You are viewing 'Intelligence'
Solutionary blogs about intelligence.
Key points: decline in attacks, challenges in securing the retail industry, and an apparent increase in nation state-sponsored cyberattacks
During Q4 ’16, NTT Security researchers observed a noticeable shift in the types of attacks from previous quarters – particularly exhibited by a much narrower scope of attack vectors. Several vulnerabilities such as Oracle Server Backup in the retail industry and Linux password files in the finance industry were specifically targeted – likely indicative of criminals identifying specific flaws and crafting attacks to fit, a sign of more sophisticated and directed efforts.
This shift was also evident in an overall 35 percent decrease in total security-related events across client networks from Q3 ’16 to Q4 ’16, including continued declines of 25 percent in... read more >
How many times have you heard a new technology or startup described as “innovative and revolutionizing,” “value added solution,” “disrupting industry,” or “making the world a better place”? Personally, I’ve heard these descriptions too many times to count. There are not many technologies that I can think back on and say “yep, they were right!” The advancement and application of big data, however, is definitely at the top of my list.
Big data analytics is an old “new” way of analyzing data. The concepts predate existing technologies, with probabilistic and statistical math. In the last few years, however, the technology has improved, making big data analytics simpler and more accessible. This old “new” way has recently become its own field of expertise and has revolutionized several industries.Big data in the news
Investment banks now have people they lovingly... read more >
12 Steps for creating a safe IoT environment
It’s hard to not find ourselves in possession of one of the so many newly available gadgets, technologies and appliances intended to improve our life experience. Most, if not all, of these new gadgets fall within the classification of “Internet of Things” (IoT), a rather nondescript categorization of devices that use Internet connectivity for a variety of purposes, ranging from entertainment to home automation to enhancing communications. The uncertainty of how to safely introduce these new things into our homes can be a little disconcerting.
Fear not! This blog provides a few basic steps allowing you to create a safe IoT environment in your home to connect those new gadgets and use them safely and in rapid fashion.
Let’s get the precautionary considerations addressed straightaway. First, security standards for IoT devices are evolving.... read more >
Another Backdoor in a Security Device
Solutionary recently posted a blog discussing the discovery of a backdoor vulnerability in Juniper Networks’ ScreenOS. Here we are, less than a month later, notifying you of yet another backdoor vulnerability. This time, the backdoor is in Fortinet’s FortiGate devices.
Although a single research entity discovered this vulnerability on January 9, it was not until just a few hours ago that the news hit social media. Researchers from both Twitter and Reddit conducted real-time testing of the vulnerability, confirming that the exploit actually works.
This backdoor vulnerability is written in the Python programming language, and... read more >
On December 17, Juniper Networks published an out-of-cycle security announcement regarding a severe vulnerability their own security researchers had discovered in ScreenOS. These vulnerabilities affect any products and platforms running ScreenOS 6.2.0r15 through 6.2.0r18 and 6.3.0r12 through 6.3.0r20, covered under CVE-2015-7755.
Security researchers discovered the vulnerability during an internal code review and identified two specific issues. The first could allow unauthorized remote administrative access to an affected NetScreen firewall via Telnet or SSH, possibly leading to compromise of the affected system. The second issue, per the Juniper Networks... read more >