A Review of the Best News of the Week on Cyber Threats & Defense

Chrome smoked by Edge in browser phishing test (Naked Security – Sophos, Oct 16 2017)
NSS Labs says Edge users are better protected from phishing than people using Chrome and Firefox

Microsoft head blames North Korea for ‘WannaCry’ hospital cyberattack (Washington Examiner, Oct 16 2017)
He added that governments need to do more to protect citizens from malicious attacks.

What Am I Missing? How to see the users you’re denied from seeing (Microsoft Secure, Oct 11 2017)
A discussion on different methods which can be used by attackers to remain persistent and stealthy in the environment to avoid detection…and the option to setup a “Deny” ACE on an object created by the attacker.

Sponsored by LogRhythm
SIEM Magic Quadrant
Gartner Positions LogRhythm in SIEM Leaders Quadrant for 5th Consecutive Year. Get the report

Unstructured Data: The Threat You Cannot See (Dark Reading, Oct 10 2017)
Why security teams needs to take a cognitive approach to the increasing volumes of data flowing from sources they don’t control.

Microsoft Patches Windows Zero-Day Flaws Tied to DNSSEC (Dark Reading, Oct 10 2017)
Security experts advise ‘immediate’ patching of critical DNS client vulnerabilities in Windows 8, 10, and other affected systems.

Getting the Most Out of Cyber Threat Intelligence (Dark Reading, Oct 13 2017)
How security practitioners can apply structured analysis and move from putting out fires to fighting the arsonists.

Crypto failure cripples millions of high-security keys, 750k Estonian IDs (Ars Technica, Oct 16 2017)
Factorization weakness lets attackers impersonate key holders and decrypt their data.

Hacking a Power Grid in Three (Not-So-Easy) Steps (Wired, Oct 16 2017)
After months of reports of energy grid breaches, time to distinguish the elite intrusions from just another spearphishing attack.

Printers: The Weak Link in Enterprise Security (Dark Reading, Oct 16 2017)
Organizations frequently overlook printer security, leaving systems exposed to malware and theft. New tools aim to lessen the risk.

Our SIEM Assessment paper update is out! (Gartner Blog Network, Oct 14 2017)
“While some question SIEM threat detection value, Gartner views SIEM as the best compromise technology for a broad set of threat detection use cases.”