BackBox.org offers a range of Penetration Testing services to simulate an attack on your network or application. If you are interested in our services, please contact us and we will provide you with further information as well as an initial consultation.
Closing the Cybersecurity Career Diversity Gap
/in General NewsDiversity isn’t just an issue of fairness — it’s about operational excellence and ensuring we have the best possible teams defending our national security.
darkreading – Read More
Visio Trust Raises $7 Million for Third-Party Risk Management Platform
/in General NewsSan Francisco-based third-party risk management provider Visio Trust has raised $7 million in venture funding.
The post Visio Trust Raises $7 Million for Third-Party Risk Management Platform appeared first on SecurityWeek.
SecurityWeek – Read More
Cybersecurity 101: Understanding MITRE ATT&CK Framework
/in General NewsTraditional security frameworks often fail to connect with the realities of development. Usually, we see the results of them in PDFs and compliance documents, making it hard for developers to see how they relate to the actual code. As someone who tinkered with both worlds, Mitre is more valuable from a developer’s perspective than OWASP Top 10. Insisting at the same time that OWASP has its clear…
Source
TechSplicer – Read More
North Korea Deploying Fake IT Workers in China, Russia, Other Countries
/in General NewsThe North Korean fake IT workers have infiltrated businesses in China, Russia, and other countries aside from the US.
The post North Korea Deploying Fake IT Workers in China, Russia, Other Countries appeared first on SecurityWeek.
SecurityWeek – Read More
UK seeks collaboration for security research lab to counter Russia and ‘new AI arms race’
/in General NewsThe U.K. is seeking collaboration for a new AI security research lab that’s designed to counter Russia and other hostile states in what it dubs the “new AI arms race.” While the U.K. government has launched numerous funding initiatives in the past to support cybersecurity projects, the rise of AI-fueled nation-state attacks, specifically, is the […]
© 2024 TechCrunch. All rights reserved. For personal use only.
Security News | TechCrunch – Read More
THN Recap: Top Cybersecurity Threats, Tools, and Practices (Nov 18 – Nov 24)
/in General NewsWe hear terms like “state-sponsored attacks” and “critical vulnerabilities” all the time, but what’s really going on behind those words? This week’s cybersecurity news isn’t just about hackers and headlines—it’s about how digital risks shape our lives in ways we might not even realize.
For instance, telecom networks being breached isn’t just about stolen data—it’s about power. Hackers are
The Hacker News – Read More
Microlise Confirms Data Breach as Ransomware Group Steps Forward
/in General NewsThe SafePay ransomware group claims to have stolen over 1 terabyte of data from vehicle tracking solutions provider Microlise.
The post Microlise Confirms Data Breach as Ransomware Group Steps Forward appeared first on SecurityWeek.
SecurityWeek – Read More
Researchers Uncover Malware Using BYOVD to Bypass Antivirus Protections
/in General NewsCybersecurity researchers have uncovered a new malicious campaign that leverages a technique called Bring Your Own Vulnerable Driver (BYOVD) to disarm security protections and ultimately gain access to the infected system.
“This malware takes a more sinister route: it drops a legitimate Avast Anti-Rootkit driver (aswArPot.sys) and manipulates it to carry out its destructive agenda,” Trellix
The Hacker News – Read More
Russian Cyberspies Hacked Building Across Street From Target for Wi-Fi Attack
/in General NewsRussian cyberspy group APT28 conducted a Nearest Neighbor Attack, where it hacked into the building across the street from the victim for a Wi-Fi attack.
The post Russian Cyberspies Hacked Building Across Street From Target for Wi-Fi Attack appeared first on SecurityWeek.
SecurityWeek – Read More
The CMMC Countdown, Part 3
/in General NewsAs stressed in the previous CMMC Countdown post, the five points are make or break to get a conditional CMMC certification. We will continue briefly reviewing how to address the remaining five pointers.
CMMC Action Plan, continued
AC.L2-3.1.18
Consider showing that all mobile devices are managed using mobile device management (MDM) software the provides built-in authorization, monitoring and logging.
You could simplify your compliance posture by preventing mobile device access.
AT.L2-3.2.1
Consider showing a security awareness and training plan document that identifies your organization’s cybersecurity and CUI risks and the training courses that will educate employees on those risks. Consider using the SANS Security Awareness Planning Toolkit.
AT.L2-3.2.2
Consider showing the training assigned to the information technology and cybersecurity team members. Also, the training should be focused on the specific IT and cybersecurity systems used at your organization. Consider identifying these training assignments in your security awareness and training plan.
AU.L2-3.3.1
Consider reviewing which logs your systems are already capturing and how long they are being retained. Document those existing logs and the retention period. Review them and see whether they can help identify unlawful or unauthorized activity. Your security information and event manager (SIEM) might be able to create reports that identify unauthorized logins and anomalous behavior. Document this internal review as additional evidence. Make adjustments to the logs and retention periods as needed.
CM.L2-3.4.1
Consider creating a document that captures the hardware, software, and firmware when setting up new workstations, laptops, and servers. Revise this document at least annually. Create a document or use an inventory tracking system that identifies all the devices and their hardware, software, and firmware. Review the document at least annually, but ideally, as changes occur if you track it manually.
CM.L2-3.4.2
Consider showing how you harden each new machine and maintain its hardening. Show the scripts, Windows group policy objects, and security profiles (in MDM and security management tools). Collect any reports that show how these security configurations are applied and maintained.
IA.L2-3.5.1
Consider leveraging the implementation and evidence used for AC.L2-3.1.1. Furthermore, consider defining how each user’s unique identifier (e.g., username) and device’s unique identifiers (e.g., hostname) are assigned.
IA.L2-3.5.2
Consider showing that all systems require a unique username and password to authenticate. Remove default usernames if possible, or change their default passwords. Avoid shared usernames if possible,e or use a password manager that logs who is accessing the shared username. For service accounts, consider creating a naming convention that identifies its purpose.
IR.L2-3.6.1
Consider creating an incident response plan. The plan should show the process to addressing and resolving an incident. The plan steps should address each operational incident-handling capability defined in the CMMC control. You can use the Cybersecurity & Infrastructure Security Agency (CISA) Incident Response Plan (IRP) Basics to get started.
IR.L2-3.6.2
Create a form, set up an internal database, or use your security tools to document and track incidents. Update your IRP to include the contact information of internal (e.g., executives, directors) and external authorities (e.g., DIBNet, CISA, FBI) to contact during an incident and when to contact them. An incident affecting CUI must be reported using the DIBNet portal, which requires an ECA certificate.
MA.L2-3.7.2
Consider documenting:
MP.L2-3.8.3
Consider documenting a procedure on how CUI systems are sanitized (e.g., writing zeroes on the drive) and destroyed (e.g., degaussing and secure shredding). Consider reviewing and tailoring NIST Special Publication 800-88, Revision 1, Guidelines for Media Sanitization.
Before you go
We will review the more five-point controls in the next post.
Sign up for my mailing list at https://miguelacallesmba.medium.com/subscribe
Secjuice – Read More