Gadget Page
No Result
View All Result
  • Home
  • Apps
  • Gadget Info
  • Gaming
PRICING
SUBSCRIBE
  • Home
  • Apps
  • Gadget Info
  • Gaming
No Result
View All Result
Gadget Page
No Result
View All Result
Home Uncategorized

Prevent browser-in-the-browser phishing attacks by removing human input errors

gadgetpage by gadgetpage
June 12, 2022
Reading Time: 5 mins read
0
Prevent browser-in-the-browser phishing attacks by removing human input errors


RELATED POSTS

Puedes descargar Age of Empires III gratis y legalmente

Vanessa Kirby will play Sue Storm in Fantastic Four

Tower of Fantasy: Einjähriges Jubiläum und großes Update 3.1 angekündigt

How companies can deal with the threat of new browser-in-the-browser phishing attacks by regaining control of network access and password distribution.

By Julia O’Toole, Founder and CEO of MyCena Security Solutions

In 2022, the biggest threat vector is phishing attacks, which account for more than 80% of all violations of individuals and organizations. These are the result of misused or stolen passwords; Hackers, despite having their names, do not “hack in”, but log in using certificates phished through social engineering. This possibility of an error of judgment on the part of the individual can have a profound effect on the whole organization.

Cyber ​​attackers are also becoming more intelligent in how they infringe on organizations. In mid-March 2022, an innovative phishing strategy called Browser-in-the-Browser (BTB) Attack was unveiled by an Infosec researcher who used simulated browser windows and other authentication service providers to steal login credentials.

Bitcoin attacks act as an extension of existing clickjacking or user-interface remedies that alter the appearance of browsers and web pages to bypass user security controls. With this technique, a completely artificial replica is created – a user thinks they are seeing the original popup window, but it is fake in the page.

“Very few people will notice a slight difference between the two,” according to the report. “Once landed on an attacker-owned website, users will feel comfortable because their credentials appear to be legitimate.”

Remove the danger by regaining control

The risk aversion posed by the BitBy phishing attack depends on the business that employees can no longer create, view or type passwords to access the company’s files, apps and systems. This is the amount of withdrawal of access control and removal of the risk of human error from the network access process.

To the untrained eye, which may be most employees, such phishing attacks are dangerous but impossible to identify. What it takes for an undoubted employee to make a mistake and it compromises the whole network.

Such attacks are not for quick cash payments. Actors will sit inside your system and wait for the most damage. All the while, users continue to work without realizing that their credentials have passed.

This type of attack has been used in the past. In 2020, cybercriminals used a similar Beatty strategy on video game digital distribution service Steam to gain access to consumers’ credentials. While this may be to the detriment of individuals, what we are now seeing is a more aggressive attack on an organizational level. For the security of your business, it’s time to take responsibility and start controlling your own access

Password managers are not the solution

Although some have suggested using a password manager and a single sign-on tool to avoid the problem, since they automatically input the password without having to read for the duplicate window, it still presents major problems.

Centralizing multiple passwords behind the manager’s master password does nothing to prevent access fraud. It only centralizes access information for hackers in a breach situation. This was the case with the Lapsus $ group who, after infiltrating Okta’s network, were able to easily find an Excel document filled with the passwords of LastPass administrators to access Okta’s clients.

The password manager and the single sign-on tool can provide a surface layer of convenience for users, but in the event of a breach, Silver Platter offers their company key in the state. Instead, access segmentation and encrypted password distribution is a more effective solution that completely eliminates the potential threat of human error or forgery from the equation and protects the integrity of access.

In addition, the business may see the application of doubling with the Multi-Factor Authentication (MFA) method as a precaution. But the initial loss of their access control means that the MFA cannot guarantee the legitimacy or integrity of the access. Cyber-attackers have found many ways to infiltrate them, as we have seen recently through known vulnerabilities in the MFA protocol. Relying on MFA instead of fully protecting your cyber security and cyber resilience only suspends an inevitable breach of access.

It is no longer enough to rely on traditional methods

Cyber ​​attackers are more intelligent and relentless when it comes to modern day phishing scams. Returning access control, partitioning, and security to the organizational side ensures that employees no longer need to create, view, or type passwords. Accepting encrypted credentials, using a secure way to save them means cyber actors don’t have to worry about accidentally leaking them.

By sharing access across their entire digital infrastructure, and distributing uniquely encrypted passwords directly to their employees, businesses eliminate the possibility of unauthorized password sharing, theft or phishing. Any breach can be contained on a system, which means that in the event of another BitB attack, the rest of your network is protected from damage. This allows companies to stay one step ahead of the ransomware threat.

About the author

Julia O’Toole, Founder and CEO of MySina Security Solutions, a groundbreaking solution for managing, distributing and securing digital access. The inventor and author of several patents, Julia uses mathematics, neuroscience and technology to research and design simple but innovative solutions to complex problems. Julia’s areas of research and expertise include cyber security, collaboration and search. Julia founded MyCena in 2016, which has since become a market leader in segmented access management and secure password distribution. Through its ground-breaking patent security system, MyCena protects companies from the risk of password errors, phishing and phishing, loss of command and control, ransomware and supply chain cyber attacks.

Julia can be reached online at [email protected] or linkedin.com/in/juliaotoole And on our company’s website http://www.mycena.co

Notice of fair use: Under the “fair use” law, other authors may restrict the use of the original author’s work without permission. 17 In accordance with US Code § 107, certain use of copyrighted material “for the purposes of criticism, comment, news reporting, teaching (including multiple copies for classroom use), scholarship, or research, is not a copyright infringement.” As a matter of policy, fair use is based on the belief that parts of copyrighted material are free to be used for the purpose of public comment and criticism. The privilege of fair use is perhaps the most significant limitation of the exclusive rights of a copyright owner. Cyber ​​Defense Media Group is a news reporting company that reports cyber news, events, information and much more on our website Cyber ​​Defense Magazine at no charge. All images and reporting are done exclusively under the fair use of US copyright law.



Source link

Share this:

  • Twitter
  • Facebook
ShareTweetPin
gadgetpage

gadgetpage

Related Posts

Puedes descargar Age of Empires III gratis y legalmente
Uncategorized

Puedes descargar Age of Empires III gratis y legalmente

August 4, 2023
Vanessa Kirby will play Sue Storm in Fantastic Four
Uncategorized

Vanessa Kirby will play Sue Storm in Fantastic Four

August 4, 2023
Tower of Fantasy: Einjähriges Jubiläum und großes Update 3.1 angekündigt
Uncategorized

Tower of Fantasy: Einjähriges Jubiläum und großes Update 3.1 angekündigt

August 3, 2023
OLED-Roadmap 2024: Monitorhersteller gibt Einblicke
Uncategorized

OLED-Roadmap 2024: Monitorhersteller gibt Einblicke

August 2, 2023
Samsung Galaxy SmartTag 2: Zertifizierung zeigt neues Design – Allround-PC.com
Uncategorized

Samsung Galaxy SmartTag 2: Zertifizierung zeigt neues Design – Allround-PC.com

August 2, 2023
Samsung Galaxy S23 FE: Neue Details zur Kamera
Uncategorized

Samsung Galaxy S23 FE: Neue Details zur Kamera

August 2, 2023
Next Post
Ultravide monitors overrated, why I use a 4K TV instead

Ultravide monitors overrated, why I use a 4K TV instead

It’s not a USB-C port, it’s important what you do with it

It's not a USB-C port, it's important what you do with it

Recommended Stories

How to Share Books on a Kindle with Family and Friends | Digital Trends

How to Share Books on a Kindle with Family and Friends | Digital Trends

August 23, 2020
October 2020 Android security update is available for Pixel phones

October 2020 Android security update is available for Pixel phones

October 5, 2020
Galaxy S22 series getting a second update in May because Samsung loves updates

Galaxy S22 series getting a second update in May because Samsung loves updates

May 18, 2022

Popular Stories

  • Xiaomi 13T is said to have a flagship camera on board – macro rubbish thrown away

    Xiaomi 13T is said to have a flagship camera on board – macro rubbish thrown away

    0 shares
    Share 0 Tweet 0
  • Gamescom 2023: Asus Republic of Gamers event with new products and contests

    0 shares
    Share 0 Tweet 0
  • Horizon Forbidden West, new major event: all accounts

    0 shares
    Share 0 Tweet 0
  • iPhone 12 mini Review | Trusted Reviews

    0 shares
    Share 0 Tweet 0
  • Sony Crystal LED Display System – LED Wall for Film Sets | CineD

    0 shares
    Share 0 Tweet 0
  • Home
  • Apps
  • Gadget Info
  • Gaming
Call us: +1 234 JEG THEME

© 2023 JNews - Premium WordPress news & magazine theme by Jegtheme.

No Result
View All Result
  • Home
  • Apps
  • Gadget Info
  • Gaming

© 2023 JNews - Premium WordPress news & magazine theme by Jegtheme.

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?