In late September, news broke that the source code for Windows XP had leaked online. A torrent file for downloading the operating system code was published on an anonymous forum, and it spread webwide quickly. Although Web analytics service StatCounter estimates that fewer than 1% of all computers actually run Windows show more ...
XP, that still represents millions of devices globally. Why a Windows XP source code leak is bad news Microsoft discontinued support for Windows XP way back in 2014, so anyone still using it in 2020 is taking a big risk; Microsoft will never patch the new vulnerabilities that continue to pop up. The company makes one exception: critical bugs that can lead to global incidents. For example, the company determined that the CVE-2017-0144 (exploited by WannaCry) and CVE-2019-0708 vulnerabilities posed such a threat. Less high-profile vulnerabilities can also have very nasty consequences, however. Leaked source code aggravates the situation by giving potential attackers the opportunity to study the operating system in depth, which likely means more exploitation attempts in the near future. Security experts are not at all certain to keep on top of all of the vulnerabilities cybercriminals discover. What’s more, the vast majority of modern security solutions run only under current operating systems. That’s largely because the difference between Windows 10 and Windows XP, as well as among the technical specifications of the devices on which they run, is too great for one solution to effectively protect both operating systems. We are also ending support for the outdated versions of our main solution that can still be used to protect Windows XP, which means companies that can’t or won’t upgrade their operating systems will have to look for alternative means of protection. Security solution for legacy systems A source code leak is a sound reason to review all corporate systems and, where possible, upgrade devices from Windows XP to at least Windows 7. However, not all companies can get rid of an outdated operating system just like that. Some require it for compatibility with critical hardware or software; others might simply lack the cash to upgrade everything that needs it. Fortunately, we have a solution for keeping legacy systems secure: Kaspersky Embedded Systems Security. We initially created it to protect devices, such as ATMs and POS terminals, running Windows Embedded operating systems (including ones based on Windows XP), but the solution protects ordinary computers running XP equally well. As with our flagship technologies for businesses, you can manage Kaspersky Embedded Systems Security centrally from Kaspersky Security Center. Tips for securing Windows XP devices If your company’s computer fleet still harbors machines running Windows XP, don’t opt for just any antivirus solution; you need an integrated security approach. Use the latest versions of software that are compatible with the operating system. For example, Chrome has not supported Windows XP since 2016, or Firefox since 2018. All else being equal, the latter is the better choice; Remove all unnecessary programs — or, better, use Application Control technology to cull the list of processes allowed to run on outdated computers. The set of tasks handled by such devices is usually small, and having an “allow” list of runnable programs greatly complicates matters for cybercriminals; Disconnect old devices from the Internet where possible. Where access is critical, use the most modern of the available browsers; Use a Web gateway to filter external traffic and block unwanted requests from the outside. For that, look no further than Kaspersky Security for Internet Gateways.
The proposed laws will grant federal agencies power to “take direct action” against cyberattacks and obtain info from critical infrastructure entities if it is deemed to be in the national interest.
HPE addressed a maximum severity remote authentication bypass vulnerability, tracked as CVE-2020-7197, affecting the HPE StoreServ Management Console (SSMC) data center storage management solution.
Alcide announced the company’s security solutions are now integrated with AWS Security Hub, sending real-time threat intel and compliance info for easy consumption by Security and DevSecOps teams.
The malware passed through the strict Apple notarisation process that scans apps for security issues. Once approved, Mac's in-built security screening software, Gatekeeper, allows the apps to run.
In a Cisco survey, 85% of organizations said cybersecurity is extremely important or more important than before COVID-19, with the majority only somewhat prepared to support their remote workforce.
Finnish Interior Minister Maria Ohisalo tweeted that authorities would "provide speedy crisis help to victims" of the breach at Vastaamo, an incident she called "shocking and very serious."
The United States Department of the Treasury’s Office of Foreign Assets Control (OFAC) has announced sanctions against a Russian government institute connected to the destructive Triton malware.
Securonix announced it signed an OEM agreement with Opora, a next-generation cybersecurity provider that uses pre-attack adversary behavior analytics to protect organizations from emerging threats.
The Slovak Republic, Bulgaria, and North Macedonia all made a joint declaration with the United States, while Kosovo signed a memorandum of understanding. The text of all four were very similar.
US President Donald Trump's administration has insisted on the need to ban TikTok due to national security concerns in a new court filing ahead of a plan to make the app unavailable on November 12.
Over the six-month period from March to August 2020, over 925,000 malicious emails managed to bypass Office 365 defenses and well-known secure email gateways (SEGs), an Area 1 Security study reveals.
According to the 2021 Gartner Board of Directors survey, 69% of corporate directors want to accelerate enterprise digital strategies and implementations to help deal with the ongoing disruption.
A vulnerability in the popular open-source wiki-based CMS platform, TikiWiki, allowed an unauthenticated attacker to bypass the login process to gain remote access to admin accounts.
"If they don't listen to us, do they deserve it?" is the question being asked in a new study exploring modern attitudes surrounding the legitimacy of cybercriminal activities.
The US Federal Trade Commission (FTC) has launched a new cyber-fraud reporting platform, ReportFraud.ftc.gov, where consumers can easily report fraud, scams, or bad business practices.
Healthcare institutions preparing for a fall wave of coronavirus cases are bracing for more cyberattacks after hackers taking advantage of the pandemic launched several successful attacks this year.
“The virus has been identified: it is a new version of the Ryuk ransomware, previously unknown to anti-virus software providers and security agencies,” the IT services firm claimed.
According to the IDC 2020 Global DNS Threat Report, organizations in the sector experienced an average of 11.4 attacks last year, compared to 9.5 attacks across industries.
Some customers of the popular high street eatery Nando’s have been left hundreds of pounds poorer after cyber-attackers hijacked their online accounts to place large orders.
KashmirBlack, a highly sophisticated botnet is believed to have infected hundreds of thousands of websites by attacking their underlying content management system (CMS) platforms.
Bug bounty platform, HackerOne, has announced a range of new partnerships and integrations to enable its platform to fit better with existing security and development workflows.
The lack of security awareness about exploits often proves to be costly. Attacks such as phishing and vishing target employee credentials, leading to easy intrusions with dire consequences.
Security Joes discovered the exposed irrigation systems which were running ICC PRO, a top-shelf smart irrigation system designed by Motorola for use with agricultural, turf, and landscape management.
The FBI and other government agencies have been asking organizations to not pay ransoms. In the coming years, companies negotiating and paying the ransom may even face compliance issues.
A report by Akamai disclosed retail, hospitality, and travel industries were the worst hit among over 100 billion credential stuffing attempts that were detected between July 1, 2018, and June 30, 2020.
Researchers disclosed security risks from link previews in popular messaging apps that cause leakage of IP addresses, links sent via encrypted chats, and large data downloads in the background.
Ubuntu Security Notice 4602-1 - ManhND discovered that Perl incorrectly handled certain regular expressions. In environments where untrusted regular expressions are evaluated, a remote attacker could possibly use this issue to cause Perl to crash, resulting in a denial of service, or possibly execute arbitrary code. show more ...
Hugo van der Sanden and Slaven Rezic discovered that Perl incorrectly handled certain regular expressions. In environments where untrusted regular expressions are evaluated, a remote attacker could possibly use this issue to cause Perl to crash, resulting in a denial of service, or possibly execute arbitrary code. Various other issues were also addressed.
Red Hat Security Advisory 2020-4344-01 - Open Liberty is a lightweight open framework for building fast and efficient cloud-native Java microservices. This release of Open Liberty 20.0.0.11 serves as a replacement for Open Liberty 20.0.0.10 and includes enhancements as well as a security fix for a vulnerability in Hibernate Validator.
PubliXone version 2019.045 suffers from cross site scripting, account takeover, missing access control, hardcoded keys, and file download vulnerabilities.
A buffer overflow vulnerability in Oracle VM VirtualBox was privately reported to Oracle on September 22, 2020 and was silently patched in VM VirtualBox version 6.1.16r140961.
Andy Nguyen discovered that the Bluetooth L2CAP implementation in the Linux kernel contained a type-confusion error. Andy Nguyen discovered that the Bluetooth A2MP implementation in the Linux kernel did not properly initialize memory in some situations. Andy Nguyen discovered that the Bluetooth HCI event packet parser show more ...
in the Linux kernel did not properly handle event advertisements of certain sizes, leading to a heap-based buffer overflow.
Red Hat Security Advisory 2020-4320-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.
Red Hat Security Advisory 2020-4331-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.
Red Hat Security Advisory 2020-4332-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.
Red Hat Security Advisory 2020-4330-01 - Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 78.4.0 ESR. Issues addressed include a use-after-free vulnerability.
Sifter is a osint, recon, and vulnerability scanner. It combines a plethora of tools within different module sets in order to quickly perform recon tasks, check network firewalling, enumerate remote and local hosts, and scan for the blue vulnerabilities within Microsoft systems and if unpatched, exploits them.
Cybersecurity researchers over the weekend disclosed new security risks associated with link previews in popular messaging apps that cause the services to leak IP addresses, expose links sent via end-to-end encrypted chats, and even unnecessarily download gigabytes of data stealthily in the background. "Links shared in chats may contain private information intended only for the recipients,"
Sopra Steria confirms it has been hit by a new strain of the Ryuk ransomware, and that it will take weeks for its IT network to return to normal operation.