WebRoot Quarterly Threat Update


According to update, throughout 2016, phishing attacks increased in intensity and sophistication. One of the leading causes of network infiltration and data theft is phishing, and mostly deceptive email used for that purpose.
Online criminals send emails which appear to originate from trusted institutions or banks. When links present in the emails clicked, the attacker establishes a beachhead and gathers information for an attack on the critical system.

About Vade Secure


Vade Secure is the global leader in identifying anti-phishing, spear phishing, malware and ransomware with heuristic filtering. Language independent, the filter analyzes globally all incoming emails (links, attached files, content…) to detect all threats in zero-day, even the most targeted attacks. After eliminating all threats, Vade Secure removes the nuisance of low priority emails with Graymail Management. Ads, social network notifications, and newsletters are automatically sent to a graymail folder while a Safe Unsubscribe button eliminates them forever.

Vade Secure’s solutions are used by major ISPs, OEMs, and Enterprises worldwide, protecting more than 300 million mailboxes in 76 countries. Vade Secure is implanted in 5 countries (USA, Canada, France, Hong Kong and Japan) to offer 24/7 support.

Vade Secure analyzes incoming email to filter out spam, scam messages, phishing attempts, viruses, and Trojan horses from customer inboxes. It instantly classifies graymail (newsletters, commercial email, and social network notifications) for easy filtering.

Vade Secure integrates directly with traditional email clients and with atmail’s web-based offering, ensuring a consistent, clean inbox experience across platforms.

Protection against Ransomware

  • Web Hosting company hosts thousands of websites. Hence security against Ransomware is also becoming a primary concern to customers.
  • Ransomware is a malicious software which prevents or limits users from accessing their system.
  • Erebus utilizes a technique to bypass User Account Control to infiltrate the user’s system and ask for ransom.

Backup Technology Innovations


Everybody in the Hosting industry is worried about performing backups. With need, there is an emergence of innovations in backup technologies such as CDP instant recovery, flat backups, Server virtualization, and backup appliances. There is a need to protect data fully, and restoration on as needed basis.


For mission-critical systems and business continuity, disaster recovery systems must be fully advanced as long recovery times are unacceptable. The gap between RTO (Recovery Point Objective) and RPO (Recovery Time Objective) must be minimum.

With the E-commerce growing rapidly legacy scheduled backups are always inadequate. Incremental forever backup techniques are required, to handle backup of data collected on the daily basis.

Continuous data protection eliminates the problems associated with the backup window, which creates very frequent, block-level backups rather than nightly backups. Every few minutes newly created or modified storage blocks copied to the backup targets like storage arrays or remote machines. Thus, reducing the recovery point objective (RPO).
Losing a few minutes data is more affordable then losing a data of entire day.

Secure Content Delivery Network


It simplifies the delivery of secure web applications for developers. There is a global network of Content servers in various parts of the globe protected with web application firewall (WAF) and DDoS mitigation setup.
Users offered with real-time analytics and 24/7 support. Most of the companies charge on pre-paid bandwidth.

Biggest Web attack of More than 1TB Reported by OVH founder Octave Klaba


The previous attack was of 620Gbps (Gigabits per second) on security expert Brian Krebs’ website, which leads to website offline for nearly a week.

OVH attacked by a botnet (zombie army) of hacked devices such as webcams to knock it offline. It has thrown the spotlight once again on the security of IOT (Internet of Things) devices. A website is hit by a massive amount of data so-called distributed denial of service attack.

According to Akmail the security firm that supported the site – the attack was nearly double the size of any previous one it had seen and was “among the biggest assaults the internet has ever witnessed”.

Recently Symantec security firm reports that cybercriminals looking for vulnerable devices such as TVs, home security systems and webcams for IOT malware.

Symantec General Manager Nick Shaw says:
[QUOTE]Cybercriminals are interested in cheap bandwidth to enable bigger attacks. They obtain this by hijacking our devices and stitching together a large web of consumer devices that are easy to infect because they lack sophisticated security,[/QUOTE]

Chief Technology Officer at Security firm Corero Dave Larson says:

IoT botnets were disrupting the industry. The tools and devices used to execute the attacks are readily available to just about anyone; combining this with almost complete anonymity creates a recipe to break the internet.

Now cybercriminals are targeting Online gambling companies. A new most powerful DDOS attack ‘Mirai’ registered publicly on September 30, 2016, hacking community website HackForums. Thousands of meaningless requests for information temporarily paralyzes the company’s website until demanded a ransom paid or web-hosting technical can fend off the threat.

Hackers have potent to hold, and online business owners are unsure to protect themselves and their customers completely. The bot has terrifying capabilities and is multitudinous in nature, and coming from every place on the face of the planet.

Corero Network Security

How about Corero Network Security DDoS defense solutions? Why not hosting providers trust on such 3-rd party vendors?

Coreror is the leader in real-time, high-performance DDoS defense solutions. It provides automatic attack detection in real time and mitigation, coupled with complete network visibility, analytics, and reporting. Only legitimate user traffic is allowed to continue to flow as intended. It acts as a black box, requiring little or no intervention from any security or operations personnel.

 

Dirty COW, the Linux kernel security flaw (CVE-2016-5195)


Server Management Services

Linux widely used Open Source Operating System which includes: RedHat, Debian, CentOS and Ubuntu
Automated secure and patch services available like ‘ksplice’ or ‘kernelcare.’

Why patch and update Operating System?
Patch and update close loopholes. Otherwise, the system exposed to exploitation due to vulnerabilities.

Linux Vulnerabilities
Dirty COW, the Linux kernel security flaw (CVE-2016-5195), discovered in virtually all Linux Operating system versions. A High priority privilege-escalation vulnerability exists in a section of Linux Kernel, which allows any installed malicious app to gain administrative (root-level) access to a device and completely hijack it. Linux copy-on-write (COW) mechanism broke, and malicious program tamper real-only, root-owned executable files and setup executables. An unprivileged local user gain writes access to otherwise read-only memory mappings and thus increase their privileges on the system.
The Dirty COW vulnerability is about nine years old vulnerability, present in the Linux Kernel since 2007, but recently being exposed.
Androids powered by Linux Kernel believed to be vulnerable to it.

Updated and patched server fixes susceptible ‘Dirty Cow’ bug and the environment gets protected.

SSL Certificate


Google Chrome will give warning “Not Secure” for HTTP sites after January 2017. Google want a connection between Chrome and web page more secure i.e. private. A green lock in the URL indicates HTTPS connection which points “Your connection to this site is private.”

Google search already started preferring HTTPS web pages over HTTP pages.

Web hosting providers like Automatic, WordPress.com has already turned on SSL for their hosted customers in April 2016.
Let’s Encrypt, a project of the nonprofit Internet Security Research Group provides the free certificates to Dreamhost, Squarespace, and WordPress. Dreamhost requires you to purchase unique IP address on your hosting plan for free SSL.

Hosting Providers like ZDNet and Hivelocity offers free Let’s Encrypt certificates

Let’s Encrypt

  • It is Open Certificate Authority providing free and automated SSL-Certificates to enable HTTPS for websites supported by Google Chrome, Mozilla, and EFF.

CYRN Company Profile


Formerly known as Commtouch Software Ltd
Security-as-a-Service provider engaged in developing and marketing information security solutions for protecting The Web, e-mail, and mobile transactions.

Headquartered: Herzliya, Israel

Establishment: February 10, 1991

Company Technologies: CYREN GlobalView Cloud and Recurrent Pattern Detection (RPD)

Services Offered

  • CYREN WebSecurity (CWS), CYREN EmailSecurity, Cyber Intelligence Suite, and Embedded Solutions.
  • Messaging solutions includes anti-spam, Outbound Spam Protection for service providers, Zero-Hour virus outbreak protection, and GlobalView Mail Reputation services, as well as Command Antivirus and GlobalView URL Filtering services.
  • Network and Security Solutions include unified threat management solutions, network routers and appliances, anti-virus solutions
  • Integrated cloud security technology solutions that mitigate cyber threats, malware attacks, information leaks, legal liability and productivity loss through the application of cyber intelligence.
  • Unified threat management (UTM) solutions, network appliances
  • Antivirus and The Web security solutions

Customers

  • The company delivers security services to a range of clients and original equipment maker (OEM)
  • Content security gateways Service providers, such as Software-as-a-Service (SaaS) vendors, Web hosting providers, and Internet service providers

Comodo cybersecurity solutions


Key Selling Points

  • Comodo Group Inc. is the World’s largest certificate authority currently securing over 38 million fully qualified domains.
  • Global innovator of cybersecurity solutions, protecting critical information across the digital landscape
  • The world’s largest certificate authority

Services Offered

  • Every single digital transaction is authenticated, validated and secured through a layer of trust and security. Comodo provides SSL certificates, antivirus, and endpoint security leadership and true containment technology.
  • The company provides complete end-to-end security solutions across the boundary, internal network, and endpoint with innovative technologies solving the most advanced malware threats, both known and unknown.
  • Digital Certificate Management (CCM) Platform
    Allows customers (enterprises) to self-administer, instantly provision, auto-discovery, and manage their entire digital certificate ecosystem from any certificate authority (CA). It organizes them into one central inventory to simplify SSL/private key information (PKI) tracking and management and alerts them when certificates are about to expire.
  • Zero-day malware: New malware never seen before and continue to plague businesses of all sizes. They are not detected by existing security systems and hide on endpoints and networks.
    Hackers use them as useful tools. Millions of hidden files are created and modified each year.
  • Valkyrie: A cloud-based significant component of the AEP solution. It goes beyond typical signature-based checking for malware accomplishes and brings an instantiations file check using an online file verdict system, which tests the entire run-time behavior of a file with a range of static and behavioral checks to identify those that are malicious.
    It is efficient at detecting zero-day threats missed by the signature-based detection systems of standard antivirus products.
    The Valkyrie, Comodo’s cloud-based file analysis tool, automatically prevents hidden files from executing, and renders a file verdict as ‘Good’ or ‘Bad.’. The unknown files get isolated in automatic containment in a virtual environment on the endpoint.
    The detailed information helps IT security professionals with exact information to protect the environment from advanced persistent threats (APTs) and other cyber-attacks.
  • cWatch EDR: Endpoint Detection And Response Solution is the part company’s security solutions advanced endpoint protection to detect, prevent and respond to malware infection. It blocks and isolates unknown, zero-day attacks of malware, Trojans, and other harmful executables – and renders those attacks useless against endpoints and networks.
    • Features of cWatch EDR include:
      i) Continuous monitoring of endpoints
      ii) Advanced search capabilities for file hashes and anomaly detection
      iii) Real-time visibility into what’s happening in your environment
      iv) 100 percent trusted verdicts for all files, ensuring detection of any malware, even new attacks
      v) Unrivaled process timeline visualization
      vi) Retrospective analysis of what has happened
      vii) Centralized cloud-hosted architecture
      viii) Works in concert with Comodo’s global threat intelligence
      ix) Human analysis of unknown file and event types
      x) Compatible with other endpoint security tools

Headquartered: Clifton, New Jersey

Other Offices: branch office in Silicon Valley and international offices and R&D centers across Europe and Asia (China, India).

Target Customer: mid-sized companies, to the world’s largest enterprises

No. of Customers: 50 percent of SSL certificate market share worldwide and securing more than 38 million fully qualified domains

Executive

President: Michael Fowler
CEO: Melih Abdulhayoğlu

Latest News

  • (November 01, 2017) Comodo CA acquired by Francisco Partners The company also owns SonicWall, which produces SSL proxy boxes, and NSO Group, which provides government spyware, among other cyber-surveillance upstarts.
  • (Jul 13, 2017) The company announced upgrade Program exclusively for owners of Symantec, Thawte, and GeoTrust digital certificates by offering one year free with Comodo replacement extended validation (EV) certificates. Recent news reports, Symantec-issued certificates will have a shorter life and not have the green trust padlock indicator.
  • (June 27, 2017) Announced Free fully-featured, enterprise-class cWatch EDR Endpoint Detection And Response Solution. It enables any size organization to detect malware on endpoints better and investigate and respond to security incidents.
  • (Jan. 18, 2017, PRNewswire) Distinguished Leader in Digital Certificates Neal Creighton Joins Comodo as Advisor to Drive SSL Business. As the former co-founder, president and CEO at GeoTrust, another leading certificate authority, he led a $24 million financing round and sold GeoTrust to Verisign for $125 million. Currently based in Boston, is a graduate of the USMA at West Point and holds a JD and an MBA from Northwestern University.
  • Creighton has also spearheaded ventures, including GeoTrust spin-off chosen security, acquired by PGP, Corp. (now Symantec), and AffirmTrust LLC, acquired by Trend Micro. He is currently president and CEO of CounterTack, where he has raised more than $72 million to support the company’s rapidly growing endpoint security and threat platform.
  • (Oct. 26, 2016 PRNewswire) To aid in the fight against cyber attacks, Comodo Offers Free Forensic Analysis to Uncover Zero-day Malware Lurking on Enterprise Endpoints and Networks. Underpinned by Comodo’s industry-leading Default Deny Platform, this analysis will help enterprises to discover 100 percent of all previously unknown and undetected malware in environments that could ultimately cause serious cyber-security issues, including a data breach.

SME’s and Security


Technology industry highlights the very high threat landscape in the digital world which leads to an increase in security. Businesses communications targeted with email-related attacks. Hiring or outsourcing IT services is becoming critical. It’s essential to deploy an automated system to deal with safety issues. The proactive approach required having robust security protocol.
Data are the pillars of any business, so its protection is the top priority for owners. Companies are concerned to keep sensitive information safe and imply data security and backup solutions.

Secure web hosting

The highest level of protection with multiple layers of security to deter, detect, and prevent threats includes:

  • Up-to-date to the latest version: Keep software, scripts, plugins, and platform up-to-date to the latest version to plug loopholes.
  • Back Up & Restore: Regular automated remote backups cloud is an essential practice. Use of RAID technology.
  • Firewalls: Protects from malicious intrusions specifically intended to breach your system. It monitors all traffic coming in and out of network and prevents malware like viruses or Trojan horses from accessing and corrupting your data. It protects businesses from DDoS attacks. Locks out IP addresses that hunt for known vulnerabilities.
  • SFTP: It provides a more significant layer of security when you transfer files to the dedicated server.
  • Cryptography: Use Transport Layer Security/Secure Sockets Layer (TLS/SSL) encryption, data-at-rest encryption or an iterative cryptographic hash. Encrypting sensitive transmissions is necessary to protect from the data breach. HTTPS makes the exchange of information through your website secure and impenetrable. Encryption provided with the help of an SSL certificate. An EV SSL certificate is the highest form of SSL encryption available, issued after organization verification.
  • Man-in-the-middle attacks: Secure Sockets Layer (SSL) and Transport Layer Security (TLS) are vulnerable to man-in-the-middle attacks.The pervasive use of SSL/TSL has created blind spots in the network where malware hide.
  • Sneaky SQL injections: Put necessary constraints on all the fields, such as the web form and use parametrized queries. Hackers use them to insert code, which in turn allows them to hack database and steal sensitive information available.
  • Use Virtual Private Networks: The safe and encrypted passage to exchange confidential organizational information across the Internet without data leaks, security breaches or interception. It ensures only registered or authorized users to a network, thus ideal for corporates with the closed-door policy for data exchange.
  • Mandatory Password Change at regular intervals with minimum password strength parameter. Also, run periodic security audits by discouraging of password sharing culture.

What can malicious, greedy Hackers do?

  • Deface the website home page to embarrass company or damage reputation
  • Hijack credit-card processing and stole member’s information
  • Use your website server to send out a bulk of spam mail
  • Distribute illegal files for fishing activities, even for Bitcoin mining
  • Can load site with viruses and ransomware to infect office or members’ computers

Cyber Security Studies

  • Ponemon Institute study found that in 2016 more than 50% of US companies suffered a security breach.