Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for Windows XP source co ...

 Business

In late September, news broke that the source code for Windows XP had leaked online. A torrent file for downloading the operating system code was published on an anonymous forum, and it spread webwide quickly. Although Web analytics service StatCounter estimates that fewer than 1% of all computers actually run Windows   show more ...

XP, that still represents millions of devices globally. Why a Windows XP source code leak is bad news Microsoft discontinued support for Windows XP way back in 2014, so anyone still using it in 2020 is taking a big risk; Microsoft will never patch the new vulnerabilities that continue to pop up. The company makes one exception: critical bugs that can lead to global incidents. For example, the company determined that the CVE-2017-0144 (exploited by WannaCry) and CVE-2019-0708 vulnerabilities posed such a threat. Less high-profile vulnerabilities can also have very nasty consequences, however. Leaked source code aggravates the situation by giving potential attackers the opportunity to study the operating system in depth, which likely means more exploitation attempts in the near future. Security experts are not at all certain to keep on top of all of the vulnerabilities cybercriminals discover. What’s more, the vast majority of modern security solutions run only under current operating systems. That’s largely because the difference between Windows 10 and Windows XP, as well as among the technical specifications of the devices on which they run, is too great for one solution to effectively protect both operating systems. We are also ending support for the outdated versions of our main solution that can still be used to protect Windows XP, which means companies that can’t or won’t upgrade their operating systems will have to look for alternative means of protection. Security solution for legacy systems A source code leak is a sound reason to review all corporate systems and, where possible, upgrade devices from Windows XP to at least Windows 7. However, not all companies can get rid of an outdated operating system just like that. Some require it for compatibility with critical hardware or software; others might simply lack the cash to upgrade everything that needs it. Fortunately, we have a solution for keeping legacy systems secure: Kaspersky Embedded Systems Security. We initially created it to protect devices, such as ATMs and POS terminals, running Windows Embedded operating systems (including ones based on Windows XP), but the solution protects ordinary computers running XP equally well. As with our flagship technologies for businesses, you can manage Kaspersky Embedded Systems Security centrally from Kaspersky Security Center. Tips for securing Windows XP devices If your company’s computer fleet still harbors machines running Windows XP, don’t opt for just any antivirus solution; you need an integrated security approach. Use the latest versions of software that are compatible with the operating system. For example, Chrome has not supported Windows XP since 2016, or Firefox since 2018. All else being equal, the latter is the better choice; Remove all unnecessary programs — or, better, use Application Control technology to cull the list of processes allowed to run on outdated computers. The set of tasks handled by such devices is usually small, and having an “allow” list of runnable programs greatly complicates matters for cybercriminals; Disconnect old devices from the Internet where possible. Where access is critical, use the most modern of the available browsers; Use a Web gateway to filter external traffic and block unwanted requests from the outside. For that, look no further than Kaspersky Security for Internet Gateways.

 Malware and Vulnerabilities

HPE addressed a maximum severity remote authentication bypass vulnerability, tracked as CVE-2020-7197, affecting the HPE StoreServ Management Console (SSMC) data center storage management solution.

 Laws, Policy, Regulations

US President Donald Trump's administration has insisted on the need to ban TikTok due to national security concerns in a new court filing ahead of a plan to make the app unavailable on November 12.

 Incident Response, Learnings

“The virus has been identified: it is a new version of the Ryuk ransomware, previously unknown to anti-virus software providers and security agencies,” the IT services firm claimed.

 Trends, Reports, Analysis

According to the IDC 2020 Global DNS Threat Report, organizations in the sector experienced an average of 11.4 attacks last year, compared to 9.5 attacks across industries.

 Trends, Reports, Analysis

The lack of security awareness about exploits often proves to be costly. Attacks such as phishing and vishing target employee credentials, leading to easy intrusions with dire consequences.

 Trends, Reports, Analysis

The FBI and other government agencies have been asking organizations to not pay ransoms. In the coming years, companies negotiating and paying the ransom may even face compliance issues.

 Trends, Reports, Analysis

A report by Akamai disclosed retail, hospitality, and travel industries were the worst hit among over 100 billion credential stuffing attempts that were detected between July 1, 2018, and June 30, 2020.

 Feed

Ubuntu Security Notice 4602-1 - ManhND discovered that Perl incorrectly handled certain regular expressions. In environments where untrusted regular expressions are evaluated, a remote attacker could possibly use this issue to cause Perl to crash, resulting in a denial of service, or possibly execute arbitrary code.   show more ...

Hugo van der Sanden and Slaven Rezic discovered that Perl incorrectly handled certain regular expressions. In environments where untrusted regular expressions are evaluated, a remote attacker could possibly use this issue to cause Perl to crash, resulting in a denial of service, or possibly execute arbitrary code. Various other issues were also addressed.

 Feed

Red Hat Security Advisory 2020-4344-01 - Open Liberty is a lightweight open framework for building fast and efficient cloud-native Java microservices. This release of Open Liberty 20.0.0.11 serves as a replacement for Open Liberty 20.0.0.10 and includes enhancements as well as a security fix for a vulnerability in Hibernate Validator.

 Feed

Andy Nguyen discovered that the Bluetooth L2CAP implementation in the Linux kernel contained a type-confusion error. Andy Nguyen discovered that the Bluetooth A2MP implementation in the Linux kernel did not properly initialize memory in some situations. Andy Nguyen discovered that the Bluetooth HCI event packet parser   show more ...

in the Linux kernel did not properly handle event advertisements of certain sizes, leading to a heap-based buffer overflow.

 Feed

Red Hat Security Advisory 2020-4320-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.

 Feed

Red Hat Security Advisory 2020-4330-01 - Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 78.4.0 ESR. Issues addressed include a use-after-free vulnerability.

 Feed

Sifter is a osint, recon, and vulnerability scanner. It combines a plethora of tools within different module sets in order to quickly perform recon tasks, check network firewalling, enumerate remote and local hosts, and scan for the blue vulnerabilities within Microsoft systems and if unpatched, exploits them.

 Feed

Cybersecurity researchers over the weekend disclosed new security risks associated with link previews in popular messaging apps that cause the services to leak IP addresses, expose links sent via end-to-end encrypted chats, and even unnecessarily download gigabytes of data stealthily in the background. "Links shared in chats may contain private information intended only for the recipients,"

2020-10
Aggregator history
Monday, October 26
THU
FRI
SAT
SUN
MON
TUE
WED
OctoberNovemberDecember