Were The Solar Wind And Kaseya Attacks An Anamoly Or Just The Tip Of The Iceberg

The Black Hat Security Conference is an annual event that takes place and highlights security concerns and issues and the different ways of solving them over a few days. Most of the tech experts and IT heads attend this conference to be aware of the recent developments in the digital world and to learn methods of fighting against the dark side of the digital world, if and when it attacks.

The keynote session at this conference was delivered by Matt Tait, a former UK Government’s Communications Headquarters Employee to the current Chief Operating Officer at Corellium. While the previous iteration of the conference was online due to the pandemic, this year’s conference was hybrid and involved many online and some in person. Matt Tait delivered the keynote to this audience in a pre-recorded video message. Following the address was a question and answers session by Black Hats Founder, Jeff Moss.

The start of the session was with Tait’s address in which he highlighted the zero day vulnerability and how this previously unchartered territory allowed the scammers and hackers to get away with a lot whilst the victims can just sit and watch their work setting in ruins. He termed the Israeli Project Pegasus and the abhorrent rampant malware as the culprits of this crime. Tait backed the claim that what is shown to the world is most certainly just the tip of the iceberg and the entire black industry operation from under the shadows inflicts cataclysmic devastation to online users throughout the year.

Tait in the video message, however, commended the mobile application stores and approved that while Windows computers and updates can and are being scanned to look for loopholes, there is very little content available for this sort of scanning on Google Play Store and is virtually nonexistent on the Mac OS’s Apple App store.

He further went on to mention that the recent Solar Wind cyber attack that even had the United States Department of Defence involved in the hack and the Kaseya attacks were just two of the high profile attacks that occur every year, some of which are even let unchecked for months. He mentioned that these supply chain attacks can occur outside of your mobile’s applications and can be extremely dangerous for several users.

He concluded his statement by stating the dire need of governments and information technology societies to urge the only players on the field, platform vendors, to take action and project software to prevent phishing and scamming acts.


Photo: ValeryBrozhinsky / Getty Images/iStockphoto

H/T: Techtarget / Securityweek.

Read next: The Old Lore Of Powering Phone On And Off Now Prevents Malware
Previous Post Next Post