Supply Chain Security – how to avoid the ‘Butterfly Effect’

WithSecure’s™ special report explains how organizations must rethink supply chain cyber security to avoid the ‘Butterfly Effect’ which is the case of small mistakes or oversights having much larger and more serious consequences later on. For the C-Suite, the lessons are numerous and sometimes unexpected, as business and IT leaders from different industries explain. WithSecure™ spoke to security leaders in a range of digital, physical, and hybrid businesses, together with security experts and consultants. Some are quoted and others not, but all their viewpoints inform this document’s contents. External interviewees appear under Chatham House rules.

WithSecure™ releases OneDrive Protection

The WithSecure™ Elements Collaboration Protection empowers your hybrid workforce to collaborate securely on OneDrive, by scanning and analyzing files in your users’ personal OneDrive folders continuously for malicious content. WithSecure™ is happy to announce that they have now released OneDrive Protection for their Elements Collaboration Protection, and it is available globally at no extra charge.

Open-source tool connects dots during cyber attacks

Many companies struggle to understand malicious activity and its effects whilst a security incident is in progress. It also eats up precious time and resources that defenders need in order to contain the attack and minimize any potential damage. A new open-source tool built to increase visibility on suspicious activities detected by organisations aims to relieve this pain.

WithSecure™ refreshing License Terms for products and services

As you are aware, F-Secure Business became WithSecure in March 2022, and the demerger between WithSecure and F-Secure took place on 1 July 2022, with a separation of the B2B and B2C product offerings. WithSecure is about to start using new License Terms for their B2B products and services, and are informing you about this in advance.

Trending News

Am I part of the problem?
The supply chain is changing, of that there can be no doubt. Just a few short years ago, it was a linear, mostly one-dimensional structure that was relatively easy to police and manage. However, this is absolutely no longer the case, with many different actors now involved – ranging from start-ups and solo entrepreneurs to multinational corporations.

Effective ransomware prevention: Insights from Conti Playbook
Our customers regularly ask us what more they can do to prevent ransomware outbreaks. Our experience has shown us that the correct way to counter cyber attacks is a solid, step-by-step detection and response (D&R) foundation. Recently we’ve had the opportunity to look at this from the perspective of attackers, thanks to a massive leak of inside information and data from one of the big Ransomware as a Service (RaaS) groups: Conti.

Detection of New Infostealer Malware DUCKTAIL
WithSecure™ has discovered an ongoing operation, dubbed “DUCKTAIL”, that targets individuals and organizations operating on Facebook’s Ads and Business platform. Based upon analysis and gathered data, WithSecure™ has high confidence that the operation is conducted by a Vietnamese threat actor. The chain of evidence suggests that the threat actor’s motives are financially driven.

New unit to bring intelligence-driven protection to defenders
The world’s increasingly fraught geopolitical situation has precipitated a concerning variety of cyber attacks targeting individuals, corporations, civil infrastructure, and governments. These threats have become progressively abundant and sophisticated in nature, leading WithSecure™ to create a new unit to help combat these adversaries.

What is the point of a red team?
It’s pretty common for people to ask us for a red team engagement to understand if their organisation can be breached. Well, every organisation can be breached—you don’t need an expensive red team to prove that. You won’t get all the information you need from a red team; a purple team might be better. At this point, there’s often a bit of a confusion. Here are some of the things we look for when we are considering selling a red team service.

July 2022 Threat report

Summary:

  • Trickbot group attacks Ukraine.
  • Brute Ratel being abused by threat actors.
  • Black Basta on the rise.
  • Ransomware: Trends and notable reports.
    • BlackCat under the spotlight.
    • Vice Society.
    • A closer look at LockBit 3.0.
    • Hive joins BlackCat in using Rust.
    • CISA produce alert on MedusaLocker.
    • HavanaCrypt, a new group with novel tactics.
  • Q2 statistics from Digital Shadows.
  • Other notable highlights in brief.
  • Threat data highlights.
  • Research highlights: Ducktail: An infostealer malware targeting Facebook business accounts.

Is Securing the Supply Chain all about Cyber?

01 Sept 2022, 3:00pm SA Time

Protecting, and being protected by your customers and suppliers, is of paramount importance. Lately, supply chain cyber attacks have made headlines. This webinar will look at practical, concrete actions you can take to defend your organisation – as well as your supply chain partners – from cyber compromise. Speakers: Haydn Brooks, CEO, Risk Ledger; Michael Weng, Senior Security Consultant, WithSecure™; Tony Smith, Board Member, WithSecure™ & Director, WithSecure™ Solutions.

How to Tackle Vulnerabilities in your Supply Chain
08 Sept 2022, 3:00pm SA Time

The next major cyber attack is imminent, but what will it look like and where could it come from? Join our experts to discover what we have learned from previous attacks such as Log4j, the ways we can prevent future attacks from happening, and how we can all play our part in keeping the supply chain secure. Speakers: Laura Kankaala, Senior Security Consultant, WithSecure™; Jarno Niemelä, Principal Researcher, WithSecure™ Intelligence; Mohammad Kazem Hassan Nejad, Junior Researcher, WithSecure™ Intelligence.

Lessons from real-life: Securing your Salesforce third party integrations
15 Sept 2022, 2:00pm SA Time

Digital supply chain threats are high on the security agenda in 2022 and based on Salesforce research “third-party security management” is a top concern for IT-leaders this year. In this webinar our experts draw on decades of experience working with Salesforce environments to insights on securing your Salesforce third party integrations against supply chain threats. They’ll reveal the most common threats and weaknesses they’ve encountered in the wild, and provide practical advice on securing your expanded Salesforce environment to limit your exposure to digital supply chain risk. Speakers: Antti Tuomi, Principal Security Consultant, WithSecure™; Dmitriy Viktorov, Head of Product and Technology, Cloud Protection, WithSecure™; Pankaj Paryani, Salesforce Technical Lead, WithSecure™.

WithSecure™ refreshing License Terms for products and services

As you are aware, F-Secure Business became WithSecure in March 2022, and the demerger between WithSecure and F-Secure took place on 1 July 2022, with a separation of the B2B and B2C product offerings. WithSecure is about to start using new License Terms for their B2B products and services, and are informing you about this in advance.

Be sure to consider some of the cyber threats out there and consider these tips for protecting yourself and your devices. Until our next mailer, you can check out all the great resources we have available on our website.

The Cybervision Team