Information Security News|Cyber Security|Hacking Tutorial https://www.securitynewspaper.com/ Information Security Newspaper|Infosec Articles|Hacking News Thu, 16 Jan 2025 16:19:31 +0000 en-US hourly 1 https://wordpress.org/?v=6.7.1 https://www.securitynewspaper.com/snews-up/2018/12/news5.png Information Security News|Cyber Security|Hacking Tutorial https://www.securitynewspaper.com/ 32 32 What is External Attack Surface Management https://www.securitynewspaper.com/2025/01/16/what-is-external-attack-surface-management/ Thu, 16 Jan 2025 16:19:30 +0000 https://www.securitynewspaper.com/?p=27543 Imagine trying to guard your home without knowing how many doors and windows it has, let alone which ones are unlocked. That’s the challenge many organizations face with their digitalRead More →

The post What is External Attack Surface Management appeared first on Information Security Newspaper | Hacking News.

]]>
Cyble Attack Surface Management

Imagine trying to guard your home without knowing how many doors and windows it has, let alone which ones are unlocked. That’s the challenge many organizations face with their digital environments. As businesses expand their online presence, they inadvertently increase their exposure to cyber risks. External Attack Surface Management (EASM) acts as the vigilant guardian, identifying and securing these “entry points” before cybercriminals can exploit them. 

But what makes EASM so vital, and how does it work in practice? Let’s explore in this article in detail.

Understanding External Attack Surface Management

External Attack Surface Management or EASM refers to the process of identifying, monitoring, and managing an organization’s digital assets that are exposed to the internet and could potentially be exploited by threat actors. These assets can include websites, cloud services, APIs, IP addresses, third-party software, and other components that make up an organization’s external digital presence.

Unlike traditional Attack Surface Management (ASM), which focuses on internal and external assets, EASM narrows its focus to the external-facing components. It aims to provide visibility into all digital assets that attackers could target, enabling organizations to proactively address vulnerabilities and reduce risks.

Why EASM is Essential

The external attack surface is constantly changing. New assets are created, existing ones are modified, and shadow IT (unauthorized IT resources) can further complicate the landscape. Without a strong attack surface management solution, organizations risk leaving critical vulnerabilities unaddressed, making them easy targets for cybercriminals. 

EASM ensures continuous monitoring, helping organizations stay one step ahead of potential threats.

Key Benefits of External Attack Surface Management

  1. Comprehensive Visibility: EASM tools provide a detailed inventory of an organization’s external-facing digital assets, ensuring that nothing is overlooked.
  2. Proactive Vulnerability Management: By identifying weak points in the external attack surface, organizations can address vulnerabilities before they are exploited.
  3. Improved Incident Response: With better awareness of the external attack surface, incident response teams can act swiftly to mitigate breaches.
  4. Enhanced Third-Party Risk Management: Modern businesses rely heavily on third-party vendors and partners. EASM aids in monitoring the external attack surface of these entities, strengthening the overall supply chain risk management strategy.
  5. Cost-Effective Security: Preventing breaches through proactive monitoring and remediation is far less expensive than dealing with the aftermath of a cyberattack.

Difference Between EASM and ASM

Although Attack Surface Management (ASM) and EASM share similarities, they cater to different aspects of an organization’s security needs:

AspectEASMASM
ScopeFocuses on external-facing assets exposed to the internet.Covers both internal and external assets.
Use CaseIdeal for identifying risks associated with digital transformation.Broader approach to overall organizational security.
Target AudienceOften used by security teams focusing on perimeter defense.Utilized by security teams handling comprehensive risk.

How to Implement External Attack Surface Management

  1. Asset Discovery: Start by identifying all external-facing assets, including websites, IP addresses, cloud environments, and third-party integrations. An attack surface management tool can automate this process for efficiency.
  2. Prioritize Risks: Not all assets pose the same level of risk. Use an attack surface management platform to classify and prioritize vulnerabilities based on their potential impact.
  3. Continuous Monitoring: Cybersecurity threats evolve rapidly. Continuous monitoring ensures that new vulnerabilities or changes in the attack surface are promptly detected.
  4. Integrate with Existing Tools: Leverage integrations with vulnerability management, incident response, and third-party risk management solutions for a unified security strategy.
  5. Engage a Trusted Partner: Partnering with an attack surface management company or subscribing to an attack surface management service can provide additional expertise and resources.

EASM Best Practices

  • Automate Discovery: Use advanced External Attack Surface Management tools like Cyble Vision to automate the identification of external assets, reducing manual effort.
  • Regularly Update Inventory: Keep an up-to-date inventory of all external-facing assets to ensure no blind spots.
  • Implement Zero Trust Principles: Adopt a zero-trust approach to reduce reliance on perimeter defenses and focus on verifying every interaction.
  • Monitor Third-Party Risks: Extend EASM practices to include vendors and partners to mitigate risks from the supply chain.
  • Integrate with Security Ecosystem: Ensure that your attack surface management product integrates seamlessly with existing tools for streamlined operations.

External Attack Surface Management Tools

Several tools are available to simplify EASM implementation. These tools use automation, artificial intelligence, and machine learning to provide actionable insights. Leading EASM tools often include features like:

  • Automated discovery of digital assets.
  • Risk prioritization and remediation recommendations.
  • Integration with broader cybersecurity ecosystems.
  • Continuous monitoring and alerting.

Popular tools and platforms include, Cyble Microsoft Defender External Attack Surface Management, Palo Alto Networks Cortex Xpanse etc. 

Choosing the Right EASM Solution

When selecting an attack surface management solution, consider the following:

  • Ease of Use: Choose a tool that simplifies the process of asset discovery and monitoring.
  • Scalability: Ensure the solution can grow with your organization’s needs.
  • Integration: The solution should work well with existing security tools, such as those for vulnerability management and incident response.
  • Customization: Look for tools that allow you to tailor dashboards, reports, and alerts to your requirements.

The Role of EASM in Supply Chain Risk Management

Supply chains introduce unique cybersecurity challenges. Vendors, contractors, and other third parties can inadvertently expand your attack surface. By leveraging EASM, organizations can:

  • Monitor third-party digital assets for vulnerabilities.
  • Ensure compliance with cybersecurity standards.
  • Reduce risks associated with shadow IT and unauthorized access.

Conclusion

Your organization’s cybersecurity future hinges on its ability to adapt to an ever-changing digital environment. Embracing External Attack Surface Management is not just a security measure—it’s a competitive advantage. By leveraging the right tools, adopting EASM best practices, and partnering with experts, you can turn your digital vulnerabilities into opportunities for protection.

The journey starts now—how prepared are you?

The post What is External Attack Surface Management appeared first on Information Security Newspaper | Hacking News.

]]>
Implementing Encryption: Essential Techniques for Secure Software https://www.securitynewspaper.com/2024/04/29/implementing-encryption-essential-techniques-for-secure-software/ Mon, 29 Apr 2024 22:13:02 +0000 https://www.securitynewspaper.com/?p=27454 Security is very important in software systems in this era of digital. Today, it is not just possible to have data breaches or cyber attacks; they must occur if someoneRead More →

The post Implementing Encryption: Essential Techniques for Secure Software appeared first on Information Security Newspaper | Hacking News.

]]>
Security is very important in software systems in this era of digital. Today, it is not just possible to have data breaches or cyber attacks; they must occur if someone does not take precautions. Encryption is one of the key defense mechanisms that protects data from being accessed by unauthorized personnel. However, what makes encryption important and how can it be properly put in place by software designers? Using encryption effectively could determine whether a security is tight enough or susceptible enough to attack. This goes to imply that the implementation should be based on the nature of data and information and not just any other encryption.

Understanding Encryption Basics

Encryption refers to the changing of information into a code that cannot be understood so that the real meaning is concealed. Encryption mainly aims at ensuring the safety of electronic records when in storage or during transmission via the internet or alternative means. Symmetric encryption and asymmetric encryption are the two simplest encryption techniques. They include using one key for both coding and decoding data in symmetric encryption and using two keys which are a public and private key in asymmetric encryption respectively. These basic procedures are very important because through them communication channels can be made safe and your information can be kept in a secure way even if it is moving from one place to another.

Key Encryption Techniques for Software Security

The use of strong encryption methods is important to software engineers in order to secure private data. The following are a few of the basic approaches:

  • Secure Protocols Utilization: It is important that one always opts for secure means of transmitting sensitive information such as TLS or other better protocols.
  • Data-at-Rest Protection: Use encryption techniques such as AES to protect data that is kept in storage medium. By doing this, if an encryption key is required, it would mean that data thieves cannot just decrypt the data without having the encryption key first.
  • Regular Key Management: Managing keys is very important. Ensure that you change and replace encryption keys systematically to reduce the chances of it being seen.

For instance, turnkey sports solution by Altenar provides all the software and player account management tools that a sports betting operator needs, ensuring that both in-transit and at-rest data are adequately protected through robust encryption methodologies.

Implementing Encryption in Software Development

Careful planning and execution are necessary when integrating encryption into software development. The following are a few important measures:

  • Make a Choice on the Appropriate Encryption Form: For this reason, you should make a choice whether to use symmetric encryption or asymmetric one depending on the nature of the data and its utilization.
  • Include Encryption Libraries: Utilize complex encryption algorithms that are taken from reliable sources and are available through well-maintained libraries.
  • Guarantee Conformity: Understand and follow rules like GDPR, HIPAA, or PCI DSS concerning data encryption protocols.

Best Practices for Encryption

To maximize the effectiveness of encryption strategies, developers should adhere to the following best practices:

  • Avoid Hard-Coding Keys: Never hard-code encryption keys directly into the application’s source code. Instead, use secure vaults or services designed for key management. Storing keys in a secure, centralized location helps mitigate the risk of unauthorized access and makes it easier to manage keys over their lifecycle.
  • Use Salting and Hashing for Passwords: To enhance the security of stored passwords, use techniques such as salting and hashing. This approach not only secures passwords but also ensures that each instance of the same password is uniquely encrypted, thereby thwarting common attacks like rainbow table attacks.
  • Educate Your Team: Ensure that all team members are knowledgeable about the principles of encryption and the importance of security. Regular training sessions and updates on the latest security practices and threats can empower developers to take proactive steps in securing applications.

Advanced Encryption Strategies

For those looking to enhance their encryption efforts, considering more advanced strategies is beneficial:

  • Implementing Layered Security: Use multiple layers of encryption to protect different aspects of your application. This approach, often referred to as defense in depth, ensures that even if one layer is compromised, additional layers of security protect the underlying data.
  • Zero Trust Architectures: Adopt a zero-trust model that assumes breach and verifies each request as though it originates from an open network. This methodology minimizes the risk of insider threats and reduces the attack surface of applications.
  • Utilize Blockchain Technology: For applications needing decentralized security, blockchain technology offers an immutable, encrypted ledger that is hard to tamper with. This technology is particularly beneficial in scenarios where data integrity and transparency are crucial, such as in supply chain management or financial transactions.

Conclusion: Securing the Future

Encryption goes beyond being just a technical necessity; it plays a very big role towards confidence in electronic communication. By using appropriate encryption approaches, programmers can safeguard confidential information, and develop secure as well as trusted software. Has encryption become the cornerstone of digital security? Absolutely, and as technology evolves, so too must our strategies for protecting it. What will the future of encryption look like? It promises even greater integration into everyday technology, continuously improving to stay ahead of potential threats. In prospect, development and implementation of advanced encryption standards will play a pivotal role in fighting the continuously changing cyber menace, thus encryption becoming stronger and easily deployable across different platforms and sectors of the economy.

The post Implementing Encryption: Essential Techniques for Secure Software appeared first on Information Security Newspaper | Hacking News.

]]>
Online Payment Fraud: The Silent Adversary in the Digital Transaction Realm https://www.securitynewspaper.com/2024/02/02/online-payment-fraud-the-silent-adversary-in-the-digital-transaction-realm/ Fri, 02 Feb 2024 16:40:11 +0000 https://www.securitynewspaper.com/?p=27395 In the dynamic world of digital transactions, where convenience meets technology, there exists a silent adversary – online payment fraud. This digital menace poses a significant threat to the sanctityRead More →

The post Online Payment Fraud: The Silent Adversary in the Digital Transaction Realm appeared first on Information Security Newspaper | Hacking News.

]]>

In the dynamic world of digital transactions, where convenience meets technology, there exists a silent adversary – online payment fraud. This digital menace poses a significant threat to the sanctity of online commerce, challenging the security of personal financial information and undermining the trust in digital payment systems. In this landscape, understanding the nature of online payment fraud, its implications, and the strategies for its prevention, is crucial for businesses and consumers alike.

Unraveling Online Payment Fraud

Online payment fraud involves illegal or unauthorized transactions made over the internet. It encompasses a variety of tactics used by fraudsters to deceive individuals or businesses, steal financial information, or disrupt transaction processes. This form of fraud can occur across various platforms, including e-commerce websites, online banking portals, and mobile payment applications.

More information: https://nethone.com/blog/what-is-online-payment-fraud-and-how-to-prevent-it

The Many Faces of Online Payment Fraud

  • Card-Not-Present (CNP) Fraud: This occurs when stolen card information is used to make purchases online or over the phone.
  • Identity Theft: Fraudsters use stolen personal information to carry out transactions or open new accounts in the victim’s name.
  • Phishing Scams: These involve tricking individuals into revealing their financial details through deceptive emails or websites.
  • Account Takeover: This happens when a fraudster gains access to a user’s payment account, changing login details and making unauthorized transactions.
  • Merchant and Affiliate Fraud: Unscrupulous merchants or affiliates might engage in fraudulent activities, such as charging for goods never delivered.

The Ripple Effect: Implications of Online Payment Fraud

  • Financial Losses: Victims, both individuals and businesses, can suffer significant financial losses due to fraudulent transactions.
  • Reputational Damage: For businesses, frequent instances of fraud can lead to a loss of customer trust and damage to their brand reputation.
  • Operational Disruption: Addressing fraud can be resource-intensive, diverting attention from core business activities.
  • Legal and Compliance Issues: Failure to protect customer data can result in legal consequences and non-compliance fines.

Building a Fortress: Strategies Against Online Payment Fraud

  • Robust Authentication Processes: Implementing multi-factor authentication can significantly reduce the risk of unauthorized access.
  • Advanced Fraud Detection Systems: Utilizing AI and machine learning-based systems to monitor and flag suspicious transaction activities.
  • Consumer Education: Informing customers about safe online payment practices and how to recognize fraudulent schemes.
  • Encryption and Secure Payment Gateways: Ensuring that all transaction data is encrypted and secure from interception.
  • Regular Security Audits: Conducting periodic assessments of security protocols to identify and address vulnerabilities.

Charting a Safer Path Forward

In conclusion, as the digital economy continues to grow, the challenge of online payment fraud becomes increasingly complex. Combating this threat requires a multifaceted approach that combines advanced technology, vigilant monitoring, and informed consumers. The future of safe and secure online transactions depends on our collective ability to stay a step ahead of fraudsters, safeguarding the integrity of digital commerce and maintaining the trust of its participants.

The post Online Payment Fraud: The Silent Adversary in the Digital Transaction Realm appeared first on Information Security Newspaper | Hacking News.

]]>
Stellar Cyber: A Year in Review https://www.securitynewspaper.com/2024/01/15/stellar-cyber-a-year-in-review/ Mon, 15 Jan 2024 14:55:38 +0000 https://www.securitynewspaper.com/?p=27377 Stepping into 2024, Open XDR innovator Stellar Cyber is reflecting on 2023. Stellar Cyber’s CEO and Co-Founder, Changming Liu, writes: “Going into 2023, we had four clear objectives:  Let’s breakRead More →

The post Stellar Cyber: A Year in Review appeared first on Information Security Newspaper | Hacking News.

]]>

Stepping into 2024, Open XDR innovator Stellar Cyber is reflecting on 2023.

Stellar Cyber’s CEO and Co-Founder, Changming Liu, writes:

“Going into 2023, we had four clear objectives: 

  1. Deliver an exceptional customer experience from day one.
  2. Strive for continuous product innovation. 
  3. Expand our “routes-to-market” worldwide.
  4. Champion the value and power of Open XDR.”

Let’s break down these four objectives with the company’s results in 2023. How did they do, and what are their plans for 2024?

#1 Exceptional Customer Service

Stellar Cyber licenses its platform to a large portfolio of Managed Security Service Providers. According to Changming Liu, “relentless pursuit of customer excellence directly led to doubling our top 250 MSSP customer base, now up to nearly 50.”

MSSPs have recognized their impact. In the 2023s survey, they rated Stellar Cyber as one of the top three Open XDR vendors.

Beyond licensing, Stellar Cyber provides necessary education and resources for vendors and users.

The company launched two new programs in 2023:

  1. The interSTELLAR program for partners
  2. The University program for universities, students, and underserved communities

The role of the InterSTELLAR program is to offer the partners sales support, materials, and access to experts.

The purpose of the University program is to train the cyber professionals of tomorrow. At the same time, this program helps communities that lack the resources to protect themselves against a growing number of cyber attacks.

Improved Experience for Users

The company introduced a new feature — Stellar Cyber Chat- to further facilitate the use of their intuitive platform.

This is the company’s first GenAI feature. It helps the users to get answers to their questions faster.

The company is just starting its development in this area and plans to dedicate more time to GenerativeAI in the future.

#2 Continuous Innovation

Stellar Cyber has been developing its Open XDR solution since 2015. Starting, their main goal was to provide security teams with a less complex way of analyzing the overwhelming volume of security data.

Today, their Open XDR platform achieves this. It relies on AI and machine learning to integrate, analyze, and correlate the insights from multiple security tools.

Every year, they improve their Open XDR solution to provide businesses of all sizes with more thoughtful and accurate findings.

The year 2023 was the year of innovation for Stellar Cyber.

For security teams that use the insights from the company’s extended detection and response platform, this means that they can rely on the product that is faster and better at responding to threats.

Role of Partnerships in Innovation

To truly evolve and innovate, they also recognized that they needed to partner up. In 2023, they announced multiple collaborations.

Some of the cybersecurity companies that teamed up with Stellar Cyber are Blackberry, SentileOne, Oracle, and Hitachi.

#3 Expanding Global RTM

One of the set objectives for the company was to widen its route to market all over the globe.

After one year, Stellar Cyber can say that it has important global clients. 

Some of them are from Thailand (Vintcom), Malaysia (PROVINTELL), and the Philippines (NEXTGEN Group, NTT Data Solutions).

#4 Spreading the Word

In 2023, Gartner listed Stellar Cyber as one of the top 10 vendors that offer Open XDR solutions in the cybersecurity market.

Gartner included it in their 2023 Market Guide for XDR, where their services are represented among some of the top cybersecurity vendors.

“Additionally, our company was recognized by Gartner in several other reports (Hype Cycle for XDR solutions for midsized companies, NDR Voice of Customer, SecOps Vendor Hype Cycle,” adds Changming Liu.

Another route the company took to show more people the value and capabilities of its cybersecurity solution is through education.

With recent programs, Stellar Cyber introduces its platform to future cybersecurity experts as well. For example, they launched a University Program that helps future security professionals and underserved universities.

Normally, they wouldn’t have the funds to give their students real-life experiences in cyber security. This program gives them access to Open XDR technology, and it connects them with cyber experts in the field.

As a result, even future security professionals can see the value of Stellar Cyber’s platform. 

The Role of Open XDR in the Future

Going into 2024, businesses are acutely aware of increasing hacking threats. Over the last couple of years, they kept reading about more and more data breaches, and ransomware cases. 

The record-breaking cost of data breaches and ransomware was recorded in 2023. This made it more clear that businesses needed solutions such as Open XDR. They help them detect critical threats within the unique content of their infrastructure.

As hackers change their tactics and target companies of all sizes, it’s important to have a security platform built to keep you one step ahead of ever-evolving cyber threats.

Organizations are aware that they need actionable and accurate insights to protect their architecture constantly.

Open XDR has a key role in this. It’s built to prevent overloading teams with alerts and offers insights that help them focus on critical threats instead.

Stellar Cyber’s Objectives for 2024

Stellar has a busy year ahead. The company plans to continue to look for new and innovative ways to deliver its Open XDR platform to MSSPs and enterprise clients. 

Then, they intend to further improve their security product and streamline how data sources are integrated.

In addition, they will improve AI and machine learning-powered correlation and detection of possible threats for even more accurate insights — to minimize false positives.

In 2024, this cybersecurity company will hone automation that continually responds to high-risk exploits.

Similar to 2023, their objectives are aligned to make a detection and response solution as accurate as possible.

The post Stellar Cyber: A Year in Review appeared first on Information Security Newspaper | Hacking News.

]]>
Stellar Cyber Launches Field-Proven University Program, Provides SOC Services to Underserved Communities https://www.securitynewspaper.com/2023/12/03/stellar-cyber-launches-field-proven-university-program-provides-soc-services-to-underserved-communities/ Sun, 03 Dec 2023 15:19:44 +0000 https://www.securitynewspaper.com/?p=27351 Cybersecurity is the industry of the future. If we only consider the financial damage of security incidents, the data shows that the cost of cybercrime is expected to double byRead More →

The post Stellar Cyber Launches Field-Proven University Program, Provides SOC Services to Underserved Communities appeared first on Information Security Newspaper | Hacking News.

]]>
Cybersecurity is the industry of the future.

If we only consider the financial damage of security incidents, the data shows that the cost of cybercrime is expected to double by 2027.

In 2023, the global cost of cybercrime worldwide is estimated at $11.50 trillion. In four years, the projected financial damage will likely total $23.82 trillion USD.

The technology security professionals use constantly changes. It evolves to keep up with emerging cyber exploits. And a large number of hacking threats.

The systems that businesses rely on change as well — increasing already large attack surfaces.

To protect their assets, companies need security experts who have the right skills to reduce the chance of a costly attack.

Most universities don’t have the time or funding to teach these skills to their students. For future cybersecurity professionals, this means that it takes longer than it should to get that first job out of college.

Open XDR innovator Stellar Cyber has launched the first program that helps students get hands-on cybersecurity experience.

How does the Stellar Cyber University Partnership Program help universities, students, and disadvantaged communities?

Helping Universities Free of Cost

“Stellar Cyber is proud to offer this comprehensive, collaborative education program free of charge for those training our cyber warriors of the future,” said Jim O’Hara, Chief Revenue Officer at Stellar Cyber.

When Stellar Cyber collaborates with a university on their new program, they offer:

  • Access to technology, i.e. their Open XDR platform
  • Instructor-led training for the use of the platform
  • Mentorship through their network of cybersecurity professionals and partners

Stellar Cyber has been developing its Open XDR (Extended Detection and Response) platform for almost a decade.

Combining the functionality of several key cybersecurity solutions (including SIEM, TIP, IDS, NDR, and UEBA), the platform offers united security in one place.

Using machine learning and AI, it analyzes and correlates large volumes of data arriving from once-disconnected security tools.

Enrolled students use Stellar Cyber’s Open XDR in the university lab to seek threats and react to them before they escalate.

The platform is intuitive and created to facilitate security analysis for smaller businesses, but the instructions help students optimize this security solution.

Stellar Cyber also offers ready-made instruction-led training. Because it’s too costly for universities to alter their curriculum as often as they should.

As students use the platform and learn more about it, they also have access to coaching and experienced mentors who have a long history of working in the industry.

Preparing Students for Careers in Cybersecurity

After they obtain a degree, students often aren’t sure:

  • Whether cybersecurity is the right career path for them
  • What kind of opportunities do they have in this growing industry
  • How to breach the gap between theoretical knowledge and practical skills

The program provides the students with insight into one aspect of cybersecurity, giving them a glimpse into the role of the security expert.

They’ll use the Open XDR platform to detect threats, investigate possible high-risk incidents, and respond with suitable measures.

During training and threat hunting, they get the skills that companies actively hiring security experts today genuinely need. With it, the program is bridging the gap between theory and practical skills common for new graduates.

“We are honored to do our part to help shrink the worldwide cybersecurity skills gap and provide security services to communities in need. It’s our objective to scale as broadly as possible and to assist universities as they prepare their graduates to enter the cybersecurity workforce.”

Besides technology, training, and mentorship, Stellar Cyber also offers a certificate. Stellar Cyber Certification Program is another way to separate themselves as job candidates once they complete their degree in cybersecurity.

Offering Enrolled Students Job Opportunities

The students who complete the program will be known as reliable future professionals who have the right skills and the practice to show for it.

Stellar Cyber has built a large network of partners and customers who need security professionals who are well-versed in the Open XDR platform.

“All too often, students graduate from college without being exposed to the fantastic career opportunities in the cybersecurity industry,” said Paul Levasseur, Vice President of Customer and Partner Enablement at Stellar Cyber.

Students who participate in the program will not only have a better understanding of what a security role entails and what kind of roles are available. 

They’ll also be linked with direct opportunities.

Having access to Stellar Cyber’s private LinkedIn group, they’ll be the first ones to know about the internship and hiring opportunities within the Stellar Cyber community.

Protecting Underserved Communities

The impact of this program goes beyond the universities and even after a grad career. Students get hands-on experience in the field by helping underserved communities that lack the technology that can safeguard them against evolving cybersecurity incidents. In most cases, such communities don’t have the resources to hire their own security operations team to manage their security.

The program changes that by protecting communities in need with the latest cybersecurity technology.

“Attackers look for targets that cannot easily defend themselves,” Levasseur added. “Our hope is to ensure that these previously underserved communities get the protection they deserve.”

How Can Universities Apply for the Program?

The partnership program is an invite-only opportunity, and it’s the first of its kind. Universities that do quality for it have to:

  • Provide the students with a certificate or a degree in cybersecurity
  • Utilize the Open XDR platform in their educational labs
  • Allow Stellar Cyber to use their details for promotion purposes
  • Agree to provide underserved organizations with security operations free of cost

Also, this is a great way to stand out as a university. That is, become an institution that provides the students with real-life experiences and programs that help them build foundations for a career in cybersecurity at the university.

The post Stellar Cyber Launches Field-Proven University Program, Provides SOC Services to Underserved Communities appeared first on Information Security Newspaper | Hacking News.

]]>
Crypto prices https://www.securitynewspaper.com/2023/10/10/crypto-prices/ Tue, 10 Oct 2023 15:04:52 +0000 https://www.securitynewspaper.com/?p=27295 The Greek philosopher Heraclitus is known for asserting that “change is the only constant in life.” In regards to cryptocurrency prices, this is the case to a great degree sinceRead More →

The post Crypto prices appeared first on Information Security Newspaper | Hacking News.

]]>
The Greek philosopher Heraclitus is known for asserting that “change is the only constant in life.” In regards to cryptocurrency prices, this is the case to a great degree since the thing that is most predictable about them is that they rise and fall quite significantly. Even within a single day, the price of a given cryptocurrency can rise and fall by several percentage points. 

Considering the different types of cryptocurrency available on the market, you may be wondering which one you should purchase. A clear overview of the current prices and trends comes in really handy when you are considering options of the best cryptocurrency to buy today, and whether you want to invest, trade, or manage it in some other way. 

Making an informed, safe, reliable, and secure decision is advisable when it comes to both finances and digital ventures. With crypto being between these two worlds, it is of utmost importance that you don’t fall prey to the many scams, and fraud that can target these markets.

How falling crypto prices affected cybercrime

A recent article details how cryptocurrency users are becoming victims of address poisoning attacks. On the sunnier side of the street though, there has been a positive trend about cybercrime – financial scams and ransomware payouts have actually decreased in 2022. Some experts hypothetically correlate the lowered crime to declining crypto prices.

Cryptocurrencies have decreased significantly in value since the previous two years. During the same time period, the expenses associated with certain types of cybercrime have also gone down. Could there be a strong link between the two?

Crypto prices lower and cyber crime declines

In the past months, crypto prices have been on a downward trend. One of the contributing factors to this decrease in value is the strength of the US dollar. This year has demonstrated an ongoing negative correlation between the US dollar and cryptocurrency. So, in short, the recent past has witnessed the US dollar going up in value, the value of cryptocurrency decreasing and cybercrime is considered declining. 

Hackers typically use dark web exchanges when they are committing cyber crimes because they don’t have to input a user identity and they can safely remain anonymous. Dark web exchanges are usually used to exchange crypto from one service to another at higher fees than the previous transaction, and not for storing the currency. 

The decreasing cryptocurrency prices are making dark web exchanges less common since they in turn lowered the purchasing power of groups who had been using cryptocurrency to support illegal transactions.

Stay safe and secure steering clear of scams

Even though there has been a decrease in some types of cyber crimes due in part to the drop in crypto prices, it is still of utmost importance to be cautious of any financial or digital venture you enter. These days, there are many types of malware, phishing, cyber attacks, and scams, and it is wise to keep an eye out and remain watchful. The official website of the United States government, the United States Secret Service, speaks about combating the illicit use of digital assets. 

Some red flags for crypto scams include excessive margins, loan offers, or matching funds. Offers that seem too good to be true most likely are. Luckily, there are some ways to recover funds from cryptocurrency scams, but the best way to go is to prevent them as much as possible. Some steps you can take to protect yourself are separating your bank accounts from crypto accounts, not responding to unknown users, doing thorough research before any business undertaking, and taking care not to click links that seem suspicious.

The post Crypto prices appeared first on Information Security Newspaper | Hacking News.

]]>
3 common VPN myths debunked https://www.securitynewspaper.com/2019/09/20/3-common-vpn-myths-debunked/ Fri, 20 Sep 2019 09:58:07 +0000 https://www.securitynewspaper.com/?p=16973 A VPN is a complex technology with a lot of myths surrounding it. So, let’s take a closer look. MYTH # 1: a VPN slows down your Internet connection speedRead More →

The post 3 common VPN myths debunked appeared first on Information Security Newspaper | Hacking News.

]]>

A VPN is a complex technology with a lot of myths surrounding it. So, let’s take a closer look.

MYTH # 1: a VPN slows down your Internet connection speed

Some VPN users say that their connection speed becomes slower as far as a VPN is turned on. The fact is that using a VPN can be a reason for an insignificant speed drop. The first thing to understand is the speed is affected by the server location. The further the server is, the lower is the speed.

Moreover, your connection speed is affected by the chosen protocol. For example, L2TP and OpenVPN is not the best solution for those who intend to view video streaming content but guarantee the highest security level. If you like Netflix serials or enjoy torrenting, a VPN with SmartDNS will be the real deal.

MYTH #2: a VPN allows you to do whatever you want on the Internet

Some users naively believe that a good VPN can guarantee their 100% anonymity, so nobody can identify their personality. In very deed, even if most providers claim that they don’t keep logs, this cannot be true. Otherwise, how do they provide technical support or send you the latest offers?

Virtual private networks provide a high level of privacy and anonymity on the Internet. This means that all your connections are almost impossible to detect, extremely difficult to intercept and decrypt that make them unacceptable both to hackers and censorship. Although let along with VPNs, there are other ways to hide IP addresses.

MYTH #3: VPNs are only for advanced users

Some PC users still believe that VPNs are difficult to install and configure. That said, while in the past it was not an easy task to set up a VPN, these days it is easy-peasy. The fact is most VPNs do not require any user interaction (besides choosing a location and protocol). Moreover, almost all of them have applications for installing on a smartphone in a matter of minutes. 

There are many more common VPN myths floating across internet on different social media platforms, like Only paranoid people use a VPN, I don’t need a VPN because I don’t do anything illegal, I become 100% anonymous when I use a VPN and others.

The post 3 common VPN myths debunked appeared first on Information Security Newspaper | Hacking News.

]]>