Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable Blog

Subscribe

Cybersecurity Snapshot: CISOs Value Prevention Over Response, While CISA Urges Cyber Teams To Prep for Quantum Attacks

CISOs Value Prevention Over Response

Time to start prepping for the quantum computing threat? CISA thinks so. Plus, why security leaders are prioritizing security prevention tools. Also, find out why ransomware attacks surged in July. Oh, and the White House wants your input on open source security. And much more!

Dive into six things that are top of mind for the week ending August 25.

1 – The quantum computers are coming!

As attackers salivate at the future prospect of weaponizing powerful quantum computers, the U.S. government says public- and private-sector organizations alike must start getting ready now – especially critical infrastructure operators.

This week, the Cybersecurity and Infrastructure Security Agency (CISA), National Security Agency (NSA) and National Institute of Standards and Technology (NIST) released a joint factsheet urging organizations to prepare for attacks that will use quantum computing.

“Post-quantum cryptography is about proactively developing and building capabilities to secure critical information and systems from being compromised through the use of quantum computers,” Rob Joyce, Director of NSA Cybersecurity, said in a statement. 

The quantum computers are coming

When they become available, probably around 2030, quantum computers will have the capacity to decrypt data protected with today’s public-key cryptographic algorithms. Thus, the agencies say it’s time for IT, OT and security teams to start taking steps to protect their organizations, including:

  • Develop a “quantum readiness roadmap” by establishing a project management team
  • Plan the migration to post-quantum cryptographic standards
  • Assess their organizations’ reliance on quantum-vulnerable cryptography
  • Inventory systems, assets and data that are vulnerable to quantum computers
  • Discuss post-quantum plans with key technology vendors

“The transition to a secured quantum computing era is a long-term intensive community effort that will require extensive collaboration between government and industry. The key is to be on this journey today and not wait until the last minute,” Joyce said.

To get all the details, read the joint alert, announcement and factsheet, and visit CISA’s “Post-Quantum Cryptography Initiative” homepage.

For more information about the quantum computing cyber risks, check out these Tenable blogs:

2 – Study: Cyber leaders prioritize detection and prevention

Enterprise security leaders are allocating more investments to detection and prevention, with remediation nabbing a smaller piece of the cyber budget pie.

That’s according to the study “The State of Cybersecurity Today” from Information Services Group (ISG), for which 204 executives from the world’s 2,000 largest companies were polled. Among respondents, 24% were C-level executives, such as CISOs and CIOs.

Cyber leaders prioritize detection and prevention

Key findings from the study include:

  • Detection and prevention currently take up around half of enterprise security budgets, with response and recovery accounting for around 30%. The reason? Cyber leaders believe prevention and detection have a bigger cybersecurity impact.
  • When asked to name their organizations’ emerging top risk in the next two years, a majority of respondents (56%) picked attacks that leverage artificial intelligence and machine learning.
  • The vast majority of enterprises polled – 95% – experienced multiple cyberattacks in the past 12 months, with phishing (74%), malware (60%) and software vulnerability exploits (50%) being the most common.
  • Bucking a trend where department budgets are shrinking by 7% annually on average, security budgets rose 4.6 on average in 2023 compared with 2022. Moreover, 83% of enterprises polled grew their security budgets, and only 4% cut it.

To get more details, read the ISG announcement and a summary of the report.

3 – CISA to AI vendors: Put security at the heart of your software

Artificial intelligence tools are, at their core, software products, and as such their developers must build them secure by design.

That’s the reminder CISA experts Christine Lai, AI Security Lead, and Dr. Jonathan Spring, Senior Technical Advisor delivered in their recent blog “Software Must Be Secure by Design, and Artificial Intelligence Is No Exception.

In practice, this means that vendors of AI systems must prioritize their customers’ security as a core requisite, and emphasize security throughout their products’ lifecycle – “from inception of the idea to planning for the system’s end-of-life.” 

CISA says AI vendors must put security at the heart of their software.jpg

“It also means that AI systems must be secure to use out of the box, with little to no configuration changes or additional cost,” the authors wrote.

For more information about AI system security:

4 – Report: Ransomware attacks jumped in July

Ransomware gangs stayed busy last month, with attacks jumping 154% year-on-year and 16% compared with June of this year. For the second consecutive month, the surge was driven by the CL0P ransomware gang’s exploitation of vulnerabilities in Progress Software’s MOVEit Transfer product.

That’s according to the latest “Monthly Threat Pulse” report from NCC Group’s Global Threat Intelligence team, which also found that CL0P was responsible for 34% of observed attacks in July, followed by Lockbit 3.0 (10%).

Ransomware attacks jumped in July

“We are still seeing many organisations are still contending with the impact of Cl0p’s MOVEit attack, which goes to show just how far-reaching and long-lasting ransomware attacks can be – no organisation or individual is safe,” Matt Hull, Global Head of Threat Intelligence at NCC Group, said in the report.

To get more information about ransomware trends:

VIDEOS

Cyber Watch: $10M Bounty on CL0P Gang, Best Practices for Ransomware Incident Response, and more (Tenable)

Anatomy of a Threat: MOVEIt (Tenable)

5 – White House, cyber agencies want your input on open source security

As the U.S. government crafts plans to boost the security of open source software (OSS), it’s seeking comments from the public on how to best accomplish its goals.

The White House Office of the National Cyber Director (ONCD), CISA, and other federal agencies issued a formal request for information (RFI) about OSS security and memory-safe programming languages, such as Java and Python.

White House, cyber agencies want your input on open source security


The U.S. federal government is one of the largest users of OSS, which provides the foundation for 96% of the world’s software, CISA Executive Assistant Director of Cybersecurity Eric Goldstein said in a statement.

“We envision an ecosystem in which creating secure open source code and regularly assessing the security of existing open source code is the norm rather than an added burden,” Goldstein said.

Some of the topics outlined in the RFI include:

  • Rewriting critical OSS components in memory-safe languages
  • Reducing OSS vulnerabilities at scale via, for example, boosting secure-by-default configurations in OSS development
  • Strengthening the OSS supply chain by, for example, incorporating a zero-trust architecture into the OSS ecosystem
  • Training software developers on security best practices

“In addition to its many benefits, the ubiquity of open-source software in commercial products, government systems, and military platforms presents unique security risks,” the White House statement reads.

If you’re interested in voicing your thoughts about how to best secure OSS, you have until October 9 of this year to offer your input via the U.S. government’s Regulation.gov website.

For more information about OSS security best practices:

6 – CIS: Malware attacks drop in Q2

Malware activity fell by 40% in the second quarter, compared with the previous quarter, and the drop was even steeper – 65% – for the top 10 malware variants specifically.

That’s according to the Center for Internet Security’s “Top 10 Malware Q2 2023” blog report, which ranked crypto miner CoinMiner as the malware variant with the most activity during the quarter. Three variants cracked the quarterly top 10 list for the first time – DarkVision, Ratenjay and Amadey.

Here’s the full list, in descending order:

  • CoinMiner, a cryptocurrency miner that spreads using Windows Management Instrumentation (WMI) and EternalBlue
  • NanoCore, a remote access trojan (RAT) that spreads via malspam as a malicious Excel spreadsheet
  • Zeus, a modular banking trojan that uses keystroke logging
  • ViperSoftX, a multi-stage crypto stealer that’s spread within torrents and file sharing sites
  • Agent Tesla, a RAT that captures credentials, keystrokes and screenshots
  • Ratenjay, a RAT that’s dropped by other malware, executes remote commands and has keylogging capabilities
  • Gh0st, a RAT designed to control infected endpoint devices
  • Laplas, clipper malware that’s currently spread by SmokeLoader via phishing emails
  • Dark Vision, a remote access toolkit whose capabilities include keylogging, screen captures and password recovery
  • Amadey, a multifunctional botnet which steals information and downloads other malware
Malware attacks plunge in Q2

(Source: Center for Internet Security, August 2023)

To get more details, check out the CIS blog report, which offers many details, context and indicators of compromise for each malware strain.

For more information about malware prevention and mitigation:

Related Articles

Cybersecurity News You Can Use

Enter your email and never miss timely alerts and security guidance from the experts at Tenable.