Search This Blog

Powered by Blogger.

Blog Archive

Labels

About Me

Showing posts with label Data Breaches. Show all posts

Employee Cybersecurity Habits Are Increasing Organizational Risk: Survey

 


A recent survey involving over 14,000 employees across various industries has unveiled troubling trends in employee behavior that pose significant risks to organizational data security. The findings highlight common yet dangerous practices related to sensitive data management. 
 
Key Findings from the Survey 
 
The report sheds light on several concerning behaviors among employees:
  • Personal Devices: 80% of employees access workplace applications via personal devices that often lack adequate security measures.
  • Privileged Access: 40% of employees routinely download customer data, indicating that privileged access is no longer restricted to IT administrators.
  • Unrestricted Data Modification: One-third of respondents admitted to having the ability to modify sensitive data without restrictions.
  • Independent Financial Approvals: Nearly 30% of employees reported approving substantial financial transactions independently.
Poor Cybersecurity Practices 
 
The survey revealed widespread lapses in basic cybersecurity measures:
  • Reused Credentials: 49% of employees reuse login credentials across multiple work applications.
  • Mixed Use Credentials: 36% admitted to using the same credentials for both personal and professional accounts.
  • Policy Bypassing: 65% of respondents disclosed bypassing cybersecurity policies for personal convenience, increasing the risk of data breaches.
AI Tools and Escalating Security Concerns 
 
The adoption of workplace technologies like artificial intelligence is further complicating data security:
  • AI Usage: 72% of employees reported using AI tools in their work, with many inputting sensitive data.
  • Guideline Adherence: Only 38% of respondents consistently follow data-handling guidelines for AI usage, creating additional vulnerabilities.
The survey underscores the urgent need for organizations to address these alarming trends. Strengthening cybersecurity policies, enforcing compliance, and providing targeted training are essential to mitigate the risks posed by employee behavior. As emerging technologies like AI continue to reshape the workplace, maintaining robust data security practices remains paramount.

AI Data Breach Reveals Trust Issues with Personal Information

 


Insight AI technology is being explored by businesses as a tool for balancing the benefits it brings with the risks that are associated. Amidst this backdrop, NetSkope Threat Labs has recently released the latest edition of its Cloud and Threat Report, which focuses on using AI apps within the enterprise to prevent fraud and other unauthorized activity. There is a lot of risk associated with the use of AI applications in the enterprise, including an increased attack surface, which was already discussed in a serious report, and the accidental sharing of sensitive information that occurs when using AI apps. 

As users and particularly as individuals working in the cybersecurity as well as privacy sectors, it is our responsibility to protect data in an age when artificial intelligence has become a popular tool. An artificial intelligence system, or AI system, is a machine-controlled program that is programmed to think and learn the same way humans do through the use of simulation. 

AI systems come in various forms, each designed to perform specialized tasks using advanced computational techniques: - Generative Models: These AI systems learn patterns from large datasets to generate new content, whether it be text, images, or audio. A notable example is ChatGPT, which creates human-like responses and creative content. - Machine Learning Algorithms: Focused on learning from data, these models continuously improve their performance and automate tasks. Amazon Alexa, for instance, leverages machine learning to enhance voice recognition and provide smarter responses. - Robotic Vision: In robotics, AI is used to interpret and interact with the physical environment. Self-driving cars like those from Tesla use advanced robotics to perceive their surroundings and make real-time driving decisions. - Personalization Engines: These systems curate content based on user behavior and preferences, tailoring experiences to individual needs.  Instagram Ads, for example, analyze user activity to display highly relevant ads and recommendations. These examples highlight the diverse applications of AI across different industries and everyday technologies. 

In many cases, artificial intelligence (AI) chatbots are good at what they do, but they have problems detecting the difference between legitimate commands from their users and manipulation requests from outside sources. 

In a cybersecurity report published on Wednesday, researchers assert that artificial intelligence has a definite Achilles' heel that should be exploited by attackers shortly. There have been a great number of public chatbots powered by large language models, or LLMs for short, that have been emerging just over the last year, and this field of LLM cybersecurity is at its infancy stage. However, researchers have already found that these models may be susceptible to a specific form of attack referred to as "prompt injection," which occurs when a bad actor sneakily provides commands to the model without the model's knowledge. 

In some instances, attackers hide prompts inside webpages that the chatbot reads later, so that the chatbot might download malware, assist with financial fraud, or repeat dangerous misinformation that is passed on to people by the chatbot. 

What is Artificial Intelligence?


AI (artificial intelligence) is one of the most important areas of study in technology today. AI focuses on developing systems that mimic human intelligence, with the ability to learn, reason, and solve problems autonomously. The two basic types of AI models that can be used for analyzing data are predictive AI models and generative AI models. 

 A predictive artificial intelligence function is a computational capability that uses existing data to make predictions about future outcomes or behaviours based on historical patterns and data. A creative AI system, however, has the capability of creating new data or content that is similar to the input it has been trained on, even if there was no content set in the dataset before it was trained. 

 A philosophical discord exists between Leibnitz and the founding fathers of artificial intelligence in the early 1800s, although the conception of the term "artificial intelligence" as we use it today has existed since the early 1940s, and became famous with the development of the "Turing test" in 1950. It has been quite some time since we have experienced a rapid period of progress in the field of artificial intelligence, a trend that has been influenced by three major factors: better algorithms, increased networked computing power, and a greater capacity to capture and store data in unprecedented quantities. 

Aside from technological advancements, the very way we think about intelligent machines has changed dramatically since the 1960s. This has resulted in a great number of developments that are taking place today. Even though most people are not aware of it, AI technologies are already being utilized in very practical ways in our everyday lives, even though they may not be aware of it. As a characteristic of AI, after it becomes effective, it stops being referred to as AI and becomes mainstream computing as a result.2 For instance, there are several mainstream AI technologies on which you can take advantage, including having the option of being greeted by an automated voice when you call, or being suggested a movie based on your preferences. The fact that these systems have become a part of our lives, and we are surrounded by them every day, is often overlooked, even though they are supported by a variety of AI techniques, including speech recognition, natural language processing, and predictive analytics that make their work possible. 

What's in the news? 


There is a great deal of hype surrounding artificial intelligence and there is a lot of interest in the media regarding it, so it is not surprising to find that there are an increasing number of users accessing AI apps in the enterprise. The rapid adoption of artificial intelligence (AI) applications in the enterprise landscape is significantly raising concerns about the risk of unintentional exposure to internal information. A recent study reveals that, between May and June 2023, there was a weekly increase of 2.4% in the number of enterprise users accessing at least one AI application daily, culminating in an overall growth of 22.5% over the observed period. Among enterprise AI tools, ChatGPT has emerged as the most widely used, with daily active users surpassing those of any other AI application by a factor of more than eight. 

In organizations with a workforce exceeding 1,000 employees, an average of three different AI applications are utilized daily, while organizations with more than 10,000 employees engage with an average of five different AI tools each day. Notably, one out of every 100 enterprise users interacts with an AI application daily. The rapid increase in the adoption of AI technologies is driven largely by the potential benefits these tools can bring to organizations. Enterprises are recognizing the value of AI applications in enhancing productivity and providing a competitive edge. Tools like ChatGPT are being deployed for a variety of tasks, including reviewing source code to identify security vulnerabilities, assisting in the editing and refinement of written content, and facilitating more informed, data-driven decision-making processes. 

However, the unprecedented speed at which generative AI applications are being developed and deployed presents a significant challenge. The rapid rollout of these technologies has the potential to lead to the emergence of inadequately developed AI applications that may appear to be fully functional products or services. In reality, some of these applications may be created within a very short time frame, possibly within a single afternoon, often without sufficient oversight or attention to critical factors such as user privacy and data security. 

The hurried development of AI tools raises the risk that confidential or sensitive information entered into these applications could be exposed to vulnerabilities or security breaches. Consequently, organizations must exercise caution and implement stringent security measures to mitigate the potential risks associated with the accelerated deployment of generative AI technologies. 

Threat to Privacy


Methods of Data Collection 

AI tools generally employ one of two methods to collect data: Data collection is very common in this new tech-era. This is when the AI system is programmed to collect specific data. Examples include online forms, surveys, and cookies on websites that gather information directly from users. 

Another comes Indirect collection, this involves collecting data through various platforms and services. For instance, social media platforms might collect data on users' likes, shares, and comments, or a fitness app might gather data on users' physical activity levels. 

As technology continues to undergo ever-increasing waves of transformation, security, and IT leaders will have to constantly seek a balance between the need to keep up with technology and the need for robust security. Whenever enterprises integrate artificial intelligence into their business, key considerations must be taken into account so that IT teams can achieve maximum results. 

As a fundamental aspect of any IT governance program, it is most important to determine what applications are permissible, in conjunction with implementing controls that not only empower users but also protect the organization from potential risks. Keeping an environment in a secure state requires organizations to monitor AI app usage, trends, behaviours, and the sensitivity of data regularly to detect emerging risks as soon as they emerge.

A second effective way of protecting your company is to block access to non-essential or high-risk applications. Further, policies that are designed to prevent data loss should be implemented to detect sensitive information, such as source code, passwords, intellectual property, or regulated data, so that DLP policies can be implemented. A real-time coaching feature that integrates with the DLP system reinforces the company's policies regarding how AI apps are used, ensuring users' compliance at all times. 

A security plan must be integrated across the organization, sharing intelligence to streamline security operations and work in harmony for a seamless security program. Businesses must adhere to these core cloud security principles to be confident in their experiments with AI applications, knowing that their proprietary corporate data will remain secure throughout the experiment. As a consequence of this approach, sensitive information is not only protected but also allows companies to explore innovative applications of AI that are beyond the realm of mainstream tasks such as the creation of texts or images.  

IntelBroker Leak Claims Involve Deloitte Communications

 


An anonymous threat actor named IntelBroker claimed to be responsible for the leak of internal messaging from Deloitte, one of the world's leading auditing firms. According to reports, the breach occurred in September 2024 when an Apache Solr server had its default login credentials accidentally exposed to the internet, allowing unauthorized access to the server with default credentials. 

There are numerous types of data breaches which can be classified as violations of privacy. A breach of confidentiality can involve unauthorized access to, alteration, or release of personal data at an organization without its consent. In other words, a data breach does not only refer to releasing (leaking) the data but also to the underhanded data processing that initiates the release. 

There has been a breach in the security of personal data (as referred to in Article 13 of the Personal Data Protection Act of 2018) that has led to unauthorized access to the information. Whenever there is a data breach, personal data are exposed to loss or unauthorised processing, and these are the issues against which the security measures are meant to protect. 

An anonymous threat actor named IntelBroker claimed to be responsible for the leak of internal messaging from Deloitte, one of the world's leading auditing firms. A breach occurred when an Apache Solr server, an open-source search engine, was unintentionally exposed to the internet in September 2024, allowing unauthorized users to access the system. This oversight made Deloitte vulnerable, one of the leading auditing and consulting firms in the world. 

There is a wide range of information that has been compromised, including email addresses, internal settings, and intranet communications. As a result of the evidence that IntelBroker, which is part of the BreachForums community, provided, it is obvious that they were provided access to sensitive communications while using this platform, with evidence that supports this claim. 

Founded in 2004 as a resource for cybercriminals, BreachForums has become a hub for the organization ever since. With over 120,000 members, Hacker Forensics serves as the successor to RaidForums, an online market where stolen data and hacking tools are traded. The site has been the subject of law enforcement efforts that have led to multiple seizures of the site; however, it appears under different guises every time it is investigated. 

In this community, IntelBroker is an important figure and has been identified with several successful breaches that have resulted in high-level media attention. The breach forums have built up a reputation for being a hub for cybercriminals since their inception. As the successor to RaidForums, it facilitated the trade of stolen data and hacking tools online by supporting the trading of stolen data. 

There have been numerous seizures of the site by law enforcement agencies, but it has continued to resurface under various guises despite the efforts of law enforcement. Among the prominent figures in the cyber community, IntelBroker has become well-known for orchestrating several high-profile breaches over the years. 

There was a breach of security that was made possible by exploiting a vulnerability in Deloitte's Apache Solr server, which was left unpatched. Several organizations around the world use Apache Solr as their enterprise search platform due to its ease of use and reliability. If these vulnerabilities are not addressed properly, they can result in serious breaches of security in such software and to a person. 

With the increasing reliance on digital infrastructures by organizations, it is crucial to ensure these systems are secure from unauthorized access due to the prevalence of cyber attacks. To gather more information about the claim, Cyber Security News contacted Deloitte for more information. During the breach, Deloitte took advantage of an Apache Solr server that had been left unsecured by Deloitte, which enabled the hack. 

Several organizations around the world use Apache Solr as their enterprise search platform due to its ease of use and reliability. As a result, vulnerable systems can provide a home for severe security breaches if these vulnerabilities are not addressed properly. Organizations must ensure that their digital infrastructures are protected from unauthorized access to ensure that they will continue to operate successfully. 

Fresh MOVEit Vulnerability Under Active Exploitation: Urgent Updates Needed

 

A newly discovered vulnerability in MOVEit, a popular file transfer tool, is currently under active exploitation, posing serious threats to remote workforces. 

This exploitation highlights the urgent need for organizations to apply patches and updates to safeguard their systems. The vulnerability, identified by Progress, allows attackers to infiltrate MOVEit installations, potentially leading to data breaches and other cyber threats. MOVEit users are strongly advised to update their systems immediately to mitigate these risks. Failure to do so could result in significant data loss and compromised security. Remote workforces are particularly vulnerable due to the decentralized nature of their operations. The exploitation of this bug underscores the critical importance of maintaining robust cybersecurity practices and staying vigilant against emerging threats. 

Organizations should ensure that all systems are up-to-date and continuously monitored for any signs of compromise. In addition to applying patches, cybersecurity experts recommend implementing multi-layered security measures, including firewalls, intrusion detection systems, and regular security audits. Educating employees about the risks and signs of cyber threats is also essential in maintaining a secure remote working environment. The discovery of this MOVEit vulnerability serves as a reminder of the ever-evolving landscape of cybersecurity threats. 

As attackers become more sophisticated, organizations must prioritize proactive measures to protect their data and operations. Regularly updating software, conducting security assessments, and fostering a culture of cybersecurity awareness are key strategies in mitigating the risks associated with such vulnerabilities. 

Organizations must act swiftly to update their systems and implement comprehensive security measures to protect against potential cyberattacks. By staying informed and proactive, businesses can safeguard their remote workforces and ensure the security of their sensitive data.

Enhancing Workplace Security and Productivity with Effective Web Filtering

 

Internet access is essential in modern workplaces but can lead to distractions and security risks. To combat this, many employers use web filtering to block websites deemed unproductive or inappropriate.

The primary goal of web filters is to maintain employee productivity by limiting personal internet use during work hours. Additionally, they aim to reduce cybersecurity risks associated with high-risk sites. As cybercrime increases and data breaches become more costly, employers are enhancing web security policies to protect their organizations.

To better understand web filtering trends, the aggregated data from NordLayer’s DNS filtering service was analyzed. This research, which does not include identifiable business or user information, reveals the most commonly restricted website categories, helping create secure and productive work environments.

How Employees Are Affected By Website Filtering

Restricting internet access is crucial for boosting cybersecurity and productivity. Our research identified that 72% of employers block malware and adult content sites, while 43% block gambling websites. These findings are consistent with other studies showing widespread internet restrictions in corporate settings. For instance, a survey found that 64% of employees reported their company used a firewall to limit web access, though 40% bypass these controls using mobile data.

A 2018 study indicated that web filtering increases with company size: 96% of large businesses with over 1,000 employees restrict at least one online service, compared to 92% of midsize companies and 81% of small businesses. The same study estimated that 58% of employees spend over four hours per week on non-work-related sites without filtering, with 26% spending more than seven hours weekly on personal browsing. This translates to significant productivity losses, with full-time staff wasting 26 paid days annually.

Why Businesses Should Consider Web Filtering

While web filtering is already widely adopted, there are compelling reasons for more organizations to implement it as part of their cybersecurity and acceptable use policies.

From a security standpoint, restricting access to malware sites and other high-risk categories is crucial. Malware infections can lead to data breaches, disruptions, and financial losses. With the rise in cybercrime, web filtering serves as a preventive measure.

Beyond security, unrestricted internet access can lead to legal liabilities if employees access inappropriate or illegal content using company devices. This can result in regulatory violations, harassment issues from explicit material, or data exfiltration through file-sharing services.

Productivity is another key factor. Limiting personal internet use during work hours helps minimize distractions and increase focus on job duties. These benefits make a strong case for integrating web filtering into cybersecurity strategies.

How To Properly Implement Web Filtering

Balancing secure and productive internet access requires careful implementation. While some may see content filtering as restrictive, it is becoming essential to protect networks, data, and devices. Proper configuration and clear use policies can create a safer online workplace without hindering legitimate business activities.

Finding this balance is crucial for maximizing the internet’s business utility while safeguarding critical assets. Overly restrictive filtering that blocks essential work resources or categories like social media can frustrate employees and disrupt workflows.

The best approach involves thorough planning and customizing filtering rules to align with an organization’s needs and culture. Flexibility for temporary access and whitelist approvals for legitimate business purposes is essential. Collaboration between human resources, IT, and security departments is necessary to develop and communicate reasonable use policies.

Monitoring and adjusting filter effectiveness are also important. As new cybersecurity threats emerge and business needs evolve, filtering rules may need updates. Employee feedback can provide valuable insights into potential overblocking issues..

Financial Institutions Now Required to Disclose Breaches Within 30 Days

Financial Institutions Now Required to Disclose Breaches Within 30 Days

The 30-Day Deadline

The Securities and Exchange Commission (SEC) is demanding financial institutions to report security vulnerabilities within 30 days of discovering them.

Why the Change?

On Wednesday, the SEC adopted revisions to Regulation S-P, which controls how consumers' personal information is handled. The revisions require institutions to tell individuals whose personal information has been compromised "as soon as practicable, but no later than 30 days" after discovering of illegal network access or use of consumer data. The new criteria will apply to broker-dealers (including financing portals), investment businesses, licensed investment advisers, and transfer agents.

"Over the last 24 years, the nature, scale, and impact of data breaches has transformed substantially. These amendments to Regulation S-P will make critical updates to a rule first adopted in 2000 and help protect the privacy of customers’ financial data. The basic idea for covered firms is if you’ve got a breach, then you’ve got to notify. That’s good for the investor,” said SEC Chair Gary Gensler. 

Challenges and Compliance

Notifications must describe the occurrence, what information was compromised, and how impacted individuals can protect themselves. In what appears to be a loophole in the regulations, covered institutions are not required to provide alerts if they can demonstrate that the personal information was not used in a way that caused "substantial harm or inconvenience" or is unlikely to do so.

The revisions compel covered institutions to "develop, implement, and maintain written policies and procedures" that are "reasonably designed to detect, respond to, and recover from unauthorized access to or use of customer information." The amendments include:

The standards also increase the extent of nonpublic personal information protected beyond what the firm gathers. The new restrictions will also apply to personal information received from another financial institution.

SEC Commissioner Hester M. Peirce expressed concern that the new regulations could go too far.

Best Practices

"Today’s Regulation S-P modernization will help covered institutions appropriately prioritize safeguarding customer information," she said. "Customers will be notified promptly when their information has been compromised so they can take steps to protect themselves, like changing passwords or keeping a closer eye on credit scores. My reservations stem from the rule's breadth and the likelihood that it will spawn more consumer notices than are helpful."

Regulation S-P has not been substantially modified since its adoption in 2000.

Last year, the SEC enacted new laws requiring publicly traded businesses to disclose security breaches that have materially affected or are reasonably projected to damage business, strategy, or financial results or conditions.

UN Agency Faces Data Crisis: Ransomware Hack Exposes Extensive Data Theft

 


It is reported that the United Nations Development Programme (UNDP) is investigating a cyberattack involving human resources information stolen from its IT systems due to a breach. To eradicate poverty, fight inequality, and eliminate exclusion from society, UNDP, the UN's global development network, works in more than 170 countries and territories.

Donations are received from UN member states, private companies, and multilateral organizations. According to a statement released by the organisation published Tuesday, there was a hack in the local IT infrastructure at UN City, Copenhagen, in late March. In a statement released by the UNDP on Tuesday, the organization said that a “data extortion actor” had stolen human resources and procurement information in UN City, Copenhagen and that the IT infrastructure was targeted.

In the statement, it was not disclosed what kind of data had been stolen from the organization that is the lead agency on international development for the UN. According to notifications shared with affected parties and viewed by CyberScoop, hackers were able to access several servers and steal data that was significant in scope. 

CyberScoop was informed that the notification information included in its notification may include data about former and current employees' family members, as well as information about contractors, including dates of birth, social security numbers, bank account information, passport details, and information about their bank accounts, bank accounts, and passports. 

A UNDP entry on the 8Base ransomware gang's dark web data leak website has been added to its dark web data leak website since March 27, but the UN agency has yet to identify a specific threat group responsible for the attack. In their assertions, the attackers claim their operators were able to exfiltrate large amounts of sensitive information through the documents they were able to acquire during the breach. 

They allegedly leaked a large amount of confidential information via a now-extinct link, including personal information, accounting data, certificates, employment contracts, confidentiality agreements, invoices, receipts, and much more, according to the reports. They emerged in March 2022, and they spiked their activity in June 2023 after they began attacking companies across a greater range of industry verticals and switched to double extortion to increase their revenue. 

Data leaks were a major issue for the extortion group in May of 2023 when they claimed to be "honest and simple" pen testers that targeted "companies that neglected employees' and customers' privacy and the importance of their data." There have been over 350 victims listed on the site of this ransomware group so far, with some days announcing up to six victims at the same time. 

In 8Base, a custom version of Phobos ransomware has been used, a malicious program that emerged in 2019 and has many code similarities to the Dharma ransomware family. Additionally, in January 2021, the United Nations Environmental Programme (UNEP) announced that over 100,000 employee records containing personally identifiable information (PII) were made available online after a data breach. 

In July 2019, there was also a breach of UN networks in Geneva and Vienna, where a Sharepoint vulnerability allowed access to personnel records, health insurance data, and commercial contract data in an event, that a UN official described as a "major meltdown."

Expert Urges iPhone and Android Users to Brace for 'AI Tsunami' Threat to Bank Accounts

 

In an interview with Techopedia, Frank Abagnale, a renowned figure in the field of security, provided invaluable advice for individuals navigating the complexities of cybersecurity in today's digital landscape. Abagnale, whose life inspired the Steven Spielberg film "Catch Me If You Can," emphasized the escalating threat posed by cybercrime, projected to reach a staggering $10.5 trillion by 2025, according to Cybersecurity Ventures.

Addressing the perpetual intersection of technology and crime, Abagnale remarked, "Technology breeds crime. It always has and always will." He highlighted the impending challenges brought forth by artificial intelligence (AI), particularly its potential to fuel a surge in various forms of cybercrimes and scams. Abagnale cautioned against the rising threat of deepfake technology, which enables the fabrication of convincing multimedia content, complicating efforts to discern authenticity online.

Deepfakes, generated by AI algorithms, can produce deceptive images, videos, and audio mimicking real individuals, often exploited by cybercriminals to orchestrate elaborate scams and extortion schemes. Abagnale stressed the indispensability of education in combating social engineering tactics, emphasizing the importance of empowering individuals to recognize and thwart manipulative schemes.

One prevalent form of cybercrime discussed was phishing, a deceitful practice wherein attackers manipulate individuals into divulging sensitive information, such as banking details or passwords. Phishing attempts typically manifest through unsolicited emails or text messages, characterized by suspicious links, urgent appeals, and grammatical errors.

To fortify defenses against social engineering and hacking attempts, Abagnale endorsed the adoption of passkey technology, heralding it as a pivotal advancement poised to supplant conventional username-password authentication methods. Passkeys, embedded digital credentials associated with user accounts and applications, streamline authentication processes, mitigating vulnerabilities associated with passwords.

Abagnale underscored the ubiquity of passkey technology across various devices, envisioning its eventual displacement of traditional login mechanisms. This transition, he asserted, is long overdue and represents a crucial stride towards enhancing digital security.

Additionally, Techopedia shared practical recommendations for safeguarding online accounts, advocating for regular review and pruning of unused or obsolete accounts. They also recommended utilizing tools like "Have I Been Pwned" to assess potential data breaches and adopting a cautious approach towards hyperlinks, assuming every link to be potentially malicious until verified.

Moreover, users are advised to exercise vigilance in verifying the authenticity of sender identities and message content before responding or taking any action, mitigating the risk of falling victim to cyber threats.