{"id":33570,"date":"2023-01-06T08:01:13","date_gmt":"2023-01-06T13:01:13","guid":{"rendered":"https:\/\/www.itworldcanada.com?p=520285"},"modified":"2023-01-09T09:07:01","modified_gmt":"2023-01-09T14:07:01","slug":"cyber-security-today-jan-6-2023-a-quantum-security-break-though-claim-generates-a-quantum-sized-controversy","status":"publish","type":"post","link":"https:\/\/technewsday.com\/staging\/cyber-security-today-jan-6-2023-a-quantum-security-break-though-claim-generates-a-quantum-sized-controversy\/","title":{"rendered":"Cyber Security Today, Jan. 6, 2023 \u2013 A quantum security break-though claim generates a quantum-sized controversy"},"content":{"rendered":"<p data-ar-index=\"0\">A quantum security break-though claim generates a quantum-sized controversy.<\/p>\n<p data-ar-index=\"1\">Welcome to Cyber Security Today. It\u2019s Friday, January 6th, 2023. I\u2019m Howard Solomon, contributing reporter on cybersecurity for ITWorldCanada.com.<\/p>\n<p data-ar-index=\"2\"><iframe style=\"border: none;\" title=\"Libsyn Player\" src=\"https:\/\/html5-player.libsyn.com\/embed\/episode\/id\/25519101\/height\/90\/theme\/custom\/thumbnail\/yes\/direction\/forward\/render-playlist\/no\/custom-color\/000000\/\" width=\"100%\" height=\"90\" scrolling=\"no\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\n<table style=\"width: 100%;\">\n<tbody>\n<tr>\n<td><a href=\"https:\/\/www.amazon.com\/ITWC-Cyber-Security-Today\/dp\/B07BRNG89P\/ref=sr_1_1?s=digital-skills&amp;ie=UTF8&amp;qid=1522688435\" rel=\"noopener noreferrer\"><img decoding=\"async\" class=\"aligncenter wp-image-396718 size-full\" src=\"https:\/\/i.itworldcanada.com\/wp-content\/uploads\/2017\/09\/sub-alexa-200.png\" alt=\"Cyb er Security Today on Amazon Alexa\" width=\"200\" height=\"74\" border=\"none\" \/><\/a><\/td>\n<td><a href=\"https:\/\/www.google.com\/podcasts?feed=aHR0cDovL2N5YmVyc2VjdXJpdHl0b2RheS5saWJzeW4uY29tL3Jzcw%3D%3D\" rel=\"noopener noreferrer\"><img decoding=\"async\" class=\"thumbnail aligncenter wp-image-408712 size-full\" src=\"https:\/\/i.itworldcanada.com\/wp-content\/uploads\/2018\/09\/sub-gp-200.png\" alt=\"Cyber Security Today on Google Podcasts\" width=\"200\" height=\"74\" \/><\/a><\/td>\n<td><a href=\"https:\/\/itunes.apple.com\/ca\/podcast\/cyber-security-today\/id1363182054\" rel=\"noopener noreferrer\"><img decoding=\"async\" class=\"aligncenter wp-image-396720 size-full\" src=\"https:\/\/i.itworldcanada.com\/wp-content\/uploads\/2017\/09\/sub-itunes-200.png\" alt=\"Subscribe to Cyber Security Today on Apple Podcasts\" width=\"200\" height=\"74\" border=\"none\" \/><\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p data-ar-index=\"3\"><strong>A claim by Chinese researchers<\/strong> to have found a way that a quantum computer of today can break the RSA public-key encryption system has experts divided. If true, it would be shocking: Most experts think it will be many years before it\u2019s possible to break current RSA encryption \u2014 if at all. However, the Chinese researchers think it can be done with a quantum computer with 372 qubits. By comparison, IBM\u2019s Osprey quantum computer has 433 qubits. The thing is, the Chinese could only practice on a machine with 10 qubits \u2014 and only on 48-bit encrypted numbers. RSA\u2019s encryption algorithm has 2,048 bits. So is the RSA encryption system under threat? As <a href=\"https:\/\/www.schneier.com\/blog\/archives\/2023\/01\/breaking-rsa-with-a-quantum-computer.html\" rel=\"noopener\">encryption expert Bruce Schneier wrote this week<\/a>, we don\u2019t have enough evidence yet to know. Schneier quotes one expert saying it would take a miracle for the proposed Chinese solution to work.<\/p>\n<p data-ar-index=\"4\"><strong>For some reason<\/strong> December was a busy month for threat actors. Several ransomware attacks have been reported. In addition, hundreds of U.S. counties were forced to work with paper after a cyberattack last week on their digital records management provider, called Cott Systems. <a href=\"https:\/\/www.databreachtoday.com\/cyberattack-on-records-vendor-affects-scores-us-counties-a-20856\" rel=\"noopener\">According to Data Breach Today<\/a> the attack knocked out the ability of some government offices to access online records. The story says Cott serves over 400 local governments across 21 states.<\/p>\n<p data-ar-index=\"5\"><strong>There is also some good news<\/strong> to start the year: <a href=\"https:\/\/www.bitdefender.com\/blog\/labs\/bitdefender-partnership-with-law-enforcement-yields-megacortex-decryptor\/\" rel=\"noopener\">Bitdefender has released a free decryptor<\/a> for organizations hit by the MegaCortex ransomware strain. It was built with the help of Europol, the NoMoreRansom project and law enforcement authorities in Zurich.<\/p>\n<p data-ar-index=\"6\"><strong>Threat actors can take advantage<\/strong> of a newly-announced vulnerability within days, if not hours. The latest evidence is<a href=\"https:\/\/www.esentire.com\/blog\/hackers-exploit-fortinet-devices-to-spread-ransomware-within-corporate-environments-warns-esentire\" rel=\"noopener\"> in a report from eSentire<\/a> on an authentication bypass vulnerability in several Fortinet products. Fortinet announced the discovery last October. Three days later a proof of concept code for exploiting the hole was publicly released. Not long afterward eSentire researchers saw hackers buying and selling access to compromised Fortinet devices. In November eSentire intercepted and shut down a ransomware attack on a Canadian college and an unnamed global investment firm through a Fortinet VPN. One lesson: IT teams need to patch important network devices as soon as fixes are available. A link to the report is in the text version of this podcast at ITWorldCanada.com.<\/p>\n<p data-ar-index=\"7\"><strong>There\u2019s more evidence<\/strong> of the need for cloud services platforms to tighten their security. It comes from researchers at Palo Alto Networks, who looked into the discovery last year of a South African-based gang abusing GitHub to open hundreds of accounts for mining cryptocurrency. <a href=\"https:\/\/unit42.paloaltonetworks.com\/purpleurchin-steals-cloud-resources\/\" rel=\"noopener\">In a report this week<\/a> researchers said the gang\u2019s operations are bigger than suspected. It has created more than 130,000 accounts on GitHub, Heroku, Togglebox and other cloud services. And it isn\u2019t just using what\u2019s called \u201cfreejacking,\u201d which is the abuse of temporary free accounts. The gang is also using a tactic called \u201cplay and run,\u201d where it uses a service and then runs instead of paying. In addition, the report says the gang was able to evade GitHub\u2019s CAPTCHA security check<\/p>\n<p data-ar-index=\"8\"><strong>Malware has been discovered<\/strong> that exploits outdated or unpatched WordPress plugins. <a href=\"https:\/\/news.drweb.com\/show\/?i=14646&amp;lng=en&amp;c=23\" rel=\"noopener\">According to security firm Dr. Web,<\/a> the malware goes after 30 plugins and themes to inject malicious JavaScript on WordPress pages. When a victim clicks anywhere on the infected page they will be bounced to a website controlled by the hackers. The report is another reason why administrators have to keep track of all WordPress add-ons.<\/p>\n<p data-ar-index=\"9\"><strong>Finally,<\/strong> if you have a new IT security team, a just-released short primer on the biggest ransomware gangs <a href=\"https:\/\/www.trustwave.com\/en-us\/resources\/blogs\/spiderlabs-blog\/2022-year-in-review-ransomware\/\" rel=\"noopener\">released this week by Trustwave<\/a> may be a good introduction. It has background on the Hive, LockBit, BlackCat\/ALPHV and BlackBasta gangs. There\u2019s a link to the blog in the text version of this podcast at ITWorldCanada.com.<\/p>\n<p data-ar-index=\"10\">That\u2019s it for now. But later today the Week in Review edition will be out. Guest commentator David Shipley and I will discuss the self-imposed rules ransomware gangs create to supposedly limit who they hit, the increasing theft of digital ID tokens and how ChatGPT might be used by crooks.<\/p>\n<p data-ar-index=\"11\">Follow Cyber Security Today on Apple Podcasts, Google Podcasts or add us to your Flash Briefing on your smart speaker.<\/p>\n<p data-ar-index=\"12\">The post <a href=\"https:\/\/www.itworldcanada.com\/article\/cyber-security-today-jan-6-2023-a-quantum-security-break-though-claim-generates-a-quantum-sized-controversy\/520285\">Cyber Security Today, Jan. 6, 2023 \u2013 A quantum security break-though claim generates a quantum-sized controversy<\/a> first appeared on <a href=\"https:\/\/www.itworldcanada.com\/\">IT World Canada<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This episode reports on the debate in quantum computing circles, a free decryptor for firms hit by the MegaCortex ransomware strain and why cloud services platforms have to tighten thei<\/p>\n","protected":false},"author":17,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[360,16],"tags":[389],"class_list":["post-33570","post","type-post","status-publish","format-standard","hentry","category-podcasts","category-security","tag-cyber-security-today"],"acf":[],"_links":{"self":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts\/33570","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/comments?post=33570"}],"version-history":[{"count":3,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts\/33570\/revisions"}],"predecessor-version":[{"id":33680,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts\/33570\/revisions\/33680"}],"wp:attachment":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/media?parent=33570"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/categories?post=33570"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/tags?post=33570"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}