🌐 Millions of Internet Hosts at Risk Due to Tunneling Protocol Vulnerabilities 🌐 Recent research by KU Leuven’s Prof. Mathy Vanhoef and PhD student Angelos Beitis, in collaboration with Top10VPN, has uncovered alarming vulnerabilities in tunneling protocols used by over 4 million internet systems, including VPN servers and home routers. 👉 The Issue: Tunneling protocols like IPIP/IP6IP6, GRE/GRE6, 4in6, and 6in4, designed to transport data between networks, were found vulnerable due to misconfigurations. These flaws allow unauthenticated packets from malicious actors to exploit vulnerable hosts, enabling attacks like: > DoS attacks > DNS spoofing > Gaining access to internal networks and IoT devices Of the 4.26 million exposed systems, 1.8 million are spoofing-capable, making it nearly impossible to trace attackers. These compromised hosts can serve as one-way proxies, amplifying the impact of anonymous attacks. 👉 Implications for Small Businesses: Many of the affected systems include VPN servers, routers provided by ISPs, and mobile network gateways—technologies often utilized by micro and small businesses. A breach could result in compromised internal systems, loss of sensitive data, and business disruptions. 👉 Our Recommendation: Proactively secure your network by: > Auditing tunneling protocol configurations. > Limiting traffic to trusted sources. > Updating firmware for routers and VPN servers. > Partnering with a cybersecurity solutions provider to identify and mitigate vulnerabilities. 📍The highest concentration of vulnerable hosts was found in China and France, but this serves as a global reminder of the critical need for robust cybersecurity measures. If your business relies on tunneling protocols, act now to safeguard your infrastructure. 💻🔒 Learn more, visit: https://lnkd.in/gHdXNhvr #CompCiti #Cybersecurity #CyberAware #DataProtection #SmallBusinessSolutions #NetworkSecurity #TunnelingProtocols
CompCiti Business Solutions, Inc.
IT 服务与咨询
New York,NY 3,435 位关注者
Cybersecurity, Regulation Compliance, Risk Assessment, Virtual CISO, IT Audit, & Managed IT Service.
关于我们
- 网站
-
http://CompCiti.com
CompCiti Business Solutions, Inc.的外部链接
- 所属行业
- IT 服务与咨询
- 规模
- 11-50 人
- 总部
- New York,NY
- 类型
- 私人持股
- 创立
- 1996
- 领域
- Providing IT services for over 20 Years和Auditing • Compliance • Management • Security • Cloud Computing
地点
-
主要
261 W 35 Street
Suite 603
US,NY,New York,10001
CompCiti Business Solutions, Inc.员工
动态
-
Corporate Cyber Governance: Embracing Cyber Risk at the Board Level Cybersecurity is no longer just an IT issue—it is a strategic enterprise risk that demands ownership and active oversight by company boards and leadership. In today’s interconnected and increasingly volatile landscape, where cyber threats from nation-state adversaries are growing, boards play a pivotal role in national security and systemic resilience. To guide boards in effectively managing cyber risk, the NACD Director’s Handbook on Cyber-Risk Oversight provides a comprehensive framework for governance. Here are key takeaways for board members and executives to foster a culture of cybersecurity: 1. Empower CISOs and Prioritize Cybersecurity Ensure Chief Information Security Officers (CISOs) have the resources, authority, and visibility to prioritize cybersecurity effectively. Decisions that compromise security for cost or speed must be made transparently at the executive and board level. 2. Educate and Engage on Cyber Risk Board members and senior executives must be well-informed on cybersecurity risks and ensure these risks are central to business, technology, and acquisition decisions. Cyber risk oversight should be delegated to a dedicated cybersecurity or technology risk committee for focused management. 3. Adopt a Standardized Risk Framework Develop and implement standardized methods to measure and monitor cyber risk exposure, and ensure timely reporting of both successful breaches and “near misses” to improve defenses. 4. Champion Collaborative Cybersecurity Promote proactive information sharing about cyber threats with government and industry peers. A collaborative approach strengthens collective resilience against malicious activity. As cybersecurity becomes a cornerstone of good governance, it is imperative for CEOs and boards to treat cyber risk with the same urgency as financial risk. Embracing this responsibility not only protects organizations but also strengthens the broader ecosystem. At the board level, cyber literacy is as essential as financial literacy—an investment in understanding that pays dividends in resilience. Learn more, visit: https://lnkd.in/gZk5ieCb #CompCiti #Cybersecurity #CyberAware #CyberGovernance #CyberRisk #Leadership
-
Cross-Domain Attacks: Strengthening Identity Security to Combat Emerging Threats Cross-domain attacks are rapidly becoming a preferred tactic among adversaries, targeting vulnerabilities across interconnected environments like endpoints, identity systems, and cloud platforms. These sophisticated operations exploit compromised credentials, allowing attackers to blend in, escalate privileges, and evade detection. Groups like SCATTERED SPIDER and FAMOUS CHOLLIMA have exemplified the efficacy of these advanced techniques. At the core of this issue lies the fragmented approach many organizations take to identity security. Disjointed tools and siloed operations create visibility gaps, leaving critical vulnerabilities for attackers to exploit. To address these challenges, businesses must embrace a unified and comprehensive identity security strategy. 👉 Key Steps to Strengthen Identity Security 1. Place Identity at the Core Consolidate threat detection and response across identity, endpoint, and cloud within a unified platform. This approach streamlines operations, reduces costs, and enhances collaboration while eliminating inefficiencies from fragmented tools. 2. Ensure End-to-End Visibility Achieve seamless visibility across hybrid environments, including on-premises, cloud, and SaaS applications. Unified security tools eliminate blind spots and provide a fortified defense against adversaries. 3. Implement Real-Time Protection Leverage real-time detection and response capabilities to proactively block identity-based threats. Solutions like CrowdStrike Falcon® integrate cross-domain telemetry and behavioral analysis to identify and neutralize attacks swiftly. As cross-domain threats evolve, small and micro businesses must prioritize identity security to safeguard their operations. A unified platform, enhanced visibility, and real-time protection are not just options—they are necessities for modern cybersecurity. By adopting an integrated approach, businesses can stay one step ahead of adversaries, fortify their defenses, and ensure resilience in an increasingly complex threat landscape. Learn more, visit: https://lnkd.in/gz7zZ4Ba #CompCiti #Cybersecurity #CyberAware #IdentitySecurity #SmallBusinessSolutions #CrossDomainThreats
-
Warm wishes for a season filled with success, happiness, and peace. #HappyHolidays
-
-
🔒 Protecting Mobile Communications: Key Insights from CISA's Latest Guidance 🔒 Recent cyberespionage campaigns targeting U.S. telecom infrastructure have raised serious concerns about mobile security. In response, the Cybersecurity and Infrastructure Security Agency (CISA) has released comprehensive guidance to help highly targeted individuals—and all mobile users—secure their communications. The guidance, motivated by the actions of a China-linked group known as Salt Typhoon, highlights critical security practices to mitigate the risks of interception and manipulation of mobile communications. While designed for individuals in high-risk roles, such as senior government officials, these recommendations are applicable to anyone looking to enhance their mobile security posture. 👉 Key Takeaways: 1) Use Secure Communication Apps: Opt for end-to-end encrypted messaging platforms like Signal, which offer enhanced privacy features. 2) Adopt Strong Authentication: Enable phishing-resistant MFA (such as FIDO) and avoid SMS-based MFA. 3) Strengthen Mobile Account Security: Set PINs or passcodes for mobile accounts and use password managers. 4) Update and Optimize Devices: Regularly update operating systems and apps, and use devices with robust security records. 5) Enhance Device-Specific Protections: > iPhone: Enable Lockdown Mode, use encrypted DNS, enroll in iCloud Private Relay, and restrict sensitive app permissions. > Android: Use RCS with encryption, protect DNS queries, configure secure browser settings, and enable Google Play Protect. These measures are essential in safeguarding against sophisticated threats from state-sponsored actors. For businesses, particularly micro and small enterprises, implementing these practices can significantly reduce vulnerabilities in mobile communications. As cybersecurity professionals, we must remain vigilant and proactive in protecting critical communications. Explore CISA’s detailed best practices guide and take immediate steps to fortify your mobile security. Let’s prioritize security—because protecting information is protecting business. Learn more, visit: https://lnkd.in/dbzytdm2 #CompCiti #CyberAware #Cybersecurity #MobileSecurity #CISA #SecureCommunications #CyberResilience
-
Data Pipeline Challenges of Privacy-Preserving Federated Learning Privacy-preserving federated learning (PPFL) offers significant privacy advantages by preventing organizations from accessing training data directly. However, this approach also introduces new challenges in data preprocessing, participant trustworthiness, and model quality. A recent article by NIST titled "Privacy-Preserving Federated Learning: Data Quality Challenges and Emerging Solutions" highlights these challenges and explores potential solutions. 👉 Data Preprocessing and Consistency Challenges PPFL systems often overlook the critical step of data cleaning and preparation. Inconsistent data formatting and varied preprocessing methods among participants can lead to unexpected failures in real-world deployments. Unlike centralized systems, PPFL lacks standardized approaches to ensure clean, uniformly formatted datasets during training. 👉Participant Trustworthiness and Malicious Data PPFL's privacy protections make it challenging to identify and address malicious participants or poor-quality data submissions. These issues can compromise the global model, as distinguishing between harmful and unintentional errors is difficult without directly accessing the data. 👉Emerging Solutions Innovative solutions like FLTrust and EIFFeL are adapting data poisoning defenses for PPFL. These methods validate input data securely and safeguard the training process without violating privacy. While many of these approaches are still in development, they hold promise for addressing PPFL's complexities in the near future. As a cybersecurity expert, we recognize the importance of these advancements in building secure and trustworthy AI systems. To read the full article, visit: https://lnkd.in/gsTDSn44 #CompCiti #CyberAware #Cybersecurity #FederatedLearning #PrivacyPreservingAI #DataQuality #PPFL #Innovation
-
Gratitude is the heart of Thanksgiving. Wishing everyone a day filled with joy, togetherness, and thankfulness. 🍁 #HappyThanksgiving
-
-
Avoid Phishing Scams with Three Simple Tips: Phishing scams are online messages designed to look like they’re from a trusted source. We may open what we thought was a safe email, attachment or image only to find ourselves exposed to malware or a scammer looking for our personal data. The good news is we can take precautions to protect our important data. Learn to recognize the signs and report phishing to protect devices and data. 1) Recognize the common signs • Urgent or emotionally appealing language • Requests to send personal or financial information • Unexpected attachments • Untrusted shortened URLs • Email addresses that do not match the supposed sender • Poor writing/misspellings (less common) 2) Resist and report: Report suspicious messages by using the “report spam” feature. If the message is designed to resemble an organization you trust, report the message by alerting the organization using their contact information found on their webpage. 3) Delete: Delete the message. Don’t reply or click on any attachment or link, including any “unsubscribe” link. The unsubscribe button could also carry a link used for phishing. Just delete. If a message looks suspicious, it’s probably phishing. But even if there’s a possibility it could be real, don’t click any link, attachment or call any number. Look up another way to contact a company or person directly: 👉 Go to a company’s website to find their contact information 👉 Call the individual at a known number and confirm whether they sent the message Taking these steps helps Secure Our World. We can all help one another stay safer online, so share these tips with a family member or friend! Learn more, visit: https://lnkd.in/gAVcUNFc #CompCiti #Cybersecurity #CyberAware #CISA #Phishing #CybersecurityAwarenessMonth
-
-
Stay safer with MULTIFACTOR AUTHENTICATION (MFA) As we observe Cybersecurity Awareness Month this October, there's no better time to strengthen the security of your online accounts by enabling Multifactor Authentication (MFA). How to turn on MFA: MFA provides extra security for our online accounts and apps. This security could be a code sent via text or email or generated by an app, or biometrics like fingerprints and facial recognition. Using MFA confirms our identities when logging into our accounts. 👉 Go to Settings: It may be called Account Settings, Settings & Privacy or similar. 👉 Look for and turn on MFA: It may be called two-factor authentication, two-step verification or similar. 👉 Confirm: Select how to provide extra login security, such as by entering a code sent via text or email or using facial recognition. Congratulations! After setting up MFA, logging in may require completing the MFA security step to prove our identities. It only takes a moment but makes us significantly safer from malicious hackers! Turn on MFA for every online account or app that offers it. Doing so will protect our Email, Banking, Social Media, Online Purchases and Identities. Using MFA is one way to SECURE OUR WORLD. Taking these steps helps Secure Our World. We can all help one another stay safer online, so share these tips with a family member or friend! Learn more, visit: https://lnkd.in/gAVcUNFc #CompCiti #Cybersecurity #CyberAware #CISA #CybersecurityAwarenessMonth #MultifactorAuthentication #MFA #StaySafeOnline #DigitalSecurity #Phishing
-
-
Our online world needs to be protected. There are easy things we can do to ensure our information is safe from those wishing to steal it. Use Strong Passwords: Simple passwords can be guessed. Make passwords at least 16 characters long, random and unique for each account. Use a password manager, a secure program that maintains and creates passwords. This easy-to-use program will store passwords and fill them in automatically on the web. Turn on Multifactor Authentication (MFA): Use MFA on any site that offers it. MFA provides an extra layer of security in addition to a password when logging into accounts and apps, like a face scan or a code sent by text. Using MFA will make you much less likely to get hacked. Update Software: When devices, apps or software programs (especially antivirus software) notify us that updates are available, we should install them as soon as possible. Updates close security code bugs to better protect our data. Turn on automatic updates to make it even easier. Recognize & Report Phishing: Most successful online intrusions result from a recipient of a “phishing” message accidentally downloading malware or giving their personal information to a spammer. Do not click or engage with these phishing attempts. Instead, recognize them by their use of alarming language or offers that are too good to be true. Report the phish and delete phishing messages. Taking these steps helps Secure Our World. We can all help one another stay safer online, so share these tips with a family member or friend! #CompCiti #Cybersecurity #CyberAware #CISA #MFA #Phishing #SecureOurWorld
-