fechar
fechar
""
O AI Security Playbook
Este manual explora os seis principais desafios de segurança que as organizações enfrentam ao adotar a IA, juntamente com estratégias comprovadas e reais para enfrentá-los.
            Experimente a Netskope
            Coloque a mão na massa com a plataforma Netskope
            Esta é a sua chance de experimentar a plataforma de nuvem única do Netskope One em primeira mão. Inscreva-se em laboratórios práticos e individualizados, junte-se a nós para demonstrações mensais de produtos ao vivo, faça um test drive gratuito do Netskope Private Access ou participe de workshops ao vivo conduzidos por instrutores.
              Líder em SSE. Agora é líder em SASE de fornecedor único.
              A Netskope é reconhecida como a líder mais avançada em visão para as plataformas SSE e SASE
              2X é líder no Quadrante Mágico do Gartner® para plataformas SASE
              Uma plataforma unificada criada para sua jornada
                ""
                Netskope One AI Security
                As organizações precisam de IA segura para impulsionar seus negócios, mas os controles e as salvaguardas não devem comprometer a velocidade ou a experiência do usuário. A Netskope pode te ajudar a dizer sim às vantagens da IA.
                  ""
                  Netskope One AI Security
                  As organizações precisam de IA segura para impulsionar seus negócios, mas os controles e as salvaguardas não devem comprometer a velocidade ou a experiência do usuário. A Netskope pode te ajudar a dizer sim às vantagens da IA.
                    E-book moderno sobre prevenção de perda de dados (DLP) para leigos
                    Prevenção Contra Perda de Dados (DLP) Moderna para Leigos
                    Obtenha dicas e truques para fazer a transição para um DLP fornecido na nuvem.
                      Livro SD-WAN moderno para SASE Dummies
                      SD-WAN moderno para leigos em SASE
                      Pare de brincar com sua arquitetura de rede
                        Compreendendo onde estão os riscos
                        O Advanced Analytics transforma a maneira como as equipes de operações de segurança aplicam insights orientados por dados para implementar políticas melhores. Com o Advanced Analytics, o senhor pode identificar tendências, concentrar-se em áreas de preocupação e usar os dados para tomar medidas.
                            Suporte Técnico Netskope
                            Suporte Técnico Netskope
                            Nossos engenheiros de suporte qualificados estão localizados em todo o mundo e têm diversas experiências em segurança de nuvem, rede, virtualização, fornecimento de conteúdo e desenvolvimento de software, garantindo assistência técnica de qualidade e em tempo hábil.
                              Vídeo da Netskope
                              Treinamento Netskope
                              Os treinamentos da Netskope vão ajudar você a ser um especialista em segurança na nuvem. Conte conosco para ajudá-lo a proteger a sua jornada de transformação digital e aproveitar ao máximo as suas aplicações na nuvem, na web e privadas.

                                Cloud Threats Memo: State-sponsored Threat Actors Continue to Abuse Legitimate Cloud Services

                                Dec 19 2022

                                Threat actors exploiting cloud services are keeping me very busy in these final days of this troubled 2022. The main character of this Cloud Threats Memo is MuddyWater (also known as Earth Vetala, MERCURY, Static Kitten, Seedworm, and TEMP.Zagros), one of the most prolific cyber espionage groups, active since at least 2017, and believed to be a subordinate element within Iran’s Ministry of Intelligence and Security (MOIS).

                                Researchers at Deep Instinct’s Threat Research team have identified a new campaign by this group targeting Armenia, Azerbaijan, Egypt, Iraq, Israel, Jordan, Oman, Qatar, Tajikistan, and United Arab Emirates, and characterized by a new arsenal of adversary tactics, techniques, and procedures (TTPs) including (but I bet you already know it) the abuse of two legitimate well-know cloud services.

                                This campaign was observed in the beginning of October and possibly started in September. Similar to other operations by the same threat actor, the initial attack vector is a spear phishing email, however what makes this campaign different from the previous ones is the use of a new remote administration tool named “Syncro.” delivered in two different ways: through a direct link embedded into the email pointing to a Dropbox link hosting the Syncro installer, or an HTML attachment (a simple way to evade most email security solutions) containing a link to OneDrive pointing, once again, to the Syncro installer.

                                This is yet another example of legitimate cloud services being exploited by state-sponsored threat actors. What seemed to be an exception just a few months ago, is now becoming the norm with more and more cloud apps joining the club. In fact, if OneDrive is the most exploited service to deliver malware (and not only for state-sponsored actors), Dropbox has gained a solid reputation among Advanced Persistent Threats, with multiple operations unearthed on a regular basis over the course of the last couple of years.

                                ​​How Netskope mitigates the risk of legitimate cloud services exploited to deliver malware

                                Dropbox and OneDrive are among the thousands of services where the Netskope Next Gen SWG can provide granular access control, and one of the dozens for which instance detection is also available. To defend against attacks where a legitimate cloud service is exploited to distribute malware, it is possible to configure a policy that prevents potentially dangerous activities (such as download) from non-corporate instances, or in general from any unneeded cloud storage service for the enterprise.

                                Netskope customers are also protected against malware distributed from a legitimate cloud service by Netskope Threat Protection. Netskope Threat Protection scans web and cloud traffic to detect known and unknown threats with a comprehensive set of engines including signature-based AV, machine learning-based detectors for executables and Office documents, and sandboxing. Netskope Cloud Exchange provides powerful integration tools to leverage investments across their security posture through the integration with third-party tools such as threat intelligence feeds and endpoint detection technologies.

                                Finally, Netskope Advanced Analytics provides specific dashboards to assess the risk of rogue cloud instances being exploited to deliver malware or becoming the target of anomalous communications, with rich details and insights, supporting security teams in the analysis and mitigation/remediation process.

                                You can subscribe to the Cloud Threats Memo mailing list at this link.

                                Stay safe!

                                author image
                                Paolo Passeri
                                Paolo supports Netskope’s customers in protecting their journey to the cloud and is a security professional, with 20+ years experience in the infosec industry.
                                Paolo supports Netskope’s customers in protecting their journey to the cloud and is a security professional, with 20+ years experience in the infosec industry.
                                Conecte-se com a Netskope

                                Subscribe to the Netskope Blog

                                Sign up to receive a roundup of the latest Netskope content delivered directly in your inbox every month.