[go: up one dir, main page]

iTWire TV 160x1200notfunny

iTWire TV 160x1200notfunny

iTWire TV 705x108notfunny

GUEST RESEARCH: Generative AI is here to stay. Organisations around the world are enthusiastically using and investing in the technology. But which regions and countries are leading in the use of GenAI technology, according to AI and data analytics business decision-makers?

GUEST RESEARCH: Konica Minolta Australia has released its 2024 Australian IT trends: Driving digital transformation report, revealing valuable insights into the current trends, challenges, and opportunities in the Australian IT market.

GUEST RESEARCH:  AI has seen a meteoric rise in adoption in Australia in recent months, and it shows no signs of slowing down. With clear benefits across all industries and stages of business maturity, leaders have high hopes for the technology. However, Australian businesses are facing challenges on two fronts: the digitalisation of companies is moving too fast for many decision-makers, and skilled workers are in short supply.

GUEST REPORT: Major sporting events like the World Cup, Super Bowl, and Wimbledon attract millions, even billions, of viewers. Argentina’s shootout win over France in the final game of the Qatar 2022 World Cup reached a global audience of 1.5 billion viewers. And the Olympics, starting later this month in Paris, is the biggest of them all—with the 2020 Tokyo Olympics having attracted a worldwide audience of over 3 billion viewers.

GUEST RESEARCH:  New research from Humanforce reveals that close to half of the 500 Australian workers it surveyed have switched jobs in the past year. Despite a sharp increase in living costs, the driving force for 54% of these workers finding a new employer was not higher pay, but the pursuit of better work-life balance and wellbeing.

GUEST OPINION by Raj Samani, Chief Scientist, Rapid7: The “evolving threat landscape” is a term we often hear within webinars and presentations taking place across the cybersecurity industry. Such a catch-all term is intended to capture the litany of threat groups and their evolving tactics, but in many ways it fails to truly acknowledge the growth in their capabilities. This is particularly true of APT groups who have for years demonstrated a remarkable increase in their capabilities to remain undetected and carry out instructions from those orchestrating the broader campaigns under which they operate.

The latest research paper from Rapid7 Labs examines the tactics of North Korea’s Kimsuky threat group. It is published to serve as a learning on the evolving capabilities of a highly adept and industrious threat group, and, more importantly, to provide the necessary insights for supporting security teams in the implementation of defensive strategies.

Key insights to be found in this research include:

Targeting capabilities

The paper details Kimsuky’s delivery method as largely focused on email, but of course, a key component of this is determining who to target and what the most effective lure is likely to be.

Historically, this threat group has been particularly successful at the latter with considerable time and expense taken to identify “individuals” on whom their attention should be focused.

It is all too easy to shrug and comment on the need for security awareness as the panacea control to prevent all such initial entry vectors. The reality is that we all remain susceptible, given the right hook. And the ability of this threat group to target and compromise individuals around the globe reveals an alarming level of capability to elicit a response from victims.

Evolving technical capabilities

As detailed earlier this year, we are seeing technical innovation borne from the need to evade security controls within the victim environment. In this instance we detail the use of .LNK file payloads derived from an LNK builder proof of concept. This, however, is just the tip of the iceberg, with many other payloads delivered using alternate methods.

What this reveals — with a very high degree of confidence — is that there is an element to continual tooling improvements. Much like a component of this group dedicated to strong OSINT (as above), there is likely a subset of the group dedicated to technical innovation as a means to evade detection.
This allows the group to develop an arsenal of malware, for example, that can be used at will; but more importantly, it can be built upon and developed as defensive techniques improve.

Always on the move
The historic dependency upon reputations as a vehicle to identify malicious infrastructure is fast becoming less than effective. Politely put — and as demonstrated within the paper — we see Kimsuky establish infrastructure across the globe but quickly leverage new domains as needed. This is just another example of how this group understands and develops the ability to quickly move as it identifies new targets.

Subsequently, the publication provides tactical, actionable insights into the defensive measures that can be taken. For example, full details of coverage are included within the paper, as well as persistence measures undertaken by the threat actor, which are a critical indicator of compromise during retroactive threat hunts. All TTPs detailed within the paper are also incorporated into detection coverage across the Rapid7 portfolio.

GUEST RESEARCH: As the digital landscape evolves, organisations worldwide are increasingly leveraging the cloud to drive innovation, efficiency, and growth. However, this migration has opened new avenues for cyber threats, posing significant risks to the very fabric of modern enterprises. The Threat Horizons report by Google Cloud provides a stark reminder of the vulnerabilities that come with cloud adoption and emphasises the need for proactive security measures.

GUEST RESEARCH:  New research from Sapia.ai shows chat-based screening tools can level the playing field for those with a disability.

New research from Sapia.ai has slated chat-based interviews as one of the fairest means of evaluating candidates with a disability.

GUEST RESEARCH: Infoblox Threat Intel released a threat landscape study of the use of registered domain generation algorithms (RDGAs) by malicious actors today.

GUEST RESEARCH:  Tencent Cloud, the cloud business of global technology company Tencent, today announced its recognition as a Challenger in the 2024 Gartner Magic Quadrant for Communications Platform as a Service (CPaaS). In terms of its ability to execute, Tencent Cloud has secured the highest position among all cloud service providers in the Asia-Pacific region.

Subscribe to Newsletter

*  Enter the security code shown:

WEBINARS & EVENTS

CYBERSECURITY

PEOPLE MOVES

GUEST ARTICLES

Guest Opinion

ITWIRETV & INTERVIEWS

RESEARCH & CASE STUDIES

Channel News

Comments