Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for What is SD-WAN? | Ka ...

 Business

Practically no IT conference these days is complete without a discussion of SD-WAN. Supporters of the technology stress its ability to manage all kinds of different things — from global networks to cafe refrigerators. However, it has yet to conquer all hearts and minds. Despite being a decade old, the technology has   show more ...

many engineers still wondering if its just another marketing ploy. Today, we unpack what SD-WAN is, who needs it and why, plus why the worlds leading research agencies predict an imminent mass transition to SD-WAN networks. What is SD-WAN? Without going deep into the technical details, SD-WAN (standing for software-defined wide area network) is a solution for building distributed networks, which consists of routers and an intelligent management system (an SD-WAN Controller and Orchestrator). Routers are installed directly at the different regional branches of the company, while the control system is located at some central point such as the data center or head office. Technologically, all SD-WAN components can be spaced at any distance from each other — as long as theres connectivity between them; for example, via internet channels. The management system makes it possible to build secure tunnels among all branches, configure security policies and data transfer through these tunnels, as well as exercise centralized control over the entire network. How does SD-WAN differ from VPN? In traditional networks, each router represents an independent decision-making point, which is configured by the network administrator. But during data transfer, the router is guided only by its configuration and the data it receives directly from neighboring routers. This means that the router in one branch has no idea whats going on in other branches, or which communication channel is the best to use. And this often results in suboptimal routing, poor-quality packet transmission, and sometimes even data loss. For end users, each routers decisions often translate into connectivity issues, slow-performing applications, or downtime of corporate resources — problems that get addressed by the centralized control system. The SD-WAN controller studies the situation across the entire network in real time, and automatically adjusts the router configurations. With the help of the SD-WAN controller, the optimal route for transmitting traffic for each individual application can be found. For example, voice and video calls, plus data from CRM systems, can be routed through the fastest and most reliable routers, and non-work-related viewing of TV shows and social media posts through lower quality routes. Can SD-WAN increase network security? Network security is one of SD-WANs inherent attributes. Many vendors even bill their products as Secure SD-WAN to emphasize the integration of security tools, although this is more of a marketing ploy since the feature set is fairly uniform across the board. An SD-WAN router itself is already a small firewall that can inspect traffic in real time, identify which applications are in use, and deploy application-specific security and routing policies. Meanwhile, the SD-WAN Controller maintains the integrity of security policies across the entire network, promptly introduces new rules for data transfer, and provides real-time statistics on downloads and changes in the quality parameters of communication channels. So, for example, if there are too many said TV shows and social media posts, the administrator can ban them for all company branches, or just specific users, in just a few minutes. Will SD-WAN allow you to leave behind MPLS channels? The main advantage of centralized controllers is the ability to measure the quality of all communication channels in real time and direct application traffic along those routes with the lowest latency or packet loss. If the quality of the communication channel suddenly deteriorates, the SD-WAN Controller can automatically enable packet duplication or redundant encoding of information in the router to save data for business-critical applications. These features potentially allow you to stop leasing MPLS lines and switch to less expensive internet channels, including LTE. In addition, with smart SD-WAN routers, there can be several communication channels running simultaneously, so instead of an MPLS channel, you can use several LTE connections and aggregate their bandwidth. Will SD-WAN replace network engineers? To talk of engineers being squeezed out by network automation would be premature, because, if not every router, then at least the SD-WAN controller needs expert oversight. At the same time, the SD-WAN controller will help cut the number of routine operations and simple human errors. In addition, the introduction of SD-WAN will make connecting a new regional office faster and minimize travel expenses. Each SD-WAN router has support for automatically connecting to the controller and receiving the configuration (zero-touch provisioning). To configure a device in an SD-WAN network, you just have to connect it to the communication channels in any way — such as installing a SIM card. All control connections are encrypted, and two-step verification is supported to prevent unauthorized devices from connecting. How are SD-WAN and SASE related? Proposed by Gartner in 2019, the concept of SASE (secure access service edge) broadly refers to an integrated approach to secure network connectivity. The SASE framework includes a number of products, one of which is SD-WAN. In the minimal implementation, SASE consists of a next-generation firewall (NGFW), cloud-based firewall-as-a-service (FWaaS) and a secure web gateway (SWG), while SD-WAN represents the transport technology for granular data transfer between these systems. In broader terms, SASE also includes a cloud access secure broker (CASB) and a zero trust network agent (ZTNA) for endpoints, including for remote working. Should I migrate to SD-WAN today? Theres no universal solution for all corporate networks. Each network is individual in its own way, although many of us like to describe our own as typical. But SD-WAN certainly offers a number of advantages that will be in demand in most modern networks. These are: Centralized management of all routers in the network Real-time control of channel quality Traffic routing as per application requirements Flexible load balancing across all communication channels Network-wide integrity of security policies Automated router configuration Kaspersky has just announced the release of its new product, Kaspersky SD-WAN. You can learn more about this solution on its official web page.

image for Episode 253: DevSecO ...

 application development

Tanya Janca of the group We Hack Purple, talks with Security Ledger host Paul Roberts about the biggest security mistakes that DevSecOps teams make, and application development’s “tragedy of the commons,” as more and more development teams lean on open source code. The post Episode 253: DevSecOps Worst Practices   show more ...

With Tanya Janca of We Hack...Read the whole entry... » Click the icon below to listen. Related StoriesAttacks on APIs demand a Security Re-ThinkEpisode 250: Window Snyder of Thistle on Making IoT Security EasySpotlight: Traceable CSO Richard Bird on Securing the API Economy

 Malware and Vulnerabilities

Researchers at FortiGuard Labs uncovered nine sets of malicious NPM packages designed to steal sensitive data, including system information, user credentials, and source code. These malicious packages use install scripts to exfiltrate data to webhooks or file-sharing links. These npm packages highlight a significant and often overlooked threat within the open-source ecosystem.

 Expert Blogs and Opinion

Many organizations, including Fortune 500 firms, have exposed Zoom links that allow unauthorized individuals to initiate video conference meetings, posing a risk of phishing and social engineering attacks.

 Malware and Vulnerabilities

LightSpy, associated with the Chinese APT41 group, was found to contain a Core implant and 14 plugins for data exfiltration, supporting 24 different commands. LightSpy's Core supports 24 different commands, including self and plugin updates, indicating a sophisticated and versatile threat actor behind it.

 Malware and Vulnerabilities

APT41, previously associated with web application attacks, has shifted its tactics to develop mobile-specific malware, including the DragonEgg and LightSpy surveillance malware, which share similar configuration patterns and runtime structures.

 Identity Theft, Fraud, Scams

Menlo Labs discovered a July to August phishing campaign targeting executives in banking, insurance, real estate, and manufacturing, using the complex EvilProxy phishing kit. The campaign highlights the escalating threats that organizations face from threat actors due to the use of sophisticated tools and trusted platforms to hoodwink their targets.

 Identity Theft, Fraud, Scams

Originally published by the Police Service of Northern Ireland (PSNI) Cyber Crime Centre, the notice urges all local businesses to ensure staff cybersecurity awareness training is updated so employees can spot the threat.

 Breaches and Incidents

The breach, caused by the Clop ransomware gang, occurred in late June but was only publicly acknowledged by Sony recently, with the company taking immediate action to remediate the vulnerability and launch an investigation.

 Feed

This Metasploit module exploits an unsafe .NET deserialization vulnerability to achieve unauthenticated remote code execution against a vulnerable WS_FTP server running the Ad Hoc Transfer module. All versions of WS_FTP Server prior to 2020.0.4 (version 8.7.4) and 2022.0.2 (version 8.8.2) are vulnerable to this issue. The vulnerability was originally discovered by AssetNote.

 Feed

Ubuntu Security Notice 6401-1 - It was discovered that FreeRDP did not properly manage certain inputs. A malicious server could use this issue to cause FreeRDP clients to crash, resulting in a denial of service, or possibly obtain sensitive information. It was discovered that FreeRDP did not properly manage certain   show more ...

inputs. A malicious server could use this issue to cause FreeRDP clients to crash, resulting in a denial of service, or possibly execute arbitrary code.

 Feed

Gentoo Linux Security Advisory 202310-4 - Multiple vulnerabilities have been discovered in libvpx, the worst of which could result in arbitrary code execution. Versions greater than or equal to 1.13.1 are affected.

 Feed

Ubuntu Security Notice 6410-1 - It was discovered that a specially crafted file system image could cause a heap-based out-of-bounds write. A local attacker could potentially use this to perform arbitrary code execution bypass and bypass secure boot protections. It was discovered that a specially crafted file system   show more ...

image could cause an out-of-bounds read. A physically-present attacker could possibly use this to leak sensitive information to the GRUB pager.

 Feed

Red Hat Security Advisory 2023-5390-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.12.36. Issues addressed include a denial of service vulnerability.

 Feed

Red Hat Security Advisory 2023-5421-01 - Multicluster Engine for Kubernetes 2.3.2 images Multicluster engine for Kubernetes provides the foundational components that are necessary for the centralized management of multiple Kubernetes-based clusters across data centers, public clouds, and private clouds. You can use   show more ...

the engine to create new Red Hat OpenShift Container Platform clusters or to bring existing Kubernetes-based clusters under management by importing them. After the clusters are managed, you can use the APIs that are provided by the engine to distribute configuration based on placement policy.

 Feed

Ubuntu Security Notice 6386-3 - Jana Hofmann, Emanuele Vannacci, Cedric Fournet, Boris Kopf, and Oleksii Oleksenko discovered that some AMD processors could leak stale data from division operations in certain situations. A local attacker could possibly use this to expose sensitive information. It was discovered that   show more ...

the bluetooth subsystem in the Linux kernel did not properly handle L2CAP socket release, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.

 Feed

Ubuntu Security Notice 6407-1 - Gregory James Duck discovered that libx11 incorrectly handled certain keyboard symbols. If a user were tricked into connecting to a malicious X server, a remote attacker could use this issue to cause libx11 to crash, resulting in a denial of service, or possibly execute arbitrary code.   show more ...

Yair Mizrahi discovered that libx11 incorrectly handled certain malformed XPM image files. If a user were tricked into opening a specially crafted XPM image file, a remote attacker could possibly use this issue to consume memory, leading to a denial of service.

 Feed

Ubuntu Security Notice 6409-1 - It was discovered that the GNU C Library incorrectly handled the GLIBC_TUNABLES environment variable. An attacker could possibly use this issue to perform a privilege escalation attack. It was discovered that the GNU C Library incorrectly handled certain DNS responses when the system   show more ...

was configured in no-aaaa mode. A remote attacker could possibly use this issue to cause the GNU C Library to crash, resulting in a denial of service. This issue only affected Ubuntu 23.04.

 Feed

Ubuntu Security Notice 6408-1 - Yair Mizrahi discovered that libXpm incorrectly handled certain malformed XPM image files. If a user were tricked into opening a specially crafted XPM image file, a remote attacker could possibly use this issue to consume memory, leading to a denial of service. Yair Mizrahi discovered   show more ...

that libXpm incorrectly handled certain malformed XPM image files. If a user were tricked into opening a specially crafted XPM image file, a remote attacker could use this issue to cause libXpm to crash, leading to a denial of service, or possibly execute arbitrary code.

 Feed

Debian Linux Security Advisory 5514-1 - The Qualys Research Labs discovered a buffer overflow in the dynamic loader's processing of the GLIBC_TUNABLES environment variable. An attacker can exploit this flaw for privilege escalation.

 Feed

Debian Linux Security Advisory 5513-1 - Multiple security issues were discovered in Thunderbird, which could result in denial of service or the execution of arbitrary code.

 Feed

Red Hat Security Advisory 2023-5419-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include information leakage, privilege escalation, and use-after-free vulnerabilities.

 Feed

Ubuntu Security Notice 6406-1 - Several security issues were discovered in the SpiderMonkey JavaScript library. If a user were tricked into opening malicious JavaScript applications or processing malformed data, a remote attacker could exploit a variety of issues related to JavaScript security, including denial of service attacks, and arbitrary code execution.

 Feed

This is a Linux/portable port of OpenBSD's excellent OpenSSH. OpenSSH is based on the last free version of Tatu Ylonen's SSH with all patent-encumbered algorithms removed, all known security bugs fixed, new features reintroduced, and many other clean-ups.

 Feed

A new Linux security vulnerability dubbed Looney Tunables has been discovered in the GNU C library's ld.so dynamic loader that, if successfully exploited, could lead to a local privilege escalation and allow a threat actor to gain root privileges. Tracked as CVE-2023-4911 (CVSS score: 7.8), the issue is a buffer overflow that resides in the dynamic loader's processing of the GLIBC_TUNABLES

 Feed

Today, mid-sized companies and their CISOs are struggling to handle the growing threat of SaaS security with limited manpower and tight budgets. Now, this may be changing. By focusing on the critical SaaS security needs of these companies, a new approach has emerged that can be launched for $1,500 a year. If the name Wing Security (Wing) rings a bell, it is probably because earlier this year,

 Feed

A new deceptive package hidden within the npm package registry has been uncovered deploying an open-source rootkit called r77, marking the first time a rogue package has delivered rootkit functionality. The package in question is node-hide-console-windows, which mimics the legitimate npm package node-hide-console-window in what's an instance of a typosquatting campaign. It was downloaded 704

 Feed

Microsoft has detailed a new campaign in which attackers unsuccessfully attempted to move laterally to a cloud environment through a SQL Server instance. "The attackers initially exploited a SQL injection vulnerability in an application within the target's environment," security researchers Sunders Bruskin, Hagai Ran Kestenberg, and Fady Nasereldeen said in a Tuesday report. "This allowed the

 Feed

New findings have identified connections between an Android spyware called DragonEgg and another sophisticated modular iOS surveillanceware tool named LightSpy. DragonEgg, alongside WyrmSpy (aka AndroidControl), was first disclosed by Lookout in July 2023 as a strain of malware capable of gathering sensitive data from Android devices. It was attributed to the Chinese nation-state group APT41. On

2023-10
Aggregator history
Wednesday, October 04
SUN
MON
TUE
WED
THU
FRI
SAT
OctoberNovemberDecember