On 09 December 2021, the world was alerted to the Log4j vulnerability [CVE-2021-44228 aka Log4Shell]. It is likely that threat actors already knew about the vulnerability before this date, says Tom Bienkowski, NETSCOUT Product Marketing Director, because it’s been reported that the vulnerability had been exposed much earlier in Minecraft chat forums. How does Log4j work – and what lessons does it bring? Log4j, which is open-source software provided by the Apache Software Foundation, records errors and routine system operations and sends diagnostic messages about them to system administrators and users. A common example of Log4j is when a user types in or clicks on a bad weblink and they receive a 404 error message. The web server running the domain of the attempted weblink sends a message ...
Image sourced from Shutterstock. NETSCOUT’s ATLAS Security Engineering and Response Team (ASERT) observed a record-setting 5.4 million attacks in the first half of 2021, further confirmation that their “up and to the right” mantra would continue to hold true. As the findings from the 1H 2021 NETSCOUT Threat Intelligence Report show, the ongoing surge in DDoS activity is just one aspect of the dramatic global impact cyberattacks continue to have on private and public entities. “Cybercriminals are making front-page news launching an unprecedented number of DDoS attacks to take advantage of the pandemic’s remote work shift by undermining vital components of the connectivity supply chain,” stated Richard Hummel, threat intelligence lead, NETSCOUT. “Ransomware gangs added triple-extortion ...
When cyberattacks are on the rise, as they certainly have been in South Africa this year, an organisation cannot afford to have its cybersecurity operating in a reactive manner. And yet, far too many businesses operate in this manner, making them prime targets for a breach. This is according to Milad Aslaner, Senior Director, Cyber Defense Strategy at SentinelOne, which helps organisations to prevent, detect, respond to and remediate end-point threats using artificial intelligence (AI) and machine learning. Its endpoint security products are distributed throughout Africa by Networks Unlimited. Aslaner explains: “Endpoints including laptop computers, tablets, and phones provide entry points to a wider network penetration that could harm the organisation, and which is one of the goals of ran...
Ozone Information Technology Distribution [Ozone] has developed a comprehensive portfolio designed to provide organisations with robust cybersecurity, file sharing, digital forensics, and business continuity. This solutions-driven portfolio includes Neverfail, Nuix, WhatsUp Gold, MoveIT, Kerio Control, GFI Languard, and Keeper Password Management, among others. “The current cybersecurity climate is extremely challenging for local organisations,” says Henk Olivier, MD at Ozone Information Technology Distribution.” “Companies need better tools and solutions to help protect them from the increasingly complex and intelligent threat actors that put their data and employees at risk. This complex environment, and the rigorous compliance requirements now mandated by the Protection of Personal Info...
Financial services companies have been a popular target for cybercriminals for a long time. Not without good reason, since beyond working with money, financial companies handle a slew of sensitive client data that criminals utilise in various fraud schemes or sell-off on dark web bazaars. According to Verizon’s 2020 Data Breach Investigations Report, in the past year alone the financial industry has suffered more than 1,500 incidents, with 448 confirmed data disclosures. Carey van Vlaanderen, CEO of ESET says that in addition to the long-standing threats, most companies have had to contend with the rapid transition to remote work. “The shift happened on extremely short notice, leaving companies with little time to deploy adequate cybersecurity measures or to prepare employees for looming c...
The 100 Days of Coronavirus report – published by Mimecast – shows that the volume of malicious and opportunistic cybercrime has increased significantly by 33% in the period January to March 2020. The new report has found that in the period January to March 2020 monthly volumes of: Spam and opportunistic cybercrime detections increased by 26.3%, Impersonation fraud detections increased by 30.3%, Malware detections increased by 35.16%, and Blocking of URL clicks increased by 55.8%, meaning people are more likely now to click on unsafe links than before the outbreak. Over the months of February and March, as South Africa reported its first case and moved swiftly into lockdown, the Threat Intelligence Team saw dramatic increases in cyberattacks in Sub-Saharan Africa. Carl Wearn, Head of E-Cri...