FreshRSS

🔒
☐ ☆ ✇ Krebs on Security

Few Fortune 100 Firms List Security Pros in Their Executive Ranks

By BrianKrebs — July 21st 2023 at 19:11

Many things have changed since 2018, such as the names of the companies in the Fortune 100 list. But one aspect of that vaunted list that hasn’t shifted much since is that very few of these companies list any security professionals within their top executive ranks.

The next time you receive a breach notification letter that invariably says a company you trusted places a top priority on customer security and privacy, consider this: Only five of the Fortune 100 companies currently list a security professional in the executive leadership pages of their websites. This is largely unchanged from five of the Fortune 100 in 2018, the last time KrebsOnSecurity performed this analysis.

A review of the executives pages published by the 2022 list of Fortune 100 companies found only five — BestBuy, Cigna, Coca-Cola, Disney and Walmart — that listed a Chief Security Officer (CSO) or Chief Information Security Officer (CISO) in their highest corporate ranks.

One-third of last year’s Fortune 100 companies included a Chief Technology Officer (CTO) in their executive stables; 40 listed Chief Information Officer (CIO) roles, but just 21 included a Chief Risk Officer (CRO).

As I noted in 2018, this is not to say that 95 percent of the Fortune 100 companies don’t have a CISO or CSO in their employ: A review of LinkedIn suggests that most of them in fact do have people in those roles, and experts say some of the largest multinational companies will have multiple people in these positions.

But it is interesting to note which executive positions the top companies deem worth publishing in their executive leadership pages. For example, 88 percent listed a Director of Human Resources (or “Chief People Officer”), and 37 out of 100 included a Chief Marketing Officer.

Not that these roles are somehow more or less important than that of a CISO/CSO within the organization. Nor is the average pay hugely different among all these roles. Yet, considering how much marketing (think consumer/customer data) and human resources (think employee personal/financial data) are impacted by your average data breach, it’s somewhat remarkable that more companies don’t list their chief security personnel among their top ranks.

One likely explanation as to why a great many companies still don’t include their security leaders within their highest echelons is that these employees do not report directly to the company’s CEO, board of directors, or Chief Risk Officer.

The CSO or CISO position traditionally has reported to an executive in a technical role, such as the CTO or CIO. But workforce experts say placing the CISO/CSO on unequal footing with the organization’s top leaders makes it more likely that cybersecurity and risk concerns will take a backseat to initiatives designed to increase productivity and generally grow the business.

“Separation of duties is a fundamental concept of security, whether we’re talking about cyber threats, employee fraud, or physical theft,” said Tari Schreider, an analyst with Datos Insights. “But that critical separation is violated every day with the CISO or CSO reporting to the heads of technology.”

IANS, an organization geared toward CISOs/CSOs and their teams, surveyed more than 500 organizations last year and found roughly 65 percent of CISOs still report to a technical leader, such as the CTO or CIO: IANS found 46 percent of CISOs reported to a CIO, with 15 percent reporting directly to a CTO.

A survey last year by IANS found 65 percent of CISOs report to a tech function within organizations, such as the CTO or CIO. Image: IANS Research.

Schreider said one big reason many CISOs and CSOs aren’t listed in corporate executive biographies at major companies is that these positions often do not enjoy the same legal and insurance protections afforded to other officers within the company.

Typically, larger companies will purchase a “Directors and Officers” liability policy that covers legal expenses should one of the organization’s top executives find themselves dragged into court over some business failing on the part of their employer. But organizations that do not offer this coverage to their security leaders are unlikely to list those positions in their highest ranks, Schreider said.

“It’s frankly shocking,” Schreider said, upon hearing that only four of the Fortune 100 listed any security personnel in their top executive hierarchies. “If the company isn’t going to give them legal cover, then why give them the responsibility for security? Especially when CISOs and CSOs shouldn’t own the risk, yet the majority of them carry the mantle of responsibility and they tend to be scapegoats” when the organization eventually gets hacked, he said.

Schreider said while Datos Insights focuses mostly on the financial and insurance industries, a recent Datos survey echoes the IANS findings from last year. Datos surveyed 25 of the largest financial institutions by asset size (two of which are no longer in existence), and found just 22 percent of CSOs/CISOs reported to the CEO. A majority — 65 percent — had their CSOs/CISOs reporting to either a CTO or CIO.

“I’ve looked at these types of statistics for years and they’ve never really changed that much,” Schreider said. “The CISO or CSO is in the purview of the technical stack from a management perspective. Right, wrong or indifferent, that’s what’s happening.”

Earlier this year, IT consulting firm Accenture released results from surveying more than 3,000 respondents from 15 industries across 14 countries about their security maturity levels. Accenture found that only about one-third of the organizations they surveyed had enough security maturity under their belts to have integrated security into virtually every aspect of their businesses — and this includes having CISOs or CSOs report to someone in charge of overseeing risk for the business as a whole.

Not surprisingly, Accenture also found that only a third of respondents considered cybersecurity risk “to a great extent” when evaluating overall enterprise risk.

“This highlights there is still some way to go to make cybersecurity a proactive, strategic necessity within the business,” the report concluded.

One way of depicting the different stages of security maturity.

A spreadsheet tracking the prevalence of security leaders on the executive pages of the 2022 Fortune 100 firms is available here.

Update, July 23: Somehow overlooked Disney’s CSO listed on their leadership page. The story copy above has been updated to reflect that.

☐ ☆ ✇ The Hacker News

Azure AD Token Forging Technique in Microsoft Attack Extends Beyond Outlook, Wiz Reports

By THN — July 21st 2023 at 15:14
The recent attack against Microsoft's email infrastructure by a Chinese nation-state actor referred to as Storm-0558 is said to have a broader scope than previously thought. According to cloud security company Wiz, the inactive Microsoft account (MSA) consumer signing key used to forge Azure Active Directory (Azure AD or AAD) tokens to gain illicit access to Outlook Web Access (OWA) and
☐ ☆ ✇ The Hacker News

HotRat: New Variant of AsyncRAT Malware Spreading Through Pirated Software

By THN — July 21st 2023 at 15:05
A new variant of AsyncRAT malware dubbed HotRat is being distributed via free, pirated versions of popular software and utilities such as video games, image and sound editing software, and Microsoft Office. "HotRat malware equips attackers with a wide array of capabilities, such as stealing login credentials, cryptocurrency wallets, screen capturing, keylogging, installing more malware, and
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

dnsReaper now supports subdomain attacks using project discovery and SecurityTrails

By /u/punksecurity_simon — July 21st 2023 at 13:29

Hey all,

I help maintain dnsReaper which is a subdomain takeover tool. It's free, available on GitHub and docker and looks for domains vulnerable to domain takeovers.

Today we've added 2 new integrations!

Project discovery have a massive database of subdomains called CHAOS and you can now query and test domains in dnsReaper.

We've also added SecurityTrails, which also has a huge public subdomain list.

This means that you can just point dnsReaper at a bug bounty domain and let it run. There will be false positives for sure, but we have 61 signatures so hopefully there will be some nice easy findings too.

Our blog post on the new features is here:

https://punksecurity.co.uk/blog/dnsreaper_pd/

Our GitHub is over here:

https://github.com/punk-security/dnsReaper

It's a free tool that we built just to highlight this issue and educate. Please give it a star and share it, we'd appreciate it.

submitted by /u/punksecurity_simon
[link] [comments]
☐ ☆ ✇ WeLiveSecurity

Android GravityRAT goes after WhatsApp backups

July 21st 2023 at 13:29
ESET researchers analyzed an updated version of Android GravityRAT spyware that steals WhatsApp backup files and can receive commands to delete files
☐ ☆ ✇ WeLiveSecurity

ESET APT Activity Report Q4 2022­–Q1 2023

July 21st 2023 at 13:29
An overview of the activities of selected APT groups investigated and analyzed by ESET Research in Q4 2022 and Q1 2023
☐ ☆ ✇ WeLiveSecurity

Passwords out, passkeys in: are you ready to make the switch?

July 21st 2023 at 13:29
With passkeys poised for prime time, passwords seem passé. What are the main benefits of ditching one in favor of the other?
☐ ☆ ✇ WeLiveSecurity

The danger within: 5 steps you can take to combat insider threats

July 21st 2023 at 13:29
Some threats may be closer than you think. Are security risks that originate from your own trusted employees on your radar?
☐ ☆ ✇ WeLiveSecurity

Hunting down BlackLotus – Week in security with Tony Anscombe

July 21st 2023 at 13:29
Microsoft releases guidance on how organizations can check their systems for the presence of BlackLotus, a powerful threat first analyzed by ESET researchers
☐ ☆ ✇ WeLiveSecurity

What TikTok knows about you – and what you should know about TikTok

July 21st 2023 at 13:29
As TikTok CEO attempts to placate U.S. lawmakers, it’s time for us all to think about the wealth of personal information that TikTok and other social media giants collect about us
☐ ☆ ✇ WeLiveSecurity

How the war in Ukraine has been a catalyst in private-public collaborations

July 21st 2023 at 13:29
As the war shows no signs of ending and cyber-activity by states and criminal groups remains high, conversations around the cyber-resilience of critical infrastructure have never been more vital
☐ ☆ ✇ WeLiveSecurity

10 signs that scammers have you in their sights

July 21st 2023 at 13:29
Don’t be their next victim – here’s a handy round-up of some the most common signs that should set your alarm bells ringing
☐ ☆ ✇ WeLiveSecurity

The good, the bad and the ugly of AI – Week in security with Tony Anscombe

July 21st 2023 at 13:29
The growing use of synthetic media and difficulties in distinguishing between real and fake content raises a slew of legal and ethical questions
☐ ☆ ✇ WeLiveSecurity

School’s out for summer, but it’s not time to let your cyber guard down

July 21st 2023 at 13:29
The beginning of the summer break is the perfect time for parents to remind their children about the importance of safe online habits
☐ ☆ ✇ WeLiveSecurity

Why you need parental control software – and 5 features to look for

July 21st 2023 at 13:29
Strike a balance between making the internet a safer place for your children and giving them the freedom to explore, learn and socialize
☐ ☆ ✇ WeLiveSecurity

SVB's collapse is a scammer’s dream: Don’t get caught out

July 21st 2023 at 13:29
How cybercriminals can exploit Silicon Valley Bank's downfall for their own ends – and at your expense
☐ ☆ ✇ WeLiveSecurity

APT hackers set a honeytrap to ensnare victims – Week in security with Tony Anscombe

July 21st 2023 at 13:29
A request to move an online conversation to a supposedly more secure platform may not be as well-meaning as it sounds
☐ ☆ ✇ WeLiveSecurity

Staying safe on OnlyFans: The naked truth

July 21st 2023 at 13:29
How content creators and subscribers can embrace the social media platform without (overly) exposing themselves to the potentially toxic brew of NSFW content and privacy threats
☐ ☆ ✇ WeLiveSecurity

Tricks of the trade: How a cybercrime ring operated a multi-level fraud scheme

July 21st 2023 at 13:29
A peek under the hood of a cybercrime operation and what you can do to avoid being an easy target for similar ploys
☐ ☆ ✇ WeLiveSecurity

Is a RAT stealing your files? – Week in security with Tony Anscombe

July 21st 2023 at 13:29
Could your Android phone be home to a remote access tool (RAT) that steals WhatsApp backups or performs other shenanigans?
☐ ☆ ✇ WeLiveSecurity

Common WhatsApp scams and how to avoid them

July 21st 2023 at 13:29
Here's a roundup of some of the most common tricks that fraudsters use to dupe their victims on WhatsApp – and what you can do to protect yourself against them.
☐ ☆ ✇ WeLiveSecurity

Linux malware strengthens links between Lazarus and the 3CX supply-chain attack

July 21st 2023 at 13:29
Similarities with newly discovered Linux malware used in Operation DreamJob corroborate the theory that the infamous North Korea-aligned group is behind the 3CX supply-chain attack
☐ ☆ ✇ WeLiveSecurity

ESET Threat Report T3 2022

July 21st 2023 at 13:29
A view of the T3 2022 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts
☐ ☆ ✇ WeLiveSecurity

You may not care where you download software from, but malware does

July 21st 2023 at 13:29
Why do people still download files from sketchy places and get compromised as a result?
☐ ☆ ✇ WeLiveSecurity

One year on, how is the war playing out in cyberspace? – Week in security with Tony Anscombe

July 21st 2023 at 13:29
With the conflict in Ukraine passing the one-year mark, have its cyber-war elements turned out as expected?
☐ ☆ ✇ WeLiveSecurity

How an innocuous app morphed into a trojan – Week in security with Tony Anscombe

July 21st 2023 at 13:29
ESET research uncovers an Android app that initially had no harmful features but months later turned into a spying tool
☐ ☆ ✇ WeLiveSecurity

Confident cybersecurity means fewer headaches for SMBs

July 21st 2023 at 13:29
Small and medium-sized businesses have good reason to be concerned about the loss of data and financial impacts
☐ ☆ ✇ WeLiveSecurity

The real cost of a free lunch – Week in security with Tony Anscombe

July 21st 2023 at 13:29
Don't download software from non-reputable websites and sketchy links – you might be in for more than you bargained for
☐ ☆ ✇ WeLiveSecurity

What are the cybersecurity concerns of SMBs by sector?

July 21st 2023 at 13:29
Some sectors have high confidence in their in-house cybersecurity expertise, while others prefer to enlist the support of an external provider to keep their systems and data secured
☐ ☆ ✇ WeLiveSecurity

RSA Conference 2023 – How AI will infiltrate the world

July 21st 2023 at 13:29
As all things (wrongly called) AI take the world’s biggest security event by storm, we round up of some of their most-touted use cases and applications
☐ ☆ ✇ WeLiveSecurity

Hear no evil: Ultrasound attacks on voice assistants

July 21st 2023 at 13:29
How your voice assistant could do the bidding of a hacker – without you ever hearing a thing
☐ ☆ ✇ WeLiveSecurity

Discarded, not destroyed: Old routers reveal corporate secrets

July 21st 2023 at 13:29
When decommissioning their old hardware, many companies 'throw the baby out with the bathwater'
☐ ☆ ✇ WeLiveSecurity

Will ChatGPT start writing killer malware?

July 21st 2023 at 13:29
AI-pocalypse soon? As stunning as ChatGPT’s output can be, should we also expect the chatbot to spit out sophisticated malware?
☐ ☆ ✇ WeLiveSecurity

'A woman from Mars': Life in the pursuit of space exploration

July 21st 2023 at 13:29
An astrobiologist, analog astronaut, author and speaker, Dr. Michaela Musilova shares her experience as a woman at the forefront of space exploration and from her quest for scientific and personal excellence
☐ ☆ ✇ WeLiveSecurity

7 tips for spotting a fake mobile app

July 21st 2023 at 13:29
Plus, 7 ways to tell that you downloaded a sketchy app and 7 tips for staying safe from mobile security threats in the future
☐ ☆ ✇ WeLiveSecurity

The slow Tick-ing time bomb: Tick APT group compromise of a DLP software developer in East Asia

July 21st 2023 at 13:29
ESET Research uncovered a campaign by APT group Tick against a data-loss prevention company in East Asia and found a previously unreported tool used by the group
☐ ☆ ✇ WeLiveSecurity

Mixing cybercrime and cyberespionage – Week in security with Tony Anscombe

July 21st 2023 at 13:29
A crimeware group that usually targets individuals and SMBs in North America and Europe adds cyberespionage to its activities
☐ ☆ ✇ WeLiveSecurity

Pig butchering scams: The anatomy of a fast-growing threat

July 21st 2023 at 13:29
How fraudsters groom their marks and move in for the kill using tricks from the playbooks of romance and investment scammers
☐ ☆ ✇ WeLiveSecurity

What does $5,000 buy you on a hacking forum? – Week in security with Tony Anscombe

July 21st 2023 at 13:29
A bootkit that ESET researchers have discovered in the wild is the BlackLotus UEFI bootkit that is being peddled on hacking forums
☐ ☆ ✇ WeLiveSecurity

APTs target MSP access to customer networks – Week in security with Tony Anscombe

July 21st 2023 at 13:29
The recent compromise of the networks of several companies via the abuse of a remote access tool used by MSPs exemplifies why state-aligned threat actors should be on the radars of IT service providers
☐ ☆ ✇ WeLiveSecurity

Twitter ends free SMS 2FA: Here’s how you can protect your account now

July 21st 2023 at 13:29
Twitter’s ditching of free text-message authentication doesn’t mean that you should forgo using 2FA. Instead, switch to another – and, indeed, better – 2FA option.
☐ ☆ ✇ WeLiveSecurity

Key findings from ESET's new APT Activity Report – Week in security with Tony Anscombe

July 21st 2023 at 13:29
What have some of the world's most infamous advanced threat actors been up to and what might be the implications of their activities for your business?
☐ ☆ ✇ WeLiveSecurity

Top 5 search engines for internet-connected devices and services

July 21st 2023 at 13:29
A roundup of some of the handiest tools that security professionals can use to search for and monitor devices that are accessible from the internet
☐ ☆ ✇ WeLiveSecurity

Emotet: sold or on vacation? – Week in security with Tony Anscombe

July 21st 2023 at 13:29
Originally a banking trojan, Emotet later evolved into a full-blown botnet and went on to become one of the most dangerous cyberthreats worldwide
☐ ☆ ✇ WeLiveSecurity

Employee monitoring: Is ‘bossware’ right for your company?

July 21st 2023 at 13:29
While employee monitoring software may boost productivity, it may also be a potential privacy minefield and it can affect your relationship with your employees
☐ ☆ ✇ WeLiveSecurity

Not-so-private messaging: Trojanized WhatsApp and Telegram apps go after cryptocurrency wallets

July 21st 2023 at 13:29
ESET researchers analyzed Android and Windows clippers that can tamper with instant messages and use OCR to steal cryptocurrency funds
☐ ☆ ✇ WeLiveSecurity

ESET SMB Digital Security Sentiment Report: The damaging effects of a breach

July 21st 2023 at 13:29
SMBs need to not only reduce their odds of being hit by an attack, but also implement processes that they can follow if their defenses are breached
☐ ☆ ✇ WeLiveSecurity

Stop Cyberbullying Day: Prevention is everyone's responsibility

July 21st 2023 at 13:29
Strategies for stopping and responding to cyberbullying require a concerted, community-wide effort involving parents, educators and children themselves
☐ ☆ ✇ WeLiveSecurity

World Backup Day: Avoiding a data disaster is a forever topic

July 21st 2023 at 13:29
By failing to prepare you are preparing to fail. Make sure you're able to bounce back if, or when, a data disaster strikes.
☐ ☆ ✇ WeLiveSecurity

WinorDLL64: A backdoor from the vast Lazarus arsenal?

July 21st 2023 at 13:29
The targeted region, and overlap in behavior and code, suggest the tool is used by the infamous North Korea-aligned APT group
☐ ☆ ✇ WeLiveSecurity

MQsTTang: Mustang Panda’s latest backdoor treads new ground with Qt and MQTT

July 21st 2023 at 13:29
ESET researchers tease apart MQsTTang, a new backdoor used by Mustang Panda, which communicates via the MQTT protocol
☐ ☆ ✇ WeLiveSecurity

Shedding light on AceCryptor and its operation

July 21st 2023 at 13:29
ESET researchers reveal details about a prevalent cryptor, operating as a cryptor-as-a-service used by tens of malware families
☐ ☆ ✇ WeLiveSecurity

Cleaning up your social media and passwords: What to trash and what to treasure

July 21st 2023 at 13:29
Give your social media presence a good spring scrubbing, audit your passwords and other easy ways to bring order to your digital chaos
☐ ☆ ✇ WeLiveSecurity

Alexa, who else is listening?

July 21st 2023 at 13:29
Your smart speaker is designed to listen, but could it be eavesdropping too?
☐ ☆ ✇ WeLiveSecurity

Evasive Panda APT group delivers malware via updates for popular Chinese software

July 21st 2023 at 13:29
ESET Research uncovers a campaign by the APT group known as Evasive Panda targeting an international NGO in China with malware delivered through updates of popular Chinese software
☐ ☆ ✇ WeLiveSecurity

Digital security for the self-employed: Staying safe without an IT team to help

July 21st 2023 at 13:29
Nobody wants to spend their time dealing with the fallout of a security incident instead of building up their business
❌