CYBERSECURITY / DEFENSE / INTELLIGENCE

  • Cisco has unveiled its latest innovation, Cisco Hypershield, marking a milestone in cybersecurity.

    This groundbreaking product, described as Cisco’s most consequential security solution, introduces a cloud-native, AI-powered approach to securing highly distributed, AI-scale data centers.

    Integrated directly into the network’s fabric, the Cisco Hypershield represents a radical departure from traditional security models, leveraging the power of hyperscaler security and connectivity for the enterprise.

    The advent of artificial intelligence (AI) is propelling us into a future of digital abundance, where every individual and organization operates at a machine scale, effectively multiplying our global capacity.

    Free Live Webinar for DIFR/SOC Teams: Securing the Top 3 SME Cyber Attack Vectors - Register Here.

    This transformation necessitates reimagining our data centers, not just in terms of connectivity and operation but crucially also in terms of security.

    Cisco is at the forefront of this evolution, addressing the dual shifts in infrastructure and applications.

    With CPUs being complemented by GPUs and DPUs for specialized functions and applications fragmenting into thousands of microservices across various containers and clouds, the complexity of securing these environments has skyrocketed.

    Despite billions invested in cybersecurity, the industry continues to grapple with significant challenges.

    The sheer scale of modern applications, AI workloads, and devices introduces new vulnerabilities, making tasks like segmentation, patching, and upgrades increasingly tricky.

    The introduction of Cisco Hypershield aims to address these challenges head-on, offering a solution that can autonomously adapt to the evolving landscape of digital threats.

    Innovations Behind Cisco Hypershield

    AI-Powered Security

    At its core, Cisco Hypershield is built to leverage AI’s full potential, making it significantly more autonomous than existing security solutions.

    This AI-first approach is exemplified in Cisco’s partnership with NVIDIA, focusing on co-creating security-specific AI models and optimizing Cisco Security products for NVIDIA’s technology.

    eBPF and Hardware Acceleration

    Cisco Hypershield utilizes modern technologies like eBPF and hardware acceleration to provide unparalleled security coverage.

    eBPF allows deep visibility into every software process and I/O operation across distributed applications without compromising system integrity.

    Meanwhile, hardware acceleration ensures that high-performance security control points can be deployed close to the workloads they protect, enhancing overall security efficacy.

    Bringing Security to the Workloads

    Cisco Hypershield introduces a novel architecture that distributes thousands of security enforcement points across public and private clouds, bringing security directly to the workloads.

    This approach enables a range of innovative use cases, including:

    • Autonomous Segmentation: Leveraging ongoing visibility into network flows and application changes to dynamically define and update granular segmentation rules, protecting against lateral movement.
    • Distributed Exploit Protection: involves identifying high-risk vulnerabilities and deploying compensating controls to block attackers before patches can be applied or vulnerabilities are known.
    • Self-Qualifying Upgrades: Utilizing a shadow data path to test upgrades and policy changes against live traffic, ensuring seamless transitions to the latest versions without downtime.

    Cisco Hypershield represents a paradigm shift in how we approach security in the age of AI.

    By embedding security into the network’s fabric and harnessing the power of AI, Cisco is not only addressing the current challenges faced by data centers but also paving the way for a more secure, efficient, and resilient digital future.

    As organizations continue to navigate the complexities of digital transformation, Cisco Hypershield stands as a beacon of innovation, offering a glimpse into the future of cybersecurity.

    Looking to Safeguard Your Company from Advanced Cyber Threats? Deploy TrustNet to Your Radar ASAP

    The post Cisco Hypershield: AI-Powered Hyper-Distributed Security for Data Center appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.

    Go to source

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • Malware commonly encrypts its traffic (stolen data sent to a command-and-control server) and internal strings (like URLs and configurations) to prevent security systems from recognizing malicious content. 

    Cryptography fundamentals, classical ciphers, bitwise operations, XOR functions, and XOR cipher detection and decryption techniques, and showcase a practical example of how to decrypt malware C2 communication encrypted with XOR. 

    Common encryption methods:

    • XOR
    • Rc4
    • AES
    • DES
    • 3DES (Tripple DES)

    Main concepts in encryption are:

    • Plaintext is the raw data that hasn’t been encrypted and can be read and understood without processing.
    • Ciphertext is the encrypted data that looks like a bunch of random letters or bytes and can’t be read. It’s what the coding process turns into.
    • An encryption algorithm is a set of rules that turns plaintext into ciphertext. Several substitutions and permutations are usually used in plain text.
    • A key is a piece of data, usually a string of letters or numbers, used with an encryption algorithm to secure and decrypt data.

    Analyze Encrypted Traffic inΒ ANY.RUN with HTTPS MTIM ProxyΒ - Register for Free

    Fundamentals of Encryption:

    The encryption algorithm dictates how the data is manipulated, typically through substitutions and permutations, allowing decryption with the correct key.Β 

    There are two encryption methods: symmetric and asymmetric, whereas symmetric encryption utilizes a single key for both encryption and decryption, making it faster and simpler, which necessitates a secure channel for key exchange. 

    Asymmetric encryption, also known as public-key cryptography, addresses this by using two mathematically linked keys: a public key for encryption, freely distributable, and a private key for decryption, kept confidential, which allows for more secure key exchange but comes at the cost of increased complexity and slower processing times. 

    The breakdown will explore encryption concepts through a Lego-like approach, building towards understanding XOR with simple substitution, where a cleartext message is transformed based on a key. 

    Mutating the message at the bit level, introducing bitwise operations, and synthesizing concepts result in a comprehensive understanding of XOR, a fundamental operation in cryptography. 

    Simple substitution ciphers replace plaintext characters with alternative symbols according to a key, like swapping letters for emojis, as the concept underlies all encryption. 

    Caesar ciphers, a type of simple substitution, shift plaintext letters by a fixed amount. 

    Example of Caesar Cipher

    Caesar ciphers are vulnerable due to predictable patterns and unchanged symbol frequencies, where encryption relies on substituting symbols based on a defined rule. 

    The VigenΓ¨re cipher demonstrates the concept of using a key to mutate plaintext for encryption. A keyword generates multiple Caesar ciphers, applying a shift based on the corresponding key letter’s position (A = 0).

    Conversion of Plain text into Key, and Ciphertext

    Repetition arises when the key is shorter than the message, making the cipher vulnerable. This vulnerability, due to key brevity, is also applicable to modern symmetric encryption methods like XOR. 

    ANY.RUN explored bitwise operations, specifically XOR, for their role in encryption, where XOR operates on individual bits, returning 1 if only one input bit is 1, allowing to combine a message (plaintext) with a key using XOR, resulting in an encrypted ciphertext.Β 

    Conversion of plain text to 8-bit binary

    Decryption without the key is computationally impossible because the key controls the bit-wise changes and is thrown away after a single use (one-time pad). This shows how bitwise operations can be used to encrypt data securely.

    The XOR cipher encrypts data by performing a bitwise XOR operation between the plaintext and a secret key, where each bit in the plaintext is flipped (0 to 1 or 1 to 0) if the corresponding bit in the key is 1. 

    Cyberchef Screenshot

    By XORing the ciphertext with the same key once more, decryption is possible. This exposes the cipher’s flaw when using short, repetitive keys. In the hexadecimal representation of the encrypted data, it appears as repeating patterns of zeros, indicating a potential XOR encryption. 

    Any.Run Interface

    ANY.RUN analysis revealed a process sending a suspicious GET request for a .mp4 file, where the requested content, exhibiting repetitive patterns of 5s and 3s, suggested XOR encryption. While the key likely involved a sequence of 5s and 3s, its exact length remained unknown. 

    Downloading the executable from it and examining it in dnSpy could reveal the encryption function and the key itself. Once obtained, the key could decrypt the downloaded file (potentially malware) using tools like CyberChef.Β 

    Quickly analyze malware dynamically and statically inΒ ANY.RUN sandboxΒ  - Register for free

    What is ANY.RUN?

    ANY.RUN is a cloud-based malware lab that does most of the work for security teams. 400,000 professionals use ANY.RUN platform every day to look into events and speed up threat research on Linux and Windows cloud VMs.

    Advantages of ANY.RUN 

    • Real-time Detection: ANY.RUN can find malware and instantly identify many malware families using YARA and Suricata rules within about 40 seconds of posting a file.
    • Interactive Malware Analysis:Β ANY.RUN differs from many automated options because it lets you connect with the virtual machine from your browser. This live feature helps stop zero-day vulnerabilities and advanced malware that can get past signature-based protection.
    • Value for money: ANY.RUN’s cloud-based nature makes it a cost-effective option for businesses since your DevOps team doesn’t have to do any setup or support work.
    • Best for onboarding new security team members: ANY. RUN’s easy-to-use interface allows even new SOC researchers to quickly learn to examine malware and identify signs of compromise (IOCs).

    The post What is Encryption in Malware? – Understand From Basics to XOR appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.

    Go to source

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • Authorities have dismantled LabHost, a notorious cybercrime platform that facilitated widespread phishing attacks across the globe.

    The crackdown on LabHost, founded in the UK in 2021, marks a significant victory against cybercriminal networks that have long exploited digital platforms to conduct their illicit activities.

    LabHost, known for its Phishing-as-a-Service (PhaaS) offerings, allowed criminals, even those with limited IT skills, to create and manage phishing websites designed to mimic legitimate organizations such as banks, healthcare agencies, and postal services.

    For a monthly fee of up to Β£300, subscribers were provided with phishing kits, tutorials, and tools necessary to deceive victims into handing over sensitive information, including bank card details, PIN numbers, and passwords.

    Free Live Webinarfor DIFR/SOC Teams: Securing the Top 3 SME Cyber Attack Vectors - Register Here.

    Take Down Operation

    The operation led to the arrest of dozens of individuals, and LabHost’s fraudulent sites were seized.

    Authorities have revealed that the platform was instrumental in tricking nearly half a million people into divulging their bank card details and PIN numbers.

    Additionally, LabHost’s activities resulted in the theft of 1.2 million unique usernames and passwords, highlighting the extensive reach and impact of its operations

    LabHost’s subscription model included various tiers, targeting financial institutions primarily in North America, with a notable increase in phishing attacks against Canadian banks.

    Following a disruptive outage in October 2023, the platform’s resurgence in activity underscored the persistent threat posed by such cybercrime services.

    The international investigation into LabHost’s activities involved collaboration between law enforcement agencies and private sector partners, demonstrating a unified approach to combating online fraud.

    The Metropolitan Police Service, the National Economic Crime Centre, and other international partners played a crucial role in infiltrating and disrupting the platform.

    The seizure of LabHost has sent a strong message to online fraudsters, challenging the notion that they can operate with impunity behind digital identities.

    Authorities have emphasized their commitment to dismantling international fraud networks, leveraging global collaboration to target cybercriminals at their source.

    As the investigation continues, up to 25,000 UK-based victims have been contacted to inform them of the data breach, with efforts underway to identify and support additional victims worldwide.

    The operation against LabHost underscores the ongoing challenges in the fight against cybercrime and highlights the effectiveness of international cooperation in protecting digital spaces from exploitation.

    Protect Your Business Emails with Trusitifi'sΒ AI-PoweredΒ Security β€”stopping 99% of phishing attacks - Request a Free Demo

    The post Phishing-as-a-Service Platform LabHost Seized by Authorities appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.

    Go to source

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • Armis, a leading cybersecurity company, has acquired Silk Security, an AI-powered vulnerability detection firm.

    The acquisition comes when organizations grapple with a surge of security findings, with no scalable and automated way to prioritize and operationalize remediation.

    Ineffective processes and inconsistent risk prioritization have resulted in costly and suboptimal remediation efforts, leaving security teams struggling to address the most critical vulnerabilities.

    Armis to Address Full Exposure Management Lifecycle

    Silk Security’s capabilities are set to be integrated into the Armis Centrixβ„’ platform, marking a paradigm shift in how organizations approach risk resolution.

    Free Live Webinar for DIFR/SOC Teams: Securing the Top 3 SME Cyber Attack Vectors - Register Here.

    The combined solution will offer a comprehensive approach to risk prioritization and resolution lifecycle management across code, infrastructure, cloud, and application findings.

    Leveraging advanced AI technologies, Armis Centrixβ„’ will enable advanced security and collaborative exposure management by identifying and consolidating security issues, communicating and ranking priorities, finding and assigning the right owners, and collaborating with developers and operations stakeholders to remediate and reduce risk effectively.

    Outcomes and Proof Points

    The impact of the Armis and Silk Security integration is already felt by organizations that have leveraged these capabilities.

    Organizations have reported significantly reduced time spent identifying owners and assigning access, leading to more efficient risk assessment and remediation processes.

    Through machine learning-powered deduplication, organizations have experienced a severe reduction in the volume of security findings, resulting in improved Mean Time to Remediation (MTTR).

    The integrated solution has enabled organizations to close many findings, reducing overall threat debt and enhancing their security posture.

    Armis’ acquisition of Silk Security marks a significant leap forward in exposure management.

    By integrating Silk Security into the Armis Centrixβ„’ platform, Armis continues to push the boundaries of security excellence, empowering organizations to stay ahead of emerging threats and confidently safeguard their digital footprint.

    Looking to Safeguard Your Company from Advanced Cyber Threats? Deploy TrustNet to Your Radar ASAP

    The post Armis Acquires AI-based Vulnerability Detection Firm Silk Security appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.

    Go to source

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • Threat actors are actively exploiting critical vulnerabilities in OpenMetadata to gain unauthorized access to Kubernetes workloads and leverage them for cryptocurrency mining activity. That’s according to the Microsoft Threat Intelligence team, which said the flaws have been weaponized since the start of April 2024. OpenMetadata is an open-source platform that operates as a

    Go to source

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • A new Google malvertising campaign is leveraging a cluster of domains mimicking a legitimate IP scanner software to deliver a previously unknown backdoor dubbed MadMxShell. “The threat actor registered multiple look-alike domains using a typosquatting technique and leveraged Google Ads to push these domains to the top of search engine results targeting specific search keywords, thereby

    Go to source

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • Our State of Defense series continues with discussion with the CNO and the 4th Fleet.

    Go to source

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • Could Poland or Romania be eyeing the USAF’s old Warthogs?

    Go to source

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • Program officials also say they’ll β€œreimagine” their upgrade plan, with new delays for some capabilities.

    Go to source

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • If officials confirm it, Moscow would join the list of recent foreign infiltrators of U.S. water infrastructure.

    Go to source

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ