Story image

Not again… Expert discusses potential SECOND Equifax breach

16 Oct 2017

It was only weeks ago that one of the single largest data breaches in history was announced – known simply as the Equifax breach.

And now, news has emerged of another potential compromise at the same company. Last week the credit reporting giant disabled one of its online customer help pages and was investigating the possibility of another breach.

This came after the site was maliciously manipulated for several hours on Wednesday and again Thursday morning  to deliver fraudulent Adobe Flash updates that infected users’ computers with adware when clicked.

However, after its investigations Equifax asserted that its systems hadn’t been compromised and that the scare had not affected its consumer online dispute portal.

An Equifax spokesman reported:

"The issue involves a third-party vendor that Equifax uses to collect website performance data, and that vendor's code running on an Equifax website was serving malicious content. Since we learned of the issue, the vendor's code was removed from the webpage and we have taken the webpage offline to conduct further analysis."

VP of Security Products and Business Strategy at Barracuda, Sanjay Ramnath says the Equifax issues underscore that web applications remain among the most vulnerable threat vectors.

“This is mainly due to the complexity of web app infrastructure, constantly changing code and lack of awareness around the security implications. This is even more relevant as organisations move their applications to cloud platforms like AWS, Azure and GCP,” says Ramnath.

“Anyone can fall victim. To avoid this, organisations should proactively secure their web assets including continuously monitoring their applications for vulnerabilities, protecting their legacy web applications and automatically deploying and scaling security for their cloud workloads.”

Ramnath says businesses need to adapt to modern times as legacy technology is no longer even sufficient.

“In addition to web applications, organisations should also review their overall security posture and ensure that all threat vectors, like email, users and the network perimeter are protected,” says Ramnath.

“They should also ensure that this protection extends across all deployment surfaces, on-premises and cloud included.”

Enterprise cloud deployments being exploited by cybercriminals
A new report has revealed a concerning number of enterprises still believe security is the responsibility of the cloud service provider.
Ping Identity Platform updated with new CX and IT automation
The new versions improve the user and administrative experience, while also aiming to meet enterprise needs to operate quickly and purposefully.
Venafi and nCipher Security partner on machine identity protection
Cryptographic keys serve as machine identities and are the foundation of enterprise information technology systems.
Machine learning is a tool and the bad guys are using it
KPMG NZ’s CIO and ESET’s CTO spoke at a recent cybersecurity conference about how machine learning and data analytics are not to be feared, but used.
Popular Android apps track users and violate Google's policies
Google has reportedly taken action against some of the violators.
How blockchain could help stop video piracy in its tracks
An Australian video tech firm has successfully tested a blockchain trial that could end up being a welcome relief for video creators and the fight against video piracy.
IBM X-Force Red & Qualys introduce automated patching
IBM X-Force Red and Qualys are declaring a war on unpatched systems, and they believe automation is the answer.
Micro Focus acquires Interset to improve predictive analytics
Interset utilises user and entity behavioural analytics (UEBA) and machine learning to give security professionals what they need to execute threat detection analysis.