CYBERSECURITY / DEFENSE / INTELLIGENCE

  • In modern business, cybersecurity is not merely a technical concern but a crucial financial safeguard. With cyber threats growing in sophistication and frequency, the financial implications of neglecting cybersecurity training are severe and multifaceted. INE Security, a global leader in cybersecurity training and certifications, is exploring how overlooking this critical aspect of organizational strategy can lead to a financial crisis and laying out five key reasons why cybersecurity training is important. 

    Direct Financial Impact of Cyber Attacks

    The financial toll of cyber incidents can be staggering. The average cost of a data breach ballooned to $4.88 million dollars in 2023, a 10% spike over the previous year, according to a recent IBM report. The same report illuminates the value of a robust cybersecurity staff, showing a majority of those breached were short-staffed in cybersecurity, and experienced an average loss of $1.76 million more in beach costs. 

    “As cyber threats become more sophisticated, the cost of not investing in cybersecurity training escalates exponentially,” explains Dara Warn, CEO of INE Security. “Effective training is not merely a line item expense β€” it’s an indispensable investment in the operational integrity and financial security of organizations. Choosing the right training partner and prioritizing cybersecurity training for businesses should not be viewed as optional by CISOs and CIOs.”

    Operational Disruption

    Beyond the direct costs of a cyberattack, operational disruptions often require extensive system recoveries, diverting resources and causing significant revenue losses, as was the recent case for CDK Global. The automotive dealership software solution provider was hit by a ransomware attack, crippling the auto industry and opening the company up to substantial litigation risks, a one-two punch that will likely take years to realize the full extent of the damages.

    Long-Term Reputational Damage

    The indirect costs of cyber breaches, such as reputational damage, can be more harmful than the immediate financial penalties. After the 2019 data breach of Capital One, which affected approximately 100 million customers in the U.S., the bank faced not only regulatory fines but also a significant erosion of customer trust. The incident led to lawsuits and a decline in customer growth, illustrating how reputational damage can translate into long-term financial losses and highlighting the fragility of critical IT infrastructures. 

    Regulatory and Compliance Costs

    Neglecting cybersecurity training also exposes organizations to regulatory risks. Non-compliance with frameworks such as GDPR in Europe or HIPAA in the United States can result in substantial fines. In 020, Marriott faced a fine of more than $23 million by the UK’s Information Commissioner’s Office for a breach that affected millions of guests. Although reduced from an initial $124 million due to mitigation factors, including the economic impact of COVID-19, the fine underscores the significant financial penalties associated with failing to protect customer data.

    The Case for Investing in Cybersecurity Training

    Investing in cybersecurity training is not just about mitigating risksβ€”it’s about financial prudence. Well-trained employees are less likely to fall prey to phishing attacks or other forms of social engineering, significantly reducing the potential for breaches. Moreover, a knowledgeable IT team can ensure that systems are kept up-to-date and secure against emerging threats, decreasing the likelihood of costly incidents.

    From a financial perspective, the return on investment for cybersecurity training is clear. The cost of training and upskilling staff is considerably lower than the expenses associated with recovering from a cyber attack, not to mention the long-term savings from avoiding fines and reputational damage.

    The Case for Investing in Cybersecurity Training: Five Reasons to Make the Investment

    Comprehensive Protection Through Education

    Cybersecurity training empowers employees by educating them about the risks associated with cyber threats and the methods by which these threats can infiltrate an organization. By understanding the tactics used by cybercriminals, such as phishing, ransomware, and other forms of social engineering, employees become more adept at recognizing suspicious activities and less likely to inadvertently expose the organization to a breach. This type of education is crucial, as human error remains one of the leading causes of security failures.

    Enhancing Skill Sets with Certifications

    Achieving the best certifications for cybersecurity such as Junior Penetration Tester (eJPT), CompTIA Security+, and Certified Information Systems Security Professional (CISSP) provides IT professionals with comprehensive knowledge and skills that are crucial for managing and mitigating cybersecurity risks effectively. These certifications are recognized across the industry and signify a professional’s ability to design, implement, and manage a best-in-class cybersecurity program. They are not merely educational tools but are also instrumental in shaping the cybersecurity landscape within an organization.

    Leveraging Cybersecurity Training for Compliance

    With the increasing number of data protection regulations, such as GDPR in Europe and CCPA in California, cybersecurity training becomes essential for ensuring compliance. Training programs that include components on regulatory requirements help organizations avoid costly fines and legal battles by keeping employees informed about their responsibilities under these laws. Compliance-focused training ensures that the organization not only meets current legal standards but is also prepared for new regulations that may arise.

    Strategic Investment in Future Security

    The cost of implementing a robust cybersecurity preparedness training program is often dwarfed by the expenses associated with a data breach, which can include remediation costs, fines, lawsuits, and loss of reputation. By investing in continuous and updated training programs, organizations can create a culture of security that permeates every level of the company. This culture not only enhances security but also builds a corporate ethos where security becomes a daily operational element, as integral as customer service or quality control.

    Attracting and Retaining Top Talent

    Organizations that provide ongoing professional development opportunities in cybersecurity are more likely to attract and retain top talent. Professionals in the field often seek environments where they can grow their skills and take on new challenges. Providing access to training and development programs makes an organization more attractive to ambitious cybersecurity professionals and enhances its reputation within the industry.

    Conclusion

    The financial stakes associated with cybersecurity are too high to ignore. As cyber threats evolve, the cost of inaction will only increase. Organizations must view cybersecurity training not as an optional expense but as a critical investment in their financial security and operational integrity. By prioritizing cybersecurity education, businesses can protect themselves against not only the immediate threats but also the extensive financial repercussions that can arise from a single breach.

    About INE Security:

    INE Security is the premier provider of online networking and cybersecurity training and certification. Harnessing a powerful hands-on lab platform, cutting-edge technology, a global video distribution network, and world-class instructors, INE Security is the top training choice for Fortune 500 companies worldwide for cybersecurity training in business and for IT professionals looking to advance their careers. INE Security’s suite of learning paths offers an incomparable depth of expertise across cybersecurity and is committed to delivering advanced technical training while also lowering the barriers worldwide for those looking to enter and excel in an IT career.

    Contact

    Director of Global Strategic Communications and Events
    Kathryn Brown
    INE Security
    kbrown@ine.com

    The post INE Security Alert: The Steep Cost of Neglecting Cybersecurity Training appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.

    Go to source

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • A new phishing campaign is targeting developers by exploiting GitHub’s legitimate infrastructure.

    This sophisticated attack involves fake job offers sent from genuine GitHub email addresses, posing a threat to corporate information security, especially for developers with administrative access to company repositories.

    GitHub Account Hijacking: The Phishing Tactic

    The attack begins with an email fromΒ notifications@github.com, a legitimate GitHub address.

    The email claims that GitHub is seeking an experienced developer. It offers an enticing salary of $180,000 per year along with generous benefits. Recipients are invited to apply via a link in the email.

    The attack begins with an email: GitHub is supposedly seeking a developer for a $180,000 annual salary.
    The attack begins with an email: GitHub is supposedly seeking a developer for a $180,000 annual salary.

    Despite coming from a genuine address, the email raises several red flags. The HR team using a notification address for job offers is unusual, and the email subject often doesn’t align with the job offer, so they list several GitHub usernames instead.

    Are You From SOC/DFIR Teams? - Try Advanced Malware and Phishing Analysis With ANY.RUN -14-day free trial

    Those distracted by the attractive salary might overlook these discrepancies. Clicking the link directs recipients to a fake GitHub career site, such as githubtalentcommunity[.]online or githubcareers[.]online.

    Here, developers are asked to log in to their GitHub account and authorize a malicious OAuth application, which requests extensive permissions, including access to private repositories and the ability to delete them.

    Phishing email variant warning of a GitHub hack
    Phishing email variant warning of a GitHub hack

    The Consequences: Repository Wipe and Ransom Demand

    According to the Kaspersky reports, attackers exploit the granted permissions once the malicious OAuth application is authorized.

    They empty the victim’s repositories, renaming them and leaving behind a single README.me file.

    This file contains a ransom note claiming that a data backup has been made and instructing the victim to contact a Gitloker user on Telegram to restore the data.

    Hijacked and emptied repositories on GitHub with ransom notes left by the attackers

    The attackers send these phishing emails using GitHub’s discussion system. Using already compromised accounts, they create messages under various topics, tagging multiple users.

    As a result, all tagged users receive emails from a legitimate email address, making the attack appear credible.

    These messages are typically deleted immediately after being sent, further complicating detection.

    Protecting Against GitHub Phishing Attacks

    Even experienced developers can fall prey to such sophisticated phishing tactics. To safeguard against these attacks, it is crucial to follow these recommendations:

    1. Scrutinize Email Details: Carefully check all aspects of an email, including the subject, text, and sender address. Discrepancies often indicate a phishing attempt rather than an accidental error.
    2. Avoid Clicking Suspicious Links: If you receive a suspicious email from GitHub, refrain from clicking any links and report the email to GitHub support.
    3. Be Cautious with OAuth Applications: Never authorize unknown OAuth applications. Regularly review the list of authorized applications in your GitHub account and remove any suspicious ones.

    By staying vigilant and following these guidelines, developers can help protect themselves and their organizations from these malicious phishing campaigns.

    As attackers refine their methods, awareness and proactive measures remain the best defense against such threats.

    Protect Your Business with Cynet Managed All-in-One Cybersecurity Platform – Try Free Trial

    The post Developers Beware! Fake Job Offers from Legitimate Github Address appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.

    Go to source

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • The Researcher team has identified and patched a critical privilege escalation vulnerability in the LiteSpeed Cache plugin.

    This plugin, installed on over 5 million WordPress sites, was susceptible to attacks that could allow unauthenticated users to gain administrative access.

    The vulnerability, identified as CVE-2024-28000, has been fixed in the latest version, 6.4.1, and users are urged to update immediately.

    CVE-2024-28000 – The Vulnerability

    The vulnerability in question affected all versions of the LiteSpeed Cache plugin up to 6.3.0.1. It was discovered that the plugin did not properly restrict the role simulation functionality.

    This flaw allowed unauthenticated attackers to spoof their user IDs, potentially register as administrative-level users, and take over WordPress sites.

    Technical Details

    Are You From SOC/DFIR Teams? - Try Advanced Malware and Phishing Analysis With ANY.RUN -14-day free trial

    The vulnerability was rooted in the plugin’s handling of user emulation through its “Crawler Simulation Settings.”

    This feature was insecurely implemented. It was designed to allow the plugin to crawl and cache pages as specific authenticated users. The core issue lay in theΒ async_litespeed_handler()Β function, which lacked proper capability or nonce checks.

    This oversight enabled users to trigger the function and generate a $hash value stored in the options table. This $hash could then be used to spoof user IDs.

    Wordfence has issued a firewall rule to protect its Premium, Care, and Response users against this vulnerability as of August 20th, 2024.

    Free users will receive this protection on September 19th, 2024. Given the critical nature of this vulnerability, it is imperative for all users of the LiteSpeed Cache plugin to update to version 6.4.1 or later immediately.

    For those managing WordPress sites, it is also advisable to regularly review and update all plugins and themes to their latest versions to mitigate potential security risks.

    This vulnerability highlights the ongoing need for vigilance in web security, especially for widely used plugins like LiteSpeed Cache.

    The swift action by Wordfence and the WordPress community underscores the importance of collaborative efforts in maintaining a secure web environment.

    Users are encouraged to remain proactive in updating their sites and sharing security advisories with others to prevent exploitation.

    Protect Your Business with Cynet Managed All-in-One Cybersecurity Platform – Try Free Trial

    The post Critical Flaw in LiteSpeed Cache WordPress Plugin Exposes Millions of Websites to Attack appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.

    Go to source

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • Google has rolled out security fixes to address a high-severity security flaw in its Chrome browser that it said has come under active exploitation in the wild. Tracked as CVE-2024-7971, the vulnerability has been described as a type confusion bug in the V8 JavaScript and WebAssembly engine. “Type confusion in V8 in Google Chrome prior to 128.0.6613.84 allowed a remote attacker to exploit heap

    Go to source

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • Cybersecurity researchers have disclosed a critical security flaw in the LiteSpeed Cache plugin for WordPress that could permit unauthenticated users to gain administrator privileges. “The plugin suffers from an unauthenticated privilege escalation vulnerability which allows any unauthenticated visitor to gain Administrator level access after which malicious plugins could be uploaded and

    Go to source

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • GitHub has released fixes to address a set of three security flaws impacting its Enterprise Server product, including one critical bug that could be abused to gain site administrator privileges. The most severe of the shortcomings has been assigned the CVE identifier CVE-2024-6800, and carries a CVSS score of 9.5. “On GitHub Enterprise Server instances that use SAML single sign-on (SSO)

    Go to source

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • Cybersecurity researchers have unpacked a new malware strain dubbed PG_MEM that’s designed to mine cryptocurrency after brute-forcing their way into PostgreSQL database instances. “Brute-force attacks on Postgres involve repeatedly attempting to guess the database credentials until access is gained, exploiting weak passwords,” Aqua security researcher Assaf Morag said in a technical report. ”

    Go to source

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • Breakthroughs in design for military-specific chips are ushering new capabilities.

    Go to source

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • The reconnaissance unit is the poster child for Army plans to field more drones, electronic warfare, and communications equipment across the force.

    Go to source

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • The reconnaissance unit is the poster child for Army plans to field more drones, electronic warfare, and communications equipment across the force.

    Go to source

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ