Phone : +91 95 8290 7788 | Email : sales@itmonteur.net

Register & Request Quote | Submit Support Ticket

Home » Tag: cyber security

Tag Archives: cyber security

Home » Tag: cyber security

Industries We Serve

Industries We Serve

Textile
Textile
Banking and Insurance/ Non-Banking Financial Institutions
FMCG
Telecom/ IT/ ITES
Healthcare
Agro based Industries. (Sugar/ Malt/ Rice Bran Oil/ Other Commodities)
Printing and Publishing
Not-for-Profit Organizations/ Trusts
Manufacturing and Engineering
Media and Entertainment
Automotive
Infrastructure (Highways/ Metro/ Power/ Energy)
Education
Aviation
Real Estate
Pharma

Network Security Audit Company in India

Network Security Audit Company in India

Network Security Audit Company in India

Network Security Audit Company in India

Firewall Firm offers security audit services. These audits include applications, Operating systems, Networks and policy. Details of these audit processes are as below:

Policy Audit

Policy Audit service are deals with auditing of security policies. With our experience in dealing with various diverse systems and policies, we offer a unique combination of audit as well as technology skills. Policy Audits helps clients to recognizes their weaknesses and strengths as formulated in their policies and take adequate measures to reach standards prevalent elsewhere in this area.

Application Security

Firewall Firm looks into applications and audits existing policies on applications keeping in view the objectives of the client organization in terms of security. We also help clients develop secure and state of art applications through our solutions which are indicated elsewhere on this site.

Operating System Security

Operating system is the backbone which provides the platform on which applications are hosted. Firewall Firm has extensive experience in plugging the known vulnerabilities and hardening the operating system for client use. Audit services also help the client in understanding the weaknesses which exist in the system.

Network Security

Network security audit service audits the security of the network. This service looks into the areas of confidentiality, authentication and data integrity. Firewall Firm solutions team is capable of building these features on any network using standard protocols. Firewall Firm also helps clients in proper selection of network security appliances like Firewalls, IDS’s, Antivirus software and PKI solutions.

Vulnerability Assessments Services in India

Vulnerability Assessments are essential to find out the extent to which systems are exposed to threats from internal as well as external users. Firewall Firm provides these tests using the best of breed tools. You can request a sample report of the Vulnerability Assessment here. Firewall Firm conducts Vulnerability Assessment Tests in the following two ways:

Onsite Vulnerability Assessment Tests

Onsite Vulnerability Assessment is done by deploying Firewall Firm’s assessors to the client’s locations. These assessments include:

Assessment of vulnerabilities on Operating Systems ( only for servers on public IP addresses) verifying if the recent patches are applied or not.
Automated vulnerability assessments of routers and Firewalls.
Assessing the vulnerabilities on web servers, RAS, mailservers which are accessible from outside.
A detailed report regarding vulnerabilities found with recommendations for plugging the same.

Remote Vulnerability Assessment Tests

Remote Vulnerability Assessment is done by remotely accessing the Client Servers which are kept on public IP addresses. These tests include:

Assessment of vulnerabilities on Operating Systems ( only for servers on public IP addresses) verifying if the recent patches are applied or not.
Automated vulnerability assessments of routers and Firewalls.
Assessing the vulnerabilities on web servers, RAS, mailservers which are accessible from outside.
A detailed report regarding vulnerabilities found with recommendations for plugging the same.

Cyber-Security-Audit-Review

Cyber-Security-Audit-Review

For more details, please contact us on

Sales :+91 958 290 7788 | Support : +91 96540 16484

Register & Request Quote | Submit Support Ticket

Indian firewall manufacturers company

 

Made_in_India

Made_in_India

Indian firewall manufacturers company

When any enterprise or small medium business start thinking of a network management & security, the first thing to come up in the mind of IT Managers is a good and secure firewall. Firewalls are the first layer of defense in a network, as a system without the basic layer of security is intended to reveal the sensitive data for enterprise users.

A firewall is a combo of a firewall software and operating system that is built to run a firewall system on a dedicated hardware or virtual machine which includes :

Embedded firewalls: very limited-capability programs running on a low-power CPU system,
Software firewall appliances: a system that can be run in independent hardware or in a virtualised environment as a virtual appliance
Hardware firewall appliances: Hardware firewall is specifically built to install as a network device, providing enough network interfaces and CPU to serve a wide range of purposes. From protecting a small network to protecting an enterprise-level network.

below is the list of Top Indian Firewall Manufacturing Companies :

Vendors and Products of Indian Firewall Manufacturer

 

 

Dwarpal

Seqrite

GajShield

 

Made_in_India

Made_in_India

Prime Minister Narendra Modi has launched his big “Make in India” campaign, with the aim of turning the India into a global hub of manufacturing, with His Initiative of Digital India, Make in India, Many IT Companies started doing manufacture of Security Firewalls.

Made-in-India

Made-in-India

Toyota suffered a data breach compromising sales information of almost 3.1 million customers

  • Hackers breached Toyota’s IT systems and gained unauthorized access to servers that contained sales information of almost 3.1 customers.
  • The accessed data belongs to several sales subsidiaries such as Toyota Tokyo Sales Holdings, Tokyo Tokyo Motor, Tokyo Toyopet, Toyota Tokyo Corolla, Nets Toyota Tokyo, Lexus Koishikawa Sales, Jamil Shoji (Lexus Nerima), and Toyota West Tokyo Corolla.

What is the issue – Japanese car manufacturing giant Toyota recently suffered a data breach compromising sales information of almost 3.1 million customers.

It should be noted that this is the second breach that Toyota has suffered in the last five weeks. The first breach impacted its Australia branch, while this incident impacted the company’s main branch in Japan.

What happened

Toyota revealed that hackers breached its IT systems and gained unauthorized access to servers that contained sales information of almost 3.1 customers. However, no financial information was stored in the server.

The accessed data belongs to several sales subsidiaries such as Toyota Tokyo Sales Holdings, Tokyo Tokyo Motor, Tokyo Toyopet, Toyota Tokyo Corolla, Nets Toyota Tokyo, Lexus Koishikawa Sales, Jamil Shoji (Lexus Nerima), and Toyota West Tokyo Corolla.

What actions were taken?

  • The car manufacturing company is conducting investigations on the incident.
  • Toyota is planning to implement information security measures in order to avoid such incidents from happening in the future.

“We apologize to everyone who has been using Toyota and Lexus vehicles for the great concern. We take this situation seriously, and will thoroughly implement information security measures at dealers and the entire Toyota Group,” a Toyota spokesperson told the press.

Worth noting – On the same day that Toyota Japan announced its data breach, Toyota Vietnam also disclosed a similar cyber-security incident. However, details on the incident remain unclear.

Business Email Compromise (BEC) Scams: A deep insight on how attackers leverage social engineering tricks to perform BEC scams

Business Email Compromise (BEC) is a type of scam that targets corporate companies that pay bills via wire transfers. BEC scammers targeting employees of corporate companies mostly impersonate the company’s CEO or senior executives. These scammers use social engineering techniques to trick employees into sending funds directly to the scammers.

Types of BEC Scams

According to the FBI, there are five types of BEC scams:

  • Bogus Invoice Scheme – This scheme is also known as the ‘Supplier Swindle’ and ‘Invoice Modification Scheme’. This scheme often targets companies with suppliers abroad. These scammers impersonate the suppliers and request payment via wire transfer to an account controlled by the scammers.
  • CEO Fraud – In this type of scam, attackers compromise CEO or a senior executive’s email account and use it to send emails to employees requesting money transfer to the account controlled by them.
  • Account Compromise – Scammers compromise targeted employees’ email accounts and send email to multiple vendors requesting payment via wire transfer to the scammers’ accounts.
  • Attorney Impersonation – In this case, scammers impersonate lawyers who are in charge of confidential matters and request payment from victims.
  • Data Theft – In this scam type, attackers target employees PII, social security number and tax statements to be used for various other attack campaigns.

Examples of BEC scams

Example 1 – BEC scam targeting employees’ paycheck

In January 2019, BEC scammers targeted employees paycheck. These scammers sent spoof emails to the HR department impersonating the employees and requesting the HR to change their direct deposit information and divert monthly salary paycheck to a fake account controlled by the scammers.

Example 2 – BEC scammers exploiting a Gmail feature

In February 2019, Business Email Compromise (BEC) scammers were exploiting a Gmail feature ‘Dot accounts’ to perform various fraudulent activities such as filing for fake tax returns, filing for fake unemployment benefits, and more.

Gmail’s ‘Dot accounts’ is a feature of Gmail addresses that ignores dot characters inside Gmail usernames, regardless of their placement. Scammers were taking advantage of this feature and creating multiple email accounts to perform various fraudulent activities.

For example, scammers leveraged this feature to trick Netflix account owners into adding card details to scammers’ accounts.

BEC scammers switching to mobile

Recently researchers noted that scammers are adopting SMS as a communication platform for BEC attacks as mobile devices are easier to facilitate attacks. For which, these scammers are using temporary US-based phone numbers and are utilizing services such as Google Voice to perform multiple attacks from the same US number.

How to stay protected?

  • It is always best to use two-factor authentication while logging in to your email accounts.
  • To stay protected from such attacks it is important for organizations to train their employees on how to react to emails or SMS that request any sort of financial task.
  • It always best to ensure the sender’s email address and confirm directly with the sender in person or via phone call regarding the email.
  • Experts recommended users to never open any email or attachments that come from anonymous senders.

TrickBot Creators Collaborate With BokBot to Conduct Man-in-the-Middle Attacks

Security researchers warned that the cybercriminals behind the two banking Trojans are now collaborating to perform man-in-the-middle (MitM) attacks.

On March 17, Crowdstrike discovered a BokBot proxy module called shadDll in conjunction with TrickBot. The code for the two banking Trojans is 81 percent similar, the researchers said, which means the proxy module can be seamlessly integrated into TrickBot’s extensible, modular framework. It’s possible the two threat groups have been collaborating on an ongoing basis, the researchers added.

Adding New Features Through Threat Group Collaboration

After infecting a machine by duping victims into installing malware via phishing messages, TrickBot can use the shadDll module to access networking functions and install illegitimate secure socket layer (SSL) certificates. At this point, it can do many of the things BokBot can do, including intercepting web traffic and redirecting it, taking screenshots to steal personal information, and injecting other malicious code.

The researchers have attributed the BokBot Trojan to a cybercriminal group called Lunar Spider, while TrickBot is believed to have been created by a group called Wizard Spider. TrickBot, which first emerged in late 2016, has proven highly versatile in attacking financial services firms, and Wizard Spider may include members of the group that developed the earlier Dyre malware, according to Crowdstrike.

How to Stay Ahead of TrickBot’s Tricks

The “IBM X-Force Threat Intelligence Index” for 2019 identified TrickBot as the most prevalent financial malware family of last year, representing 13 percent of all campaign activity. This was in part due to the ability of various threat actors to make use of the Trojan’s variants. For example, the report showed that IcedID distributed TrickBot within its own botnet in a 2018 campaign. However, experts noted that proper security controls, regular user education and planned incident response can help keep this threat at bay.

X-Force researchers also discovered that TrickBot has been used to steal cryptocurrency, and distribution of the BokBot module may make it even more popular. Organizations should employ advanced malware protection to receive alerts for high-risk devices and notifications when malware has been detected to ensure this cooperation among cybercriminals doesn’t lead to even deadlier attacks.

Man drives 3,300 miles to talk to YouTube about deleted video

On Sunday, police in Mountain View, California, where Google is headquartered, arrested a man who drove more than 3,300 miles from Maine to discuss what he thought was the company’s removal of his YouTube account and the one video he’d posted – one about getting rich quick.

It was not, in fact, deleted by YouTube. It turns out, his wife deleted it, concerned as she was about her husband’s mental state. She told BuzzFeed News that the video, created by 33-year-old Kyle Long, was “rambling” and “bizarre.”

According to a press release from the Mountain View police department (MVPD), Iowa State Patrol on Friday gave them a heads-up about Long’s journey. Iowa police spoke to Long twice that day: once when he got into a collision (without injuries) and then again after he vandalized a restroom at a gas station store a short time later.

Employees at the gas station store didn’t want to press charges, and the collision didn’t warrant Long’s detention, so Iowa police let him go.

Three baseball bats and a serious need to chat

Then, on Sunday, the MVPD got another heads-up. This one came from police in Long’s hometown of Waterville, Maine. Waterville police told MV police that they’d been tipped off about Long having made it to California. They’d also gotten a tip that he intended to resort to physical violence if his meeting with Google execs didn’t go well.

MVPD began to look into the matter …and kept an eye out for Long’s arrival. Officers were stationed in and around Googleplex, and monitoring all the major highways around the city in order to intercept Long before he could step foot on Google’s main campus.

On Sunday afternoon, around 1pm, they spotted Long’s car. When they stopped him, they found three baseball bats.

Legislation Introduced in California to Strengthen Data Breach Notification Law

California Attorney General Xavier Becerra and Assemblymember Marc Levine (D-San Rafael) unveiled AB 1130, legislation to strengthen California’s data breach notification law to protect consumers. The bill closes a loophole in the state’s existing data breach notification law by requiring businesses to notify consumers of compromised passport numbers and biometric information.

“Knowledge is power, and all Californians deserve the power to take action if their passport numbers or biometric data have been accessed without authorization,” said Attorney General Becerra. “We are grateful to Assemblymember Levine for introducing this bill to improve our state’s data breach notification law and better protect the personal data of California consumers. AB 1130 closes a gap in California law and ensures that our state remains the nation’s leader in data privacy and protection.”

“There is a real danger when our personal information is not protected by those we trust,” said Assemblymember Levine. “Businesses must do more to protect personal data, and I am proud to stand with Attorney General Becerra in demanding greater disclosure by a company when a data breach has occurred. AB 1130 will increase our efforts to protect consumers from fraud and affirms our commitment to demand the strongest consumer protections in the nation.”

In 2003, California became the first state to pass a data breach notification law requiring companies to disclose breaches of personal information to California consumers whose personal information was, or was reasonably believed to have been, acquired by an unauthorized person. This personal information includes identifiers such as a person’s social security number, driver’s license number, credit card number, and medical and health insurance information. This bill would update that law to include passport numbers as personal information protected under the statute. Passport numbers are unique, government-issued, static identifiers of a person, which makes them valuable to criminals seeking to create or build fake profiles and commit sophisticated identity theft and fraud. AB 1130 would also update the statute to include protection for a person’s unique biometric information, such as a fingerprint, or image of a retina or iris.

The legislation was prompted by the massive data breach of the guest database at Starwood Hotels — recently acquired by Marriott — in 2018. Marriott revealed that the massive breach exposed more than 327 million records containing guests’ names, addresses, and more than 25 million passport numbers, among other things. Though the company did notify consumers of the breach, current law does not require companies to report breaches if only consumers’ passport numbers have been improperly accessed.

Microsoft Edge secretly whitelisted sites running Flash Player for Facebook

Facebook has found itself involved in another controversy, this time a cybersecurity researcher has revealed Microsoft Edge allows Flash Player content to be played on Facebook without notifying the user.

Google Project Zero’s Ivan Fratric came across what is essentially a secret whitelist and reported it on November 26, 2018 and waited the usual 90 days before making his discovery public. In this case, the public disclosure came after Microsoft addressed the issue, CVE-2019-0641, with its February Patch Tuesday rollout. The domains on the list were enabled to play Flash content on Facebook.

What Fratric came across was the binary file C:\Windows\system32\edgehtmlpluginpolicy.bin. This contains the default whitelist of at least domains 58 domains that can bypass Flash click2play and load Flash content without getting user confirmation in Microsoft Edge in Windows 10, he wrote.

The sites that had been whitelisted range from music.microsoft.com to the gaming site www.poptropica.com to www.vudu.com along with two Facebook URLs https://www.facebook.com and https://apps.facebook.com. Post update the list has been whittled down to include only the two Facebook domains.

“The most common permission flag value (1) indicates that the site is allowed to load Flash content if: the Flash content is hosted on the same domain *OR* The element containing Flash is larger than 398×298 pixels as can be seen in FlashClickToRunHelper::DetermineControlAction,” he said.

Fratric pointed out the security issues involved with the secret whitelist. An XSS vulnerability on any of the domains would allow bypassing click2play policy. Primarily the unpatched XSS vulnerabilities contained within several of these sites and that the list contained HTTP sites which could allow a man in the middle attacker to bypass the click2play policy.

The overall danger contained in such whitelists was pointed out by Mike Bittner, digital security and operations manager at The Media Trust.

“Block/blacklists and allow/whitelists can outlive their usefulness within seconds. As soon as new malware surface — and 285,000 new ones are created every day — a blocklist’s utility takes a dive. It’s important to continuously update such lists not only to keep pace with attacks but also to ensure their accuracy so that harmless, legitimate sites aren’t needlessly blocked, he said.

Adobe announced in July 2017 it will end support for Flash in 2020. The application receives a steady stream of security updates and has been banned from many browsers.

Google Play announces 2019 malicious app crackdown

Google Play announced it will continue its crackdown on malicious apps into 2019 by focusing more on user privacy, developer integrity and harmful app contents and behavior.

Google said it plans to introduce additional policies for device permissions and user data throughout the year, according to a Feb. 13 blog post.

“In addition to identifying and stopping bad apps from entering the Play Store, our Google Play Protect system now scans over 50 billion apps on users’ devices each day to make sure apps installed on the device aren’t behaving in harmful ways,” Google said in the post.

“With such protection, apps from Google Play are eight times less likely to harm a user’s device than Android apps from other sources.”

Google also said it will set out to increase developer integrity. The firm said that because 80 percent of severe policy violations are conducted by repeat offenders, it will focus on better screening for those who get booted off and then create new accounts to continue uploading their malicious content.

In addition, Google said it would work to enhance its capabilities to counter adversarial behavior, and strive relentlessly to provide users with a secure and safe app store.

 

Read More »

Information Security - InfoSec - Cyber Security - Firewall Providers Company in India

 

 

 

 

 

 

 

 

 

 

 

 

What is Firewall? A Firewall is a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies. At its most basic, a firewall is essentially the barrier that sits between a private internal network and the public Internet.

 

Secure your network at the gateway against threats such as intrusions, Viruses, Spyware, Worms, Trojans, Adware, Keyloggers, Malicious Mobile Code (MMC), and other dangerous applications for total protection in a convenient, affordable subscription-based service. Modern threats like web-based malware attacks, targeted attacks, application-layer attacks, and more have had a significantly negative effect on the threat landscape. In fact, more than 80% of all new malware and intrusion attempts are exploiting weaknesses in applications, as opposed to weaknesses in networking components and services. Stateful firewalls with simple packet filtering capabilities were efficient blocking unwanted applications as most applications met the port-protocol expectations. Administrators could promptly prevent an unsafe application from being accessed by users by blocking the associated ports and protocols.

 

Firewall Firm is an IT Monteur Firewall Company provides Managed Firewall Support, Firewall providers , Firewall Security Service Provider, Network Security Services, Firewall Solutions India , New Delhi - India's capital territory , Mumbai - Bombay , Kolkata - Calcutta , Chennai - Madras , Bangaluru - Bangalore , Bhubaneswar, Ahmedabad, Hyderabad, Pune, Surat, Jaipur, Firewall Service Providers in India

Sales Number : +91 95 8290 7788 | Support Number : +91 94 8585 7788
Sales Email : sales@itmonteur.net | Support Email : support@itmonteur.net

Register & Request Quote | Submit Support Ticket