Top Cybersecurity Threats for November 2023 Business
We've got some great deals going on right now exclusively for our online customers... chat now to hear more! Author: Phil Muncaster,On the third Wednesday of every month, the VTRAC holds a Monthly Intelligence Briefing (MIB) to discuss the current security threat landscape, latest cybersecurity trends, news and threat intelligence. Below is the summary of their most recent briefing and here is the . 1. Crypto trading platform Poloniex loses $114M to suspected North Korean attackers,2. LockBit affiliate exploits Citrix flaw to devastating effect,3. Software vendor Atlassian forced to upgrade the severity of Common Vulnerabilities and Exposures (CVE) after widespread exploitation,If you'd like to receive new articles, solutions briefs, whitepapers and more—just let us know. Threat actors have stolen over $114m in digital currency from cryptocurrency trading company . Although precise details are still unknown at the time of writing, the attackers are believed to have targeted the firm's hot wallets. That fits with to disable the wallet system for maintenance following the incident. A leaked private key Poloniex and Tron founder, Justin Sun, has claimed that a portion of the stolen assets have been frozen and that losses are within manageable limits—in other words, no customers should lose funds. The firm is offering a 5% white hat bounty to its attackers in exchange for the return of the funds to the affected wallets. However, that offer has so far been ignored by the threat actors. That could be because sources suspect that the . to have observed similar behavior to the heist at Stake.com earlier this year, with attackers saving different stolen tokens at different addresses. If true, this would be the latest in a long line of North Korean cryptocurrency thefts this year, including ($41m), ($70m), ($35m), . An affiliate of the prolific ransomware-as-a-service (RaaS) outfit LockBit a series of breaches at several major global organizations—all within the space of a few days. These include London-headquartered law firm Allen & Overy, Boeing, the U.S. arm of Chinese banking giant ICBC, and Australian port operator DP World. It's unclear what impact the compromises may have on victim organizations, it could be weeks before affected ports in Australia will be able to accept export cargo, as a result of the DP World breach. The common thread appears to be the exploitation of a critical Citrix vulnerability named Bleed () for which fixes were made available more than a month ago. As the MOVEit campaign highlighted, a single flaw in a widely used product can have a devastating downstream impact on corporate customers. Researchers claimed that, as of November 14, over 10,000 Citrix servers were still vulnerable to the flaw. Software vendor Atlassian upgraded the severity of a critical vulnerability in its Confluence product after widespread attacks exploited the bug. The firm originally posted a cybersecurity advisory about the improper authorization vulnerability on October 31. The bug () affects all versions of its Confluence Data Center and Server product (although not Atlassian Cloud sites accessed via atlassian.net). It was originally given a CVSS score of 9.1. Atlassian urged sysadmins to patch, warning that organizations are vulnerable to significant data loss if exploited by an unauthenticated attacker.,However, the firm updated its guidance on November 2, claiming that it had found publicly posted critical information about the vulnerability which increases risk of exploitation. Just a day later, it revealed active exploitation. Three days after that, on November 6, to the maximum, 10.0, due to the change in the scope of the attack. Widespread exploitation was , including attempts to deploy the Cerber ransomware. The incident highlights the speed with which threat actors can pounce on newly published vulnerabilities/exploits, and the need for rapid incident response and risk-based patch management. Learn more about the ever-evolving nature of security threats and complex risk environments. Verizon Business Internet Security,Qualified Verizon Business Internet customers have access to powerful internet security solutions designed to help protect your business from cyber threats. Verizon Mobile Device Management (MDM),MDM provides powerful resources to mitigate mobile risk and help protect against cyberattacks that target corporate, education and business data and personal information. Mobile Threat Defense (MTD),Safeguard the data used by your remote workforce with advanced mobile security from Verizon and our partners. Managed Detection and Response,Take your security program to the next level by quickly identifying and responding to security incidents. Managed Security Information and Event Management,Get a tailored operational model that integrates Verizon security and intelligence capabilities with your own SIEM solution. Advanced Security Operations Center (SOC),To help detect and contain sophisticated threats and help prevent them from spreading. Rapid Response Retainer,To help accelerate response to serious attacks. Cyber Risk Programs,Identify security risks and threats before they can seriously harm your organization,Social Engineering Defense,Fortify your organization's cybersecurity, end to end, with the help of Verizon's customizable and comprehensive 5-point plan. Verizon Data Breach Investigations Report,Keep your security plan up to date and help protect your organization—with access to in-depth analysis on recent cyber threats and data breaches. To find out more, listen to the full threat intelligence briefing from the . If you are already a Verizon customer, we have several options to help you get the support you need. Choose your country to view contact details. Existing customers, to your business account or . . * Indicates a required field. We will follow up from your contact request using the information provided. These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information. These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. We use both third party and first party cookies for this purpose. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance. These cookies enable the website to provide enhanced functionality and personalisation. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly. These cookies may be set through our site by Verizon and third parties. They are used to present Verizon advertising on third party sites that you may visit. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising from Verizon. BackClear Filters,All Consent Allowed
Learn more