sb-nz logo
Story image

Not again… Expert discusses potential SECOND Equifax breach

16 Oct 2017

It was only weeks ago that one of the single largest data breaches in history was announced – known simply as the Equifax breach.

And now, news has emerged of another potential compromise at the same company. Last week the credit reporting giant disabled one of its online customer help pages and was investigating the possibility of another breach.

This came after the site was maliciously manipulated for several hours on Wednesday and again Thursday morning  to deliver fraudulent Adobe Flash updates that infected users’ computers with adware when clicked.

However, after its investigations Equifax asserted that its systems hadn’t been compromised and that the scare had not affected its consumer online dispute portal.

An Equifax spokesman reported:

"The issue involves a third-party vendor that Equifax uses to collect website performance data, and that vendor's code running on an Equifax website was serving malicious content. Since we learned of the issue, the vendor's code was removed from the webpage and we have taken the webpage offline to conduct further analysis."

VP of Security Products and Business Strategy at Barracuda, Sanjay Ramnath says the Equifax issues underscore that web applications remain among the most vulnerable threat vectors.

“This is mainly due to the complexity of web app infrastructure, constantly changing code and lack of awareness around the security implications. This is even more relevant as organisations move their applications to cloud platforms like AWS, Azure and GCP,” says Ramnath.

“Anyone can fall victim. To avoid this, organisations should proactively secure their web assets including continuously monitoring their applications for vulnerabilities, protecting their legacy web applications and automatically deploying and scaling security for their cloud workloads.”

Ramnath says businesses need to adapt to modern times as legacy technology is no longer even sufficient.

“In addition to web applications, organisations should also review their overall security posture and ensure that all threat vectors, like email, users and the network perimeter are protected,” says Ramnath.

“They should also ensure that this protection extends across all deployment surfaces, on-premises and cloud included.”

Story image
AvePoint brings Salesforce Cloud Backup to channel partners
The product adds to the AvePoint suite of trusted Cloud Backup for Microsoft 365 and Dynamics 365 to provide managed service providers with backup and restore capabilities across multiple, popular SaaS providers.More
Link image
Webinar: Securing privileged access to stop attackers in their tracks
Thycotic's immersive webinar will demonstrate how attackers acquire passwords on endpoints and access critical cloud applications — without being detected.More
Story image
Enterprises underutilising security tools, causing teams to burn out
The report unveiled a lack of meaningful ROI metrics when reporting on security progress, as well as disparate opinions on objectives, tool effectiveness and security awareness amongst the organisation between executives and operations on security teams.More
Story image
Video: 10 Minute IT Jams - Radware VP on the challenges of cloud security
In this interview, Techday speaks to Radware vice president of technologies Yaniv Hoffman, who discusses the primary challenges facing IT organisations in terms of their cloud security apparatus.More
Story image
Need for greater understanding of data security responsibility as cloud adoption grows - report
Despite the accelerated adoption of cloud services, there was a lack of clarity and confidence regarding the protection and recovery of data stored in public clouds.More
Story image
Cohesity appoints its very first CISO
In the newly created role, new appointee Brian Spanswick will focus on advancing and optimising IT and security for Cohesity and its customers, the company says.More