• Latest
  • Trending
Cyber-Attack on Belgium’s Military

Cyber-Attack on Belgium’s Military

December 23, 2021
EU Agrees New Cybersecurity Legislation for Critical Services Organizations

EU Agrees New Cybersecurity Legislation for Critical Services Organizations

May 16, 2022
Apple releases iOS 15.5 RC, here’s the list of everything new

Apple releases iOS 15.5 RC, here’s the list of everything new

May 13, 2022
MSI Full AMD 300-Series Motherboard Compatibility for Zen 3

MSI Full AMD 300-Series Motherboard Compatibility for Zen 3

May 13, 2022
Gigabyte New Flagship AORUS 17X Gaming Laptop with Extreme Performance

Gigabyte New Flagship AORUS 17X Gaming Laptop with Extreme Performance

May 13, 2022
MediaTek Unveils New AIoT Platform Stack and Genio 1200 AIoT Chip

MediaTek Unveils New AIoT Platform Stack and Genio 1200 AIoT Chip

May 13, 2022
Oracle expands global network of industry innovation labs

Oracle expands global network of industry innovation labs

May 13, 2022
Google announces 30,000 scholarships under African developer scheme

Google announces 30,000 scholarships under African developer scheme

May 13, 2022
Huawei attracts global talent to tackle world-class challenges

Huawei attracts global talent to tackle world-class challenges

May 13, 2022
MTN SA Commits R2.2 Billion For Network Modernisation

MTN SA Commits R2.2 Billion For Network Modernisation

May 13, 2022
Micron Delivers Industry-Leading Capacity Sizes and QLC NAND

Micron Delivers Industry-Leading Capacity Sizes and QLC NAND

May 13, 2022
ADATA LEGEND 850 and Limited Edition PCIe Gen4 x4 M.2 2280 SSDs

ADATA LEGEND 850 and Limited Edition PCIe Gen4 x4 M.2 2280 SSDs

May 13, 2022
SMART Modular Technologies New DuraMemory DDR5 VLP RDIMM

SMART Modular Technologies New DuraMemory DDR5 VLP RDIMM

May 13, 2022
  • Consumer Watch
  • Kids Page
  • Directory
  • Events
  • Reviews
Monday, 16 May, 2022
  • Login
itechnewsonline.com
  • Home
  • Tech
  • Africa Tech
  • InfoSEC
  • Data Science
  • Data Storage
  • Business
  • Opinion
Subscription
Advertise
No Result
View All Result
itechnewsonline.com
No Result
View All Result

Cyber-Attack on Belgium’s Military

by ITECHNEWS
December 23, 2021
in Infosec, Leading Stories
0 0
0
Cyber-Attack on Belgium’s Military

Threat actors have exploited a vulnerability in Log4j software to wage a cyber-attack on Belgium’s Defense Ministry.

The attack began on December 16 and was confirmed by Belgium’s Ministry of Defense on Monday.

YOU MAY ALSO LIKE

EU Agrees New Cybersecurity Legislation for Critical Services Organizations

Apple releases iOS 15.5 RC, here’s the list of everything new

Speaking to the AFP in Brussels on Tuesday, Belgian military spokesman Commander Olivier Séverin said that the incident had caused damage to services that were connected to the internet, paralyzing part of the ministry’s activities.

He added that five days after the attack began, analysis of the incident was still being carried out and the process of restoring disrupted services remained ongoing.

Séverin did not shed any light on who may have been responsible for the cyber-attack.

A spokesperson for Belgian Defense Minister Ludivine Dedonder said that “the ministry’s teams have been working hard in past days to secure its networks” and that the Belgian government will continue to invest in cybersecurity defenses.

Log4j is a Java-based logging library that tracks system processes. Security teams around the world have been working to secure their systems after multiple vulnerabilities were discovered in Log4j earlier this month.

Mike Saxton, chief technologist at Booz Allen and director of Federal Threat Hunt and Digital Forensics and Incident Response (DFIR) urged organizations to act now to mitigate the Log4j vulnerability.

“Most immediately, organizations must establish and see through a plan that begins with the following: 1) Implementing sensor blocks; 2) Disabling Log4J; 3) Identifying and patching vulnerable versions; 4) Disabling JNDI lookups; 5) Disabling remote codebases; 6) Performing scan with updated vulnerability management templates; 7) Performing searches and analysis of all security logs for evidence of enumeration or compromise; 8) Consolidating, communicating, and disseminating updated threat intel associated with Log4j; 9) Tracking all remediation and mitigation efforts and tasks; 10) Continuing to apply up-to-date blocking measures; 11) Monitoring LDAP traffic; and 12) Moving vulnerable systems behind additional firewalls,” said Saxton.

He added: “This list may seem overwhelming, but it should be viewed as a template rather than a checklist that organizations can follow.”

In the long term, Saxton advised organizations to move to a persistent threat hunt model and to work under the assumption that their vulnerable assets will be breached.

Source: Sarah Coble
Via: INFOSECURITY MAGAZINE
Tags: Cyber-AttackLog4j VulnerabilityMilitary
ShareTweetShare

Get real time update about this post categories directly on your device, subscribe now.

Unsubscribe

Search

No Result
View All Result

Recent News

EU Agrees New Cybersecurity Legislation for Critical Services Organizations

EU Agrees New Cybersecurity Legislation for Critical Services Organizations

May 16, 2022
Apple releases iOS 15.5 RC, here’s the list of everything new

Apple releases iOS 15.5 RC, here’s the list of everything new

May 13, 2022
MSI Full AMD 300-Series Motherboard Compatibility for Zen 3

MSI Full AMD 300-Series Motherboard Compatibility for Zen 3

May 13, 2022

About What We Do

itechnewsonline.com

We bring you the best Premium Tech News.

Recent News With Image

EU Agrees New Cybersecurity Legislation for Critical Services Organizations

EU Agrees New Cybersecurity Legislation for Critical Services Organizations

May 16, 2022
Apple releases iOS 15.5 RC, here’s the list of everything new

Apple releases iOS 15.5 RC, here’s the list of everything new

May 13, 2022

Recent News

  • EU Agrees New Cybersecurity Legislation for Critical Services Organizations May 16, 2022
  • Apple releases iOS 15.5 RC, here’s the list of everything new May 13, 2022
  • MSI Full AMD 300-Series Motherboard Compatibility for Zen 3 May 13, 2022
  • Gigabyte New Flagship AORUS 17X Gaming Laptop with Extreme Performance May 13, 2022
  • Home
  • InfoSec
  • Opinion
  • Africa Tech
  • Data Storage

© 2021 iTechNewsOnline.Com - Powered by BackUpDataSystems

No Result
View All Result
  • Home
  • Tech
  • Africa Tech
  • InfoSEC
  • Data Science
  • Data Storage
  • Business
  • Opinion

© 2021 iTechNewsOnline.Com - Powered by BackUpDataSystems

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?
Go to mobile version