2017 in Review: Data Breach Statistics and Trends

Illustration: 2017 in Review: Data Breach Statistics and Trends - Authentic8 Blog

What were the biggest data breaches in 2017? Did the federal government's cybersecurity fare better, two years after the disastrous OPM hack in 2015?

Did ransomware live up to, or even beat, the dire predictions? Which industries were targeted or hacked most?

We have pulled together summaries, surveys and posts worth returning to, for use as a quick reference to consult when working on IT security presentations, cybersecurity plans and requests for budget or approvals in the year ahead:

The Biggest Hacks, Leaks and Data Breaches in 2017

...presented in 28 (illustrated) slides by ZDnet, with links to more in-depth information.

Source: ZDNet

ABA Tech Report 2017: Security

What does the American Bar Association’s 2017 Legal Technology Survey Report reveal about data security in the nation’s law firms? David G. Riess, attorney at Clark Hill PLC, summarizes.

Source: ABA Tech Report

2017 in Review: Data Breach Statistics and Trends - Authentic8 Blog illustration

Largest Healthcare Data Breaches of 2017

78 healthcare data breaches in 2017 that affected more than 10,000+ records

Breaking and Evading the Local Browser Sandbox (2)

Illustration: Breaking and Evading the Local Browser Sandbox (2) - Authentic8 Blog

by Amir Khashayar Mohammadi

In the first part of this mini-series, we examined which methods have been applied so far to break local browser and app sandboxes. Now let's look at how attackers gain an advantage with sandbox evasion techniques.

Sandbox escapes allow attacking local machines with exploit kits that are usually hosted on compromised web servers.

Such exploit kits then scan the “inside” of the browser to identify more weak spots and deliver a payload, like ransomware or spyware.

Once the sandbox is broken, nothing can prevent a malicious payload from being transferred. The privileges that were once given to the browser are now being used to render malware directly to your machine.

How attackers gain time with sandbox evasion techniques

No matter how sturdy the sandboxed environment turns out to be in the end, initially it creates an additional hurdle for web-borne attacks.

But the presence of sandboxing technology can also be read as a warning sign: “IT security researchers

Company Statement on Meltdown and Spectre

The Meltdown and Spectre attacks have recently been publicized, revealing vulnerabilities in all systems using modern microprocessors. Authentic8 systems share these vulnerabilities.

While there have been no publicized practical in-the-wild exploits of these vulnerabilities, we are applying system patches as they become available. Patches have been released for Meltdown on some platforms, with more expected; Spectre does not appear to be patchable in software and may require physical CPU revisions.

Authentic8 uses third-party cloud virtualization platforms for a minority of our services. These services (Amazon AWS, Google Compute) have patched their underlying software against the Meltdown attack. We are preparing kernel patches for our own systems and will provide updates as they are processed through QA and deployed.

The Authentic8 architecture in many ways mitigates against these types of attacks. Our browser isolation does not rely on hypervisors, so exploits designed to access data across virtual machines do not apply to us. Sensitive customer data is kept encrypted at rest and only

Noteworthy Reads, Pics & Tweets

Earlier this month, we asked our circle of InfoSec Luminaries: "Which cybersecurity-related book, video, movie, podcast, GIF, or epic tweet can you recommend?"

Their tips make for worthwhile reads and relaxed browsing (not only) over the holidays. Enjoy!

Steve Durbin, Information Security Forum

I’m going to play safe and go with The Cyber Risk Handbook: Creating and Measuring Effective Cybersecurity Capabilities by Domenic Antonucci.

I highlight it not because I wrote one of the chapters but because it tries, and I’d say succeeds, in covering the whole range of challenges associated today with operating in cyberspace in a readable manner whilst suggesting practical approaches from a range of well known and respected contributors.

If you want to understand how to get to grips with cyber, read this book. Now! It’s also available for Prime delivery via Amazon, Kindle download and Audio download. The perfect gift!

Dr. Fred Scholl, Monarch Information Networks

WTF?: What’s the Future and

News Media: Easy Target on Twitter?

Illustration: News Media: Easy Target on Twitter? - Authentic8 Blog

CNN host Anderson Cooper said someone hijacked his Twitter account while he was asleep. The incident serves as a reminder that the Twitter feeds of (media) brands have become high-value targets for pranksters, online criminals and hacktivists.

How can news organizations and journalists better protect themselves against having their Twitter accounts hijacked or sabotaged?

CNN's initial announcement in December came after a tweet from Cooper's handle called President Trump a “tool” and a “pathetic loser.” CNN tweeted that “someone gained access” to his account.

The account wasn't "hacked", technically. It turns out that Cooper's assistant left his phone - which was logged in to the Twitter account - unattended at the gym. So goes the story, at least, and they're