AI EXPRESS - Hot Deal 4 VCs instabooks.co
  • AI
    Nvidia launches Omniverse workflow for car makers to digitize their operations

    Nvidia launches Omniverse workflow for car makers to digitize their operations

    GitHub unveils Copilot X: The future of AI-powered software development

    GitHub unveils Copilot X: The future of AI-powered software development

    The industrial metaverse: Are we there yet? | GTC panel

    The industrial metaverse: Are we there yet? | GTC panel

    Nvidia enters the speech AI race, joining Meta and Google

    Speech AI, supercomputing in the cloud, and GPUs for LLMs and generative AI among Nvidia’s next big moves

    TestGPT, a generative AI tool for ensuring code integrity, is released for beta

    TestGPT, a generative AI tool for ensuring code integrity, is released for beta

    Nvidia unveils Isaac Sim on Omniverse Cloud for better robot design

    Nvidia unveils Isaac Sim on Omniverse Cloud for better robot design

  • ML
    Automate Amazon Rekognition Custom Labels model training and deployment using AWS Step Functions

    Automate Amazon Rekognition Custom Labels model training and deployment using AWS Step Functions

    Best practices for viewing and querying Amazon SageMaker service quota usage

    Best practices for viewing and querying Amazon SageMaker service quota usage

    comparing the NDVI distributions of the current vs. the baseline period

    Remote monitoring of raw material supply chains for sustainability with Amazon SageMaker geospatial capabilities

    Accelerate Amazon SageMaker inference with C6i Intel-based Amazon EC2 instances

    Accelerate Amazon SageMaker inference with C6i Intel-based Amazon EC2 instances

    Intelligently search your organization’s Microsoft Teams data source with the Amazon Kendra connector for Microsoft Teams

    Intelligently search your organization’s Microsoft Teams data source with the Amazon Kendra connector for Microsoft Teams

    AccuShoot

    BigML is spinning out AccuShoot! –

    Announcing the Yammer connector for Amazon Kendra

    Announcing the Yammer connector for Amazon Kendra

    Bring legacy machine learning code into Amazon SageMaker using AWS Step Functions

    Bring legacy machine learning code into Amazon SageMaker using AWS Step Functions

    Maximize performance and reduce your deep learning training cost with AWS Trainium and Amazon SageMaker

    Maximize performance and reduce your deep learning training cost with AWS Trainium and Amazon SageMaker

  • NLP
    What could ChatGPT mean for Medical Affairs?

    What could ChatGPT mean for Medical Affairs?

    Want to Improve Clinical Care? Embrace Precision Medicine Through Deep Phenotyping

    Want to Improve Clinical Care? Embrace Precision Medicine Through Deep Phenotyping

    Presight AI and G42 Healthcare sign an MOU

    Presight AI and G42 Healthcare sign an MOU

    Meet Sketch: An AI code Writing Assistant For Pandas

    Meet Sketch: An AI code Writing Assistant For Pandas

    Exploring The Dark Side Of OpenAI's GPT Chatbot

    Exploring The Dark Side Of OpenAI’s GPT Chatbot

    OpenAI launches tool to catch AI-generated text

    OpenAI launches tool to catch AI-generated text

    Year end report, 1 May 2021- 30 April 2022.

    U.S. Consumer Spending Starts to Sputter; Labor Report to Give Fed Look at Whether Rate Increases Are Cooling Rapid Wage Growth

    Meet ETCIO SEA Transformative CIOs 2022 Winner Edmund Situmorang, CIOSEA News, ETCIO SEA

    Meet ETCIO SEA Transformative CIOs 2022 Winner Edmund Situmorang, CIOSEA News, ETCIO SEA

    His Highness Sheikh Theyab bin Zayed Al Nahyan witnesses MBZUAI inaugural commencement

    His Highness Sheikh Theyab bin Zayed Al Nahyan witnesses MBZUAI inaugural commencement

  • Vision
    NVIDIA Metropolis Ecosystem Grows With Advanced Development Tools to Accelerate Vision AI

    NVIDIA Metropolis Ecosystem Grows With Advanced Development Tools to Accelerate Vision AI

    Low Code and No Code Platforms for AI and Computer Vision

    Low Code and No Code Platforms for AI and Computer Vision

    Computer Vision Model Performance Evaluation (Guide 2023)

    Computer Vision Model Performance Evaluation (Guide 2023)

    PepsiCo Leads in AI-Powered Automation With KoiVision Platform

    PepsiCo Leads in AI-Powered Automation With KoiVision Platform

    USB3 & GigE Frame Grabbers for Machine Vision

    USB3 & GigE Frame Grabbers for Machine Vision

    Active Learning in Computer Vision - Complete 2023 Guide

    Active Learning in Computer Vision – Complete 2023 Guide

    Ensembling Neural Network Models With Tensorflow

    Ensembling Neural Network Models With Tensorflow

    Autoencoder in Computer Vision - Complete 2023 Guide

    Autoencoder in Computer Vision – Complete 2023 Guide

    CVAT: Computer Vision Annotation Tool - 2023 Guide

    CVAT: Computer Vision Annotation Tool – 2023 Guide

  • Robotics
    industrial robot picks an item for a customer order.

    Ambi Robotics optimizes sorting operations with AmbiAccess

    kuka industrial robots manufacturing cars

    Automotive industry sets record by employing 1M robots

    A Digit humanoid from Agility Robotics waving

    Next-gen Digit humanoid wants to automate logistics tasks

    amazon robots in a simulated world.

    NVIDIA is making AI easier to use

    Clearpath Robotics announces Husky Observer

    Clearpath Robotics announces Husky Observer

    OTTO Motors launches OTTO 600 and improved software

    OTTO Motors launches OTTO 600 and improved software

    Locus Robotics surpasses 1 billion units picks

    Locus Robotics introduces LocusONE multi-bot warehouse management

    Slip Robotics launches new trailer pallet unloading solution

    Slip Robotics launches new trailer pallet unloading solution

    MiR Insights software for its AMRs

    MiR Insights cloud-based software optimizes AMR fleets

  • RPA
    What is IT Process Automation? Use Cases, Benefits, and Challenges in 2023

    What is IT Process Automation? Use Cases, Benefits, and Challenges in 2023

    Benefits of Automated Claims Processing in Insurance Industry

    Benefits of Automated Claims Processing in Insurance Industry

    ChatGPT and RPA Join Force to Create a New Tech-Revolution

    ChatGPT and RPA Join Force to Create a New Tech-Revolution

    How does RPA in Accounts Payable Enhance Data Accuracy?

    How does RPA in Accounts Payable Enhance Data Accuracy?

    10 Best Use Cases to Automate using RPA in 2023

    10 Best Use Cases to Automate using RPA in 2023

    How will RPA Improve the Employee Onboarding Process?

    How will RPA Improve the Employee Onboarding Process?

    Key 2023 Banking Automation Trends / Blogs / Perficient

    Key 2023 Banking Automation Trends / Blogs / Perficient

    AI-Driven Omnichannel is the Future of Insurance Industry

    AI-Driven Omnichannel is the Future of Insurance Industry

    Avoid Patient Queues with Automated Query Resolution

    Avoid Patient Queues with Automated Query Resolution

  • Gaming
    God of War Ragnarok had a banner debut week at UK retail

    God of War Ragnarok had a banner debut week at UK retail

    A Little To The Left Review (Switch eShop)

    A Little To The Left Review (Switch eShop)

    Horizon Call of the Mountain will release alongside PlayStation VR2 in February

    Horizon Call of the Mountain will release alongside PlayStation VR2 in February

    Sonic Frontiers has Dreamcast-era jank and pop-in galore - but I can't stop playing it

    Sonic Frontiers has Dreamcast-era jank and pop-in galore – but I can’t stop playing it

    Incredible November Xbox Game Pass addition makes all other games obsolete

    Incredible November Xbox Game Pass addition makes all other games obsolete

    Free Monster Hunter DLC For Sonic Frontiers Now Available On Switch

    Free Monster Hunter DLC For Sonic Frontiers Now Available On Switch

    Somerville review: the most beautiful game I’ve ever played

    Somerville review: the most beautiful game I’ve ever played

    Microsoft Flight Sim boss confirms more crossover content like Halo's Pelican and Top Gun Maverick

    Microsoft Flight Sim boss confirms more crossover content like Halo’s Pelican and Top Gun Maverick

    The Game Awards nominations are in, with God of War Ragnarok up for 10 of them

    The Game Awards nominations are in, with God of War Ragnarok up for 10 of them

  • Investment
    Cognito Therapeutics

    Cognito Therapeutics Raises $73M in Series B Funding

    Adeptia

    Adeptia Raises $65M in Strategic Growth Funding

    Amogy

    Amogy Raises $139M Series B-1 Funding

    RiseKit

    RiseKit Raises $4.75M in Funding

    Mad Rabbit Raises $10M in Series A Funding

    Mad Rabbit Raises $10M in Series A Funding

    healthcare

    Reveal HealthTech Raises $4M in Investment From W Health Ventures

    Kin

    Kin Raises Additional $15M; Series D Round Upsized to $109M

    BitKeep

    BitKeep Raises US$30M From Bitget

    Backslash Security

    Backslash Security Raises $8M in Funding

  • More
    • Data analytics
    • Apps
    • No Code
    • Cloud
    • Quantum Computing
    • Security
    • AR & VR
    • Esports
    • IOT
    • Smart Home
    • Smart City
    • Crypto Currency
    • Blockchain
    • Reviews
    • Video
No Result
View All Result
AI EXPRESS - Hot Deal 4 VCs instabooks.co
No Result
View All Result
Home Security

With Log4j vulnerability, the full impact has yet to come

seprameen by seprameen
December 23, 2021
in Security
0
Log4j vulnerabilities, malware strains multiply; major attack disclosed
0
SHARES
1
VIEWS
Share on FacebookShare on Twitter

Hear from CIOs, CTOs, and different C-level and senior execs on knowledge and AI methods on the Way forward for Work Summit this January 12, 2022. Study extra


There’s no technique to sugarcoat it: the widespread vulnerability in Apache Log4j will likely be exploited for some nastier cyberattacks than these we’ve seen to date. And the worst of them may very well be months — and even years — into the longer term.

Subtle attackers typically create a backdoor into an exploited server, enabling them to bypass safety instruments as they re-enter and exit. So even when a company has patched towards the vulnerability in Log4j, an attacker might be able to stay within the community, undetected, till the time is good to strike.

If that sounds scary — nicely, it in all probability ought to.

“In lots of circumstances, attackers breach an organization, acquire entry to networks and credentials, and leverage them to hold out large assaults months and years later,” mentioned Rob Gurzeev, cofounder and CEO of CyCognito.

New gamers

The vulnerability within the broadly used Log4j logging library was publicly revealed every week in the past, and an onslaught of greater than 1 million tried assaults have adopted, in accordance with Test Level. Researchers on the firm mentioned they’ve noticed tried exploits on greater than 44% of company networks worldwide.

A lot of the malicious assault quantity over the previous week has concerned “hobbyists” or solo operators, mentioned Casey Ellis, founder and chief know-how officer at Bugcrowd. However proof has emerged that extra subtle risk actors have begun to take advantage of the vulnerability in Log4j, as nicely. These embody attackers trying to get a foothold in networks as a way to promote that entry to ransomware operators.

Compared to the hobbyists, these attackers are extra like a multinational enterprise, Ellis mentioned. “Their enterprise mannequin is constructed on scale and reliability of intrusion,” he mentioned.

And crucially, “subtle attackers don’t need to get caught earlier than they’ve gotten their job accomplished, so they have a tendency to develop strategies and working practices that make them quieter, and more durable to see,” Ellis mentioned.

As soon as they’ve established a foothold, subtle attackers will typically take their time in surveying customers and safety protocols earlier than executing the total brunt of their assaults, mentioned Hank Schless, senior supervisor for safety options at Lookout.

This helps them strategize methods to most successfully keep away from current safety practices and instruments, Schless mentioned, “whereas concurrently figuring out what elements of the infrastructure could be simplest to encrypt for a ransomware assault.”

Different actions can embody exfiltrating knowledge slowly — so slowly that it usually received’t be blocked or detected, Gurzeev mentioned.

See also  Russian hackers exploited MFA and 'PrintNightmare' vulnerability in NGO breach, U.S. says

Evading detection

It’s not that hackers can’t be detected on this scenario, however additionally they repeatedly hone their techniques to evade detection makes an attempt, mentioned Asaf Karas, chief know-how officer for safety at JFrog. Over the previous week, “we’ve already seen the usage of obfuscation to keep away from detection,” Karas mentioned.

Within the case of the Sony breach of 2014, the New York Occasions reported that the attackers spent two months mapping the corporate’s methods and figuring out key information. (“They have been extremely cautious, and affected person,” an individual briefed on the investigation advised the Occasions, talking of the attackers.) Wired reported that the attackers could have been stealing knowledge over the course of a full 12 months.

The attackers within the SolarWinds Orion breach, in the meantime, are believed to have had entry for 9 months to “a number of the most subtle networks on the planet,” together with cybersecurity agency FireEye, Microsoft, and the U.S. Treasury Division, mentioned Peter Firstbrook, a analysis vice chairman and analyst at Gartner, on the agency’s latest safety convention.

For attackers, “if the motive is to steal delicate info, you would possibly need to simply be actually quiet and simply pay attention in and steal knowledge because it’s coming,” mentioned Sonali Shah, chief product officer at Invicti.

However after a breach involves gentle, it’s not all the time clear how the attackers even obtained in initially — particularly if a considerable amount of time has handed. And which will very nicely be the case with any main assaults that stem from the vulnerability in Log4j, Gurzeev mentioned.

“Since we’d solely be taught in regards to the assaults in months or years from now, it is perhaps powerful to correlate,” he mentioned.

‘Sky is the restrict’

Researchers have mentioned they do count on extra critical assaults to end result from the vulnerability in Log4j, generally known as Log4Shell. Many purposes and providers written in Java are probably susceptible to Log4Shell, which might allow distant execution of code by unauthenticated customers. Distributors together with Bitdefender and Microsoft have already reported tried ransomware assaults exploiting the vulnerability in Log4j.

Moreover, Microsoft and cyber agency Mandiant mentioned this week that they’ve noticed exercise from nation-state teams—tied to nations together with China and Iran—looking for to take advantage of the Log4j vulnerability. In a single occasion, an Iranian group generally known as Phosphorus, which has beforehand deployed ransomware, has been seen “buying and making modifications of the Log4j exploit,” Microsoft mentioned.

The chance of ransomware assaults deriving from Log4Shell is excessive, researchers have mentioned. However in the case of distant code execution, “the sky is the restrict on what an attacker can obtain as an finish end result as they pivot and execute instructions on different apps, methods, and networks,” mentioned Michael Isbitski, technical evangelist at Salt Safety.

See also  Citizen science project in Brazil could help to reduce the impact of flooding

As a result of widespread nature of the flaw, “the lengthy tail on this vulnerability goes to be fairly lengthy,” mentioned Andrew Morris, the founder and CEO at GreyNoise Intelligence. “It’s in all probability going to take some time for this to get utterly cleaned up. And I believe that it’s going to be a little bit bit earlier than we begin to perceive the size of affect from this.”

Response effort

The excellent news is that in some methods a minimum of, companies are in a greater place to keep away from a disaster now than previously. This being 2021, many companies are extra primed to reply rapidly — as evidenced by the speedy response of safety groups late final week, lots of which labored via the weekend to safe their methods.

In the meantime, key applied sciences for defenders trying to root out the attackers sitting of their networks can embody internet software firewall (WAF) and intrusion prevention system (IPS) applied sciences, Ellis mentioned.

“A motivated attacker will discover a bypass for them, however the noise generated by everybody else will likely be turned down within the course of, making their actions simpler to see,” he mentioned.

For bigger organizations, “the massive factor is to do the whole lot you possibly can to know the place Log4j is or is prone to be in your surroundings, then logging the whole lot and watching it — particularly internally — like a hawk, and deal with suspected assaults towards these methods as if they have been profitable,” Ellis mentioned.

For smaller organizations who would possibly lack the headcount to do that, “engaged on an ‘assume breach’ foundation and deploying honeypots and honeytokens is a low-noise, high-signal technique to detect post-exploitation exercise,” he mentioned. Honeypots are pretend “susceptible” servers meant to catch attackers within the act, whereas honeytokens provide an identical idea however for knowledge.

In the end, getting a deal with on all the property and methods that the group possesses is a crucial first step, Gurzeev mentioned.

“You’ll be able to’t shield what you don’t know,” he mentioned. “However as soon as you already know, you possibly can set compensating controls, shut the gaps, and take different steps to reduce buyer threat and enterprise threat — which ought to be everybody’s prime precedence.”

Source link

Tags: fullImpactLog4jvulnerability
Previous Post

Elon Musk Officially Released Tesla's Upgraded Bot!

Next Post

Shiba Inu ($SHIB) surges 10% amid 4 trillion accumulation from Ether (ETH) whales

seprameen

seprameen

Next Post
Shiba Inu announced via its official Twitter page that the holders of the meme coin are now over a million

Shiba Inu ($SHIB) surges 10% amid 4 trillion accumulation from Ether (ETH) whales

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Newsletter

Popular Stories

  • Man upset using a Windows 10 laptop

    Microsoft’s blunders with new Windows 10 update are causing serious headaches

    0 shares
    Share 0 Tweet 0
  • Preterm babies do not habituate to repeated pain like other babies do

    0 shares
    Share 0 Tweet 0
  • Children’s mental health declines as a result of mothers forced to find job

    0 shares
    Share 0 Tweet 0
  • Borgata Casino in Atlantic City Unveils a $55 Million Remodel and Rebranding of Its Hotel Tower

    0 shares
    Share 0 Tweet 0
  • Microsoft lays off AI ethics team

    0 shares
    Share 0 Tweet 0

Security Jobs

View 115 Security Jobs at Tesla

View 165 Security Jobs at Nvidia

View 105 Security Jobs at Google

View 135 Security Jobs at Amamzon

View 131 Security Jobs at IBM

View 95 Security Jobs at Microsoft

View 205 Security Jobs at Meta

View 192 Security Jobs at Intel

Accounting and Finance Hub

Raised Seed, Series A, B, C Funding Round

Get a Free Insurance Quote

Try Our Accounting Service

AI EXPRESS – Hot Deal 4 VCs instabooks.co

AI EXPRESS is a news site that covers the latest developments in Artificial Intelligence, Data Analytics, ML & DL, Algorithms, RPA, NLP, Robotics, Smart Homes & Cities, Cloud & Quantum Computing, AR & VR and Blockchains

Categories

  • AI
  • Ai videos
  • Apps
  • AR & VR
  • Blockchain
  • Cloud
  • Computer Vision
  • Crypto Currency
  • Data analytics
  • Esports
  • Gaming
  • Gaming Videos
  • Investment
  • IOT
  • Iot Videos
  • Low Code No Code
  • Machine Learning
  • NLP
  • Quantum Computing
  • Robotics
  • Robotics Videos
  • RPA
  • Security
  • Smart City
  • Smart Home

Quick Links

  • Reviews
  • Deals
  • Best
  • AI Jobs
  • AI Events
  • AI Directory
  • Industries

© 2021 Aiexpress.io - All rights reserved.

  • Contact
  • Privacy Policy
  • Terms & Conditions

No Result
View All Result
  • AI
  • ML
  • NLP
  • Vision
  • Robotics
  • RPA
  • Gaming
  • Investment
  • More
    • Data analytics
    • Apps
    • No Code
    • Cloud
    • Quantum Computing
    • Security
    • AR & VR
    • Esports
    • IOT
    • Smart Home
    • Smart City
    • Crypto Currency
    • Blockchain
    • Reviews
    • Video

© 2021 Aiexpress.io - All rights reserved.