Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for Returning to the wor ...

 Business

Sooner or later, most organizations will have to think about postpandemic work routines. Although many companies, still staggering from pandemic effects, have yet to make their final decisions about handling new workplace realities, even a partial return to the office requires certain measures from IT and IT security   show more ...

teams. Switching to working from home was difficult, but oddly enough, returning to the office may be just as tricky. Organizations will have to roll back some changes, which can entail as much work as deploying them did. They will also need to recheck internal service security and meet employee needs for the software they got used to during lockdown. To help stressed IT security managers prioritize, we put together some cybersecurity action items for businesses. 1. Keep work-from-home cybersecurity workarounds To maintain the security of corporate endpoints while employees were working from home, many companies introduced additional protection measures such as security checks and centralized patch management of remote computers, adding or expanding VPN access, and offering dedicated awareness training. Detection and response agents on endpoints played important roles identifying and closing network perimeter gaps. Whether your workforce is returning from home to office or simply travels a bunch, using VPN, EDR, and intrusion detection systems on endpoints will ensure their safe return to on-site work. 2. Restore any security controls you disabled for remote workers To allow remote employees to connect to the corporate network, especially from personal devices, some organizations weakened or disabled cybersecurity controls such as Network Admission Control (NAC). NAC checks computers for compliance with corporate security requirements such as up-to-date malware protection before granting access to the corporate network. When employees return to the office and connect to the corporate network, NAC should be turned on to protect the internal systems in case the machines pose any risks. But since computers have been remote for about 18 months, they could have missed some updates. This means that enabling NAC for dozens or even hundreds of such machines can cause many errors. As a result, switching the service on could turn into a step-by-step, fine-tuning process for small groups of staff. Organizations need to anticipate such issues and have a plan that includes resources, deadlines, bug fixes, and maybe even help from IT integrators. 3. Update internal systems Don’t forget to check internal critical services. If there are any unpatched servers in the building, the IT security team needs to know about them before letting anyone in. When we were all sitting at office desktops, our computers were constantly connected to the corporate network and were under 24/7 protection and policy control. Accordingly, the risks of an exploit penetrating the network from a PC and compromising a vulnerable server were lower. With everyone returning to the office and connecting their laptops to the corporate network at once, just one unpatched domain controller can provide broad access to, for example, employee account data and passwords.  A vigilant IT security team should detect the problem in time and head off serious trouble, but that still leaves the extra work of reorganizing the network and changing all passwords. 4. Get ready to save — and also to pay Bringing employees back to the office will save employers some money. For example, at Kaspersky we increased the number of VPN tunnels from 1,000 to more than 5,000 to enable most of our staff to work from home. It is likely that we will cut this cost as our team returns to the office. Similarly, companies can reduce the number of subscription-based cloud solutions such as Slack or Microsoft Teams. With staff in the office, companies will not need as many cloud licenses, and they may be able to bring some services back as local resources. The same strategy applies to electronic signature apps, necessary during lockdown but replaceable (or scalable) with a return to traditional document signature processes. Consider spending those freed-up budgets on organizing digital workstations such that employees can split their weeks between the office and elsewhere. The concept is not new, but the pandemic has made it more common, as Gartner notes. From virtual desktop infrastructure (VDI) to desktop as a service (DaaS), remote-work technologies can essentially move workspaces to the cloud, making them accessible from any connected device — and virtual desktops are much easier to deploy, manage, fix, and protect than remote computers. 5. Save the tools and settings employees were using remotely Working remotely, employees mastered new communication and collaboration tools — for chats, videoconferencing, planning, CRM, and more. If those tools worked at all well, employees will want to continue using them. Thanks to their pandemic experience, 74% of our survey respondents said they want more flexible and comfortable working conditions. Banning such innovations may not be wise. It could provoke the growth of a sort-of shadow IT, staff members using apps without IT approval. Companies should be prepared either to approve new services or to suggest, and defend, alternatives. Dedicated solutions can help organizations manage access to cloud services — using dedicated cloud discovery features in a security solution or cloud access security brokers — and enforce associated security policies. IT security should be a business enabler, not a barrier. Ignoring a massive behavioral change can damage an employee’s view of the company, whereas allowing flexible working and services that are convenient for workers can do just the opposite. That applies to future candidates and staff as well. We saw that happen with Apple, where some employees wrote an open letter asking Tim Cook and executives to “consider remote and location-flexible work decisions to be as autonomous for a team to decide as hiring decisions are.” The pandemic and global transitions to remote work represented force majeure challenges for companies and their IT departments. Despite the difficulties, this experience is invaluable and provides a crucial lesson for the future. One of the pandemic’s most important takeaways is how quickly businesses can change. Having learned so much from the experience, IT security should offer options and support ongoing flexibility. A smart and safe return to office work in any form can help companies stay on top of this trend and make the most of their business processes.

 Trends, Reports, Analysis

In the first half of the year, malicious actors exploited flaws across different types of platforms, leading to major attacks that shut down fuel networks and extracted millions from enterprises.

 Trends, Reports, Analysis

Researchers at NYU recently analyzed code generated by Copilot and found that, for certain tasks where security is crucial, the code contains security flaws around 40 percent of the time.

 Identity Theft, Fraud, Scams

FortiGuard Labs has now begun to encounter offers of fake vaccine passports as lures in email scams. It reflects how cybercriminals think that they can successfully exploit this issue.

 Govt., Critical Infrastructure

Dams, levees, and other water structures are considered part of the 16 critical infrastructure sectors overseen by CISA, according to the Department of Homeland Security's inspector general's report.

 Companies to Watch

DeepFactor announced that it raised $15 million in series A financing led by Insight Partners with participation from Emergent Ventures, Security Leadership Capital, and Tricentis.

 Malware and Vulnerabilities

The FBI, CISA, and CGCYBER issued a joint advisory warning against the exploitation of a critical bug in the Zoho ManageEngine ADSelfService Plus software by the nation-state actors. Besides applying a patch, organizations are suggested to baseline the normal behavior in web server logs to spot a web shell when deployed.

 Malware and Vulnerabilities

New Capoae malware strain is reportedly targeting WordPress and Linux systems worldwide. Written in GoLang, it exploited around four different RCE vulnerabilities. Moreover, the malware contains a port scanner to find open ports and services for further exploitation. Among other advice, experts recommend users never use weak or default credentials for deployed applications.

 Trends, Reports, Analysis

A report from Sonatype revealed that supply chain attacks on open-source public repositories have increased up to 650% year-over-year. The security firm has mentioned that the significant increase in supply-chain attacks has been mainly caused by the exploitation of flaws in popular open-source ecosystems. It is   show more ...

always recommended to strictly monitor the open-source projects used in the production environment for any anomalies.

 Trends, Reports, Analysis

In terms of authentication, everything is a resource. Employees, user devices, data sources, services and more — they all have the same status: the system doesn’t let them in by default.

 Trends, Reports, Analysis

An online survey of 2,500 adults in Canada and the United States found that in relation to cybersecurity, seven in ten respondents (69%) said news of data breaches caused them stress.

 Malware and Vulnerabilities

ESET reported a new Numando banking Trojan that abuses YouTube, Pastebin, and other public platforms to fool victims into stealing their financial credentials. It can simulate mouse clicks, keyboard actions, hijack PC’s shutdown/restart functions, kill browser processes, and take screenshots. Banking customers are suggested to follow all the security practices to stay protected.

 Malware and Vulnerabilities

Azure customers are requested to urgently address the OMIGOD flaw exploited by Mirai botnet operators. Microsoft has released additional guidance on securing Linux machines impacted by the critical flaw that concerns thousands of Azure customers and millions of endpoints. Due to no auto-update mechanism, customers have to update manually to protect endpoints from OMIGOD exploits.

 Feed

An HTTP endpoint used by the Manage Engine OpManager Smart Update Manager component can be leveraged to deserialize an arbitrary Java object. This can be abused by an unauthenticated remote attacker to execute OS commands in the context of the OpManager application. This vulnerability is also present in other products   show more ...

that are built on top of the OpManager application. This vulnerability affects OpManager versions 12.1 through 12.5.328.

 Feed

Ubuntu Security Notice 5079-4 - USN-5079-2 fixed vulnerabilities in curl. One of the fixes introduced a regression. This update fixes the problem. Patrick Monnerat discovered that curl incorrectly handled upgrades to TLS. When receiving certain responses from servers, curl would continue without TLS even when the option to require a successful upgrade to TLS was specified. Various other issues were also addressed.

 Feed

Red Hat Security Advisory 2021-3623-01 - Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. Issues addressed include denial of service, path sanitization, and use-after-free vulnerabilities.

 Feed

Ubuntu Security Notice 5084-1 - It was discovered that LibTIFF incorrectly handled certain malformed images. If a user or automated system were tricked into opening a specially crafted image, a remote attacker could crash the application, leading to a denial of service, or possibly execute arbitrary code with user privileges.

 Feed

Red Hat Security Advisory 2021-3572-01 - Network Security Services is a set of libraries designed to support the cross-platform development of security-enabled client and server applications. Netscape Portable Runtime provides platform independence for non-GUI operating system facilities. Issues addressed include a denial of service vulnerability.

 Feed

Ubuntu Security Notice 5079-3 - USN-5079-1 fixed vulnerabilities in curl. One of the fixes introduced a regression on Ubuntu 18.04 LTS. This update fixes the problem. It was discovered that curl incorrect handled memory when sending data to an MQTT server. A remote attacker could use this issue to cause curl to crash,   show more ...

resulting in a denial of service, or possibly execute arbitrary code. Patrick Monnerat discovered that curl incorrectly handled upgrades to TLS. When receiving certain responses from servers, curl would continue without TLS even when the option to require a successful upgrade to TLS was specified. Patrick Monnerat discovered that curl incorrectly handled responses received before STARTTLS. A remote attacker could possibly use this issue to inject responses and intercept communications. Various other issues were also addressed.

 Feed

Red Hat Security Advisory 2021-3590-01 - MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon and many client programs and libraries. Issues addressed include a denial of service vulnerability.

 Feed

Red Hat Security Advisory 2021-3576-01 - Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted   show more ...

third party, the Kerberos key distribution center. Issues addressed include denial of service and null pointer vulnerabilities.

 Feed

2020 was a year of relentless disruptions. The protective layer of secured enterprise networks and controlled IT environments of the physical premises did not exist. Over the past year, CISOs (Chief Information Security Officers) have had to grapple with the challenges of bolstering the security posture, minimizing risks, and ensuring business continuity in the new normal. The rise in volumes

 Feed

Unidentified threat actors breached a server running an unpatched, 11-year-old version of Adobe's ColdFusion 9 software in minutes to remotely take over control and deploy file-encrypting Cring ransomware on the target's network 79 hours after the hack. The server, which belonged to an unnamed services company, was used to collect timesheet and accounting data for payroll as well as to host a

 Feed

A recently discovered wave of malware attacks has been spotted using a variety of tactics to enslave susceptible machines with easy-to-guess administrative credentials to co-opt them into a network with the goal of illegally mining cryptocurrency. "The malware's primary tactic is to spread by taking advantage of vulnerable systems and weak administrative credentials. Once they've been infected,

 Feed

Cybersecurity researchers on Tuesday disclosed details of an unpatched vulnerability in macOS Finder that could be abused by remote adversaries to trick users into running arbitrary commands on the machines. "A vulnerability in macOS Finder allows files whose extension is inetloc to execute arbitrary commands, these files can be embedded inside emails which if the user clicks on them will

2021-09
Aggregator history
Tuesday, September 21
WED
THU
FRI
SAT
SUN
MON
TUE
SeptemberOctoberNovember