SlideShare a Scribd company logo
1 of 3
Antivirus vulnerability calls for a multi layered cybersecurity approach
Beginning of the week, it was revealed that the antivirus engines (AVE) used in Symantec products presented a
critical vulnerability, making it an easy-to-exploit system entry point. This is the latest of news from a troubling
string of flaws uncovered in conventional IT security products. Unfortunately for antivirus software vendors, the
road seems to be heading downhill from here on. More and more enterprises and individual users alike are
realizing that the time has come to step up their cybersecurity game.
Discovered by Google security researchers, the Symantec vulnerability could have been easily exploited remotely
by potential attackers, enabling them to execute malicious code on the user station. After preparing his attack,
all a hacker had to do was send an email containing a malicious file with in-build code to any random target.
This input, especially designed to be executed on your system, triggers avulnerability domino effect. The file
needn’t be executed, since the AVE employs a driver that intercepts all incoming and outgoing operations.
Hope for the best and prepare for the worst
The vulnerability, rated 9.1 / 10 in the CVSS[1] by Symantec, does the most damage on Windows OS, since the
scan engine of the antivirus is loaded directly into the kernel. As long as its header points to a portable
executable file packed with ASPack (an advanced Win32 executable file compressor), the AVE will automatically
scan the file, unpacking it inside the region of highest privilege within an OS. What does this mean? Well,
obviously, parsing executable files with malformed headers cannot bring anything good. On the contrary, it can
only imply one thing: you are faced with a memory safety vulnerability and you are about to get acquainted
with the Blue Screen of Death (watch this video for a short history of the BSoD). Full system crash.
A patch to correct the flaw was issued almost immediately after its discovery. All is well that ends well, right?
Not exactly. This quick ‘fix’ doesn’t change the reality of things. The general public continues to live under the
impression that the cybersecurity threat landscape is immobile, something that doesn’t really affect us in the
here and now. By the time everyone is done updating their antivirus, new vulnerabilities are more than likely to
appear again.
The solution? Expect change. Time can render any solution obsolete and, in order to fight against these
unfavorable odds, we must ensure a consistent cyber-ecosystem around IT environments. Even up-to-date
antivirus tools are no longer enough against advanced attack (as we’ve already covered in our previous article
on “How to cure yourself of antivirus side-effects” here). That is why industry vendors should make it their
responsibility to aid businesses in adapting their strategy to a multi-layered cybersecurity approach.
Time to step up your cybersecurity game
Let’s suppose for a moment that the Symantec AVE vulnerability would have never been discovered last week.
Let’s also suppose that those targeted disposed only of basic security tools. It wouldn’t be a long shot to assume
that the number of related incidents would plague the news by now.
Now let’s replay the same scenario, only this time, the target had the good sense of tapping into behavior
analytics. A hacker infiltrates the system through this security flaw and then lets the malware do its thing. Would
the outcome be the same? Definitely not. This extra layer of protection bridges the intelligence gap that
antiviruses are confronted with, identifying the threat before it has reached the end of the kill-chain (at the
moment it tries contacting its C&C server).
One of the main issues encountered when dealing with traditional network protection is the false of security
tools such as antiviruses and firewalls create. The aim is to catch the hacker in the act, not just react in the
aftermath of a cyber-attack. By implementing multiple layers of security, based on a continuous monitoring of
system vulnerabilities and behavior anomalies, enterprises of all sizes can improve their detection response time
and gain broader and more in-depth insights.
[1] CVSS (Common Vulnerability Scoring System): is a free and open industry standard for assessing the
severity of computer system security vulnerabilities. CVSS attempts to assign severity scores to vulnerabilities,
allowing responders to prioritize responses and resources according to threat. Scores are calculated based on a
formula that depends on several metrics that approximate ease of exploit and the impact of exploit. Scores
range from 0 to 10, with 10 being the most severe.
Link:
https://www.reveelium.com/en/call-for-multilayer-cybersecurity/

More Related Content

Viewers also liked

Banana Trends. South Korea tourism and Russian Tourists. Case Study
Banana Trends. South Korea tourism and Russian Tourists. Case StudyBanana Trends. South Korea tourism and Russian Tourists. Case Study
Banana Trends. South Korea tourism and Russian Tourists. Case StudyBanana Trends
 
Businessday okt 2016 - Awingu
Businessday okt 2016 - AwinguBusinessday okt 2016 - Awingu
Businessday okt 2016 - AwinguMarketing Team
 
Ростелеком. Тимур Ибрагимов. "Защита от DDoS атак. Взгляд со стороны оператор...
Ростелеком. Тимур Ибрагимов. "Защита от DDoS атак. Взгляд со стороны оператор...Ростелеком. Тимур Ибрагимов. "Защита от DDoS атак. Взгляд со стороны оператор...
Ростелеком. Тимур Ибрагимов. "Защита от DDoS атак. Взгляд со стороны оператор...Expolink
 
Businessday 18 okt - Teamleader
Businessday 18 okt - Teamleader Businessday 18 okt - Teamleader
Businessday 18 okt - Teamleader Marketing Team
 
SDN Security Talk - (ISC)2_3
SDN Security Talk - (ISC)2_3SDN Security Talk - (ISC)2_3
SDN Security Talk - (ISC)2_3Wen-Pai Lu
 
My Sister with my sun in the Ikutsu Games
My Sister with my sun in the Ikutsu GamesMy Sister with my sun in the Ikutsu Games
My Sister with my sun in the Ikutsu GamesAli Murtadlo
 
MVA Presentation 5
MVA Presentation 5MVA Presentation 5
MVA Presentation 5Bryan Chung
 
1. tipos de camas hospitalarias
1. tipos de camas hospitalarias1. tipos de camas hospitalarias
1. tipos de camas hospitalariascaedhmh
 
NEFROLOGIA CLINICA: Hipertension renovascular
NEFROLOGIA CLINICA: Hipertension renovascularNEFROLOGIA CLINICA: Hipertension renovascular
NEFROLOGIA CLINICA: Hipertension renovasculargustavo diaz nuñez
 
Yeni başlayanlar için Laravel
Yeni başlayanlar için Laravel Yeni başlayanlar için Laravel
Yeni başlayanlar için Laravel Cüneyd Tural
 
Breaking through the Clouds
Breaking through the CloudsBreaking through the Clouds
Breaking through the CloudsAndy Piper
 
Meetup Mesos : Mesos, Chronos and Marathon in CI/CD factory
Meetup Mesos : Mesos, Chronos and Marathon in CI/CD factoryMeetup Mesos : Mesos, Chronos and Marathon in CI/CD factory
Meetup Mesos : Mesos, Chronos and Marathon in CI/CD factoryLaurent Grangeau
 

Viewers also liked (14)

Banana Trends. South Korea tourism and Russian Tourists. Case Study
Banana Trends. South Korea tourism and Russian Tourists. Case StudyBanana Trends. South Korea tourism and Russian Tourists. Case Study
Banana Trends. South Korea tourism and Russian Tourists. Case Study
 
Businessday okt 2016 - Awingu
Businessday okt 2016 - AwinguBusinessday okt 2016 - Awingu
Businessday okt 2016 - Awingu
 
Ростелеком. Тимур Ибрагимов. "Защита от DDoS атак. Взгляд со стороны оператор...
Ростелеком. Тимур Ибрагимов. "Защита от DDoS атак. Взгляд со стороны оператор...Ростелеком. Тимур Ибрагимов. "Защита от DDoS атак. Взгляд со стороны оператор...
Ростелеком. Тимур Ибрагимов. "Защита от DDoS атак. Взгляд со стороны оператор...
 
Businessday 18 okt - Teamleader
Businessday 18 okt - Teamleader Businessday 18 okt - Teamleader
Businessday 18 okt - Teamleader
 
SDN Security Talk - (ISC)2_3
SDN Security Talk - (ISC)2_3SDN Security Talk - (ISC)2_3
SDN Security Talk - (ISC)2_3
 
My Sister with my sun in the Ikutsu Games
My Sister with my sun in the Ikutsu GamesMy Sister with my sun in the Ikutsu Games
My Sister with my sun in the Ikutsu Games
 
MVA Presentation 5
MVA Presentation 5MVA Presentation 5
MVA Presentation 5
 
Volodymyr Shtybel
Volodymyr ShtybelVolodymyr Shtybel
Volodymyr Shtybel
 
1. tipos de camas hospitalarias
1. tipos de camas hospitalarias1. tipos de camas hospitalarias
1. tipos de camas hospitalarias
 
NEFROLOGIA CLINICA: Hipertension renovascular
NEFROLOGIA CLINICA: Hipertension renovascularNEFROLOGIA CLINICA: Hipertension renovascular
NEFROLOGIA CLINICA: Hipertension renovascular
 
Yeni başlayanlar için Laravel
Yeni başlayanlar için Laravel Yeni başlayanlar için Laravel
Yeni başlayanlar için Laravel
 
Breaking through the Clouds
Breaking through the CloudsBreaking through the Clouds
Breaking through the Clouds
 
Les places de marché
Les places de marchéLes places de marché
Les places de marché
 
Meetup Mesos : Mesos, Chronos and Marathon in CI/CD factory
Meetup Mesos : Mesos, Chronos and Marathon in CI/CD factoryMeetup Mesos : Mesos, Chronos and Marathon in CI/CD factory
Meetup Mesos : Mesos, Chronos and Marathon in CI/CD factory
 

More from ITrust - Cybersecurity as a Service

L’Intelligence Artificielle : un ‘booster’ pour la cybersécurité
L’Intelligence Artificielle : un ‘booster’ pour la cybersécuritéL’Intelligence Artificielle : un ‘booster’ pour la cybersécurité
L’Intelligence Artificielle : un ‘booster’ pour la cybersécuritéITrust - Cybersecurity as a Service
 
Quand les cybercriminels n’ont plus besoin de fuir les logiciels de sécurité
Quand les cybercriminels n’ont plus besoin de fuir les logiciels de sécuritéQuand les cybercriminels n’ont plus besoin de fuir les logiciels de sécurité
Quand les cybercriminels n’ont plus besoin de fuir les logiciels de sécuritéITrust - Cybersecurity as a Service
 
Artificial intelligence and machine learning: ultimate game changers
Artificial intelligence and machine learning: ultimate game changersArtificial intelligence and machine learning: ultimate game changers
Artificial intelligence and machine learning: ultimate game changersITrust - Cybersecurity as a Service
 
Passer de la détection d’anomalies à la détection de menaces
Passer de la détection d’anomalies à la détection de menacesPasser de la détection d’anomalies à la détection de menaces
Passer de la détection d’anomalies à la détection de menacesITrust - Cybersecurity as a Service
 
Meet anomaly detection: a powerful cybersecurity defense mechanism when its w...
Meet anomaly detection: a powerful cybersecurity defense mechanism when its w...Meet anomaly detection: a powerful cybersecurity defense mechanism when its w...
Meet anomaly detection: a powerful cybersecurity defense mechanism when its w...ITrust - Cybersecurity as a Service
 

More from ITrust - Cybersecurity as a Service (20)

IT security : a five-legged sheep
IT security : a five-legged sheepIT security : a five-legged sheep
IT security : a five-legged sheep
 
Petya, pire que WannaCry ?
Petya, pire que WannaCry ?Petya, pire que WannaCry ?
Petya, pire que WannaCry ?
 
L’Intelligence Artificielle : un ‘booster’ pour la cybersécurité
L’Intelligence Artificielle : un ‘booster’ pour la cybersécuritéL’Intelligence Artificielle : un ‘booster’ pour la cybersécurité
L’Intelligence Artificielle : un ‘booster’ pour la cybersécurité
 
Manifeste ResistanceCYBER 29.05.17
Manifeste ResistanceCYBER 29.05.17Manifeste ResistanceCYBER 29.05.17
Manifeste ResistanceCYBER 29.05.17
 
Advanced persistent threats, entre mythe et réalité
Advanced persistent threats, entre mythe et réalitéAdvanced persistent threats, entre mythe et réalité
Advanced persistent threats, entre mythe et réalité
 
Quand les cybercriminels n’ont plus besoin de fuir les logiciels de sécurité
Quand les cybercriminels n’ont plus besoin de fuir les logiciels de sécuritéQuand les cybercriminels n’ont plus besoin de fuir les logiciels de sécurité
Quand les cybercriminels n’ont plus besoin de fuir les logiciels de sécurité
 
Artificial intelligence and machine learning: ultimate game changers
Artificial intelligence and machine learning: ultimate game changersArtificial intelligence and machine learning: ultimate game changers
Artificial intelligence and machine learning: ultimate game changers
 
Manifeste ResistanceCYBER 19.05.17
Manifeste ResistanceCYBER 19.05.17Manifeste ResistanceCYBER 19.05.17
Manifeste ResistanceCYBER 19.05.17
 
Manifeste ResistanceCYBER 18.05.17
Manifeste ResistanceCYBER 18.05.17Manifeste ResistanceCYBER 18.05.17
Manifeste ResistanceCYBER 18.05.17
 
Manifeste ResistanceCYBER 17.05.17
Manifeste ResistanceCYBER 17.05.17Manifeste ResistanceCYBER 17.05.17
Manifeste ResistanceCYBER 17.05.17
 
Manifeste ResistanceCYBER 15.05.17
Manifeste ResistanceCYBER 15.05.17Manifeste ResistanceCYBER 15.05.17
Manifeste ResistanceCYBER 15.05.17
 
Passer de la détection d’anomalies à la détection de menaces
Passer de la détection d’anomalies à la détection de menacesPasser de la détection d’anomalies à la détection de menaces
Passer de la détection d’anomalies à la détection de menaces
 
Meet anomaly detection: a powerful cybersecurity defense mechanism when its w...
Meet anomaly detection: a powerful cybersecurity defense mechanism when its w...Meet anomaly detection: a powerful cybersecurity defense mechanism when its w...
Meet anomaly detection: a powerful cybersecurity defense mechanism when its w...
 
L’étrange histoire d’un piratage en Angleterre
L’étrange histoire d’un piratage en AngleterreL’étrange histoire d’un piratage en Angleterre
L’étrange histoire d’un piratage en Angleterre
 
Ignorance is bliss, but not for MongoDB
Ignorance is bliss, but not for MongoDBIgnorance is bliss, but not for MongoDB
Ignorance is bliss, but not for MongoDB
 
Cisco WebEx vulnerability: it’s a kind of magic
Cisco WebEx vulnerability: it’s a kind of magicCisco WebEx vulnerability: it’s a kind of magic
Cisco WebEx vulnerability: it’s a kind of magic
 
ITrust Company Overview FR
ITrust Company Overview FRITrust Company Overview FR
ITrust Company Overview FR
 
ITrust Company Overview EN
ITrust Company Overview ENITrust Company Overview EN
ITrust Company Overview EN
 
SOC OEM - Datasheet FR
SOC OEM - Datasheet FRSOC OEM - Datasheet FR
SOC OEM - Datasheet FR
 
SOC OEM - Datasheet EN
SOC OEM - Datasheet ENSOC OEM - Datasheet EN
SOC OEM - Datasheet EN
 

Recently uploaded

Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptkotipi9215
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfkalichargn70th171
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationkaushalgiri8080
 

Recently uploaded (20)

Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanation
 

Antivirus vulnerability calls for a multi layered cybersecurity approach

  • 1. Antivirus vulnerability calls for a multi layered cybersecurity approach Beginning of the week, it was revealed that the antivirus engines (AVE) used in Symantec products presented a critical vulnerability, making it an easy-to-exploit system entry point. This is the latest of news from a troubling string of flaws uncovered in conventional IT security products. Unfortunately for antivirus software vendors, the road seems to be heading downhill from here on. More and more enterprises and individual users alike are realizing that the time has come to step up their cybersecurity game. Discovered by Google security researchers, the Symantec vulnerability could have been easily exploited remotely by potential attackers, enabling them to execute malicious code on the user station. After preparing his attack, all a hacker had to do was send an email containing a malicious file with in-build code to any random target. This input, especially designed to be executed on your system, triggers avulnerability domino effect. The file needn’t be executed, since the AVE employs a driver that intercepts all incoming and outgoing operations. Hope for the best and prepare for the worst The vulnerability, rated 9.1 / 10 in the CVSS[1] by Symantec, does the most damage on Windows OS, since the scan engine of the antivirus is loaded directly into the kernel. As long as its header points to a portable executable file packed with ASPack (an advanced Win32 executable file compressor), the AVE will automatically scan the file, unpacking it inside the region of highest privilege within an OS. What does this mean? Well, obviously, parsing executable files with malformed headers cannot bring anything good. On the contrary, it can only imply one thing: you are faced with a memory safety vulnerability and you are about to get acquainted with the Blue Screen of Death (watch this video for a short history of the BSoD). Full system crash. A patch to correct the flaw was issued almost immediately after its discovery. All is well that ends well, right? Not exactly. This quick ‘fix’ doesn’t change the reality of things. The general public continues to live under the impression that the cybersecurity threat landscape is immobile, something that doesn’t really affect us in the here and now. By the time everyone is done updating their antivirus, new vulnerabilities are more than likely to appear again. The solution? Expect change. Time can render any solution obsolete and, in order to fight against these unfavorable odds, we must ensure a consistent cyber-ecosystem around IT environments. Even up-to-date antivirus tools are no longer enough against advanced attack (as we’ve already covered in our previous article on “How to cure yourself of antivirus side-effects” here). That is why industry vendors should make it their responsibility to aid businesses in adapting their strategy to a multi-layered cybersecurity approach.
  • 2.
  • 3. Time to step up your cybersecurity game Let’s suppose for a moment that the Symantec AVE vulnerability would have never been discovered last week. Let’s also suppose that those targeted disposed only of basic security tools. It wouldn’t be a long shot to assume that the number of related incidents would plague the news by now. Now let’s replay the same scenario, only this time, the target had the good sense of tapping into behavior analytics. A hacker infiltrates the system through this security flaw and then lets the malware do its thing. Would the outcome be the same? Definitely not. This extra layer of protection bridges the intelligence gap that antiviruses are confronted with, identifying the threat before it has reached the end of the kill-chain (at the moment it tries contacting its C&C server). One of the main issues encountered when dealing with traditional network protection is the false of security tools such as antiviruses and firewalls create. The aim is to catch the hacker in the act, not just react in the aftermath of a cyber-attack. By implementing multiple layers of security, based on a continuous monitoring of system vulnerabilities and behavior anomalies, enterprises of all sizes can improve their detection response time and gain broader and more in-depth insights. [1] CVSS (Common Vulnerability Scoring System): is a free and open industry standard for assessing the severity of computer system security vulnerabilities. CVSS attempts to assign severity scores to vulnerabilities, allowing responders to prioritize responses and resources according to threat. Scores are calculated based on a formula that depends on several metrics that approximate ease of exploit and the impact of exploit. Scores range from 0 to 10, with 10 being the most severe. Link: https://www.reveelium.com/en/call-for-multilayer-cybersecurity/