ukraine’s cyber agency’s analysis provides a granular view of the sectors most impacted by cyber threats

  • Government Agencies: As the backbone of Ukraine’s operational and strategic initiatives, government networks faced relentless attacks. Over 90% of incidents were concentrated here, ranging from attempts to steal classified information to disruptions in communication systems. 
  • Energy Sector: With Ukraine’s energy infrastructure being a critical target, adversaries focused on disrupting power grids and supply chains, aiming to weaken national stability. 
  • Defense Sector: Sophisticated attacks aimed to infiltrate military communications and logistics systems, compromising national security. 

Recommendations for Enhanced Cyber Resilience 

Ukraine’s cyberthreat landscape suggests a multi-layered approach to cybersecurity, advocating for the following measures: 

  1. Regular Software Updates: Ensure that all systems, software, and firmware are updated promptly to address known vulnerabilities. 
  2. Advanced Email Security: Deploy filters to detect and block phishing attempts, and train employees to recognize suspicious communications. 
  3. Comprehensive Endpoint Protection: Utilize advanced antivirus and EDR solutions to secure devices against malware and unauthorized access. 
  4. Network Segmentation: Isolate critical systems from less secure areas to limit the scope of potential breaches. 
  5. Multi-Factor Authentication (MFA): Enforce MFA across all user accounts to bolster identity verification processes. 
  6. Incident Response Plans: Develop and regularly test robust incident response protocols to ensure rapid recovery from cyber events. 
  7. Continuous Monitoring: Leverage SIEM tools and log analysis to detect and respond to anomalies in real-time. 

The Path Forward 

Ukraine’s annual cyberthreat landscape report 2024 shows the dynamic and persistent nature of cyberthreats that the country is facing. The integration of advanced technologies and proactive collaboration with international allies has significantly enhanced the nation’s cyber defense capabilities. However, the evolving tactics of adversaries demand an equally adaptive and forward-looking approach. 

As Ukraine continues to navigate its geopolitical challenges, the role of cybersecurity in safeguarding national sovereignty and infrastructure remains paramount. By fostering a culture of resilience and collaboration, Ukraine is setting an example for global cybersecurity efforts, proving that even under relentless attack, robust defenses can prevail. 

References: 

https://scpc.gov.ua/api/files/72e13298-4d02-40bf-b436-46d927c88006
https://www.cip.gov.ua/ua/news/sistema-viyavlennya-vrazlivostei-i-reaguvannya-na-kiberincidenti-ta-kiberataki-dckz-dopomogla-viyaviti-ta-opracyuvati-1042-kiberincidenti-u-2024-roci

The post Government Sector Bears the Brunt of Cyberattacks in Ukraine: Report  appeared first on Cyble.

Blog – Cyble – ​Read More

Wultra Raises €3 Million for Post-Quantum Authentication

Authentication solutions provider Wultra has raised €3 million (~$3.1 million) for its post-quantum technology.

The post Wultra Raises €3 Million for Post-Quantum Authentication appeared first on SecurityWeek.

SecurityWeek – ​Read More

Ransomware sanctions, software security among key points in new Biden executive order

The federal government will have more power to issue sanctions in response to ransomware incidents, and software vendors will have to do more to prove the security of their products under an executive order issued with just days left in the Biden administration.

The Record from Recorded Future News – ​Read More