• New Atomic macOS Stealer Campaign Exploits ClickFix to Target Apple Users

    Jun 06, 2025The Hacker NewsMalware / Endpoint Security

    Cybersecurity researchers are alerting to a new malware campaign that employs the ClickFix social engineering tactic to trick users into downloading an information stealer malware known as Atomic macOS Stealeron Apple macOS systems.
    The campaign, according to CloudSEK, has been found to leverage typosquat domains mimicking U.S.-based telecom provider Spectrum.
    "macOS users are served a malicious shell script designed to steal system passwords and download an AMOS variant for further exploitation," security researcher Koushik Pal said in a report published this week. "The script uses native macOS commands to harvest credentials, bypass security mechanisms, and execute malicious binaries."
    It's believed that the activity is the work of Russian-speaking cybercriminals owing to the presence of Russian language comments in the malware's source code.

    The starting point of the attack is a web page that impersonates Spectrum. Visitors to the sites in question are served a message that instructs them to complete a hCaptcha verification check to in order to "review the security" of their connection before proceeding further.
    However, when the user clicks the "I am human" checkbox for evaluation, they are displayed an error message stating "CAPTCHA verification failed," urging them to click a button to go ahead with an "Alternative Verification."
    Doing so causes a command to be copied to the users' clipboard and the victim is shown a set of instructions depending on their operating system. While they are guided to run a PowerShell command on Windows by opening the Windows Run dialog, it's substituted by a shell script that's executed by launching the Terminal app on macOS.
    The shell script, for its part, prompts users to enter their system password and downloads a next-stage payload, in this case, a known stealer called Atomic Stealer.
    "Poorly implemented logic in the delivery sites, such as mismatched instructions across platforms, points to hastily assembled infrastructure," Pal said.
    "The delivery pages in question for this AMOS variant campaign contained inaccuracies in both its programming and front-end logic. For Linux user agents, a PowerShell command was copied. Furthermore, the instruction 'Press & hold the Windows Key + R' was displayed to both Windows and Mac users."
    The disclosure comes amid a surge in campaigns using the ClickFix tactic to deliver a wide range of malware families over the past year.
    "Actors carrying out these targeted attacks typically utilize similar techniques, tools, and proceduresto gain initial access," Darktrace said. "These include spear phishing attacks, drive-by compromises, or exploiting trust in familiar online platforms, such as GitHub, to deliver malicious payloads."

    The links distributed using these vectors typically redirect the end user to a malicious URL that displays a fake CAPTCHA verification check in an attempt to deceive users into thinking that they are carrying out something innocuous, when, in reality, they are guided to execute malicious commands to fix a non-existent issue.
    The end result of this effective social engineering method is that users end up compromising their own systems, enabling threat actors to bypass security controls.
    The cybersecurity company said it identified multiple ClickFix attacks across customer environments in Europe, the Middle East, and Africa, and in the United States. And these campaigns are gaining steam, adopting several variations but operating with the same end goal of delivering malicious payloads, ranging from trojans to stealers to ransomware.
    Earlier this week, Cofense outlined an email phishing campaign that spoofs Booking.com, targeting hotel chains and the food services sector with fake CAPTCHAs that lead to XWorm RAT, PureLogs Stealer, and DanaBot. The fact that ClickFix is flexible and easy to adapt makes it an attractive malware distribution mechanism.
    "While the exact email structure varies from sample to sample, these campaigns generally provide Bookingcom-spoofing emails with embedded links to a ClickFix fake CAPTCHA site which is used to deliver a malicious script that runs RATs and/or information stealers," Cofense said.
    The email security firm said it has also observed ClickFix samples mimicking cookie consent banners, wherein clicking on the "Accept" button causes a malicious script file to be downloaded. The user is subsequently prompted to run the script to accept cookies.

    In one April 2025 incident analyzed by Darktrace, unknown threat actors were found to utilize ClickFix as an attack vector to download nondescript payloads to burrow deeper into the target environment, conduct lateral movement, send system-related information to an external server via an HTTP POST request, and ultimately exfiltrate data.
    "ClickFix baiting is a widely used tactic in which threat actors exploit human error to bypass security defenses," Darktrace said. "By tricking endpoint users into performing seemingly harmless, everyday actions, attackers gain initial access to systems where they can access and exfiltrate sensitive data."
    Other ClickFix attacks have employed phony versions of other popular CAPTCHA services like Google reCAPTCHA and Cloudflare Turnstile for malware delivery under the guise of routine security checks.
    These fake pages are "pixel-perfect copies" of their legitimate counterparts, sometimes even injected into real-but-hacked websites to trick unsuspecting users. Stealers such as Lumma and StealC, as well as full-fledged remote access trojanslike NetSupport RAT are some of the payloads distributed via bogus Turnstile pages.
    "Modern internet users are inundated with spam checks, CAPTCHAs, and security prompts on websites, and they've been conditioned to click through these as quickly as possible," SlashNext's Daniel Kelley said. "Attackers exploit this 'verification fatigue,' knowing that many users will comply with whatever steps are presented if it looks routine."

    Found this article interesting? This article is a contributed piece from one of our valued partners. Follow us on Twitter  and LinkedIn to read more exclusive content we post.

    SHARE




    #new #atomic #macos #stealer #campaign
    New Atomic macOS Stealer Campaign Exploits ClickFix to Target Apple Users
    Jun 06, 2025The Hacker NewsMalware / Endpoint Security Cybersecurity researchers are alerting to a new malware campaign that employs the ClickFix social engineering tactic to trick users into downloading an information stealer malware known as Atomic macOS Stealeron Apple macOS systems. The campaign, according to CloudSEK, has been found to leverage typosquat domains mimicking U.S.-based telecom provider Spectrum. "macOS users are served a malicious shell script designed to steal system passwords and download an AMOS variant for further exploitation," security researcher Koushik Pal said in a report published this week. "The script uses native macOS commands to harvest credentials, bypass security mechanisms, and execute malicious binaries." It's believed that the activity is the work of Russian-speaking cybercriminals owing to the presence of Russian language comments in the malware's source code. The starting point of the attack is a web page that impersonates Spectrum. Visitors to the sites in question are served a message that instructs them to complete a hCaptcha verification check to in order to "review the security" of their connection before proceeding further. However, when the user clicks the "I am human" checkbox for evaluation, they are displayed an error message stating "CAPTCHA verification failed," urging them to click a button to go ahead with an "Alternative Verification." Doing so causes a command to be copied to the users' clipboard and the victim is shown a set of instructions depending on their operating system. While they are guided to run a PowerShell command on Windows by opening the Windows Run dialog, it's substituted by a shell script that's executed by launching the Terminal app on macOS. The shell script, for its part, prompts users to enter their system password and downloads a next-stage payload, in this case, a known stealer called Atomic Stealer. "Poorly implemented logic in the delivery sites, such as mismatched instructions across platforms, points to hastily assembled infrastructure," Pal said. "The delivery pages in question for this AMOS variant campaign contained inaccuracies in both its programming and front-end logic. For Linux user agents, a PowerShell command was copied. Furthermore, the instruction 'Press & hold the Windows Key + R' was displayed to both Windows and Mac users." The disclosure comes amid a surge in campaigns using the ClickFix tactic to deliver a wide range of malware families over the past year. "Actors carrying out these targeted attacks typically utilize similar techniques, tools, and proceduresto gain initial access," Darktrace said. "These include spear phishing attacks, drive-by compromises, or exploiting trust in familiar online platforms, such as GitHub, to deliver malicious payloads." The links distributed using these vectors typically redirect the end user to a malicious URL that displays a fake CAPTCHA verification check in an attempt to deceive users into thinking that they are carrying out something innocuous, when, in reality, they are guided to execute malicious commands to fix a non-existent issue. The end result of this effective social engineering method is that users end up compromising their own systems, enabling threat actors to bypass security controls. The cybersecurity company said it identified multiple ClickFix attacks across customer environments in Europe, the Middle East, and Africa, and in the United States. And these campaigns are gaining steam, adopting several variations but operating with the same end goal of delivering malicious payloads, ranging from trojans to stealers to ransomware. Earlier this week, Cofense outlined an email phishing campaign that spoofs Booking.com, targeting hotel chains and the food services sector with fake CAPTCHAs that lead to XWorm RAT, PureLogs Stealer, and DanaBot. The fact that ClickFix is flexible and easy to adapt makes it an attractive malware distribution mechanism. "While the exact email structure varies from sample to sample, these campaigns generally provide Bookingcom-spoofing emails with embedded links to a ClickFix fake CAPTCHA site which is used to deliver a malicious script that runs RATs and/or information stealers," Cofense said. The email security firm said it has also observed ClickFix samples mimicking cookie consent banners, wherein clicking on the "Accept" button causes a malicious script file to be downloaded. The user is subsequently prompted to run the script to accept cookies. In one April 2025 incident analyzed by Darktrace, unknown threat actors were found to utilize ClickFix as an attack vector to download nondescript payloads to burrow deeper into the target environment, conduct lateral movement, send system-related information to an external server via an HTTP POST request, and ultimately exfiltrate data. "ClickFix baiting is a widely used tactic in which threat actors exploit human error to bypass security defenses," Darktrace said. "By tricking endpoint users into performing seemingly harmless, everyday actions, attackers gain initial access to systems where they can access and exfiltrate sensitive data." Other ClickFix attacks have employed phony versions of other popular CAPTCHA services like Google reCAPTCHA and Cloudflare Turnstile for malware delivery under the guise of routine security checks. These fake pages are "pixel-perfect copies" of their legitimate counterparts, sometimes even injected into real-but-hacked websites to trick unsuspecting users. Stealers such as Lumma and StealC, as well as full-fledged remote access trojanslike NetSupport RAT are some of the payloads distributed via bogus Turnstile pages. "Modern internet users are inundated with spam checks, CAPTCHAs, and security prompts on websites, and they've been conditioned to click through these as quickly as possible," SlashNext's Daniel Kelley said. "Attackers exploit this 'verification fatigue,' knowing that many users will comply with whatever steps are presented if it looks routine." Found this article interesting? This article is a contributed piece from one of our valued partners. Follow us on Twitter  and LinkedIn to read more exclusive content we post. SHARE     #new #atomic #macos #stealer #campaign
    THEHACKERNEWS.COM
    New Atomic macOS Stealer Campaign Exploits ClickFix to Target Apple Users
    Jun 06, 2025The Hacker NewsMalware / Endpoint Security Cybersecurity researchers are alerting to a new malware campaign that employs the ClickFix social engineering tactic to trick users into downloading an information stealer malware known as Atomic macOS Stealer (AMOS) on Apple macOS systems. The campaign, according to CloudSEK, has been found to leverage typosquat domains mimicking U.S.-based telecom provider Spectrum. "macOS users are served a malicious shell script designed to steal system passwords and download an AMOS variant for further exploitation," security researcher Koushik Pal said in a report published this week. "The script uses native macOS commands to harvest credentials, bypass security mechanisms, and execute malicious binaries." It's believed that the activity is the work of Russian-speaking cybercriminals owing to the presence of Russian language comments in the malware's source code. The starting point of the attack is a web page that impersonates Spectrum ("panel-spectrum[.]net" or "spectrum-ticket[.]net"). Visitors to the sites in question are served a message that instructs them to complete a hCaptcha verification check to in order to "review the security" of their connection before proceeding further. However, when the user clicks the "I am human" checkbox for evaluation, they are displayed an error message stating "CAPTCHA verification failed," urging them to click a button to go ahead with an "Alternative Verification." Doing so causes a command to be copied to the users' clipboard and the victim is shown a set of instructions depending on their operating system. While they are guided to run a PowerShell command on Windows by opening the Windows Run dialog, it's substituted by a shell script that's executed by launching the Terminal app on macOS. The shell script, for its part, prompts users to enter their system password and downloads a next-stage payload, in this case, a known stealer called Atomic Stealer. "Poorly implemented logic in the delivery sites, such as mismatched instructions across platforms, points to hastily assembled infrastructure," Pal said. "The delivery pages in question for this AMOS variant campaign contained inaccuracies in both its programming and front-end logic. For Linux user agents, a PowerShell command was copied. Furthermore, the instruction 'Press & hold the Windows Key + R' was displayed to both Windows and Mac users." The disclosure comes amid a surge in campaigns using the ClickFix tactic to deliver a wide range of malware families over the past year. "Actors carrying out these targeted attacks typically utilize similar techniques, tools, and procedures (TTPs) to gain initial access," Darktrace said. "These include spear phishing attacks, drive-by compromises, or exploiting trust in familiar online platforms, such as GitHub, to deliver malicious payloads." The links distributed using these vectors typically redirect the end user to a malicious URL that displays a fake CAPTCHA verification check in an attempt to deceive users into thinking that they are carrying out something innocuous, when, in reality, they are guided to execute malicious commands to fix a non-existent issue. The end result of this effective social engineering method is that users end up compromising their own systems, enabling threat actors to bypass security controls. The cybersecurity company said it identified multiple ClickFix attacks across customer environments in Europe, the Middle East, and Africa (EMEA), and in the United States. And these campaigns are gaining steam, adopting several variations but operating with the same end goal of delivering malicious payloads, ranging from trojans to stealers to ransomware. Earlier this week, Cofense outlined an email phishing campaign that spoofs Booking.com, targeting hotel chains and the food services sector with fake CAPTCHAs that lead to XWorm RAT, PureLogs Stealer, and DanaBot. The fact that ClickFix is flexible and easy to adapt makes it an attractive malware distribution mechanism. "While the exact email structure varies from sample to sample, these campaigns generally provide Booking[.]com-spoofing emails with embedded links to a ClickFix fake CAPTCHA site which is used to deliver a malicious script that runs RATs and/or information stealers," Cofense said. The email security firm said it has also observed ClickFix samples mimicking cookie consent banners, wherein clicking on the "Accept" button causes a malicious script file to be downloaded. The user is subsequently prompted to run the script to accept cookies. In one April 2025 incident analyzed by Darktrace, unknown threat actors were found to utilize ClickFix as an attack vector to download nondescript payloads to burrow deeper into the target environment, conduct lateral movement, send system-related information to an external server via an HTTP POST request, and ultimately exfiltrate data. "ClickFix baiting is a widely used tactic in which threat actors exploit human error to bypass security defenses," Darktrace said. "By tricking endpoint users into performing seemingly harmless, everyday actions, attackers gain initial access to systems where they can access and exfiltrate sensitive data." Other ClickFix attacks have employed phony versions of other popular CAPTCHA services like Google reCAPTCHA and Cloudflare Turnstile for malware delivery under the guise of routine security checks. These fake pages are "pixel-perfect copies" of their legitimate counterparts, sometimes even injected into real-but-hacked websites to trick unsuspecting users. Stealers such as Lumma and StealC, as well as full-fledged remote access trojans (RATs) like NetSupport RAT are some of the payloads distributed via bogus Turnstile pages. "Modern internet users are inundated with spam checks, CAPTCHAs, and security prompts on websites, and they've been conditioned to click through these as quickly as possible," SlashNext's Daniel Kelley said. "Attackers exploit this 'verification fatigue,' knowing that many users will comply with whatever steps are presented if it looks routine." Found this article interesting? This article is a contributed piece from one of our valued partners. Follow us on Twitter  and LinkedIn to read more exclusive content we post. SHARE    
    Like
    Love
    Wow
    Sad
    Angry
    640
    0 Comentários 0 Compartilhamentos 0 Anterior
  • Popular Chrome Extensions Leak API Keys, User Data via HTTP and Hard-Coded Credentials

    Cybersecurity researchers have flagged several popular Google Chrome extensions that have been found to transmit data in HTTP and hard-code secrets in their code, exposing users to privacy and security risks.
    "Several widely used extensionsunintentionally transmit sensitive data over simple HTTP," Yuanjing Guo, a security researcher in the Symantec's Security Technology and Response team, said. "By doing so, they expose browsing domains, machine IDs, operating system details, usage analytics, and even uninstall information, in plaintext."
    The fact that the network traffic is unencrypted also means that they are susceptible to adversary-in-the-middleattacks, allowing malicious actors on the same network such as a public Wi-Fi to intercept and, even worse, modify this data, which could lead to far more serious consequences.

    The list of identified extensions are below -

    SEMRush Rankand PI Rank, which call the URL "rank.trelliancom" over plain HTTP
    Browsec VPN, which uses HTTP to call an uninstall URL at "browsec-uninstall.s3-website.eu-central-1.amazonawscom" when a user attempts to uninstall the extension
    MSN New Taband MSN Homepage, Bing Search & News, which transmit a unique machine identifier and other details over HTTP to "g.ceipmsncom"
    DualSafe Password Manager & Digital Vault, which constructs an HTTP-based URL request to "stats.itopupdatecom" along with information about the extension version, user's browser language, and usage "type"

    "Although credentials or passwords do not appear to be leaked, the fact that a password manager uses unencrypted requests for telemetry erodes trust in its overall security posture," Guo said.
    Symantec said it also identified another set of extensions with API keys, secrets, and tokens directly embedded in the JavaScript code, which an attacker could weaponize to craft malicious requests and carry out various malicious actions -

    Online Security & Privacy extension, AVG Online Security, Speed Dial- New Tab Page, 3D, Sync, and SellerSprite - Amazon Research Tool, which expose a hard-coded Google Analytics 4API secret that an attacker could use to bombard the GA4 endpoint and corrupt metrics
    Equatio – Math Made Digital, which embeds a Microsoft Azure API key used for speech recognition that an attacker could use to inflate the developer's costs or exhaust their usage limits
    Awesome Screen Recorder & Screenshotand Scrolling Screenshot Tool & Screen Capture, which expose the developer's Amazon Web Servicesaccess key used to upload screenshots to the developer's S3 bucket
    Microsoft Editor – Spelling & Grammar Checker, which exposes a telemetry key named "StatsApiKey" to log user data for analytics
    Antidote Connector, which incorporates a third-party library called InboxSDK that contains hard-coded credentials, including API keys.
    Watch2Gether, which exposes a Tenor GIF search API key
    Trust Wallet, which exposes an API key associated with the Ramp Network, a Web3 platform that offers wallet developers a way to let users buy or sell crypto directly from the app
    TravelArrow – Your Virtual Travel Agent, which exposes a geolocation API key when making queries to "ip-apicom"

    Attackers who end up finding these keys could weaponize them to drive up API costs, host illegal content, send spoofed telemetry data, and mimic cryptocurrency transaction orders, some of which could see the developer's ban getting banned.
    Adding to the concern, Antidote Connector is just one of over 90 extensions that use InboxSDK, meaning the other extensions are susceptible to the same problem. The names of the other extensions were not disclosed by Symantec.

    "From GA4 analytics secrets to Azure speech keys, and from AWS S3 credentials to Google-specific tokens, each of these snippets demonstrates how a few lines of code can jeopardize an entire service," Guo said. "The solution: never store sensitive credentials on the client side."
    Developers are recommended to switch to HTTPS whenever they send or receive data, store credentials securely in a backend server using a credentials management service, and regularly rotate secrets to further minimize risk.
    The findings show how even popular extensions with hundreds of thousands of installations can suffer from trivial misconfigurations and security blunders like hard-coded credentials, leaving users' data at risk.
    "Users of these extensions should consider removing them until the developers address the insecurecalls," the company said. "The risk is not just theoretical; unencrypted traffic is simple to capture, and the data can be used for profiling, phishing, or other targeted attacks."
    "The overarching lesson is that a large install base or a well-known brand does not necessarily ensure best practices around encryption. Extensions should be scrutinized for the protocols they use and the data they share, to ensure users' information remains truly safe."

    Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.
    #popular #chrome #extensions #leak #api
    Popular Chrome Extensions Leak API Keys, User Data via HTTP and Hard-Coded Credentials
    Cybersecurity researchers have flagged several popular Google Chrome extensions that have been found to transmit data in HTTP and hard-code secrets in their code, exposing users to privacy and security risks. "Several widely used extensionsunintentionally transmit sensitive data over simple HTTP," Yuanjing Guo, a security researcher in the Symantec's Security Technology and Response team, said. "By doing so, they expose browsing domains, machine IDs, operating system details, usage analytics, and even uninstall information, in plaintext." The fact that the network traffic is unencrypted also means that they are susceptible to adversary-in-the-middleattacks, allowing malicious actors on the same network such as a public Wi-Fi to intercept and, even worse, modify this data, which could lead to far more serious consequences. The list of identified extensions are below - SEMRush Rankand PI Rank, which call the URL "rank.trelliancom" over plain HTTP Browsec VPN, which uses HTTP to call an uninstall URL at "browsec-uninstall.s3-website.eu-central-1.amazonawscom" when a user attempts to uninstall the extension MSN New Taband MSN Homepage, Bing Search & News, which transmit a unique machine identifier and other details over HTTP to "g.ceipmsncom" DualSafe Password Manager & Digital Vault, which constructs an HTTP-based URL request to "stats.itopupdatecom" along with information about the extension version, user's browser language, and usage "type" "Although credentials or passwords do not appear to be leaked, the fact that a password manager uses unencrypted requests for telemetry erodes trust in its overall security posture," Guo said. Symantec said it also identified another set of extensions with API keys, secrets, and tokens directly embedded in the JavaScript code, which an attacker could weaponize to craft malicious requests and carry out various malicious actions - Online Security & Privacy extension, AVG Online Security, Speed Dial- New Tab Page, 3D, Sync, and SellerSprite - Amazon Research Tool, which expose a hard-coded Google Analytics 4API secret that an attacker could use to bombard the GA4 endpoint and corrupt metrics Equatio – Math Made Digital, which embeds a Microsoft Azure API key used for speech recognition that an attacker could use to inflate the developer's costs or exhaust their usage limits Awesome Screen Recorder & Screenshotand Scrolling Screenshot Tool & Screen Capture, which expose the developer's Amazon Web Servicesaccess key used to upload screenshots to the developer's S3 bucket Microsoft Editor – Spelling & Grammar Checker, which exposes a telemetry key named "StatsApiKey" to log user data for analytics Antidote Connector, which incorporates a third-party library called InboxSDK that contains hard-coded credentials, including API keys. Watch2Gether, which exposes a Tenor GIF search API key Trust Wallet, which exposes an API key associated with the Ramp Network, a Web3 platform that offers wallet developers a way to let users buy or sell crypto directly from the app TravelArrow – Your Virtual Travel Agent, which exposes a geolocation API key when making queries to "ip-apicom" Attackers who end up finding these keys could weaponize them to drive up API costs, host illegal content, send spoofed telemetry data, and mimic cryptocurrency transaction orders, some of which could see the developer's ban getting banned. Adding to the concern, Antidote Connector is just one of over 90 extensions that use InboxSDK, meaning the other extensions are susceptible to the same problem. The names of the other extensions were not disclosed by Symantec. "From GA4 analytics secrets to Azure speech keys, and from AWS S3 credentials to Google-specific tokens, each of these snippets demonstrates how a few lines of code can jeopardize an entire service," Guo said. "The solution: never store sensitive credentials on the client side." Developers are recommended to switch to HTTPS whenever they send or receive data, store credentials securely in a backend server using a credentials management service, and regularly rotate secrets to further minimize risk. The findings show how even popular extensions with hundreds of thousands of installations can suffer from trivial misconfigurations and security blunders like hard-coded credentials, leaving users' data at risk. "Users of these extensions should consider removing them until the developers address the insecurecalls," the company said. "The risk is not just theoretical; unencrypted traffic is simple to capture, and the data can be used for profiling, phishing, or other targeted attacks." "The overarching lesson is that a large install base or a well-known brand does not necessarily ensure best practices around encryption. Extensions should be scrutinized for the protocols they use and the data they share, to ensure users' information remains truly safe." Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post. #popular #chrome #extensions #leak #api
    THEHACKERNEWS.COM
    Popular Chrome Extensions Leak API Keys, User Data via HTTP and Hard-Coded Credentials
    Cybersecurity researchers have flagged several popular Google Chrome extensions that have been found to transmit data in HTTP and hard-code secrets in their code, exposing users to privacy and security risks. "Several widely used extensions [...] unintentionally transmit sensitive data over simple HTTP," Yuanjing Guo, a security researcher in the Symantec's Security Technology and Response team, said. "By doing so, they expose browsing domains, machine IDs, operating system details, usage analytics, and even uninstall information, in plaintext." The fact that the network traffic is unencrypted also means that they are susceptible to adversary-in-the-middle (AitM) attacks, allowing malicious actors on the same network such as a public Wi-Fi to intercept and, even worse, modify this data, which could lead to far more serious consequences. The list of identified extensions are below - SEMRush Rank (extension ID: idbhoeaiokcojcgappfigpifhpkjgmab) and PI Rank (ID: ccgdboldgdlngcgfdolahmiilojmfndl), which call the URL "rank.trellian[.]com" over plain HTTP Browsec VPN (ID: omghfjlpggmjjaagoclmmobgdodcjboh), which uses HTTP to call an uninstall URL at "browsec-uninstall.s3-website.eu-central-1.amazonaws[.]com" when a user attempts to uninstall the extension MSN New Tab (ID: lklfbkdigihjaaeamncibechhgalldgl) and MSN Homepage, Bing Search & News (ID: midiombanaceofjhodpdibeppmnamfcj), which transmit a unique machine identifier and other details over HTTP to "g.ceipmsn[.]com" DualSafe Password Manager & Digital Vault (ID: lgbjhdkjmpgjgcbcdlhkokkckpjmedgc), which constructs an HTTP-based URL request to "stats.itopupdate[.]com" along with information about the extension version, user's browser language, and usage "type" "Although credentials or passwords do not appear to be leaked, the fact that a password manager uses unencrypted requests for telemetry erodes trust in its overall security posture," Guo said. Symantec said it also identified another set of extensions with API keys, secrets, and tokens directly embedded in the JavaScript code, which an attacker could weaponize to craft malicious requests and carry out various malicious actions - Online Security & Privacy extension (ID: gomekmidlodglbbmalcneegieacbdmki), AVG Online Security (ID: nbmoafcmbajniiapeidgficgifbfmjfo), Speed Dial [FVD] - New Tab Page, 3D, Sync (ID: llaficoajjainaijghjlofdfmbjpebpa), and SellerSprite - Amazon Research Tool (ID: lnbmbgocenenhhhdojdielgnmeflbnfb), which expose a hard-coded Google Analytics 4 (GA4) API secret that an attacker could use to bombard the GA4 endpoint and corrupt metrics Equatio – Math Made Digital (ID: hjngolefdpdnooamgdldlkjgmdcmcjnc), which embeds a Microsoft Azure API key used for speech recognition that an attacker could use to inflate the developer's costs or exhaust their usage limits Awesome Screen Recorder & Screenshot (ID: nlipoenfbbikpbjkfpfillcgkoblgpmj) and Scrolling Screenshot Tool & Screen Capture (ID: mfpiaehgjbbfednooihadalhehabhcjo), which expose the developer's Amazon Web Services (AWS) access key used to upload screenshots to the developer's S3 bucket Microsoft Editor – Spelling & Grammar Checker (ID: gpaiobkfhnonedkhhfjpmhdalgeoebfa), which exposes a telemetry key named "StatsApiKey" to log user data for analytics Antidote Connector (ID: lmbopdiikkamfphhgcckcjhojnokgfeo), which incorporates a third-party library called InboxSDK that contains hard-coded credentials, including API keys. Watch2Gether (ID: cimpffimgeipdhnhjohpbehjkcdpjolg), which exposes a Tenor GIF search API key Trust Wallet (ID: egjidjbpglichdcondbcbdnbeeppgdph), which exposes an API key associated with the Ramp Network, a Web3 platform that offers wallet developers a way to let users buy or sell crypto directly from the app TravelArrow – Your Virtual Travel Agent (ID: coplmfnphahpcknbchcehdikbdieognn), which exposes a geolocation API key when making queries to "ip-api[.]com" Attackers who end up finding these keys could weaponize them to drive up API costs, host illegal content, send spoofed telemetry data, and mimic cryptocurrency transaction orders, some of which could see the developer's ban getting banned. Adding to the concern, Antidote Connector is just one of over 90 extensions that use InboxSDK, meaning the other extensions are susceptible to the same problem. The names of the other extensions were not disclosed by Symantec. "From GA4 analytics secrets to Azure speech keys, and from AWS S3 credentials to Google-specific tokens, each of these snippets demonstrates how a few lines of code can jeopardize an entire service," Guo said. "The solution: never store sensitive credentials on the client side." Developers are recommended to switch to HTTPS whenever they send or receive data, store credentials securely in a backend server using a credentials management service, and regularly rotate secrets to further minimize risk. The findings show how even popular extensions with hundreds of thousands of installations can suffer from trivial misconfigurations and security blunders like hard-coded credentials, leaving users' data at risk. "Users of these extensions should consider removing them until the developers address the insecure [HTTP] calls," the company said. "The risk is not just theoretical; unencrypted traffic is simple to capture, and the data can be used for profiling, phishing, or other targeted attacks." "The overarching lesson is that a large install base or a well-known brand does not necessarily ensure best practices around encryption. Extensions should be scrutinized for the protocols they use and the data they share, to ensure users' information remains truly safe." Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.
    Like
    Love
    Wow
    Sad
    Angry
    334
    0 Comentários 0 Compartilhamentos 0 Anterior
  • Cyber Security Threat Analysis: A Complete Guide for 2025

    Posted on : May 31, 2025

    By

    Tech World Times

    Security Testing 

    Rate this post

    In a digital era where cyberattacks are increasing in frequency, complexity, and cost, organizations must stay one step ahead by investing in robust cybersecurity strategies. At the heart of this defense lies Cyber Security Threat Analysis, a process that helps businesses detect, understand, and respond to threats before they escalate. This comprehensive guide explores the fundamentals of threat analysis, the methodologies used in 2025, emerging trends, and how companies can implement an effective threat analysis framework to safeguard their digital assets.

    What is Cyber Security Threat Analysis?
    Cyber Security Threat Analysis is the process of identifying, assessing, and prioritizing potential and existing cybersecurity threats. It involves analyzing data from various sources to uncover vulnerabilities, detect malicious activity, and evaluate the potential impact on systems, networks, and data. The goal is to proactively defend against attacks rather than react to them after damage is done.
    Why Threat Analysis Matters in 2025
    With the growing adoption of AI, IoT, cloud computing, and remote work, the digital landscape has expanded. This has also widened the attack surface for threat actors. According to recent studies, global cybercrime costs are projected to reach trillion annually by 2025. Threat analysis is no longer optional; it’s a critical component of enterprise cybersecurity strategies.
    Key Components of Cyber Security Threat Analysis

    Threat Intelligence Gathering
    Collecting data from open-source intelligence, internal systems, dark web monitoring, and threat intelligence platforms.Threat Identification
    Recognizing indicators of compromise, such as malicious IP addresses, abnormal behavior, and unusual login attempts.Risk Assessment
    Evaluating the likelihood and potential impact of a threat on business operations.Vulnerability Management
    Identifying weaknesses in systems, applications, and networks that could be exploited.Incident Response Planning
    Developing action plans to quickly contain and remediate threats.

    Types of Cyber Threats in 2025
    Threat actors continue to evolve, leveraging advanced techniques to breach even the most secure environments. Here are the most prominent threats organizations face in 2025:

    Ransomware-as-a-Service: Cybercriminals offer ransomware toolkits to affiliates, enabling less-skilled attackers to launch sophisticated attacks.
    Phishing 3.0: AI-generated deepfake emails and voice messages make phishing harder to detect.
    Supply Chain Attacks: Attackers compromise third-party software or vendors to gain access to larger networks.
    Cloud Security Breaches: Misconfigured cloud environments remain a top vulnerability.
    IoT Exploits: Devices with weak security protocols are targeted to infiltrate larger systems.
    Insider Threats: Employees or contractors may intentionally or unintentionally expose systems to risk.

    Modern Threat Analysis Methodologies
    1. MITRE ATT&CK Framework
    The MITRE ATT&CK framework maps the behavior and techniques of attackers, providing a structured method to analyze and predict threats.
    2. Kill Chain Analysis
    Developed by Lockheed Martin, this method breaks down the stages of a cyberattack from reconnaissance to actions on objectives, allowing analysts to disrupt attacks early in the chain.
    3. Threat Modeling
    Threat modeling involves identifying assets, understanding potential threats, and designing countermeasures. STRIDEis a popular model used in 2025.
    4. Behavior Analytics
    User and Entity Behavior Analyticsuses machine learning to detect anomalies in user behavior that could indicate threats.

    The Role of AI and Automation in Threat Analysis
    Artificial Intelligenceand automation are revolutionizing Cyber Security Threat Analysis in 2025. AI-driven analytics tools can:

    Correlate large volumes of data in real-time
    Detect zero-day vulnerabilities
    Predict attack patterns
    Automate incident response processes

    Platforms like IBM QRadar, Microsoft Sentinel, and Splunk integrate AI capabilities for enhanced threat detection and response.

    Building a Threat Analysis Framework in Your Organization

    Establish Objectives
    Define what you want to protect, the types of threats to look for, and the goals of your analysis.Choose the Right Tools
    Invest in threat intelligence platforms, SIEM systems, and endpoint detection and responsetools.Create a Skilled Team
    Assemble cybersecurity professionals including threat hunters, analysts, and incident responders.Integrate Data Sources
    Pull data from internal logs, external intelligence feeds, user activity, and cloud services.Run Simulations
    Regularly test your threat detection capabilities using red teaming and penetration testing.Review and Adapt
    Continuously update the threat model based on evolving threats and organizational changes.

    Metrics to Measure Threat Analysis Success

    Mean Time to Detect: Time taken to identify a threat.
    Mean Time to Respond: Time taken to neutralize the threat.
    False Positive Rate: Accuracy of alerts generated.
    Threat Coverage: Percentage of known threats the system can detect.
    Business Impact Score: How much value the threat analysis process adds to business continuity and risk mitigation.

    Challenges in Cyber Security Threat Analysis

    Data Overload: Managing and analyzing massive volumes of data can be overwhelming.
    Alert Fatigue: Too many alerts, including false positives, reduce response effectiveness.
    Talent Shortage: Skilled cybersecurity professionals are in high demand but short supply.
    Rapid Threat Evolution: Attack techniques evolve quickly, making it hard to maintain up-to-date defenses.

    Best Practices for Effective Threat Analysis

    Prioritize Critical Assets: Focus analysis efforts on high-value systems and data.
    Implement Zero Trust Security: Never trust, always verify; ensure robust identity and access controls.
    Automate Where Possible: Use automation to handle repetitive tasks and free up human resources for strategic analysis.
    Encourage a Security Culture: Train employees to recognize and report suspicious activity.
    Leverage Community Intelligence: Participate in threat intelligence sharing communities like ISACs.

    Future of Threat Analysis Beyond 2025
    The future of Cyber Security Threat Analysis will continue to evolve with:

    Quantum Computing Threats: New cryptographic challenges will require upgraded threat models.
    Decentralized Threat Intelligence: Blockchain-based threat sharing platforms could emerge.
    Autonomous Cyber Defense: AI systems capable of defending networks without human input.

    Conclusion
    Cyber Security Threat Analysis is an indispensable element of modern digital defense, especially in a hyper-connected 2025. With increasingly sophisticated threats on the horizon, businesses must adopt proactive threat analysis strategies to protect their digital environments. From leveraging AI tools to integrating structured methodologies like MITRE ATT&CK and STRIDE, a multi-layered approach can provide robust defense against cyber adversaries. Investing in skilled teams, up-to-date technologies, and continuous improvement is essential to building resilient cybersecurity infrastructure.

    FAQs
    1. What is Cyber Security Threat Analysis?
    It is the process of identifying, evaluating, and mitigating potential cybersecurity threats to protect data, networks, and systems.2. Why is threat analysis important in 2025?
    With rising digital threats and complex attack vectors, proactive analysis helps businesses prevent breaches and minimize damage.3. Which tools are best for threat analysis?
    Popular tools include Splunk, IBM QRadar, Microsoft Sentinel, and CrowdStrike.4. How does AI help in threat analysis?
    AI helps by automating data analysis, detecting patterns, and predicting threats in real-time.5. What industries benefit most from threat analysis?
    Finance, healthcare, government, and tech sectors, where data protection and regulatory compliance are critical.Tech World TimesTech World Times, a global collective focusing on the latest tech news and trends in blockchain, Fintech, Development & Testing, AI and Startups. If you are looking for the guest post then contact at techworldtimes@gmail.com
    #cyber #security #threat #analysis #complete
    Cyber Security Threat Analysis: A Complete Guide for 2025
    Posted on : May 31, 2025 By Tech World Times Security Testing  Rate this post In a digital era where cyberattacks are increasing in frequency, complexity, and cost, organizations must stay one step ahead by investing in robust cybersecurity strategies. At the heart of this defense lies Cyber Security Threat Analysis, a process that helps businesses detect, understand, and respond to threats before they escalate. This comprehensive guide explores the fundamentals of threat analysis, the methodologies used in 2025, emerging trends, and how companies can implement an effective threat analysis framework to safeguard their digital assets. What is Cyber Security Threat Analysis? Cyber Security Threat Analysis is the process of identifying, assessing, and prioritizing potential and existing cybersecurity threats. It involves analyzing data from various sources to uncover vulnerabilities, detect malicious activity, and evaluate the potential impact on systems, networks, and data. The goal is to proactively defend against attacks rather than react to them after damage is done. Why Threat Analysis Matters in 2025 With the growing adoption of AI, IoT, cloud computing, and remote work, the digital landscape has expanded. This has also widened the attack surface for threat actors. According to recent studies, global cybercrime costs are projected to reach trillion annually by 2025. Threat analysis is no longer optional; it’s a critical component of enterprise cybersecurity strategies. Key Components of Cyber Security Threat Analysis Threat Intelligence Gathering Collecting data from open-source intelligence, internal systems, dark web monitoring, and threat intelligence platforms.Threat Identification Recognizing indicators of compromise, such as malicious IP addresses, abnormal behavior, and unusual login attempts.Risk Assessment Evaluating the likelihood and potential impact of a threat on business operations.Vulnerability Management Identifying weaknesses in systems, applications, and networks that could be exploited.Incident Response Planning Developing action plans to quickly contain and remediate threats. Types of Cyber Threats in 2025 Threat actors continue to evolve, leveraging advanced techniques to breach even the most secure environments. Here are the most prominent threats organizations face in 2025: Ransomware-as-a-Service: Cybercriminals offer ransomware toolkits to affiliates, enabling less-skilled attackers to launch sophisticated attacks. Phishing 3.0: AI-generated deepfake emails and voice messages make phishing harder to detect. Supply Chain Attacks: Attackers compromise third-party software or vendors to gain access to larger networks. Cloud Security Breaches: Misconfigured cloud environments remain a top vulnerability. IoT Exploits: Devices with weak security protocols are targeted to infiltrate larger systems. Insider Threats: Employees or contractors may intentionally or unintentionally expose systems to risk. Modern Threat Analysis Methodologies 1. MITRE ATT&CK Framework The MITRE ATT&CK framework maps the behavior and techniques of attackers, providing a structured method to analyze and predict threats. 2. Kill Chain Analysis Developed by Lockheed Martin, this method breaks down the stages of a cyberattack from reconnaissance to actions on objectives, allowing analysts to disrupt attacks early in the chain. 3. Threat Modeling Threat modeling involves identifying assets, understanding potential threats, and designing countermeasures. STRIDEis a popular model used in 2025. 4. Behavior Analytics User and Entity Behavior Analyticsuses machine learning to detect anomalies in user behavior that could indicate threats. The Role of AI and Automation in Threat Analysis Artificial Intelligenceand automation are revolutionizing Cyber Security Threat Analysis in 2025. AI-driven analytics tools can: Correlate large volumes of data in real-time Detect zero-day vulnerabilities Predict attack patterns Automate incident response processes Platforms like IBM QRadar, Microsoft Sentinel, and Splunk integrate AI capabilities for enhanced threat detection and response. Building a Threat Analysis Framework in Your Organization Establish Objectives Define what you want to protect, the types of threats to look for, and the goals of your analysis.Choose the Right Tools Invest in threat intelligence platforms, SIEM systems, and endpoint detection and responsetools.Create a Skilled Team Assemble cybersecurity professionals including threat hunters, analysts, and incident responders.Integrate Data Sources Pull data from internal logs, external intelligence feeds, user activity, and cloud services.Run Simulations Regularly test your threat detection capabilities using red teaming and penetration testing.Review and Adapt Continuously update the threat model based on evolving threats and organizational changes. Metrics to Measure Threat Analysis Success Mean Time to Detect: Time taken to identify a threat. Mean Time to Respond: Time taken to neutralize the threat. False Positive Rate: Accuracy of alerts generated. Threat Coverage: Percentage of known threats the system can detect. Business Impact Score: How much value the threat analysis process adds to business continuity and risk mitigation. Challenges in Cyber Security Threat Analysis Data Overload: Managing and analyzing massive volumes of data can be overwhelming. Alert Fatigue: Too many alerts, including false positives, reduce response effectiveness. Talent Shortage: Skilled cybersecurity professionals are in high demand but short supply. Rapid Threat Evolution: Attack techniques evolve quickly, making it hard to maintain up-to-date defenses. Best Practices for Effective Threat Analysis Prioritize Critical Assets: Focus analysis efforts on high-value systems and data. Implement Zero Trust Security: Never trust, always verify; ensure robust identity and access controls. Automate Where Possible: Use automation to handle repetitive tasks and free up human resources for strategic analysis. Encourage a Security Culture: Train employees to recognize and report suspicious activity. Leverage Community Intelligence: Participate in threat intelligence sharing communities like ISACs. Future of Threat Analysis Beyond 2025 The future of Cyber Security Threat Analysis will continue to evolve with: Quantum Computing Threats: New cryptographic challenges will require upgraded threat models. Decentralized Threat Intelligence: Blockchain-based threat sharing platforms could emerge. Autonomous Cyber Defense: AI systems capable of defending networks without human input. Conclusion Cyber Security Threat Analysis is an indispensable element of modern digital defense, especially in a hyper-connected 2025. With increasingly sophisticated threats on the horizon, businesses must adopt proactive threat analysis strategies to protect their digital environments. From leveraging AI tools to integrating structured methodologies like MITRE ATT&CK and STRIDE, a multi-layered approach can provide robust defense against cyber adversaries. Investing in skilled teams, up-to-date technologies, and continuous improvement is essential to building resilient cybersecurity infrastructure. FAQs 1. What is Cyber Security Threat Analysis? It is the process of identifying, evaluating, and mitigating potential cybersecurity threats to protect data, networks, and systems.2. Why is threat analysis important in 2025? With rising digital threats and complex attack vectors, proactive analysis helps businesses prevent breaches and minimize damage.3. Which tools are best for threat analysis? Popular tools include Splunk, IBM QRadar, Microsoft Sentinel, and CrowdStrike.4. How does AI help in threat analysis? AI helps by automating data analysis, detecting patterns, and predicting threats in real-time.5. What industries benefit most from threat analysis? Finance, healthcare, government, and tech sectors, where data protection and regulatory compliance are critical.Tech World TimesTech World Times, a global collective focusing on the latest tech news and trends in blockchain, Fintech, Development & Testing, AI and Startups. If you are looking for the guest post then contact at techworldtimes@gmail.com #cyber #security #threat #analysis #complete
    TECHWORLDTIMES.COM
    Cyber Security Threat Analysis: A Complete Guide for 2025
    Posted on : May 31, 2025 By Tech World Times Security Testing  Rate this post In a digital era where cyberattacks are increasing in frequency, complexity, and cost, organizations must stay one step ahead by investing in robust cybersecurity strategies. At the heart of this defense lies Cyber Security Threat Analysis, a process that helps businesses detect, understand, and respond to threats before they escalate. This comprehensive guide explores the fundamentals of threat analysis, the methodologies used in 2025, emerging trends, and how companies can implement an effective threat analysis framework to safeguard their digital assets. What is Cyber Security Threat Analysis? Cyber Security Threat Analysis is the process of identifying, assessing, and prioritizing potential and existing cybersecurity threats. It involves analyzing data from various sources to uncover vulnerabilities, detect malicious activity, and evaluate the potential impact on systems, networks, and data. The goal is to proactively defend against attacks rather than react to them after damage is done. Why Threat Analysis Matters in 2025 With the growing adoption of AI, IoT, cloud computing, and remote work, the digital landscape has expanded. This has also widened the attack surface for threat actors. According to recent studies, global cybercrime costs are projected to reach $10.5 trillion annually by 2025. Threat analysis is no longer optional; it’s a critical component of enterprise cybersecurity strategies. Key Components of Cyber Security Threat Analysis Threat Intelligence Gathering Collecting data from open-source intelligence (OSINT), internal systems, dark web monitoring, and threat intelligence platforms.Threat Identification Recognizing indicators of compromise (IOCs), such as malicious IP addresses, abnormal behavior, and unusual login attempts.Risk Assessment Evaluating the likelihood and potential impact of a threat on business operations.Vulnerability Management Identifying weaknesses in systems, applications, and networks that could be exploited.Incident Response Planning Developing action plans to quickly contain and remediate threats. Types of Cyber Threats in 2025 Threat actors continue to evolve, leveraging advanced techniques to breach even the most secure environments. Here are the most prominent threats organizations face in 2025: Ransomware-as-a-Service (RaaS): Cybercriminals offer ransomware toolkits to affiliates, enabling less-skilled attackers to launch sophisticated attacks. Phishing 3.0: AI-generated deepfake emails and voice messages make phishing harder to detect. Supply Chain Attacks: Attackers compromise third-party software or vendors to gain access to larger networks. Cloud Security Breaches: Misconfigured cloud environments remain a top vulnerability. IoT Exploits: Devices with weak security protocols are targeted to infiltrate larger systems. Insider Threats: Employees or contractors may intentionally or unintentionally expose systems to risk. Modern Threat Analysis Methodologies 1. MITRE ATT&CK Framework The MITRE ATT&CK framework maps the behavior and techniques of attackers, providing a structured method to analyze and predict threats. 2. Kill Chain Analysis Developed by Lockheed Martin, this method breaks down the stages of a cyberattack from reconnaissance to actions on objectives, allowing analysts to disrupt attacks early in the chain. 3. Threat Modeling Threat modeling involves identifying assets, understanding potential threats, and designing countermeasures. STRIDE (Spoofing, Tampering, Repudiation, Information disclosure, Denial of service, Elevation of privilege) is a popular model used in 2025. 4. Behavior Analytics User and Entity Behavior Analytics (UEBA) uses machine learning to detect anomalies in user behavior that could indicate threats. The Role of AI and Automation in Threat Analysis Artificial Intelligence (AI) and automation are revolutionizing Cyber Security Threat Analysis in 2025. AI-driven analytics tools can: Correlate large volumes of data in real-time Detect zero-day vulnerabilities Predict attack patterns Automate incident response processes Platforms like IBM QRadar, Microsoft Sentinel, and Splunk integrate AI capabilities for enhanced threat detection and response. Building a Threat Analysis Framework in Your Organization Establish Objectives Define what you want to protect, the types of threats to look for, and the goals of your analysis.Choose the Right Tools Invest in threat intelligence platforms, SIEM systems, and endpoint detection and response (EDR) tools.Create a Skilled Team Assemble cybersecurity professionals including threat hunters, analysts, and incident responders.Integrate Data Sources Pull data from internal logs, external intelligence feeds, user activity, and cloud services.Run Simulations Regularly test your threat detection capabilities using red teaming and penetration testing.Review and Adapt Continuously update the threat model based on evolving threats and organizational changes. Metrics to Measure Threat Analysis Success Mean Time to Detect (MTTD): Time taken to identify a threat. Mean Time to Respond (MTTR): Time taken to neutralize the threat. False Positive Rate: Accuracy of alerts generated. Threat Coverage: Percentage of known threats the system can detect. Business Impact Score: How much value the threat analysis process adds to business continuity and risk mitigation. Challenges in Cyber Security Threat Analysis Data Overload: Managing and analyzing massive volumes of data can be overwhelming. Alert Fatigue: Too many alerts, including false positives, reduce response effectiveness. Talent Shortage: Skilled cybersecurity professionals are in high demand but short supply. Rapid Threat Evolution: Attack techniques evolve quickly, making it hard to maintain up-to-date defenses. Best Practices for Effective Threat Analysis Prioritize Critical Assets: Focus analysis efforts on high-value systems and data. Implement Zero Trust Security: Never trust, always verify; ensure robust identity and access controls. Automate Where Possible: Use automation to handle repetitive tasks and free up human resources for strategic analysis. Encourage a Security Culture: Train employees to recognize and report suspicious activity. Leverage Community Intelligence: Participate in threat intelligence sharing communities like ISACs (Information Sharing and Analysis Centers). Future of Threat Analysis Beyond 2025 The future of Cyber Security Threat Analysis will continue to evolve with: Quantum Computing Threats: New cryptographic challenges will require upgraded threat models. Decentralized Threat Intelligence: Blockchain-based threat sharing platforms could emerge. Autonomous Cyber Defense: AI systems capable of defending networks without human input. Conclusion Cyber Security Threat Analysis is an indispensable element of modern digital defense, especially in a hyper-connected 2025. With increasingly sophisticated threats on the horizon, businesses must adopt proactive threat analysis strategies to protect their digital environments. From leveraging AI tools to integrating structured methodologies like MITRE ATT&CK and STRIDE, a multi-layered approach can provide robust defense against cyber adversaries. Investing in skilled teams, up-to-date technologies, and continuous improvement is essential to building resilient cybersecurity infrastructure. FAQs 1. What is Cyber Security Threat Analysis? It is the process of identifying, evaluating, and mitigating potential cybersecurity threats to protect data, networks, and systems.2. Why is threat analysis important in 2025? With rising digital threats and complex attack vectors, proactive analysis helps businesses prevent breaches and minimize damage.3. Which tools are best for threat analysis? Popular tools include Splunk, IBM QRadar, Microsoft Sentinel, and CrowdStrike.4. How does AI help in threat analysis? AI helps by automating data analysis, detecting patterns, and predicting threats in real-time.5. What industries benefit most from threat analysis? Finance, healthcare, government, and tech sectors, where data protection and regulatory compliance are critical.Tech World TimesTech World Times (TWT), a global collective focusing on the latest tech news and trends in blockchain, Fintech, Development & Testing, AI and Startups. If you are looking for the guest post then contact at techworldtimes@gmail.com
    0 Comentários 0 Compartilhamentos 0 Anterior
  • From the "Department of No" to a "Culture of Yes": A Healthcare CISO's Journey to Enabling Modern Care

    May 30, 2025The Hacker NewsHealthcare / Zero Trust

    Breaking Out of the Security Mosh Pit
    When Jason Elrod, CISO of MultiCare Health System, describes legacy healthcare IT environments, he doesn't mince words: "Healthcare loves to walk backwards into the future. And this is how we got here, because there are a lot of things that we could have prepared for that we didn't, because we were so concentrated on where we were."
    This chaotic approach has characterized healthcare IT for decades. In a sector where lives depend on technology working flawlessly 24/7/365, security teams have traditionally functioned as gatekeepers—the "Department of No"—focused on protection at the expense of innovation and care delivery.
    But as healthcare continues its digital transformation journey, this approach is no longer sustainable. With 14 hospitals, hundreds of urgent care clinics, and nearly 30,000 employees serving millions of patients, MultiCare needed a different path forward – one that didn't sacrifice innovation for safety. That shift began with a mindset change at the top that was driven by years of experience navigating these exact tensions.
    Jason Elrod's View: The Healthcare Security Conundrum
    After 15+ years as a healthcare CISO, Elrod has a unique perspective on the security challenges facing healthcare organizations. According to him, healthcare's specific operational realities create security dilemmas unlike any other industry:

    Always-on operations: "When can you take it down? When can you stop everything and upgrade it?" asks Elrod. Unlike other industries, healthcare operates 24/7/365 with little room for downtime.
    Life-or-death access requirements: "We have to make sure all the information they need is available when they need it, with the minimum amount of friction possible. Because it's me, it's you, it's our communities, it's our loved ones, it's life or death."
    Expanding attack surface: With the shift to telemedicine, remote work, and connected medical devices, the threat landscape has expanded dramatically. "It's like a bowl of spaghetti where each strand needs to be able to talk to one end or the other, but just to the strands it needs to."
    Misaligned incentives: "IT historically has been concentrated on availability and speed and access, ubiquitous access… And security says, 'That's a fantastic Lego car you built. Before you can go outside and play with it, I'm going to stick a bunch more Legos on top of it called security, privacy, and compliance.'"

    It's a recipe for burnout, blame, and breakdowns. But what if security could enable care instead of obstructing it?
    Watch how MultiCare turned that possibility into practice in the Elisity Microsegmentation Platform case study with Jason Elrod, CISO, MultiCare Health System.

    Identity: The Key to Modern Healthcare Security
    The breakthrough for MultiCare came with the implementation of identity-based microsegmentation through Elisity.
    "The biggest attack surface is the identity of every individual," notes Elrod. "Why are the attacks always on identity? Because in healthcare, we must make sure all the information is available when they need it, with the minimum amount of friction possible."
    Traditional network segmentation approaches relied on complex VLANs, firewalls, and endpoint agents. The result? "A Byzantine spaghetti mess" that became increasingly difficult to manage and update.
    Elisity's approach changed this paradigm by focusing on identity rather than network location:

    Dynamic security policies that follow users, workloads, and devices wherever they appear on the network
    Granular access controls that create security perimeters around individual assets
    Policy enforcement points that leverage existing infrastructure to implement microsegmentation without requiring new hardware, agents, or complex network reconfigurations

    From Skepticism to Transformation
    When Elrod first introduced Elisity to his team, they responded with healthy skepticism. "They're like, 'Did you hit your head? Are you sure you read what you were saying? I thought you stopped drinking,'" Elrod recalls.
    The technical teams were doubtful that such a microsegmentation solution could work with their existing infrastructure. "They said, 'That doesn't sound like something that can be done,'" shares Elrod.
    But seeing was believing. "When you see people who are deeply technical, people who just know their craft really well, and they see something and go 'Wow'… it shakes the pillars of their opinions about what can be done," explains Elrod.
    The Elisity solution delivered on its promises:

    Rapid implementation without disruptive network changes
    Real-time automated or manual policy adjustments that previously took weeks to implement
    Comprehensive visibility across previously siloed environments
    Enhanced security posture without compromising availability

    ...all without forcing a tradeoff between protection and performance.
    But what surprised Elrod most wasn't just what the technology did, but how it changed the people using it.Breaking Down Walls Between Teams
    Perhaps the most unexpected benefit was how the solution transformed relationships between teams.
    "There's been a friction point. Put this control and constraint around the network. Who's the first person to call? They're going to call IT. 'I can't do this thing.' And I'm saying, 'Well, you can't open everything, because everybody can't have everything. Because the bad guys will have everything then,'" Elrod explains.
    Identity-based microsegmentation changed this dynamic:
    "It changed from 'How do I get around you?' and 'How do you get around me?' to cooperation. Because now it's like, 'Oh, well, let's make that change together.' It shifted culturally, and this was not something I expected… We really are on the same team. This is a solution that works for all of us, makes all of our jobs better, Security and IT. It is a force multiplier across the organization," says Elrod.
    With Elisity, security and IT teams now share incentives rather than competing priorities. "The same thing that allows me to make connectivity work between this area and here in a frictionless fashion is also the same exact thing that provides the rationalized security around it. Same tool, same dashboard, same team," Elrod notes.
    Enabling a Culture of Yes
    For healthcare providers, the impact is profound. "If they don't have to worry about access, don't have to worry about the controls, they can take the cognitive load of thinking and worrying about the compliance factors of it, the security, the privacy, the technology underlying the table that they're working on," says Elrod.
    This shift enables a fundamental change in how security interacts with clinical staff:

    Speed of delivery: "We can do that at the speed of need as opposed to the speed of bureaucracy, the speed of technology, the speed of legacy," explains Elrod.
    Granular control: "How would you like your own segment on the network, wherever you may roam? I can base it on your identity, wherever you're at," Elrod shares.
    Enhanced trust: "Being able to instill that confidence that, 'Hey, it's secure, it's stable, it's scalable, it's functional, we can support it. And we can move at the pace that you want to move at.'"

    Breaking Down Silos: The Business Imperative of Security-IT Integration
    The traditional separation between security and IT operations teams is rapidly becoming obsolete as organizations recognize the strategic advantages of integration. Recent research demonstrates compelling business benefits for enterprises that successfully bridge this divide, particularly for those in manufacturing, industrial, and healthcare sectors.
    According to Skybox Security, 76% of organizations believe miscommunication between network and security teams has negatively impacted their security posture. This disconnect creates tangible security risks and operational inefficiencies. Conversely, organizations with unified security and IT operations reported 30% fewer significant security incidents compared to those with siloed teams.
    For healthcare organizations, the stakes are even higher. Among healthcare institutions that experienced ransomware attacks, those with siloed security and IT operations reported a 28% increase in patient mortality rates in 2024, up from 23% in 2023. This stark reality underscores that cybersecurity integration isn't just an operational consideration—it's a patient safety imperative.
    The financial case for integration is equally compelling. A Forrester Total Economic Impact study on ServiceNow Security Operations solutions demonstrated a 238% ROI and million in present value benefits, with a 6-month payback period when integrating security and IT operations.
    Forward-thinking organizations are adopting sophisticated integration models like Cyber Fusion Centers. Gartner research confirms these represent a significant advancement over traditional security operations, predicting that by 2028, 20% of large enterprises will shift to cyber-fraud fusion teams to combat internal and external adversaries, up from less than 5% in 2023.
    For enterprise leaders, the message is clear: breaking down operational silos between security and IT teams isn't just good practice—it's essential for comprehensive protection, operational efficiency, and competitive advantage in today's threat landscape. Few understand that better than Elrod, who's spent decades trying to bridge this gap both technologically and culturally.
    The Bridge to Modern Healthcare
    For Elrod, identity-based microsegmentation represents more than just a technology solution—it's a bridge between where healthcare has been and where it needs to go.
    "Technology in the past wasn't bought because it was crappy… They were great. Good intention. They did what they needed to do at the time. But there's a lot of temporal distance between now and when that made sense," he explains.
    Elisity helps MultiCare "build that bridge from where we have been to where we need to go… It's a ladder out of the pit. This is great. Let's stop throwing things in there. Let's actually do things in a rational fashion," says Elrod.
    Looking Ahead
    While no single solution can address all of healthcare's security challenges, identity-based microsegmentation is "one of the bricks on the yellow brick road to making healthcare security and technology the culture of Yes," according to Elrod.
    As healthcare organizations continue to balance security requirements with the need for frictionless care delivery, solutions that align these competing priorities will become increasingly essential.
    By implementing identity-based microsegmentation, MultiCare has transformed security from a barrier to an enabler of modern healthcare—proving that with the right approach, it's possible to create a culture where "yes" is the default response without compromising security or compliance.
    Ready to escape your own security "mosh pit" and build a bridge to modern healthcare? Download Elisity's Microsegmentation Buyer's Guide 2025. This resource equips healthcare security leaders with evaluation criteria, implementation strategies, and ROI frameworks that have helped organizations like MultiCare transform from the "Department of No" to a "Culture of Yes." Begin your journey toward identity-based security today. To learn more about Elisity and how we help transform healthcare organizations like MultiCare, visit our website here.

    Found this article interesting? This article is a contributed piece from one of our valued partners. Follow us on Twitter  and LinkedIn to read more exclusive content we post.

    SHARE




    #quotdepartment #noquot #quotculture #yesquot #healthcare
    From the "Department of No" to a "Culture of Yes": A Healthcare CISO's Journey to Enabling Modern Care
    May 30, 2025The Hacker NewsHealthcare / Zero Trust Breaking Out of the Security Mosh Pit When Jason Elrod, CISO of MultiCare Health System, describes legacy healthcare IT environments, he doesn't mince words: "Healthcare loves to walk backwards into the future. And this is how we got here, because there are a lot of things that we could have prepared for that we didn't, because we were so concentrated on where we were." This chaotic approach has characterized healthcare IT for decades. In a sector where lives depend on technology working flawlessly 24/7/365, security teams have traditionally functioned as gatekeepers—the "Department of No"—focused on protection at the expense of innovation and care delivery. But as healthcare continues its digital transformation journey, this approach is no longer sustainable. With 14 hospitals, hundreds of urgent care clinics, and nearly 30,000 employees serving millions of patients, MultiCare needed a different path forward – one that didn't sacrifice innovation for safety. That shift began with a mindset change at the top that was driven by years of experience navigating these exact tensions. Jason Elrod's View: The Healthcare Security Conundrum After 15+ years as a healthcare CISO, Elrod has a unique perspective on the security challenges facing healthcare organizations. According to him, healthcare's specific operational realities create security dilemmas unlike any other industry: Always-on operations: "When can you take it down? When can you stop everything and upgrade it?" asks Elrod. Unlike other industries, healthcare operates 24/7/365 with little room for downtime. Life-or-death access requirements: "We have to make sure all the information they need is available when they need it, with the minimum amount of friction possible. Because it's me, it's you, it's our communities, it's our loved ones, it's life or death." Expanding attack surface: With the shift to telemedicine, remote work, and connected medical devices, the threat landscape has expanded dramatically. "It's like a bowl of spaghetti where each strand needs to be able to talk to one end or the other, but just to the strands it needs to." Misaligned incentives: "IT historically has been concentrated on availability and speed and access, ubiquitous access… And security says, 'That's a fantastic Lego car you built. Before you can go outside and play with it, I'm going to stick a bunch more Legos on top of it called security, privacy, and compliance.'" It's a recipe for burnout, blame, and breakdowns. But what if security could enable care instead of obstructing it? Watch how MultiCare turned that possibility into practice in the Elisity Microsegmentation Platform case study with Jason Elrod, CISO, MultiCare Health System. Identity: The Key to Modern Healthcare Security The breakthrough for MultiCare came with the implementation of identity-based microsegmentation through Elisity. "The biggest attack surface is the identity of every individual," notes Elrod. "Why are the attacks always on identity? Because in healthcare, we must make sure all the information is available when they need it, with the minimum amount of friction possible." Traditional network segmentation approaches relied on complex VLANs, firewalls, and endpoint agents. The result? "A Byzantine spaghetti mess" that became increasingly difficult to manage and update. Elisity's approach changed this paradigm by focusing on identity rather than network location: Dynamic security policies that follow users, workloads, and devices wherever they appear on the network Granular access controls that create security perimeters around individual assets Policy enforcement points that leverage existing infrastructure to implement microsegmentation without requiring new hardware, agents, or complex network reconfigurations From Skepticism to Transformation When Elrod first introduced Elisity to his team, they responded with healthy skepticism. "They're like, 'Did you hit your head? Are you sure you read what you were saying? I thought you stopped drinking,'" Elrod recalls. The technical teams were doubtful that such a microsegmentation solution could work with their existing infrastructure. "They said, 'That doesn't sound like something that can be done,'" shares Elrod. But seeing was believing. "When you see people who are deeply technical, people who just know their craft really well, and they see something and go 'Wow'… it shakes the pillars of their opinions about what can be done," explains Elrod. The Elisity solution delivered on its promises: Rapid implementation without disruptive network changes Real-time automated or manual policy adjustments that previously took weeks to implement Comprehensive visibility across previously siloed environments Enhanced security posture without compromising availability ...all without forcing a tradeoff between protection and performance. But what surprised Elrod most wasn't just what the technology did, but how it changed the people using it.Breaking Down Walls Between Teams Perhaps the most unexpected benefit was how the solution transformed relationships between teams. "There's been a friction point. Put this control and constraint around the network. Who's the first person to call? They're going to call IT. 'I can't do this thing.' And I'm saying, 'Well, you can't open everything, because everybody can't have everything. Because the bad guys will have everything then,'" Elrod explains. Identity-based microsegmentation changed this dynamic: "It changed from 'How do I get around you?' and 'How do you get around me?' to cooperation. Because now it's like, 'Oh, well, let's make that change together.' It shifted culturally, and this was not something I expected… We really are on the same team. This is a solution that works for all of us, makes all of our jobs better, Security and IT. It is a force multiplier across the organization," says Elrod. With Elisity, security and IT teams now share incentives rather than competing priorities. "The same thing that allows me to make connectivity work between this area and here in a frictionless fashion is also the same exact thing that provides the rationalized security around it. Same tool, same dashboard, same team," Elrod notes. Enabling a Culture of Yes For healthcare providers, the impact is profound. "If they don't have to worry about access, don't have to worry about the controls, they can take the cognitive load of thinking and worrying about the compliance factors of it, the security, the privacy, the technology underlying the table that they're working on," says Elrod. This shift enables a fundamental change in how security interacts with clinical staff: Speed of delivery: "We can do that at the speed of need as opposed to the speed of bureaucracy, the speed of technology, the speed of legacy," explains Elrod. Granular control: "How would you like your own segment on the network, wherever you may roam? I can base it on your identity, wherever you're at," Elrod shares. Enhanced trust: "Being able to instill that confidence that, 'Hey, it's secure, it's stable, it's scalable, it's functional, we can support it. And we can move at the pace that you want to move at.'" Breaking Down Silos: The Business Imperative of Security-IT Integration The traditional separation between security and IT operations teams is rapidly becoming obsolete as organizations recognize the strategic advantages of integration. Recent research demonstrates compelling business benefits for enterprises that successfully bridge this divide, particularly for those in manufacturing, industrial, and healthcare sectors. According to Skybox Security, 76% of organizations believe miscommunication between network and security teams has negatively impacted their security posture. This disconnect creates tangible security risks and operational inefficiencies. Conversely, organizations with unified security and IT operations reported 30% fewer significant security incidents compared to those with siloed teams. For healthcare organizations, the stakes are even higher. Among healthcare institutions that experienced ransomware attacks, those with siloed security and IT operations reported a 28% increase in patient mortality rates in 2024, up from 23% in 2023. This stark reality underscores that cybersecurity integration isn't just an operational consideration—it's a patient safety imperative. The financial case for integration is equally compelling. A Forrester Total Economic Impact study on ServiceNow Security Operations solutions demonstrated a 238% ROI and million in present value benefits, with a 6-month payback period when integrating security and IT operations. Forward-thinking organizations are adopting sophisticated integration models like Cyber Fusion Centers. Gartner research confirms these represent a significant advancement over traditional security operations, predicting that by 2028, 20% of large enterprises will shift to cyber-fraud fusion teams to combat internal and external adversaries, up from less than 5% in 2023. For enterprise leaders, the message is clear: breaking down operational silos between security and IT teams isn't just good practice—it's essential for comprehensive protection, operational efficiency, and competitive advantage in today's threat landscape. Few understand that better than Elrod, who's spent decades trying to bridge this gap both technologically and culturally. The Bridge to Modern Healthcare For Elrod, identity-based microsegmentation represents more than just a technology solution—it's a bridge between where healthcare has been and where it needs to go. "Technology in the past wasn't bought because it was crappy… They were great. Good intention. They did what they needed to do at the time. But there's a lot of temporal distance between now and when that made sense," he explains. Elisity helps MultiCare "build that bridge from where we have been to where we need to go… It's a ladder out of the pit. This is great. Let's stop throwing things in there. Let's actually do things in a rational fashion," says Elrod. Looking Ahead While no single solution can address all of healthcare's security challenges, identity-based microsegmentation is "one of the bricks on the yellow brick road to making healthcare security and technology the culture of Yes," according to Elrod. As healthcare organizations continue to balance security requirements with the need for frictionless care delivery, solutions that align these competing priorities will become increasingly essential. By implementing identity-based microsegmentation, MultiCare has transformed security from a barrier to an enabler of modern healthcare—proving that with the right approach, it's possible to create a culture where "yes" is the default response without compromising security or compliance. Ready to escape your own security "mosh pit" and build a bridge to modern healthcare? Download Elisity's Microsegmentation Buyer's Guide 2025. This resource equips healthcare security leaders with evaluation criteria, implementation strategies, and ROI frameworks that have helped organizations like MultiCare transform from the "Department of No" to a "Culture of Yes." Begin your journey toward identity-based security today. To learn more about Elisity and how we help transform healthcare organizations like MultiCare, visit our website here. Found this article interesting? This article is a contributed piece from one of our valued partners. Follow us on Twitter  and LinkedIn to read more exclusive content we post. SHARE     #quotdepartment #noquot #quotculture #yesquot #healthcare
    THEHACKERNEWS.COM
    From the "Department of No" to a "Culture of Yes": A Healthcare CISO's Journey to Enabling Modern Care
    May 30, 2025The Hacker NewsHealthcare / Zero Trust Breaking Out of the Security Mosh Pit When Jason Elrod, CISO of MultiCare Health System, describes legacy healthcare IT environments, he doesn't mince words: "Healthcare loves to walk backwards into the future. And this is how we got here, because there are a lot of things that we could have prepared for that we didn't, because we were so concentrated on where we were." This chaotic approach has characterized healthcare IT for decades. In a sector where lives depend on technology working flawlessly 24/7/365, security teams have traditionally functioned as gatekeepers—the "Department of No"—focused on protection at the expense of innovation and care delivery. But as healthcare continues its digital transformation journey, this approach is no longer sustainable. With 14 hospitals, hundreds of urgent care clinics, and nearly 30,000 employees serving millions of patients, MultiCare needed a different path forward – one that didn't sacrifice innovation for safety. That shift began with a mindset change at the top that was driven by years of experience navigating these exact tensions. Jason Elrod's View: The Healthcare Security Conundrum After 15+ years as a healthcare CISO, Elrod has a unique perspective on the security challenges facing healthcare organizations. According to him, healthcare's specific operational realities create security dilemmas unlike any other industry: Always-on operations: "When can you take it down? When can you stop everything and upgrade it?" asks Elrod. Unlike other industries, healthcare operates 24/7/365 with little room for downtime. Life-or-death access requirements: "We have to make sure all the information they need is available when they need it, with the minimum amount of friction possible. Because it's me, it's you, it's our communities, it's our loved ones, it's life or death." Expanding attack surface: With the shift to telemedicine, remote work, and connected medical devices, the threat landscape has expanded dramatically. "It's like a bowl of spaghetti where each strand needs to be able to talk to one end or the other, but just to the strands it needs to." Misaligned incentives: "IT historically has been concentrated on availability and speed and access, ubiquitous access… And security says, 'That's a fantastic Lego car you built. Before you can go outside and play with it, I'm going to stick a bunch more Legos on top of it called security, privacy, and compliance.'" It's a recipe for burnout, blame, and breakdowns. But what if security could enable care instead of obstructing it? Watch how MultiCare turned that possibility into practice in the Elisity Microsegmentation Platform case study with Jason Elrod, CISO, MultiCare Health System. Identity: The Key to Modern Healthcare Security The breakthrough for MultiCare came with the implementation of identity-based microsegmentation through Elisity. "The biggest attack surface is the identity of every individual," notes Elrod. "Why are the attacks always on identity? Because in healthcare, we must make sure all the information is available when they need it, with the minimum amount of friction possible." Traditional network segmentation approaches relied on complex VLANs, firewalls, and endpoint agents. The result? "A Byzantine spaghetti mess" that became increasingly difficult to manage and update. Elisity's approach changed this paradigm by focusing on identity rather than network location: Dynamic security policies that follow users, workloads, and devices wherever they appear on the network Granular access controls that create security perimeters around individual assets Policy enforcement points that leverage existing infrastructure to implement microsegmentation without requiring new hardware, agents, or complex network reconfigurations From Skepticism to Transformation When Elrod first introduced Elisity to his team, they responded with healthy skepticism. "They're like, 'Did you hit your head? Are you sure you read what you were saying? I thought you stopped drinking,'" Elrod recalls. The technical teams were doubtful that such a microsegmentation solution could work with their existing infrastructure. "They said, 'That doesn't sound like something that can be done,'" shares Elrod. But seeing was believing. "When you see people who are deeply technical, people who just know their craft really well, and they see something and go 'Wow'… it shakes the pillars of their opinions about what can be done," explains Elrod. The Elisity solution delivered on its promises: Rapid implementation without disruptive network changes Real-time automated or manual policy adjustments that previously took weeks to implement Comprehensive visibility across previously siloed environments Enhanced security posture without compromising availability ...all without forcing a tradeoff between protection and performance. But what surprised Elrod most wasn't just what the technology did, but how it changed the people using it.[JE2] Breaking Down Walls Between Teams Perhaps the most unexpected benefit was how the solution transformed relationships between teams. "There's been a friction point. Put this control and constraint around the network. Who's the first person to call? They're going to call IT. 'I can't do this thing.' And I'm saying, 'Well, you can't open everything, because everybody can't have everything. Because the bad guys will have everything then,'" Elrod explains. Identity-based microsegmentation changed this dynamic: "It changed from 'How do I get around you?' and 'How do you get around me?' to cooperation. Because now it's like, 'Oh, well, let's make that change together.' It shifted culturally, and this was not something I expected… We really are on the same team. This is a solution that works for all of us, makes all of our jobs better, Security and IT. It is a force multiplier across the organization," says Elrod. With Elisity, security and IT teams now share incentives rather than competing priorities. "The same thing that allows me to make connectivity work between this area and here in a frictionless fashion is also the same exact thing that provides the rationalized security around it. Same tool, same dashboard, same team," Elrod notes. Enabling a Culture of Yes For healthcare providers, the impact is profound. "If they don't have to worry about access, don't have to worry about the controls, they can take the cognitive load of thinking and worrying about the compliance factors of it, the security, the privacy, the technology underlying the table that they're working on," says Elrod. This shift enables a fundamental change in how security interacts with clinical staff: Speed of delivery: "We can do that at the speed of need as opposed to the speed of bureaucracy, the speed of technology, the speed of legacy," explains Elrod. Granular control: "How would you like your own segment on the network, wherever you may roam? I can base it on your identity, wherever you're at," Elrod shares. Enhanced trust: "Being able to instill that confidence that, 'Hey, it's secure, it's stable, it's scalable, it's functional, we can support it. And we can move at the pace that you want to move at.'" Breaking Down Silos: The Business Imperative of Security-IT Integration The traditional separation between security and IT operations teams is rapidly becoming obsolete as organizations recognize the strategic advantages of integration. Recent research demonstrates compelling business benefits for enterprises that successfully bridge this divide, particularly for those in manufacturing, industrial, and healthcare sectors. According to Skybox Security (2025), 76% of organizations believe miscommunication between network and security teams has negatively impacted their security posture. This disconnect creates tangible security risks and operational inefficiencies. Conversely, organizations with unified security and IT operations reported 30% fewer significant security incidents compared to those with siloed teams. For healthcare organizations, the stakes are even higher. Among healthcare institutions that experienced ransomware attacks, those with siloed security and IT operations reported a 28% increase in patient mortality rates in 2024, up from 23% in 2023 (Ponemon Institute & Proofpoint, 2024). This stark reality underscores that cybersecurity integration isn't just an operational consideration—it's a patient safety imperative. The financial case for integration is equally compelling. A Forrester Total Economic Impact study on ServiceNow Security Operations solutions demonstrated a 238% ROI and $6.2 million in present value benefits, with a 6-month payback period when integrating security and IT operations (Forrester/ServiceNow, 2024). Forward-thinking organizations are adopting sophisticated integration models like Cyber Fusion Centers. Gartner research confirms these represent a significant advancement over traditional security operations, predicting that by 2028, 20% of large enterprises will shift to cyber-fraud fusion teams to combat internal and external adversaries, up from less than 5% in 2023. For enterprise leaders, the message is clear: breaking down operational silos between security and IT teams isn't just good practice—it's essential for comprehensive protection, operational efficiency, and competitive advantage in today's threat landscape. Few understand that better than Elrod, who's spent decades trying to bridge this gap both technologically and culturally. The Bridge to Modern Healthcare For Elrod, identity-based microsegmentation represents more than just a technology solution—it's a bridge between where healthcare has been and where it needs to go. "Technology in the past wasn't bought because it was crappy… They were great. Good intention. They did what they needed to do at the time. But there's a lot of temporal distance between now and when that made sense," he explains. Elisity helps MultiCare "build that bridge from where we have been to where we need to go… It's a ladder out of the pit. This is great. Let's stop throwing things in there. Let's actually do things in a rational fashion," says Elrod. Looking Ahead While no single solution can address all of healthcare's security challenges, identity-based microsegmentation is "one of the bricks on the yellow brick road to making healthcare security and technology the culture of Yes," according to Elrod. As healthcare organizations continue to balance security requirements with the need for frictionless care delivery, solutions that align these competing priorities will become increasingly essential. By implementing identity-based microsegmentation, MultiCare has transformed security from a barrier to an enabler of modern healthcare—proving that with the right approach, it's possible to create a culture where "yes" is the default response without compromising security or compliance. Ready to escape your own security "mosh pit" and build a bridge to modern healthcare? Download Elisity's Microsegmentation Buyer's Guide 2025. This resource equips healthcare security leaders with evaluation criteria, implementation strategies, and ROI frameworks that have helped organizations like MultiCare transform from the "Department of No" to a "Culture of Yes." Begin your journey toward identity-based security today. To learn more about Elisity and how we help transform healthcare organizations like MultiCare, visit our website here. Found this article interesting? This article is a contributed piece from one of our valued partners. Follow us on Twitter  and LinkedIn to read more exclusive content we post. SHARE    
    0 Comentários 0 Compartilhamentos 0 Anterior
  • Former PlayStation Exec Warns Developers Against Relying Too Much on Subscription Services

    Former PlayStation executive Shuhei Yoshida, in an interview with Game Developer at Gamescom LATAM, has warned developers against relying too heavily on subscription services. According to Yoshida, game subscription services, like Xbox Game Pass, can be “really dangerous”, since these services could start dictating what kinds of games developers would be able to make.
    Yoshida expanded on this idea by mentioning that big companies – who typically tend to be averse to funding games that are based on big, risky ideas – would try to steer developers under them to safer genres or gameplay styles to appease a player base that might end up existing primarily on subscription services.
    “If the only way for people to play games is through subscriptions that’s really dangerous, because whatof games can be created will be dictated by the owner of the subscription services,” said Yoshida.
    “That’s really, really risky because there always must always be fresh new ideas tried by small developers that create the next wave of development. But if the big companies dictate what games can be created, I don’t think that will advance the industry.”
    Yoshida also believes that Sony’s approach to a subscription service, through some of the higher tiers available for PlayStation Plus, might be “healthier” for developers and the overall industry. While he does acknowledge that his time working for Sony might have biased him a bit in the company’s favour, Yoshida also says that, through PlayStation Plus, Sony avoids over-promising, while also encouraging players to buy games rather than to wait for the games to come to the service.
    “I believe the way Sony approachedis healthier. You know, not to overpromise and to allow people to spend money to buy the new games,” Yoshida said. “After a couple of years there won’t be many people willing to buy those games at that initial price, so they’ll be added to the subscription service and there’ll be more people to tryin time for the next game in the franchise to come out.”
    When it comes to Sony’s competitors in the console market, Yoshida praises Microsoft for its efforts in bringing backwards compatibility on Xbox Series X/S. “They must have put a lot of engineering effort in to achieve what they have done,” he said. As for Nintendo, Yoshida praises the company’s strategy, as well as the technology behind the Switch and its Joy-Con controllers. “so smart,” he said. “It’s in their DNA to cater to the needs of family and friends.”
    While Yoshida might have a point about Game Pass, Microsoft has considered it to be quite successful. During an earnings call back in January, Microsoft CEO Satya Nadella spoke about the subscription service’s growth, revealing that its subscriber base had grown by more than 30 percent.
    “All-up, Game Pass set a new quarterly record for revenue and grew its PC subscriber base by over 30%, as we focus on driving fully paid subscribers across endpoints,” said Nadella in the earnings call, who went on to praise the critical response for Indiana Jones and the Great Circle.
    #former #playstation #exec #warns #developers
    Former PlayStation Exec Warns Developers Against Relying Too Much on Subscription Services
    Former PlayStation executive Shuhei Yoshida, in an interview with Game Developer at Gamescom LATAM, has warned developers against relying too heavily on subscription services. According to Yoshida, game subscription services, like Xbox Game Pass, can be “really dangerous”, since these services could start dictating what kinds of games developers would be able to make. Yoshida expanded on this idea by mentioning that big companies – who typically tend to be averse to funding games that are based on big, risky ideas – would try to steer developers under them to safer genres or gameplay styles to appease a player base that might end up existing primarily on subscription services. “If the only way for people to play games is through subscriptions that’s really dangerous, because whatof games can be created will be dictated by the owner of the subscription services,” said Yoshida. “That’s really, really risky because there always must always be fresh new ideas tried by small developers that create the next wave of development. But if the big companies dictate what games can be created, I don’t think that will advance the industry.” Yoshida also believes that Sony’s approach to a subscription service, through some of the higher tiers available for PlayStation Plus, might be “healthier” for developers and the overall industry. While he does acknowledge that his time working for Sony might have biased him a bit in the company’s favour, Yoshida also says that, through PlayStation Plus, Sony avoids over-promising, while also encouraging players to buy games rather than to wait for the games to come to the service. “I believe the way Sony approachedis healthier. You know, not to overpromise and to allow people to spend money to buy the new games,” Yoshida said. “After a couple of years there won’t be many people willing to buy those games at that initial price, so they’ll be added to the subscription service and there’ll be more people to tryin time for the next game in the franchise to come out.” When it comes to Sony’s competitors in the console market, Yoshida praises Microsoft for its efforts in bringing backwards compatibility on Xbox Series X/S. “They must have put a lot of engineering effort in to achieve what they have done,” he said. As for Nintendo, Yoshida praises the company’s strategy, as well as the technology behind the Switch and its Joy-Con controllers. “so smart,” he said. “It’s in their DNA to cater to the needs of family and friends.” While Yoshida might have a point about Game Pass, Microsoft has considered it to be quite successful. During an earnings call back in January, Microsoft CEO Satya Nadella spoke about the subscription service’s growth, revealing that its subscriber base had grown by more than 30 percent. “All-up, Game Pass set a new quarterly record for revenue and grew its PC subscriber base by over 30%, as we focus on driving fully paid subscribers across endpoints,” said Nadella in the earnings call, who went on to praise the critical response for Indiana Jones and the Great Circle. #former #playstation #exec #warns #developers
    GAMINGBOLT.COM
    Former PlayStation Exec Warns Developers Against Relying Too Much on Subscription Services
    Former PlayStation executive Shuhei Yoshida, in an interview with Game Developer at Gamescom LATAM, has warned developers against relying too heavily on subscription services. According to Yoshida, game subscription services, like Xbox Game Pass, can be “really dangerous”, since these services could start dictating what kinds of games developers would be able to make. Yoshida expanded on this idea by mentioning that big companies – who typically tend to be averse to funding games that are based on big, risky ideas – would try to steer developers under them to safer genres or gameplay styles to appease a player base that might end up existing primarily on subscription services. “If the only way for people to play games is through subscriptions that’s really dangerous, because what [type] of games can be created will be dictated by the owner of the subscription services,” said Yoshida. “That’s really, really risky because there always must always be fresh new ideas tried by small developers that create the next wave of development. But if the big companies dictate what games can be created, I don’t think that will advance the industry.” Yoshida also believes that Sony’s approach to a subscription service, through some of the higher tiers available for PlayStation Plus, might be “healthier” for developers and the overall industry. While he does acknowledge that his time working for Sony might have biased him a bit in the company’s favour, Yoshida also says that, through PlayStation Plus, Sony avoids over-promising, while also encouraging players to buy games rather than to wait for the games to come to the service. “I believe the way Sony approached [subscriptions] is healthier. You know, not to overpromise and to allow people to spend money to buy the new games,” Yoshida said. “After a couple of years there won’t be many people willing to buy those games at that initial price, so they’ll be added to the subscription service and there’ll be more people to try [those products] in time for the next game in the franchise to come out.” When it comes to Sony’s competitors in the console market, Yoshida praises Microsoft for its efforts in bringing backwards compatibility on Xbox Series X/S. “They must have put a lot of engineering effort in to achieve what they have done,” he said. As for Nintendo, Yoshida praises the company’s strategy, as well as the technology behind the Switch and its Joy-Con controllers. “[That’s] so smart,” he said. “It’s in their DNA to cater to the needs of family and friends.” While Yoshida might have a point about Game Pass, Microsoft has considered it to be quite successful. During an earnings call back in January, Microsoft CEO Satya Nadella spoke about the subscription service’s growth, revealing that its subscriber base had grown by more than 30 percent. “All-up, Game Pass set a new quarterly record for revenue and grew its PC subscriber base by over 30%, as we focus on driving fully paid subscribers across endpoints,” said Nadella in the earnings call, who went on to praise the critical response for Indiana Jones and the Great Circle.
    0 Comentários 0 Compartilhamentos 0 Anterior
CGShares https://cgshares.com