Page 98 - Cyber Defense eMagazine September 2022
P. 98

Most Recent 2022 Data Breaches

            August 2022. A hacker publicized 22 million QuestionPro email addresses and other data. The same
            hacker previously successfully breached the FBI and Robinhood.

            July, 2022. A hacker posted 5.4 million Twitter accounts for sale on a hacker forum. A few days earlier
            another hacker posted 69 million Neopets (virtual pet website) accounts to the same forum. In both
            incidents hackers exploited Zero Days to scrape confidential data from websites.

            July, 2022. Hackers stole 20 gigabytes of sensitive data from Marriott International. The sensitive data
            included flight information and credit card numbers.

            July, 2022. Massachusetts-based Shields Health Care Group disclosed they were breached in March
            2022. The continental data stolen by hackers included names, social security numbers, medical records,
            and other sensitive personal information.

            Conventional approaches to cyber security may NOT prevent Data Exfiltration and Data Breaches. In
            2020 the DHS, Department of State, U.S. Marine Corps and the Missile Defense Agency recognized this
            and  all  issued  requests  for  proposals  (RFP)  for  network  full  packet  data  capture  for  Deep  Packet
            Inspection  analysis  (DPI)  of  network  traffic.  This  is  an  important  step  forward  protecting  confidential
            database data and organization information.

            Zero-day vulnerabilities that allow hackers to gain system privileges are a major threat to all organizations
            encrypted and unencrypted confidential data. Confidential data includes: credit card, tax ID, medical,
            social media, corporate, manufacturing, trade secrets, law enforcement, defense, homeland security,
            power  grid  and  public  utility  data.  This  confidential  data  is  almost  always  stored  in  DB2,  Informix,
            MariaDB, Microsoft SQL Server, MySQL, Oracle, PostgreSQL and SAP Sybase databases.



            How to Stop Data Exfiltration and Data Breaches with Deep Packet Inspection

            Protecting encrypted and unencrypted confidential database data is much more than securing databases,
            operating  systems,  applications  and  the  network  perimeter  against  Hackers,  Rogue  Insiders,
            Government-backed Hacking Teams and Supply Chain Attacks.

            Non-intrusive network sniffing technology can perform a real-time Deep Packet Inspection (DPI) of 100%
            of the database activity from a network tap or proxy server with no impact on the database servers. The
            database SQL activity is very predictable. Database servers servicing 1,000 to 10,000 end-users typically
            process daily 2,000 to 10,000 unique queries or SQL commands that run millions of times a day. Deep
            Packet  Analysis  does  not  require  logging  into  the  monitored  networks,  servers  or  databases.  This
            approach can provide CISOs with what they can rarely achieve. Total visibility into the database activity
            24x7 and 100% protection of confidential database data.










            Cyber Defense eMagazine – September 2022 Edition                                                                                                                                                                                                         98
            Copyright © 2022, Cyber Defense Magazine. All rights reserved worldwide.
   93   94   95   96   97   98   99   100   101   102   103