<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Recent HSM breaches in Threats</title>
    <link>https://community.isc2.org/t5/Threats/Recent-HSM-breaches/m-p/47210#M370</link>
    <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/704671939"&gt;@geraldjoyce312&lt;/a&gt;&amp;nbsp;&amp;nbsp; The fact is HSMs are used for all sorts of Financial Institutions around the world, for regulatory requirements etc.&amp;nbsp;&amp;nbsp; The fact is many vendors would not like this type of information to be available in the public realm - bad for business and reputation, trust etc.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Based on this link:&amp;nbsp; &lt;A href="https://searchsecurity.techtarget.com/tip/What-are-the-biggest-hardware-security-threats" target="_blank"&gt;https://searchsecurity.techtarget.com/tip/What-are-the-biggest-hardware-security-threats&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You can perceive some of the issues from going from manual to automation processes in terms of assurance, balanced carefully in terms of mandated regulation, especially in the payment and transaction space.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Or even using Cloud based HSMs.&amp;nbsp;&amp;nbsp; I once saw one situation, where by the management interface was actually left exposed on the same public VLAN, which caused some internal issues for the organisation involved, especially as the client actually found it themselves and were actively using the services to use Cloud based HSMs, using a mobile device.&amp;nbsp; It was solved very quickly indeed as you can imagine.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Other links I have uncovered are:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.unboundsecurity.com/blog/major-vulnerabilities-in-hardware-security-modules/" target="_blank"&gt;https://www.unboundsecurity.com/blog/major-vulnerabilities-in-hardware-security-modules/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.sans.org/white-papers/757/" target="_blank"&gt;https://www.sans.org/white-papers/757/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.venafi.com/blog/what-are-hardware-security-modules-and-how-important-are-they-your-organization" target="_blank"&gt;https://www.venafi.com/blog/what-are-hardware-security-modules-and-how-important-are-they-your-organization&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://blog.fuelusergroup.org/implementing-and-using-hardware-security-modules" target="_blank"&gt;https://blog.fuelusergroup.org/implementing-and-using-hardware-security-modules&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.globenewswire.com/news-release/2021/08/25/2286086/0/en/Global-Hardware-Security-Module-Market-Analysis-Trends-Industry-Forecast-to-2028.html" target="_blank"&gt;https://www.globenewswire.com/news-release/2021/08/25/2286086/0/en/Global-Hardware-Security-Module-Market-Analysis-Trends-Industry-Forecast-to-2028.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://cyware.com/news/vulnerabilities-in-hardware-security-modules-hsms-allow-attackers-to-retrieve-sensitive-data-3002e405" target="_blank"&gt;https://cyware.com/news/vulnerabilities-in-hardware-security-modules-hsms-allow-attackers-to-retrieve-sensitive-data-3002e405&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.unboundsecurity.com/blog/major-vulnerabilities-in-hardware-security-modules/" target="_blank"&gt;https://www.unboundsecurity.com/blog/major-vulnerabilities-in-hardware-security-modules/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Other major factors are going to be misconfiguration, human beings and errors over time.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sun, 29 Aug 2021 20:23:45 GMT</pubDate>
    <dc:creator>Caute_cautim</dc:creator>
    <dc:date>2021-08-29T20:23:45Z</dc:date>
    <item>
      <title>Recent HSM breaches</title>
      <link>https://community.isc2.org/t5/Threats/Recent-HSM-breaches/m-p/47169#M369</link>
      <description>&lt;P&gt;I have been looking on the web for news and background on any recent HSM breaches. I haven't found anything less than about three years old. Would anyone know of a resource I could look at to gather information? I am interested in researching the cause of the breaches, whether they be hardware tampering, a code vulnerability, misconfiguration, placed in the wrong security zone with the wrong security controls, etc. Any information would be greatly appreciated.&lt;/P&gt;</description>
      <pubDate>Mon, 09 Oct 2023 09:58:00 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/Recent-HSM-breaches/m-p/47169#M369</guid>
      <dc:creator>geraldjoyce312</dc:creator>
      <dc:date>2023-10-09T09:58:00Z</dc:date>
    </item>
    <item>
      <title>Re: Recent HSM breaches</title>
      <link>https://community.isc2.org/t5/Threats/Recent-HSM-breaches/m-p/47210#M370</link>
      <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/704671939"&gt;@geraldjoyce312&lt;/a&gt;&amp;nbsp;&amp;nbsp; The fact is HSMs are used for all sorts of Financial Institutions around the world, for regulatory requirements etc.&amp;nbsp;&amp;nbsp; The fact is many vendors would not like this type of information to be available in the public realm - bad for business and reputation, trust etc.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Based on this link:&amp;nbsp; &lt;A href="https://searchsecurity.techtarget.com/tip/What-are-the-biggest-hardware-security-threats" target="_blank"&gt;https://searchsecurity.techtarget.com/tip/What-are-the-biggest-hardware-security-threats&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You can perceive some of the issues from going from manual to automation processes in terms of assurance, balanced carefully in terms of mandated regulation, especially in the payment and transaction space.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Or even using Cloud based HSMs.&amp;nbsp;&amp;nbsp; I once saw one situation, where by the management interface was actually left exposed on the same public VLAN, which caused some internal issues for the organisation involved, especially as the client actually found it themselves and were actively using the services to use Cloud based HSMs, using a mobile device.&amp;nbsp; It was solved very quickly indeed as you can imagine.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Other links I have uncovered are:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.unboundsecurity.com/blog/major-vulnerabilities-in-hardware-security-modules/" target="_blank"&gt;https://www.unboundsecurity.com/blog/major-vulnerabilities-in-hardware-security-modules/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.sans.org/white-papers/757/" target="_blank"&gt;https://www.sans.org/white-papers/757/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.venafi.com/blog/what-are-hardware-security-modules-and-how-important-are-they-your-organization" target="_blank"&gt;https://www.venafi.com/blog/what-are-hardware-security-modules-and-how-important-are-they-your-organization&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://blog.fuelusergroup.org/implementing-and-using-hardware-security-modules" target="_blank"&gt;https://blog.fuelusergroup.org/implementing-and-using-hardware-security-modules&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.globenewswire.com/news-release/2021/08/25/2286086/0/en/Global-Hardware-Security-Module-Market-Analysis-Trends-Industry-Forecast-to-2028.html" target="_blank"&gt;https://www.globenewswire.com/news-release/2021/08/25/2286086/0/en/Global-Hardware-Security-Module-Market-Analysis-Trends-Industry-Forecast-to-2028.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://cyware.com/news/vulnerabilities-in-hardware-security-modules-hsms-allow-attackers-to-retrieve-sensitive-data-3002e405" target="_blank"&gt;https://cyware.com/news/vulnerabilities-in-hardware-security-modules-hsms-allow-attackers-to-retrieve-sensitive-data-3002e405&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.unboundsecurity.com/blog/major-vulnerabilities-in-hardware-security-modules/" target="_blank"&gt;https://www.unboundsecurity.com/blog/major-vulnerabilities-in-hardware-security-modules/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Other major factors are going to be misconfiguration, human beings and errors over time.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 29 Aug 2021 20:23:45 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/Recent-HSM-breaches/m-p/47210#M370</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2021-08-29T20:23:45Z</dc:date>
    </item>
  </channel>
</rss>

