At the end of November, reports were broken that Palo Alto Networks (Nasdaq: Panw), one of the main cybersecurity firms in the world, had been pirate. Silicon Valley’s security firm serves more than 70,000 clients worldwide and specializes in advanced firewalls and cloud -based security solutions.
A few days after the reports, he issued a statement confirming that his next -generation Firewalls (NGFWS) had been attacked in cyber attacks that exploit two zero day vulnerabilities. After exploiting these vulnerabilities to avoid authentication and execute commands with root privileges, the attackers deployed malware and digital currency mining software, which affected more than 2,000 devices.
Research on what happened and how it is in progress, although independent security advisors already say that it is a much greater violation than that of Palo Alto Networks admits.
Cybersecurity violations take too long to discover and track
On average, it has been discovering a cyber attack and even more to discover how the damage happened and calculate.
Why so much time? Computer pirates specialize in eliminating records that record activity in computer networks, allowing them to cover their clues after rape. This is possible because all system inputs/outputs and network activity records are stored in centralized systems. Often, vital records are stored in the same systems that have been violated. It is similar to storing the CCTV images of a robbery in the same place where it breaks, allowing intruders to clean it before they leave.
Although the infractions of large companies specialized such as Palo Alto Networks are attackers and shameful, cyber attacks occur every 39 seconds and 43% affect small businesses. The average cost of rape has increased to $ 4.88 million in 2024, which makes them potentially catastrophic for smaller companies.
In addition to monetary costs, there are often incalculable damage. This is especially true for companies such as Palo Alto, which supposedly specialize in cybersecurity. When disputes over the size of the incidents and their seriousness are broken, it only worsens things by making an attempt to hide the facts.
With such high bets at stake, the affordable tools that can accelerate the detection of infractions and provide verifiably transparent records of what happened are extremely valuable. Could Blockchain based on the solution that many have been waiting for?
Sentinel node of CERTIHASH and IBM
Block chains are immutable public books with recorded records in the time that a single entity cannot alter. A startup, CERTIHASH, uses the BSV block chain to feed its cyber security tool of the sentinel node.
The Sentinel node is simple in principle: it takes ‘snapshots’ of protected networks and files and links them to cryptographic hashes in the block chain. If unauthorized access to these files is detected or changes are made, they will no longer coincide with the hash, and an alert will be sent to the administrators of the system in seconds. In addition, any action taken by the administrators is also recorded in the immutable block chain, which means that the complete facts of what happened, when and who was involved are transparent and unalterable.
The sentinel node reduces the average detection time of 212 days to only second infractions, allowing rapid responses and much more effective containment. Better still, blockchain -based records that show what happened eliminate any dispute, which means that companies can present the complete facts transparently and independent auditors can verify them.
With the frequency of attacks and increased associated costs, blockchain -based cybersecurity tools such as the sentinel node could be the solution or part of it. IBM (Nasdaq: IBM) certainly thinks yes, so it was involved in the construction of these tools in BSV.
While no tool will solve all problems related to cyber attacks and system violations, to be able to detect them immediately and test what happened is a massive step in the right direction. Finally, the usefulness of blockchain technology is being carried out, and the tools that will change the world are positively thick and fast.
LOOK: Fundamentals of cybersecurity in the current digital era with AI and Web3
https://www.youtube.com/watch?v=TMC4BNLDSNQ Title = “YouTube Video Player” FRAMBORDER = “0” allowed = “accelerometer; autoplay; clipboard-write; encryption-media; gyroscope; photo image; origin” tentishullscreen = “”>>>