Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Blog Tenable

S'abonner

Cybersecurity Snapshot: Get the Latest on Deepfake Threats, Open Source Risks, AI System Security and Ransomware Gangs

Get the Latest on Deepfake Threats, Open Source Risks, AI System Security and Ransomware Gangs

Tasked with securing your org’s new AI systems? Check out a new Google paper with tips and best practices. Plus, open source security experts huddled at a conference this week – find out what they talked about. Also, Uncle Sam says it’s time to prep for deepfake attacks. Et bien plus encore !

Dive into six things that are top of mind for the week ending September 15.

1 - Google: The ins and outs of securing AI systems

As businesses adopt artificial intelligence (AI) and cybersecurity teams get tasked with protecting these complex new systems, a fundamental question looms: When defending AI systems, what changes and what stays the same?

That’s the topic of the paper “Securing AI: Similar or Different?” published by Google’s Cybersecurity Action Team. It aims to parse out what’s common and what’s unique about AI security in these seven areas:

  • Gouvernance
  • Menaces
  • Application and product security
  • Data security and privacy
  • Network and endpoint security
  • Threat detection and response
  • Security assessment and validation

“By understanding the differences between securing a traditional enterprise software system and an AI system, organizations can develop a more comprehensive security strategy to protect their AI systems from a variety of security threats,” the paper reads. 

The ins and outs of securing AI systems

In a blog about the paper titled “The Prompt: What to think about when you’re thinking about securing AI,” the authors broadly summarize the key differences and similarities in this way:

  • AI systems are more complex, more data driven, more adaptive and more interconnected than non-AI systems
  • Many threats and vulnerabilities are the same in both AI and non-AI systems, and their processed data and software supply chain must be secured 

The paper also includes best-practice recommendations for AI system security, including:

  • Adopt strong governance and security controls throughout the AI lifecycle
  • Implement strong controls for securing data collection, data storage, data processing and data usage
  • Inventory and understand your AI systems, including how they work, what data they use and how employees and customers use them
  • Use secure software development practices, such as code review, threat modeling and penetration testing
  • Educate users, developers and operators of AI systems about security risks
  • Monitor deployed AI systems by filtering and logging inputs, such as generative AI prompts, as well as outputs; and check them for security threats
  • Have an incident response plan in place

To get more details:

2 - CISA: Prep for deepfake threats now

Deepfakes represent such a danger to public- and private-sector organizations alike that they must be ready to identify and respond to these threats. That’s the word from the U.S. government, which this week published an 18-page guide titled “Contextualizing Deepfake Threats to Organizations," intended to help organizations defend themselves from deepfake attacks.

Deepfakes are highly-realistic multimedia created or manipulated using AI with the intention to misinform, trick and confuse people. Attackers use these maliciously crafted videos, photos and audio to create societal unrest, carry out fraud and damage reputations of individuals and brands.

“Organizations can take a variety of steps to identify, defend against, and respond to deepfake threats,” reads the document, published by the National Security Agency (NSA), the Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA).

CISA says prep for deepfake threats now

Those steps include:

  • Implement technologies that detect deepfakes and determine media origins
  • Proactively plan for and rehearse responses
  • Train staff, especially on recognizing deepfakes in phishing attacks
  • Use authentication techniques and watermarks to protect sensitive multimedia, such as ones containing high-profile individuals

To get more details, check out the joint announcement from the NSA, FBI and CISA and the full guide “Contextualizing Deepfake Threats to Organizations”.

For more information about deepfake attacks:

VIDEOS

Stop deepfakes - How to counter presentation attacks (ENISA)

How synthetic media, or deepfakes, could soon change our world (60 Minutes)

3 - OpenSSF lays out plans for boosting OSS security

Develop more education materials for hands-on and in-depth learning about open source software (OSS) security. Create more security guides. Improve OSS supply-chain integrity. Enhance OSS infrastructure and tooling.

Those are some of the initiatives the Linux Foundation’s Open Source Security Foundation (OpenSSF) plans to undertake in the coming year, the group announced at its “Secure Open Source Software Summit 2023” held in Washington, D.C. this week.

OpenSSF lays out plans for boosting OSS security

The event featured representatives from the U.S. federal government, including CISA, the National Science Foundation and the National Security Council, as well as from the private sector, including Amazon, Apple and Google.

“By bringing together a diverse group of stakeholders, we aim to foster a culture of collaboration and innovation in addressing the most critical security challenges facing open source software for the public good,” OpenSSF General Manager Omkhar Arasaratnam said in a statement.

Topics discussed at the summit included:

  • The need for better collaboration among incident response providers
  • More coordinated vulnerability disclosures
  • Improved threat information exchanges
  • Better understanding of the ties between OSS, security and artificial intelligence (AI)

To get more details, check out the “Secure Open Source Software Vision Brief” the organization published at the event.

For more information about OSS security:

4 - CISA outlines its roadmap for open source security

And continuing with the OpenSSF’s “Secure Open Source Software Summit 2023,” CISA announced its roadmap for OSS security at the event. Saying it’s focused on securing OSS in the U.S. federal government, as well as on helping make the OSS ecosystem safer for everyone, CISA said it expects to attain four key goals between fiscal years 2024 and 2026.

  • Establish its role to support OSS security by, for example, partnering with OSS communities
  • Broaden visibility into OSS usage and risks, by, among other things, developing a framework for OSS risk prioritization
  • Lower risks to the federal government by, for example, developing OSS best-practices guidance for federal agencies
  • Harden the OSS ecosystem by, for example, coordinating OSS vulnerability disclosures and responses

“We envision a world in which every critical OSS project is not only secure but sustainable and resilient, supported by a healthy, diverse, and vibrant community,” reads the eight-page “CISA Open Source Software Security Roadmap.”

CISA outlines its roadmap for OSS security

Last month, CISA, the White House and other federal agencies issued a formal request for information (RFI) about OSS security, saying that the issue is critical since the usage of OSS software globally is widespread. 

To get more details, check out CISA’s announcement of its OSS security roadmap and read the full roadmap document, as well as a blog about it from the OpenSSF.

5 - Tenable poll on tool sprawl, risk prioritization

During our recent webinar “Maximizing Your Cyber Resilience: Why Now is the Right Time to Transition from Vulnerability to Exposure Management,” we polled attendees about a number of related topics. Check out what they said about the size of their cyber toolset and about their ability to prioritize cyber risk across their attack surface.

Tenable poll on tool sprawl, risk prioritization2

(105 respondents polled by Tenable, August 2023)

Tenable poll on tool sprawl, risk prioritization

(111 respondents polled by Tenable, August 2023)

For more insights about exposure management and its benefits, check out these Tenable resources:

6 - U.K. cyber agency delves into ransomware’s criminal ecosystem

Noting that ransomware gangs and their partners continue to adapt, the U.K. National Cyber Security Centre this week published a white paper to update cyber teams on the evolution of the ransomware ecosystem.

Titled “Ransomware, extortion and the cyber crime ecosystem,” the 26-page paper shifts the focus away from granular analysis of individual ransomware strains and attacks and puts it on the broader, interconnected supply chain of services, platforms, distributors and affiliates that all play a part.

Simplified Ransomware Workflow

U.K. cyber agency delves into ransomware’s criminal ecosystem

(Source: “Ransomware, extortion and the cyber crime ecosystem” paper from the U.K. NCSC, September 2023)

The U.K. government’s strategy to disrupt ransomware activities “is based on understanding and undermining the increasingly sophisticated criminal ecosystem behind these threats, especially focusing on common enablers and vulnerabilities,” wrote James Babbage, Director of General Threats at the U.K. National Crime Agency (NCA), which contributed to the paper.

Topics covered include:

  • The cybercrime ecosystem
  • Common initial access vectors, like stealers and loaders, direct exploitation and brute force access
  • Initial access brokers
  • Ransomware business models, such as ransomware as a service and ransomware affiliates
  • Services financiers

“The deployment of ransomware relies on a complex supply chain, so focussing on specific ransomware strains can be confusing at best, and unhelpful at worst. We hope that the publication of this white paper shines a light on the motivations of the threat actors further upstream,” reads the NCSC blog “Ransomware and the cyber crime ecosystem” about the paper.

For more information about ransomware:

VIDEO

Anatomy of a Threat: MOVEIt (Tenable)

Articles connexes

Des actualités décisives sur la cyber-sécurité

Saisissez votre adresse e-mail et ne manquez plus aucune alerte ni aucun conseil en matière de sécurité de la part de nos experts Tenable.

Tenable Vulnerability Management

Bénéficiez d'un accès complet à une plateforme cloud moderne de gestion des vulnérabilités qui vous permet de visualiser l'ensemble de vos assets et d'en assurer le suivi avec une précision inégalée.

Les essais de Tenable Vulnerability Management créés partout (excepté aux Émirats arabes unis) incluent Tenable Lumin et Tenable Web App Scanning.

Tenable Vulnerability Management

Bénéficiez d'un accès complet à une plateforme de gestion des vulnérabilités moderne hébergée dans le cloud qui vous permet de consulter l'ensemble de vos assets et d'en assurer le suivi, tout en bénéficiant d'une précision inégalée. Souscrivez votre abonnement annuel dès aujourd'hui.

100 assets

Sélectionnez votre option d'abonnement :

Acheter maintenant

Tenable Vulnerability Management

Bénéficiez d'un accès complet à une plateforme cloud moderne de gestion des vulnérabilités qui vous permet de visualiser l'ensemble de vos assets et d'en assurer le suivi avec une précision inégalée.

Les essais de Tenable Vulnerability Management créés partout (excepté aux Émirats arabes unis) incluent Tenable Lumin et Tenable Web App Scanning.

Tenable Vulnerability Management

Bénéficiez d'un accès complet à une plateforme de gestion des vulnérabilités moderne hébergée dans le cloud qui vous permet de consulter l'ensemble de vos assets et d'en assurer le suivi, tout en bénéficiant d'une précision inégalée. Souscrivez votre abonnement annuel dès aujourd'hui.

100 assets

Sélectionnez votre option d'abonnement :

Acheter maintenant

Tenable Vulnerability Management

Bénéficiez d'un accès complet à une plateforme cloud moderne de gestion des vulnérabilités qui vous permet de visualiser l'ensemble de vos assets et d'en assurer le suivi avec une précision inégalée.

Les essais de Tenable Vulnerability Management créés partout (excepté aux Émirats arabes unis) incluent Tenable Lumin et Tenable Web App Scanning.

Tenable Vulnerability Management

Bénéficiez d'un accès complet à une plateforme de gestion des vulnérabilités moderne hébergée dans le cloud qui vous permet de consulter l'ensemble de vos assets et d'en assurer le suivi, tout en bénéficiant d'une précision inégalée. Souscrivez votre abonnement annuel dès aujourd'hui.

100 assets

Sélectionnez votre option d'abonnement :

Acheter maintenant

Essayer Tenable Web App Scanning

Profitez d'un accès complet à notre dernière offre de scan des applications web conçue pour les applications modernes dans la plateforme de gestion des expositionsTenable One. Scannez l'ensemble de votre portefeuille en toute sécurité et avec une grande précision, sans effort manuel important ni interruption des applications web stratégiques. Abonnez-vous dès maintenant.

Votre essai de Tenable Web App Scanning inclut également Tenable Vulnerability Management et Tenable Lumin.

Acheter Tenable Web App Scanning

Bénéficiez d'un accès complet à une plateforme de gestion des vulnérabilités moderne hébergée dans le cloud qui vous permet de consulter l'ensemble de vos assets et d'en assurer le suivi, tout en bénéficiant d'une précision inégalée. Souscrivez votre abonnement annuel dès aujourd'hui.

5 FQDN

3 578,00 $

Acheter maintenant

Essayer Tenable Lumin

Visualisez et explorez votre gestion de l'exposition, suivez la réduction des risques au fil du temps et comparez-la à celle des autres entreprises avec Tenable Lumin.

Votre essai de Tenable Lumin inclut également Tenable Vulnerability Management et Tenable Web App Scanning.

Acheter Tenable Lumin

Contactez un commercial pour découvrir comment Lumin peut vous permettre d'obtenir des informations exploitables sur l'ensemble de votre entreprise et de gérer votre cyber-risque.

Essayer gratuitement Tenable Nessus Professional

GRATUIT PENDANT 7 JOURS

Tenable Nessus est aujourd'hui le scanner de vulnérabilités le plus complet du marché.

NOUVEAU - Tenable Nessus Expert
Maintenant disponible

Nessus Expert offre encore plus fonctionnalités, comme les scans de surface d'attaque externe, et la possibilité d'ajouter des domaines et de scanner l'infrastructure cloud. Cliquez ici pour essayer Nessus Expert.

Remplissez le formulaire ci-dessous pour profiter d'un essai de Nessus Pro.

Acheter Tenable Nessus Professional

Tenable Nessus est aujourd'hui le scanner le plus complet du marché. Tenable Nessus Professional vous permet d'automatiser le processus de scan des vulnérabilités, d'écourter les cycles de mise en conformité et de mieux tirer parti de votre équipe informatique.

Achetez une licence pluriannuelle et faites des économies. Ajoutez l'assistance avancée pour bénéficier de l'accès 24 h/24 et 7 j/7 à une assistance par téléphone, via la communauté et via le chat.

Sélectionnez votre licence

Achetez une licence pluriannuelle et faites des économies.

Ajoutez une assistance et une formation

Essayer gratuitement Tenable Nessus Expert

GRATUIT PENDANT 7 JOURS

Conçu pour la surface d'attaque moderne, Nessus Expert vous permet de bénéficier d'une meilleure visibilité et de protéger votre entreprise des vulnérabilités issues de l'IT, comme du cloud.

Vous avez déjà Nessus Professional de Tenable ?
Passez à Nessus Expert gratuitement pendant 7 jours.

Acheter Tenable Nessus Expert

Conçu pour la surface d'attaque moderne, Nessus Expert vous permet de bénéficier d'une meilleure visibilité et de protéger votre entreprise des vulnérabilités issues de l'IT, comme du cloud.

Sélectionnez votre licence

Achetez une licence pluriannuelle pour économiser davantage.

Ajoutez une assistance et une formation