Connect with us

Cyber Security

Trellix Study Claims 53% of UAE Cybersecurity Professionals Are Fighting a Losing Battle Against Cybercriminals

Published

on

The majority of UAE-based cybersecurity professionals are feeling overwhelmed by the rapid escalation of cyber threats despite increased commitments from senior management and access to bigger budgets. This was one of the key findings in a global study commissioned by Trellix, the cybersecurity company at the forefront of extended detection and response (XDR).

The study polled 9,000 cybersecurity professionals across 15 countries, including the UAE, in organizations with 500 or more employees. Some 70% of UAE respondents said their organization’s cybersecurity investments had increased in the past 12 months and two-thirds (67%) reported regular meetings on cybersecurity and compliance with senior executives. But most (56%) also admitted that threats evolve so rapidly they still struggle to keep up.

There was widespread acknowledgment among UAE respondents of the need for change. Some 57% said their current security model needed to be updated to successfully predict, detect, and respond to attacks as they happened. Among those expressing such concerns, 13% described the necessary updates as “major”.

Amid these capability gaps, 53% of UAE cybersecurity specialists say they are “fighting a losing battle against cybercriminals”. Beyond taking a toll on the cybersecurity professionals — 54% of respondents cited being held back by the limitations of their cybersecurity infrastructure as one of their biggest work frustrations — this gap in cybersecurity is impacting UAE organizations’ bottom lines, with 80% of respondents acknowledging that their organization lost up to 10% of revenue in the previous year because of security breaches.

According to the findings, 60% of UAE SecOps teams are hampered by the patchwork of security solutions that have few, if any, integration options. Only one in nine (11%) have managed to eliminate silos and little more than a fifth (22%) are working towards this end. Some 59% are working with more than 10 separate security solutions and 60% decried the lack of efficiency this causes. To make matters worse, one-third (67%) of organizations have no plans to rid themselves of silos.

“Siloed security systems hand easy victories to threat actors and make life harder for SecOps teams everywhere,” said Vibin Shaju, General Manager, UAE at Trellix. “And yet many businesses seem prepared to accept siloed security rather than updating their security architecture to connect the dots and enable adaptive security. Nothing changes if nothing changes. Organizations that do not move purposefully towards a more integrated security model are painting a target on their back as an open invitation to cybercriminals.”

In the UAE, 69% of cybersecurity professionals reported dealing with up to 50 cybersecurity incidents per day and 42% characterize their daily routine as being “inundated by a never-ending stream of cyberattacks”. Respondents are plagued by blind spots within their infrastructure, with 27% citing such visibility gaps. Moreover, just over a third (36%) say their security ecosystem does meet their current needs but expressed concerns about their future capabilities if they continue to use the same security suite.

Against this backdrop, one technology that has come to the fore is Extended Detection & Response (XDR). In particular, an open, cloud-native XDR architecture that constantly learns from and adapts to the ever-changing threat landscape, can help organizations eliminate silos and identify threats before they can do harm. More than a fifth (22%) of UAE respondents said they had already implemented XDR, with an additional 41% saying they were exploring the technology for likely implementation in the next 12 to 18 months.

Among XDR implementors in the UAE, 78% ranked the ability to automate processes and prioritize critical concerns among the most important benefits of the technology. Not only was this the top priority for UAE organizations, but the proportion of respondents that cited it was significantly higher than the global average, suggesting that automation and alert triage are of specific interest to UAE enterprises — an understandable finding given the region’s extant cybersecurity skills gaps.

Among other important factors that compelled UAE companies to implement XDR was its capability to detect threats in real-time (76%), and the ability to deliver operational efficiency by freeing human analysts to pursue higher-value cyber work (37%). A quarter of UAE XDR implementors were drawn to the technology by its capability to learn from incidents and adapt to threats; and 38% were impressed by the reduction in response times. Some 46% said that because of the benefits they had witnessed, they were likely to recommend that their organization allocate budgets this year to advanced programs that include XDR.

“This research reveals how unsustainable the situation is for cybersecurity professionals today,” said Aparna Rayasam, chief product officer, Trellix. “Instead of relying on traditional siloed solutions that add complexity, businesses can reshape SecOps with a flexible, intelligent security architecture that consolidates security tools, so teams can work smarter and quickly remediate threats.”

Cyber Security

FortiGuard Labs Contributes to INTERPOL Multinational Cybercrime Suppression Operation in Africa

Published

on

Sharing threat intelligence and working with other threat intelligence organizations improves protections for customers and enhances the effectiveness of the entire cybersecurity industry.

Recently, FortiGuard Labs provided evidentiary support to INTERPOL and African Member countries as part of the Africa Cyber Surge Operation (ASCO) to help detect, investigate, and disrupt cybercrime through coordinated law enforcement activities, utilizing INTERPOL platforms, tools, and channels in close cooperation with AFRIPOL.

The ACSO is a multinational cybercrime suppression operation focused on identifying cybercriminals and compromised infrastructure in the African region. The INTERPOL Cybercrime Directorate and INTERPOL Support Program for the African Union (ISPA) collaborated with AFRIPOL and 27 INTERPOL member countries to leverage this intelligence and combat the growing threat of cybercrime across the continent.

The successful Cyber Surge operation and transfer of knowledge to multiple law enforcement agencies in the African region is the result of continued threat information sharing and trusted cooperation between INTERPOL, FortiGuard Labs, and other INTERPOL private partners.

FortiGuard Labs provided actionable threat intelligence over a six-month period, which consisted of botnet, command, and control (C2), and malware infrastructure research, including C2 and malware and botnet victims located within the African continent.

“The Africa Cyber Surge Operation, launched in July 2022, has brought together law enforcement officials from 27 countries, working together for almost four months on actionable intelligence provided by INTERPOL private partners,” Craig Jones, Director of the Cybercrime Directorate with INTERPOL comments. “This intelligence focused on opportunities to prevent, detect, investigate and disrupt cybercrime through coordinated LE activities utilizing INTERPOL platforms, tools, and channels. This operation focused both on cybercriminals and compromised network infrastructure in Africa, allowing member countries to identify more than 1,000 malicious IP addresses, dark web markets, and individual threat actors, enhancing cooperation between INTERPOL, AFRIPOL, and the member countries, and contributing to connecting policing for a safer world.”

“The Africa Cyber Surge Operation is a shining example of how shared threat intelligence on threat actors and joint operations across trusted partners can increase the cyber resilience of an entire region,” highlights Derek Manky, Chief Security Strategist & VP Global Threat Intelligence, FortiGuard Labs. “It also shows how valuable cybersecurity training and education is to help close the cyber skills gap and effectively disrupt cybercrime at scale. We will continue to work with our private and public sector partners such as INTERPOL around the world to help make our digital world a safer place.”

For more than a decade, FortiGuard Labs has helped inform and protect customers, partners, and governments around the world. As a leader in the threat intelligence community, its mission is to provide the best threat intelligence designed to protect customers from malicious activity and sophisticated cyberattacks. The team is composed of some of the most knowledgeable threat hunters, researchers, analysts, engineers, and data scientists in the industry, working in dedicated threat research labs all around the world.

Fortinet has been an active member of the Global Cybercrime Expert Group and trusted partner to INTERPOL dating back to 2015 and became an INTERPOL Gateway partner in 2018. This ongoing collaboration has resulted in greater threat intelligence standards and protocols across the industry as well as impactful global cybercriminal takedowns.

In addition to INTERPOL, FortiGuard Labs is committed to partnership and cooperation with global law enforcement, government organizations, and industry organizations. Some of the global partnerships include being a founding member and regular contributor of the World Economic Forum’s (WEF) Centre for Cybersecurity as part of its Partnership Against Cybercrime (PAC), serving as a long-standing member of the NATO Industry Cyber Partnership (NICP), contributing to the development of STIX/TAXII protocols with MITRE & OASIS​, being an official Research Partner with MITRE Engenuity’s Center for Threat-Informed Defense (Center), co-founding the Cyber Threat Alliance (CTA), working in partnership with the computer incident response organization FIRST, and more.

Continue Reading

Cyber Security

Lookout Threat Lab Discovers Predatory Loan Apps on Google Play and Apple App Store

Published

on

Lookout, Inc. has announced the discovery of nearly 300 loan apps that exhibit predatory behavior such as exfiltrating excessive user data from mobile devices and harassing borrowers for repayment. These apps, which were found in Africa and Southeast Asia, as well as India, Colombia, and Mexico, purportedly offer quick, fully-digital loan approvals with reasonable loan terms. In reality, they exploit victims’ desire for quick cash in an attempt to ensnare borrowers into predatory loan contracts and require them to grant access to sensitive information on their devices such as contacts, phone history, and SMS messages — information that would not be required in a valid loan application process.

In addition to predatory requests for excessive permissions, many of the loan operators display scam-like actions. Victims have reported that their loans came with hidden fees, high-interest rates, and repayment terms that were much less favorable than what was posted on the app stores. Lookout Threat Lab also found evidence that the data exfiltrated from devices were sometimes used to pressure the customer for repayment – a common threat tactic to disclose a borrower’s debt or other personal information to their network of contacts.

In total, Lookout researchers uncovered 251 Android apps on the Google Play Store with more than 15 million collective downloads. The team also identified 35 apps on the Apple App Store that were in the top 100 finance apps in their regional stores. Lookout has been in contact with Google and Apple about these apps and, at the time of publishing, none of them are available for download.

“Mobile apps have made managing our lives a lot easier and are a convenient way to interact with businesses such as financial institutions. However, when entrusting any app with sensitive personal information, it is extremely important to stop and ask yourself if the information being requested makes sense and if the business behind the app is a trusted entity,” said Ruohan Xiong, senior security intelligence researcher, Lookout. “As these predatory loan apps have demonstrated, app permissions could easily be abused if users are not careful. While there are likely dozens of independent operators involved, all of these loan apps have a very similar business model – to trick victims into unfair loan terms and then extort payment.”

Continue Reading

Cyber Security

Dragos Participates in Global Security Forum in Riyadh

Published

on

Dragos, Inc. announced that it participated in the Global Cybersecurity Forum, held in Riyadh recently. The two-day event attracted cybersecurity experts and leaders from all over the world. Ben Miller, who represented Dragos as its Vice President of Services, spoke on the concluding day of the forum, about the threat of supply chain and third-party attacks. In his session, titled, “Pervasive and Insecure,” he discussed supply chain risk in critical infrastructure, examining the complex reality of third-party and supply chain attacks and sharing perspectives on the unseen vulnerabilities and how to address them.

Miller highlighted the complex nature of supply chain attacks, which potentially contain widespread vulnerabilities in the OT and industrial control systems (ICS). He outlined Dragos’ specific focus on the Kingdom’s supply chain risk in critical infrastructure including refineries and water treatment plants, as “Energy and water are specific focuses of ours in the region as they are critical not just to the economy but also to every person who lives here,” he said.

Giving an outline of the Dragos plan to help organizations detect and respond to the threat challenges posed to critical infrastructure in Saudi Arabia, he said, “We need to focus on educating the workforce, building a new understanding of how OT is different from IT, and gaining visibility and insights into what is happening in our critical infrastructure.” OT cybersecurity is in many ways a new field, he said.

“We need to communicate the needs of OT security as right now the concern exists but the specific needs aren’t well understood by asset owners. They do understand that digital transformation is happening and they need to secure it. I would focus on this business case and speak to the need for OT-specific monitoring, defensible architectures, and OT-specific incident response plans,” the Dragos official said.

Miller said supply chain attacks in critical infrastructure are complex with many suppliers, vendors, integrators, and long lifecycles that measure in decades. Commenting on the need to build industrial cyber resilience to keep such threats in check, he said: “The first challenge in the OT space is gaining visibility into what assets one has. You can’t defend something if you don’t know it exists.”

When it comes to safeguarding cyberspace, he had a few words of advice for Saudi Arabia, “The Kingdom should realize the potential challenges as early as possible. Commending the country’s efforts in cybersecurity. Over the last few years, Saudi Arabia has focused heavily on cybersecurity by investing in key programs and events such as the Global Cybersecurity Forum. The Kingdom of Saudi Arabia has impressed many by taking one of the world’s leading positions in developing and maintaining a cyber ecosystem. Therefore, the Kingdom now has a vantage point to bridge global cyber divides and ensure that cybersecurity benefits all societies in the region.”

A global expert in industrial cybersecurity himself, Miller joined other renowned thought leaders in the field, including Dr. Albert Antwi-Boasiako, Directory-General of the Cyber Security Authority, Ghana; Mary O’Brien, General Manager, IBM Security; Lothar Renner from Cisco Security; and Dr. Victoria Coates, Former Senior Advisor to the US Secretary of Energy.

Continue Reading
Advertisement

Follow Us

Trending

Copyright © 2021 Security Review Magazine. Rysha Media LLC. All Rights Reserved.