Forwarded from RUSCADASEC news: Кибербезопасность АСУ ТП (Anton Shipulin)
В сентябре (по словам авторов 4 сентября) в онлайн-магазине компьютерных игр Steam выйдет профессиональная игра «ThreatGEN: Red vs. Blue», направленная на обучение методам нападения и защиты технологических сетей
ThreatGEN™ Red vs. Blue is the industry's first multi-player strategy computer game where players compete against each other, head-to-head, to take control/maintain control of a computer network. This is not a fiction-based game like those found on the consumer gaming market. This is a live, player vs. player "gamified" training simulator, designed to teach cyber security skills in an immersive and interactive applied learning environment.
Which side will you choose? The hackers (red team) or the cyber defenders (blue team)? Battle head-to-head in turn-based cyber warfare, where the fate of a company's computers, network, information, and even critical industrial control systems hang in the balance.
https://store.steampowered.com/app/994670/ThreatGEN_Red_vs_Blue/
ThreatGEN™ Red vs. Blue is the industry's first multi-player strategy computer game where players compete against each other, head-to-head, to take control/maintain control of a computer network. This is not a fiction-based game like those found on the consumer gaming market. This is a live, player vs. player "gamified" training simulator, designed to teach cyber security skills in an immersive and interactive applied learning environment.
Which side will you choose? The hackers (red team) or the cyber defenders (blue team)? Battle head-to-head in turn-based cyber warfare, where the fate of a company's computers, network, information, and even critical industrial control systems hang in the balance.
https://store.steampowered.com/app/994670/ThreatGEN_Red_vs_Blue/
Steampowered
ThreatGEN: Red vs. Blue on Steam
ThreatGEN: Red vs. Blue is an educational game-based cybersecurity simulator designed for those with genuine interest in cybersecurity. Learn and practice cybersecurity concepts & strategy, play as the red team (hackers) or the blue team (defenders), single…
Forwarded from RUSCADASEC news: Кибербезопасность АСУ ТП (Anton Shipulin)
Команда Kaspersky Lab Security Services опубликовала статистику по расследованию киберинцидентов за 2018 год, включая инциденты в промышленных компаниях – 22% от общего числа инцидентов. По данным статистики команды промышленные компании чаще были жертвами банковских троянов, реже жертвами атак APT и шифровальщиков.
О том, что промышленные компании являются привлекальной целью для кражи денег, ранее говорил в своих отчетах Kaspersky ICS CERT в связи с большими транзакциями и низкой культурой кибербезопасности в промышленности.
Кроме того, по результатам реагирования на инциденты опубликована “Тепловая карта” (heatmap) наиболее частых атакующих техник в терминологии базы техник MITRE ATT&CK. Данную карту можно использовать для приоритезации и оценки защитных мер
https://github.com/klsecservices/Publications/blob/master/Incident-Response-Analytics-Report_2018_EN.PDF
О том, что промышленные компании являются привлекальной целью для кражи денег, ранее говорил в своих отчетах Kaspersky ICS CERT в связи с большими транзакциями и низкой культурой кибербезопасности в промышленности.
Кроме того, по результатам реагирования на инциденты опубликована “Тепловая карта” (heatmap) наиболее частых атакующих техник в терминологии базы техник MITRE ATT&CK. Данную карту можно использовать для приоритезации и оценки защитных мер
https://github.com/klsecservices/Publications/blob/master/Incident-Response-Analytics-Report_2018_EN.PDF
GitHub
klsecservices/Publications
Contribute to klsecservices/Publications development by creating an account on GitHub.
Forwarded from CNews.ru
Три главных ИТ-тренда и пять важных тенденций для корпоративного сектора
http://www.cnews.ru/news/top/2019-09-02_tri_glavnyh_ittrenda_i_pyat
http://www.cnews.ru/news/top/2019-09-02_tri_glavnyh_ittrenda_i_pyat
CNews.ru
3 главных ИТ-тренда для корпоративного сектора
Аналитическая компания Gartner выпустила очередной Hype Cycle для предприятий категории midsize enterprise по ее классификации....
NIST Releases Final Public Draft SP 800-160 Vol. 2 | CSRC
https://csrc.nist.gov/news/2019/nist-releases-final-public-draft-sp-800-160-vol-2
https://csrc.nist.gov/news/2019/nist-releases-final-public-draft-sp-800-160-vol-2
CSRC | NIST
NIST Releases Final Public Draft SP 800-160 Vol. 2 | CSRC
NIST has released the Final Public Draft of Special Publication (SP) 800-160 Volume 2, 'Developing Cyber Resilient Systems: A Systems Security Engineering Approach.' Public comment are due by November 1, 2019.
Один из примеров нового риска из за развития машинного обучения.
Forget email: Scammers use CEO voice 'deepfakes' to con workers into wiring cash | ZDNet
https://www.zdnet.com/article/forget-email-scammers-use-ceo-voice-deepfakes-to-con-workers-into-wiring-cash/
Forget email: Scammers use CEO voice 'deepfakes' to con workers into wiring cash | ZDNet
https://www.zdnet.com/article/forget-email-scammers-use-ceo-voice-deepfakes-to-con-workers-into-wiring-cash/
ZDNET
Forget email: Scammers use CEO voice 'deepfakes' to con workers into wiring cash
AI-generated audio was used to trick a CEO into wiring $243,000 to a scammer's bank account.
The Extortion Economy: How Insurance Companies Are Fueling a Rise in Ransomware Attacks — ProPublica
https://www.propublica.org/article/the-extortion-economy-how-insurance-companies-are-fueling-a-rise-in-ransomware-attacks
https://www.propublica.org/article/the-extortion-economy-how-insurance-companies-are-fueling-a-rise-in-ransomware-attacks
ProPublica
The Extortion Economy: How Insurance Companies Are Fueling a Rise in Ransomware Attacks
Even when public agencies and companies hit by ransomware could recover their files on their own, insurers prefer to pay the ransom. Why? The attacks are good for business.
A project aims to help ISPs mind their routing security manners | Ars Technica
https://arstechnica.com/information-technology/2019/09/a-project-aims-to-help-isps-to-mind-their-routing-security-manners/
https://arstechnica.com/information-technology/2019/09/a-project-aims-to-help-isps-to-mind-their-routing-security-manners/
Ars Technica
A project aims to help ISPs mind their routing security manners
MANRS Observatory gives a peek inside security issues of Internet routing.
Forwarded from Vulnerability Management and more
The news that Rostelecom (Solar) will begin to provide Qualys Vulnerability Management services (rus) probably doesn't mean much on a global scale, but it's quite interesting for Russian market and for markets of other "countries with strict data sovereignty rules".
What problems we have with global cloud-based security solutions, including Vulnerability Management solutions? When the data about vulnerabilities of Russian organizations is stored and processed somewhere abroad and it is not clear how and by whom, (even if we are not even talking about the real threats) it's is a red flag for government regulators, like FSTEC. And they can easily make the usage of such services VERY complicated, at least among the customers that are somehow related to the government. The same restrictions stimulate the development of local security products, that's why we have local players on Russian #VulnerabilityManagement market, like Positive Technologies, Altx-Soft, NPO Echelon, etc.
What problems we have with global cloud-based security solutions, including Vulnerability Management solutions? When the data about vulnerabilities of Russian organizations is stored and processed somewhere abroad and it is not clear how and by whom, (even if we are not even talking about the real threats) it's is a red flag for government regulators, like FSTEC. And they can easily make the usage of such services VERY complicated, at least among the customers that are somehow related to the government. The same restrictions stimulate the development of local security products, that's why we have local players on Russian #VulnerabilityManagement market, like Positive Technologies, Altx-Soft, NPO Echelon, etc.