Joe Nocera & Vikas Agarwal, partners at PwC The 2021 PwC Global Digital Trust Insights survey shows 96% of businesses will adjust their cybersecurity strategy as a result of the COVID-19 pandemic. Joe Nocera and Vikas Agarwal of PwC offer an analysis.
“I can t remember any survey we ve ever done where you had 96% of the respondents agreeing . that they were planning to adjust their strategy,” Nocera says.
Half of all organizations surveyed for the report are now more likely to consider cybersecurity in every business decision, and 44% are implementing new processes for cybersecurity budgeting.
In a video interview with Information Security Media Group, Nocera and Agarwal discuss:
The Impact of COVID-19 on Cybersecurity Strategies bankinfosecurity.com - get the latest breaking news, showbiz & celebrity photos, sport news & rumours, viral videos and top stories from bankinfosecurity.com Daily Mail and Mail on Sunday newspapers.
Get Permission
A Microsoft Exchange Server at the European Banking Authority, a regulatory agency of the European Union, was hacked. But the agency says there are no indications of data exfiltration.
An investigation is continuing, and the agency says it s deployed additional security controls to the affected server.
In a Tuesday update, the European Banking Authority said the hackers didn t access any sensitive data. The agency says it has restored the compromised email server and is collaborating with the Computer Emergency Response Team - EU and a team of forensic experts to investigate the attack. The scope of the vulnerability was limited and the confidentiality of the EBA systems and data has not been compromised, an EBA spokesperson tells Information Security Media Group. We would also like to note that email communication has been restored.
Get Permission
Computer security researchers have acquired an enormous list of compromised email servers from the perpetrators of the mass Microsoft Exchange compromises - a lucky but not uncommon find that is now being put to use to alert infected organizations.
The victim list contains 86,000 IP addresses of Exchange servers infected worldwide as the result of the latest vulnerabilities revealed by Microsoft last week, says Allison Nixon, chief research officer with Unit 221B, a New York-based cybersecurity company.
The list is now being used to power a web-based service that can help organizations identify if their email systems were infected in the first wave of attacks, Nixon says. That service, Check My OWA, is now active.
Get Permission
Microsoft is warning users of its Azure cloud platform that hackers are using several living off the land attack techniques to evade security measures, escalate privileges and deploy cryptominers. The software giant released a threat detection and mitigation strategy for the platform.
Hackers are using Azure LoLBins, which refers to weaponizing preinstalled Windows or Linux binary tools designed for legitimate purposes within the Azure platform. Attackers are increasingly employing stealthier methods to avoid detection. Evidence for a variety of campaigns has been witnessed, Microsoft notes. The usage of LoLBins is frequently seen, mostly combined with fileless attacks, where attacker payloads surreptitiously persist within the memory of compromised processes and perform a wide range of malicious activities. Together with the use of legitimate LoLBins, attackers’ activities are more likely to remain undetected.