Connect with us

Cyber Security

Zero Day Vulnerability in Adobe Flash Player Threatens Web Users




Zero Day CalendarReading Time: 2 minutes

Criminals are using a new zero day vulnerability in the Adobe Flash Player to conduct drive-by-downloads, infecting unsuspecting web site visitors with malicious software.

What is Zero Day Vulnerability?

A zero day vulnerability is a previously unknown flaw where there is no patch available and security software have not been updated to deal with.

Security researchers as CISCO have reported that hackers are using the exploit to spread adware and build botnets. A botnet is a network of computers taken over by hackers, usually without the knowledge of the computer owner, which is used for nefarious purposes such as spreading malware, send spam email or launching Denial of Service attacks.

A famous blogger known as Kafeine first reported that this zero day vulnerability has been included in a well-known hacker exploit kit called Angler. Exploit kits contain tools for conducting attacks and creating malware and are sold online for profit.

Kafeine has also reported that test show Windows 8.1 and Chrome browser users are not affected by the zero day exploit.

Flash Player has been found to have numerous vulnerabilities in recent years and has been a popular target of hackers. Many web sites display Flash animation that requires the user to have a Flash Player installed. Hackers have zeroed in on other web technologies that also require a local user application such as Java, Adobe Reader and Silverlight.

No patch is currently available for this vulnerability, but Adobe is aware of the problem and has indicated they are working on a solution.

Comodo Internet Security (CIS) provides the best protection for zero day vulnerabilities because it uses a unique “Default Deny” architecture with auto-sandboxing that prevents programs that are not verified as safe from being run by the system. They may instead run in a safe, secure system area called a sandbox, where an unknown file where it can be analyzed for malicious behavior.

Comodo Security software, including the version for Endpoint Management is able to keep you safe because it does not rely solely on detecting known threats which require frequent updates to the systems virus signature file.


Cyber Security

Threat Landscaping




The past six months has proven that the threat landscape has changed forever. Threat intelligence is one of those posture-forward initiatives. Our upcoming Year-End Report will shed light on the fact that it is a growing focus for the community. In concert with that growing focus, we asked a few of our close friends, what has changed and what should executives do now?



Santosh Kamane, Vice President Information Security, DBS Bank

“Phishing, malware, ransomware attacks are on the rise because adversaries know that users are isolated from their workplaces. Organizations who worked in a security environment where they were not prepared to work remotely have had a particularly hard time. They did not have do’s and don’ts on how to handle phishing emails, malware, and ransomware, what to click, what not to click, when to report incident, etc.- those base practices in place.”

Santosh notes that security awareness was low on our way into the pandemic. That means that all of the security awareness focus for the past two years simply got the community to a less than optimal outcome. Security awareness campaigns continue- but it’s possible the strategy of communication needs to be examined.

What might be most interesting about Kamane’s response is that he’s not discussing feeds- he’s talking about basic human threat intelligence. What good do the best feeds do you if Dave from accounting just opened the wrong email?

Kayne McGladrey, Senior Member, IEEE

“We were in the hype cycle with threat intelligence, and as a direct consequence, organizations are evaluating their threat intelligence providers and asking, is this actionable? Is this relevant? You can have two separate threat intelligence feeds covering the exact same industry, and you’re getting entirely different signaling information out of them. So I think that there’s a hesitancy to invest more in threat intelligence rather than to pick the feeds and providers that are providing the most actionable information.”

Kayne is talking about feeds. But all feeds are not created equal and a great way to know if your given feeds are of any value to you is if you’ve taken action on anything anytime recently. Another way to know if you’re feeds are of any value is to quantify.

“Have a KPI about value that came out of your threat intelligence feed. Did it actually cause you to do something differently? Were your analysts able to act on this, or was it just another thing that they had to go look at? Because when you think of time as being our chief enemy, if it’s sucking time and not producing value, why do you keep it? It’s a data feed, ultimately. At the end of the day, you have to contextualize it in terms of your organization. Threat actors tend to vary in terms of behavior in their TTPs. And consequently, you need to really tailor your threat intelligence. And if you’re not getting that tailored information, drop it.”

One might argue that tailored information for your organization is more valuable than general information. Kayne is arguing that general information is not valuable. But he stops short of offering that company-specific feeds are the only feeds that matter.

“Is there an ISAC, an information security association, that’s sharing similar information that you could just get by being a member? That could also be a better public/private partnership to address these issues, in addition to a commercial entity that’s allegedly providing intelligence, whereas, in fact, they’re just providing data.”

Make some friends. Share some information. Which brings us to our second question.


Kayne McGladrey, Senior Member, IEEE

“Definitely, make a contact with your local veterans employment representative, your LVER. You can find those through America’s job network, and just find out. Like the other thing, ultimately, your HR departments will be pleased with because LVERs are not a paid service. You can basically hire people- with no hiring or headhunter fee or associated cost structure- who are going to be motivated and talented. They might need to learn your tool chain, but the actual intelligence skills to disambiguate and make sense of a threat intelligence feed or feeds, as well as what you’re seeing off your SIEM telemetry- that’s invaluable. You cannot put a price on that.”

Many folks are talking about investing more into threat intelligence. And many of those folks are talking about investing in automated analysis of threat intelligence feeds. An alternative to automating your (potentially unproven) feeds is hiring a veteran who all-in will likely be cheaper while having intelligence chops that are proven.

Santosh Kamane, Vice President Information Security, DBS Bank

“The key is zero trust architecture. It talks about addressing your internal and external traits at the same time. We always considered our employees, as non-mobile, internal resources that would always be in-office, now everybody’s on the move. That makes the threat level for external and internal players pretty much same. And in some cases with the internal employees it’s higher, because they hold so much knowledge, they already have keys to enter into your network.”

Again Santosh discusses heading off threats at the pass. It seems he in fact is on the pulse of where the industry’s issues lie. How can we justify unproven investment on “detect” threat landscape initiatives if “protect” threat landscape initiatives are vulnerable?

“The focus would be on how you build, purely a good a zero trust architecture to gain better visibility into everything that goes into your network- a centralized view- to have centralized security administration. Everything that goes in and out of the network that needs to be built, scrutinized, everything needs to be logged. Everything needs to be assessed on why that particularly activity was allowed or denied.”

As a coda to his contribution, Kamane urges folks to focus on the solution as opposed to the problem. So one might suggest that even if you’ve got the VPN in place because you just invested in that architecture. Rather than invest further in threat intelligence feeds or automation, use that money on a ZTNA (Zero Trust Network Architecture). Or, close the doors before you worry about the windows.

Jeff Campbell, CISO, Horizon Power

“Adopt that model of sharing. It’s all about knowledge sharing. It doesn’t really matter which threat Intel feed to which you subscribe. Don’t be overwhelmed by the number of available services- choose a framework, choose a model that you feel comfortable with, or that is purpose fit for your organization- and then start to structure your intelligence feeds or threat Intel around what you’re trying to achieve. If you’re trying to mature your cybersecurity practice, then look at threat feeds that will actually give you practical ways of remediating.”

Jeff makes like Steven Covey and suggests that you begin with the end in mind. What outcome are you trying to achieve? Answer that question. Then- just as Kayne suggested- customize your feeds as well as you can to your particular organization. And-  just as Kayne suggested- ensure that you are getting information which is actionable.

Dennis Leber, CISO, University of Tennessee

“Review your program and look at how you’re operationalizing that program. Look at what you’re doing with the data. You know how to improve. Look for opportunities to improve on what you’re doing already, and then share it, share your best practices with your peers and other companies.”

No matter what you do- once you have your threat intelligence working for you. A great final point by Dennis- share with your peers. The cyber security community is stronger and safer when collaboration occurs.


Continue Reading

Cyber Security

Huobi expands fiat gateway to support AUD, GBP and EUR through Banxa




Huobi expands fiat gateway to support AUD, GBP and EUR through Banxa

Huobi Global, the world’s leading digital asset exchange, today announced support for the Australian dollar (AUD), British pound sterling (GPB), and Euro (EUR) through Banxa, an internationally compliant fiat-to-crypto gateway solution. The partnership allows users in Australia, UK, and the European Union to purchase cryptocurrencies with their official fiat currencies.

By integrating with Banxa’s payment solutions, Huobi is able to provide users with more flexibility and choice in payment methods, while also enabling a seamless user experience. Users can access the new fiat-to-crypto gateway directly from the Huobi OTC site and deposit AUD, GBP, or EUR to begin trading cryptocurrencies in just a few clicks. Funds can be instantly added to a user’s account using bank transfers, debit/credit card, and other preferred payment methods with zero fees.

“Our partnership with Banxa allows us to support three of the world’s most widely-used fiat currencies, marking a significant milestone in our global expansion,” said Ciara Sun, Vice President, Global Markets at Huobi Group. “With our newly expanded fiat gateway, we want to help accelerate crypto adoption by making digital assets much more easily accessible to the masses. This integration introduces a new point of access for users in Australia, UK, and the European Union looking to enter the crypto market.”

Domenic Carcosa, founder and Non-Executive Chairman of Banxa said. “Huobi is a first mover heavyweight, with some of the most innovative products and services in the industry. As digital assets become mainstream and move toward mass adoption, regulation and transparency are key to building trust. That is why we’ve chosen to partner with Huobi.”

From the ‘Buy Crypto’ page on Huobi OTC, users can select the digital asset they’d like to purchase, choose their fiat currency, and enter the fiat value or asset quantity for purchase. After selecting their preferred payment method, which includes Visa and Mastercard transactions, users can purchase up to $20,000 USD worth of digital assets in a single transaction. The daily purchase limit is $15,000 and the monthly purchase limit is $60,000.

Users are also required to submit a one-time identity verification as part of the transaction process. Once completed and the payment approved, users can access their assets in their exchange account within a few minutes. From there, users can immediately select a trading pair and start crypto-to-crypto trading.

Sun added, “As we bolster our global presence and expand into new markets, we will continue adding new fiat on-ramps to give all users a frictionless onboarding experience. We recently set out on an ambitious new goal to empower 100 million households worldwide to own digital assets, so we want to ensure we make it faster, easier, and more secure for new users to get started.”


Continue Reading

Cyber Security

Australian Cyber Week 2020 showcases vibrant, growing sector




Today, the Federal Minister for Industry, Science and Technology, The Hon Karen Andrews MP, launched the fourth annual Australian Cyber Week, a week-long series of events and activities nationally coordinated by AustCyber – the Australian Cyber Security Growth Network.

The official launch event, featuring Minister Andrews, Innes Willox of the Australian Industry Group, Chris Painter of the Global Forum on Cybersecurity Expertise, industry heavyweight David Thodey and AustCyber’s CEO Michelle Price, will highlight the shift to digital through the COVID-19 pandemic and how it is accelerating the economy – a theme that will be explored further throughout the week through almost 30 events spanning the full breadth of the cyber security landscape for those within the sector, but also well beyond.

Held from 26-30 October, Australian Cyber Week 2020 provides opportunities for Australian cyber security and related organisations to showcase their capabilities and network with peers, potential investors and customers. It also provides an excellent way for cyber curious individuals and organisations to better understand what cyber security can do and mean for them.

“Cyber Week 2020 is one of AustCyber’s key programs under our mission to grow a globally competitive cyber security sector,” said Michelle Price, CEO of AustCyber. “The events during Australia’s Cyber Week connect Australian cyber capabilities with key domestic and international stakeholders who are contributing to the growth and success of the sector and creates further opportunities to enhance future economic growth.”

Australian Cyber Week has traditionally featured in-person events and activities at various locations across Australia. In 2020, AustCyber is debuting a new virtual conference platform which features 100% Australian technology. The 3D ‘circuit board city’ is the gateway to daily live events, a networking hub and exhibition hall showcasing booths which feature sovereign products and services. Online events will be complemented by in-person events in South Australia and Western Australia, facilitated through AustCyber’s National Network of Cyber Security Innovation Nodes.

“Each day, Australian Cyber Week has a feature event to demonstrate our globally completive cyber security ecosystem,” said Ms. Price. “The range of speakers is broad – ranging from CEOs of large corporates and venture capital investors, to ethical hackers, school students with a keen interest in cyber, and those with disabilities working within the sector.”

Later today, AustCyber in partnership with Cynch Security, Deakin University and RMIT University, will explore small business attitudes towards cyber security. While small businesses have had to fight for survival during the COVID-19 crisis, the unprecedented period of digital adoption has left many exposed to threats they are unprepared for. As Australia looks towards the future again, there has never been a more important time than now to understand the challenges this sector faces. This event will provide paths forward for building cyber fitness in the most vulnerable businesses.

AustCyber has partnered with CISO Lens and cyber security accelerator CyRise to host Sky’s the Limit on Tuesday 27 October. This event will feature ten Australian cyber security companies delivering short pitches to executives from ASX listed companies from key Australian sectors including advanced manufacturing, health, consumer services, mining and financial services.

To underline the importance of digital trust in keeping our digital activity secure and resilient, during an event on 28 October, AustCyber will simulate a significant cyber-attack on Australia through a hypothetical situation. Experts from the Australian Energy Market, Siemens Digital Industries Australia, TOLL Group and cohealth come together to examine the impact on critical infrastructure, crucial parts of our society and how it would impact almost all of us.

The National Missing Persons Hackathon 2020, held on 29 October, is one of the most innovative events to be held in Australia this year and is being held in partnership with the Australian Federal Police, National Missing Persons Coordination Centre and Trace Labs.

This event will see the gathering of ethical hackers and investigators using online investigative techniques within the bounds of the law to find new leads on 12 real missing persons cases in Australia. Contestants will be using their cyber skills to gather open source intelligence (OSINT) on long-term and current missing persons using only information that is publicly available on the internet. The goal of this is to generate new leads on cases that can aid the relevant Australian policing jurisdictions in their investigations.

“We are excited to be returning for 2020 and going virtual for the first time,” said Linda Cavanagh, National Network Lead at AustCyber and Founder of the National Missing Persons Hackathon. “Theoretical concepts are put aside so participants can operate in real time, with real data, for real human impact. Imagine the possibility of a missing person case being solved by the community using crowdsourced cyber skills! Helping close a case would be a great result and show the value and power of OSINT.”


Continue Reading
Cyber Security1 hour ago

Threat Landscaping

Energy4 hours ago

Sunoco LP Maintains Quarterly Distribution

Energy4 hours ago

CVG Announces Third Quarter 2020 Conference Call

AR/VR7 hours ago

What the VR is Going on at Facebook? Accounts, Store Content and the Splits

Cannabis10 hours ago

Jay-Z announces new line of cannabis products dubbed Monogram

Energy10 hours ago

The Rockefeller Foundation commits USD1 billion to catalyze a green recovery from pandemic

Energy10 hours ago

PJM Named a Top Adoption-Friendly Company in the United States for 14th Consecutive Year

Blockchain10 hours ago

Top 10 Blockchain-as-a-Service (BaaS) Providers

Energy10 hours ago

Defining Value in Supplier Selection: An NSK Perspective

AR/VR10 hours ago

LBE VR: Past, Present and Post Civid Future

Blockchain News10 hours ago

Do I need to Buy One Whole Bitcoin? 3 BTC Questions I’m Tired of Answering

Energy11 hours ago

ReneSola Power and Novergy to Form Joint Venture to Develop Solar Projects in the UK

Energy11 hours ago

S&P Global Platts Announces Finalists for ‘Leadership in Energy Transition Award’

Blockchain11 hours ago

Founder´s Packs now available for the first AAA blockchain game BLANKOS BLOCK PARTY

Blockchain News11 hours ago

Kevin Hart Jokingly Calls Crypto “Voodoo Money” While Kanye West Takes Bitcoin Seriously on Joe Rogan’s Podcast

AR/VR11 hours ago

Lenovo to Sell Varjo’s Enterprise VR Headsets

AR/VR12 hours ago

The Virtual Arena: The Ascendance of Arena-Scale Entertainment – Part 2

Energy13 hours ago

ICL Agrees to Acquire Fertiláqua, a Leading Brazilian Specialty Plant Nutrition Company

Fintech14 hours ago

How these fintech partnerships are shaking up finance

Esports14 hours ago

Four key storylines of BLAST Premier Fall Series

Energy14 hours ago

FMC Corporation Announces New Executive Role, Vice President and Chief Sustainability Officer, and Elects New Vice President of Procurement and Global Facilities

Blockchain News14 hours ago

Ant Group Chairman Eric Jing: Blockchain Will be the New Standard of the Future Financial Infrastructure

Payments14 hours ago

Cross border payments part 1: the competition is really, really old 

Energy14 hours ago

Decarbonization Plus Acquisition Corporation Completes Initial Public Offering

Energy14 hours ago

SESCO Lighting Announces new CEO

Esports14 hours ago

Discussing roster changes, recent tournaments, and NA teams in Europe on HLTV Confirmed S5E12 with smooya

Energy15 hours ago

Humic-based Biostimulants Market worth $848 million by 2025 – Exclusive Report by MarketsandMarkets™

Fintech15 hours ago

The Carlyle Group to acquire Calastone

Biotechnology15 hours ago

Tyler Jacks, founding director of MIT’s Koch Institute, to step down

Esports16 hours ago

How to Shiny Hunt in Dynamax Adventures in Pokémon Sword and Shield’s The Crown Tundra expansion

Esports16 hours ago

March joins T1’s Dota 2 roster as head coach

Cyber Security16 hours ago

Huobi expands fiat gateway to support AUD, GBP and EUR through Banxa

Crowdfunding17 hours ago

P2P Lending Platform SeedIn Rebrands to BRDGE, Plans Expansion Into Indonesia

Aviation17 hours ago

Malaysia Airlines Operates More Than 200 Rescue and Repatriation Flights During RMCO, CMCO

Energy17 hours ago

Water Treatment Chemicals Market to Surpass $85,341.8 Million Revenue by 2030: P&S Intelligence

Energy17 hours ago

Daqo New Energy Announces ADS Ratio Change and Further Amendment and Restatement to Deposit Agreement

Esports17 hours ago

How to Shiny Hunt the Regis in Pokémon Sword and Shield’s The Crown Tundra expansion

Energy18 hours ago

Third party tests confirm HYZON Motors’ new liquid-cooled fuel cell stack leads the world in power density

Energy18 hours ago

Polyethylene Furanoate Films Market Size Worth $800.9 Thousand By 2035: Grand View Research, Inc.

Energy18 hours ago

Elkem signs MoU with FREYR for supply of battery materials