Connect with us

Cyber Security

Fashion Retailer Guess Confirmed that the Personal Data of Customers Was Compromised in a Ransomware Attack

Published

on

Guess stated last week that some of their customers’ personal information was exposed in a ransomware attack in February 2021.

The company said in a complaint with the Maine Attorney General’s Office last week that it was the target of a ransomware assault in February of this year, and that an investigation into the incident indicated that the hackers obtained certain user data.

The event was found on February 19, according to Guess. The adversaries were able to access “certain Guess systems between February 2, 2021 and February 23, 2021,” in addition to attempting to encrypt files on the organization’s networks and disrupting operations.

Guess claims that it learned the opponent had acquired users’ personal information in late May, including “Social Security numbers, driver’s licence numbers, passport numbers, and/or financial account numbers.”

Guess reported in its data breach warning that a total of 1,304 people were potentially affected by the incident, including four Maine residents. On July 9, the business began informing the affected users.

The apparel company also claims that it has taken further steps to strengthen its network security and reduce the likelihood of repeat accidents.

According to DataBreaches.net, the attack on Guess was carried out by the DarkSide organisation, which was also responsible for the attack on Colonial Pipeline earlier this year. Following the attack on Colonial Pipeline, DarkSide reportedly shut down operations, but not before claiming to have stolen 200 GB of data from the apparel retailer.

“We informed law enforcement and are assisting them in their investigation. We also took further steps to improve our security standards. “We regret that this happened and apologise for any inconvenience,” the business writes in a letter to those who were affected.

Bags, jewellery, fragrances, and watches are among the accessories produced by the American apparel brand and retailer. The company operates over 1,000 retail outlets in the Americas, Europe, and Asia, as well as 524 additional retail stores worldwide as of January 2021.


PlatoAi. Web3 Reimagined. Data Intelligence Amplified.
Click here to access.

Source: https://cybersguards.com/fashion-retailer-guess-confirmed-personal-data-customers-ransomware-attack/

Cyber Security

How to Sell Cybersecurity

Published

on

How to Sell Cybersecurity- We spoke with professionals to learn how they presently offer cybersecurity and information security goods and services to their clients.

Let’s look at seven of these tried-and-true ways that you may use right now:

Understand the Requirements of Different Industries

Different sectors have their own set of standards and compliance regulations to adhere to. For example, the security procedures that a healthcare organisation must follow are vastly different from those that a law firm or accountant should consider.

Your offer will most likely differ depending on who you’re selling your cybersecurity services to.

As a result, it’s critical for cybersecurity companies to understand the verticals in which they market.

You know more about security than they do, so research the laws and regulations for yourself. Find out what particular firms are needed to do, and whether their location has an impact on what is required.

You’ll be able to segment your prospects into separate lists more easily after that.

You can construct Smart Views in Close, for example, that automatically group leads together depending on your criteria. As a result, you can establish divisions based on industry, region, or any other significant feature. You may quickly change and amend those criteria, and your dynamic lead lists will update in real time.

Build and maintain a wide network online and offline

Your prospects are continually inundated with messages from a variety of sources, some of which are genuine and others which are spam.

So, how do you get others to pay attention to you? In a world of “spammy” security messaging, how can you stand out as a legitimate solution?

According to Magda Chelly of Responsible Cyber,

Making connections and maintaining relationships with your customers can be the key to success for most businesses. By continuously building a network of colleagues, business partners, and more, you are ensuring that whenever you need a strong pipeline and a definite lead, you can call upon your network to help you. One of my colleagues mentioned, you build relationships when you are interested in people, not when you make people interested in you.

It’s critical to be real whether you’re building your network online or offline. If you’re a salesperson who isn’t. You sell your prospect on yourself by selling nothing.

Apozy’s Rick Deacon adds, “Genuine, valuable information and good dialogue can lead to a new client.” “The issue is that individuals are phoney and ‘market-y,’ and it doesn’t work for them. It’s crucial to be someone who others want to talk to.”

You could, for example:

  • Use LinkedIn to share useful material.
  • Attend (or host!) a virtual event in your field.
  • Interviews on podcasts and shows hosted by notable people in your field are a great way to get your name out there.

Provide material that starts fresh dialogues and helps you extend your network to draw your audience to you. Make yourself the person people want to speak with.

Become an Educator and Security Consultant

You’ll be in a better position to educate your prospects after you understand the various security standards that different sectors must follow.

Many firms are unconcerned about protecting themselves from cyberattacks, but they recognise the necessity of adhering to regulatory rules. They’re probably aware that they’re not well-informed.

That’s where you, as the hero, come in: you can assist them cut through the legalese and figure out what’s really expected of them.

You establish yourself as an information security specialist by serving as an advisor and lecturer. This strategy helps you create trust with your prospects, and they’ll likely recognise they need your support on their own.

Ask Questions that Reveal Needs they didn’t Know they had

People, on the whole, despise being told what to do or what they require.

So, rather than trying to persuade or persuade your prospects that they require better security solutions, ask them questions to enable them arrive to their own conclusions. You could, for example, ask queries like:

  • Are you up to date on your industry’s regulations?
  • Are you safe from internal dangers and unintentional leaks?
  • How safe is it for you to share documents and communicate internally?
  • How do you deal with security issues posed by remote workers?
  • Do you have a plan in place to deal with an incident?

You can help your prospects recognise they aren’t entirely prepared for the hazards by discussing these and other questions.

They’ll be more receptive to hearing about your options after that.

Concentrate on how Your Product Helps them run their Business

Remember that fear tactics don’t work in real life. Instead of using fear to sell your goods or service, utilise value.

As a result, you’ll be able to focus less on what you do and more on what it accomplishes for them.

Here’s what Responsible Cyber’s Magda Chelly does:

I summarize the benefits and value of the product that I am offering using regulatory requirements and use cases. This usually works in our industry, as depending on where the customers are, the awareness might be very different.

In the field of cybersecurity, use cases and case studies can be extremely useful. Because your prospects may not fully comprehend their demands or what they can achieve with your product or services, it is your responsibility to offer them real-world instances of the outcomes they could expect. This is a great storytelling technique that can assist you in closing more business.

Use use cases that are relevant to their industry to help them reach that “aha” moment.

Keep their Priorities in Mind

When it comes to security, each company has its own priorities and objectives. Perhaps they wish to give their consumers more trust by adopting infosec products or services to better protect their data. Perhaps they don’t want to get fined if they don’t follow the rules. Perhaps they’re looking for ways to keep a newly remote crew safe.

Before you start pitching, you should figure out what this prospect’s top priorities are.

Consider how you may begin your pitch by emphasising the need of printer security. After a few minutes of talking, you learn that this prospect has lately transferred the bulk of their teams to the cloud and has eliminated the majority of their printers. Security solutions for their remote staff were what they really required.

Don’t be that person.

Instead, concentrate on their priorities first, then build your proposal around their company. This will not only save you time and efforts, but it will also increase your chances of piqueing their attention.

Don’t be Frightened to show your Vulnerability

Is it true that you can guarantee 100 percent security?

Come on, now, tell it how it is.

If your prospects are familiar with cybersecurity, they understand that there is no such thing as 100 percent security. If that’s all you have to offer, you’ll quickly lose any trust people had in you.

Instead, make an effort to be vulnerable.

Here’s what Apozy’s Rick Deacon has done:

We close deals by being vulnerable and upfront with our product’s efficacy and execution. To prove you can do what you say, you need to show a technical person what it does, how it does it, and what the real outcome is while not pretending you fix every problem they face.

Pretend you’re a silver bullet who can solve any security issue that arises. Even if a prospect isn’t familiar with cybersecurity, they’ll recognise that something that seems too good to be true almost always is.

So, be truthful and true to yourself. Make it clear to your prospects that perfect security isn’t a realistic aim. Demonstrate how you can assist them in anticipating dangers and being prepared to fight or respond to cyberattacks. In sales, practise radical candour.

The post How to Sell Cybersecurity appeared first on Cybers Guards.
PlatoAi. Web3 Reimagined. Data Intelligence Amplified.
Click here to access.

Source: https://cybersguards.com/how-to-sell-cybersecurity/

Continue Reading

Cyber Security

Android Banking Trojan Relies on Screen Recording and Keylogging Instead of HTML

Published

on

According to security experts at ThreatFabric, a newly found Android banking Trojan captures login credentials via screen recording and keylogging rather than HTML overlays.

The malware, dubbed Vultur and originally discovered in March 2021, uses AlphaVNC’s VNC (Virtual Network Computing) implementation to get full visibility into the victim system. Remote access to the device’s VNC server is provided by ngrok, which uses secure tunnels to expose endpoints behind NATs and firewalls to the Internet.

According to ThreatFabric, the mobile malware uses Accessibility Services to identify the programme running in the foreground and begins screen recording if the app is in the target list. Vultur is projecting the screen while masquerading as a programme called Protection Guard, an operation visible in the notification panel.

While Android banking Trojans are known to use the Accessibility Services to carry out criminal operations, they often use HTML overlays to deceive users into exposing their login details. Vultur does use overlay to get all of the permissions it needs to execute unimpeded on the infected device.

The malware also makes advantage of Accessibility Services to log all of the keys that the user taps on the screen and to prevent the victim from manually uninstalling the infection. The virus auto-clicks the back button to return the user to the main screen when the user accesses the app’s information screen in settings.

Vultur is a banking application that primarily targets consumers in Australia, Italy, and Spain. Some victims were also seen in the Netherlands and the United Kingdom, but to a considerably smaller extent. The malware is also highly interested in stealing crypto-wallet credentials and keeps a close eye on social networking apps.

Vultur looks to be tied to Brunhilda, a privately managed dropper that previously transmitted Alien, a variant of the Cerberus banking malware that was discovered in Google Play several months ago, according to ThreatFabric.

The Brunhilda sample connected with Vultur (it has the same icon, package name, and command and control server as a Vultur sample) has over 5.000 instals, out of a total of more than 30.000 Brunhilda droppers are estimated to have had through Google Play and unofficial stores.

The post Android Banking Trojan Relies on Screen Recording and Keylogging Instead of HTML appeared first on Cybers Guards.
PlatoAi. Web3 Reimagined. Data Intelligence Amplified.
Click here to access.

Source: https://cybersguards.com/android-banking-trojan-relies-on-screen-recording-and-keylogging-instead-of-html/

Continue Reading

Cyber Security

Chinese-Speaking Threat Actor Targeting Microsoft Exchange Vulnerabilities

Published

on

According to Kaspersky, a previously unknown Chinese-speaking threat actor is targeting Microsoft Exchange vulnerabilities in an attempt to compromise high-profile victims.

The long-running operation known as GhostEmperor concentrates on Southeast Asian targets and employs a previously unknown Windows kernel-mode rootkit.

According to Kaspersky, GhostEmperor uses a loading technique that relies on a component of the Cheat Engine open-source project to get around Windows Driver Signature Enforcement and install its rootkit.

Kaspersky security researchers uncovered the use of “a sophisticated multi-stage malware framework targeted at allowing remote control over the infected machines” during their examination into the activities.

The threat actor targeted various entities in Southeast Asia, including governmental organisations and telecom companies, according to Kaspersky. The toolset first appeared in July 2020, with the threat actor targeting various entities in Southeast Asia, including governmental organisations and telecom companies.

While looking into numerous efforts targeting Exchange servers, Kaspersky discovered the GhostEmperor cluster of activity.

Several threat actors targeted a set of Exchange vulnerabilities that Microsoft publicly reported in March this year, with the majority of the attacks being blamed on Chinese opponents.

Last Monday, the US and its allies publicly accused China of the assaults.

GhostEmperor, on the other hand, is a wholly new adversary, according to Kaspersky, with no resemblance to established threat actors.

“GhostEmperor is a great example of how fraudsters are always looking for new ways to exploit weaknesses and new strategies to deploy. They added additional issues to the already well-established trend of assaults against Microsoft Exchange servers by using a previously unknown, sophisticated rootkit,” said David Emm, a security analyst at Kaspersky.

The post Chinese-Speaking Threat Actor Targeting Microsoft Exchange Vulnerabilities appeared first on Cybers Guards.
PlatoAi. Web3 Reimagined. Data Intelligence Amplified.
Click here to access.

Source: https://cybersguards.com/chinese-speaking-threat-actor-targeting-microsoft-exchange-vulnerabilities/

Continue Reading

Cyber Security

Guardicore Labs are Sharing Details of a Critical Vulnerability in Hyper-V

Published

on

Microsoft addressed a significant vulnerability in Hyper-V in May 2021, according to security experts at Guardicore Labs.

The security vulnerability, identified as CVE-2021-28476 with a CVSS score of 9.9, affects Hyper-virtual V’s network switch driver (vmswitch.sys) and might be used to gain remote code execution or create a denial of service scenario.

Microsoft employs Hyper-V as the core virtualization technology for Azure. Hyper-V is a native hypervisor that provides virtualization features for both desktop and cloud systems.

Because it first surfaced in a vmswitch build in August 2019, the security flaw found by Guardicore Labs (in partnership with SafeBreach Labs) was likely in production for more than a year. Windows 7, 8.1, and 10 are all affected, as well as Windows Server 2008, 2012, 2016, and 2019.

By delivering a forged packet to the Hyper-V host, an attacker with an Azure virtual machine might exploit the security flaw. As a result, the attacker might have run code on the Hyper-V host, potentially bringing down entire cloud regions.

“Because Hyper-V is Azure’s hypervisor, a vulnerability in Hyper-V also affects Azure, and can compromise entire regions of the public cloud. According to a Guardicore Labs research, “triggering denial of service from an Azure VM would crash significant elements of Azure’s infrastructure and knock down all virtual machines that share the same host.”

According to the security researchers, an attacker who is able to exploit the vulnerability to gain remote code execution – a more complex exploitation chain – could gain control of the host and the VMs running on it, gaining access to sensitive information and the ability to run malicious payloads or perform other nefarious operations.

The problem exists because vmswitch does not validate the value of OID requests before processing them, and so may dereference an invalid pointer.

According to Guardicore Labs, there are two exploitation scenarios: one in which an incorrect pointer causes the Hyper-V host to crash, and another in which the host’s kernel reads from a memory-mapped device register and executes code.

“What made this vulnerability so fatal was the combination of a hypervisor bug – an arbitrary pointer dereference – and a design defect allowing an overly permissive communication channel between the guest and the host,” the researchers explained.

The post Guardicore Labs are Sharing Details of a Critical Vulnerability in Hyper-V appeared first on Cybers Guards.
PlatoAi. Web3 Reimagined. Data Intelligence Amplified.
Click here to access.

Source: https://cybersguards.com/guardicore-labs-are-sharing-details-of-a-critical-vulnerability-in-hyper-v/

Continue Reading
Ecommerce8 hours ago

How professional videos can help e-commerce brands attract more customers

Cyber Security1 day ago

How to Sell Cybersecurity

Cyber Security1 day ago

Android Banking Trojan Relies on Screen Recording and Keylogging Instead of HTML

Blockchain1 day ago

The GBA Annual Achievement Awards

Energy1 day ago

CEMIG Geracão e Transmissão S.A. Announces Early Tender Date Results of its Cash Tender Offer for its 9.250% Senior Notes due 2024

Esports1 day ago

Tribes of Midgard Berserker: How to Unlock

Esports1 day ago

Tribes of Midgard Berserker: How to Unlock

Esports1 day ago

Can You Play King’s Bounty 2 on PlayStation?

Esports1 day ago

Can You Play King’s Bounty 2 on PlayStation?

Energy1 day ago

Coding And Marking Equipment Market in Industrial Machinery Industry to grow by USD 1.45 billion | Technavio

Esports1 day ago

Is King’s Bounty 2 on Xbox Game Pass?

Esports1 day ago

Is King’s Bounty 2 on Xbox Game Pass?

Energy1 day ago

CATL dévoile sa dernière technologie de pointe en lançant sa première génération de batteries sodium-ion

Energy1 day ago

CATL anuncia a sua tecnologia inovadora mais recente ao lançar a sua primeira geração de baterias de íons de sódio

Esports2 days ago

Can You Preorder King’s Bounty 2?

Esports2 days ago

Can You Preorder King’s Bounty 2?

Esports2 days ago

League of Legends’ Champion Vex: Everything You Need to Know

Esports2 days ago

League of Legends’ Champion Vex: Everything You Need to Know

Fintech2 days ago

Chilean Fintechs Secure Millions; EBANX and Amazon Forge Payments Partnership

IOT2 days ago

Edge ML on the Raspberry Pi: Remote Birding and Traffic Monitoring

Fintech2 days ago

Movers and Shakers: Finastra hires new payments lead, Credit Suisse onboards tech chief

AR/VR2 days ago

Competition: Win A Township Tale for Oculus Quest

Fintech2 days ago

Listen: How the FDIC and Duke University drive bank innovation

Fintech2 days ago

State Street to offer crypto services to private-fund clients

AR/VR2 days ago

The VR Drop: Brutal Parkour Golf

Cyber Security2 days ago

Chinese-Speaking Threat Actor Targeting Microsoft Exchange Vulnerabilities

Blockchain2 days ago

Happy birthday Ethereum!

AI2 days ago

Why Machine Vision Matters to Your Business

Crowdfunding2 days ago

Why Does this Perfume Smell Like Gas?

Blockchain2 days ago

Binance to halt derivatives and futures trading in Europe

Trending