π’ CISA gives civilian agencies two weeks to patch recent security exploits π’
π Read
via "ITPro".
A total of 291 vulnerabilities have been detailed in an attempt to improve federal agency cyber securityπ Read
via "ITPro".
IT PRO
CISA gives civilian agencies two weeks to patch recent security exploits | IT PRO
A total of 291 vulnerabilities have been detailed in an attempt to improve federal agency cyber security
π’ 161% surge in mobile phishing pushes energy industry to its limits π’
π Read
via "ITPro".
Following Colonial Pipeline, crooks get a taste for energy companiesπ Read
via "ITPro".
IT PRO
161% surge in mobile phishing pushes energy industry to its limits | IT PRO
Following Colonial Pipeline, crooks get a taste for energy companies
π’ Labour Party unable to access data after suspected cyber attack on managed service provider π’
π Read
via "ITPro".
The incident is being investigated by both the National Crime Agency and the Information Commissioner's Officeπ Read
via "ITPro".
IT PRO
Labour Party unable to access data after suspected cyber attack on managed service provider | IT PRO
The incident is being investigated by both the National Crime Agency and the Information Commissioner's Office
π’ Robinhood hack exposes data from millions of customers π’
π Read
via "ITPro".
An attacker socially engineered an employee at the stock-trading platform to gain access to customer support systemsπ Read
via "ITPro".
IT PRO
Robinhood hack exposes data from millions of customers | IT PRO
An attacker socially engineered an employee at the stock-trading platform to gain access to customer support systems
π’ A third of UK workers are surveilled by employers π’
π Read
via "ITPro".
The sharp rise in surveillance comes as it's revealed webcam monitoring has more than doubledπ Read
via "ITPro".
IT PRO
A third of UK workers are surveilled by employers | IT PRO
The sharp rise in surveillance comes as it's revealed webcam monitoring has more than doubled
π’ IT Pro News In Review: Microsoft pitches 'metaverse', Graff's celebrity data leak, Meta facial recognition π’
π Read
via "ITPro".
Catch up on the biggest headlines of the week in just two minutesπ Read
via "ITPro".
ITPro
IT Pro News In Review: Microsoft pitches 'metaverse', Graff's celebrity data leak, Meta facial recognition
Catch up on the biggest headlines of the week in just two minutes
β 12 New Flaws Used in Ransomware Attacks in Q3 β
π Read
via "Threat Post".
The Q3 2021 report revealed a 4.5% increase in CVEs associated with ransomware and a 3.4% increase in ransomware families compared with Q2 2021.π Read
via "Threat Post".
Threat Post
12 New Flaws Used in Ransomware Attacks in Q3
The Q3 2021 report revealed a 4.5% increase in CVEs associated with ransomware and a 3.4% increase in ransomware families compared with Q2 2021.
π΄ How to Minimize Ransomware's Trail of Destruction and Its Associated Costs π΄
π Read
via "Dark Reading".
One of the biggest mistakes an organization can make is blindly throwing technology at the problem instead of properly investing in building a security team.π Read
via "Dark Reading".
Dark Reading
How to Minimize Ransomware's Trail of Destruction and Its Associated Costs
One of the biggest mistakes an organization can make is blindly throwing technology at the problem instead of properly investing in building a security team.
π΄ Zoho ManageEngine Flaw Highlights Risks of Race to Patch π΄
π Read
via "Dark Reading".
Attackers used a pre-auth vulnerability in a component of the enterprise management software suite to compromise businesses, highlighting the dangers of Internet-facing software.π Read
via "Dark Reading".
Dark Reading
Zoho ManageEngine Flaw Highlights Risks of Race to Patch
Attackers used a pre-auth vulnerability in a component of the enterprise management software suite to compromise businesses, highlighting the dangers of Internet-facing software.
π¦Ώ Ransomware attacks are increasingly exploiting security vulnerabilities π¦Ώ
π Read
via "Tech Republic".
The number of security flaws associated with ransomware rose from 266 to 278 last quarter, according to security firm Ivanti.π Read
via "Tech Republic".
TechRepublic
Ransomware attacks are increasingly exploiting security vulnerabilities
The number of security flaws associated with ransomware rose from 266 to 278 last quarter, according to security firm Ivanti.
π¦Ώ Digital driver's licenses: Are they secure enough for us to trust? π¦Ώ
π Read
via "Tech Republic".
States should use a privacy by design approach instead of creating a new system to track purchases and other activities, according to security experts.π Read
via "Tech Republic".
TechRepublic
Digital driver's licenses: Are they secure enough for us to trust?
States should use a privacy by design approach instead of creating a new system to track purchases and other activities, according to security experts.
βΌ CVE-2021-43172 βΌ
π Read
via "National Vulnerability Database".
NLnet Labs Routinator prior to 0.10.2 happily processes a chain of RRDP repositories of infinite length causing it to never finish a validation run. In RPKI, a CA can choose the RRDP repository it wishes to publish its data in. By continuously generating a new child CA that only consists of another CA using a different RRDP repository, a malicious CA can create a chain of CAs of de-facto infinite length. Routinator prior to version 0.10.2 did not contain a limit on the length of such a chain and will therefore continue to process this chain forever. As a result, the validation run will never finish, leading to Routinator continuing to serve the old data set or, if in the initial validation run directly after starting, never serve any data at all.π Read
via "National Vulnerability Database".
βΌ CVE-2021-43173 βΌ
π Read
via "National Vulnerability Database".
In NLnet Labs Routinator prior to 0.10.2, a validation run can be delayed significantly by an RRDP repository by not answering but slowly drip-feeding bytes to keep the connection alive. This can be used to effectively stall validation. While Routinator has a configurable time-out value for RRDP connections, this time-out was only applied to individual read or write operations rather than the complete request. Thus, if an RRDP repository sends a little bit of data before that time-out expired, it can continuously extend the time it takes for the request to finish. Since validation will only continue once the update of an RRDP repository has concluded, this delay will cause validation to stall, leading to Routinator continuing to serve the old data set or, if in the initial validation run directly after starting, never serve any data at all.π Read
via "National Vulnerability Database".
βΌ CVE-2021-43174 βΌ
π Read
via "National Vulnerability Database".
NLnet Labs Routinator versions 0.9.0 up to and including 0.10.1, support the gzip transfer encoding when querying RRDP repositories. This encoding can be used by an RRDP repository to cause an out-of-memory crash in these versions of Routinator. RRDP uses XML which allows arbitrary amounts of white space in the encoded data. The gzip scheme compresses such white space extremely well, leading to very small compressed files that become huge when being decompressed for further processing, big enough that Routinator runs out of memory when parsing input data waiting for the next XML element.π Read
via "National Vulnerability Database".
π¦Ώ Kaspersky finds 31% increase in "smart" DDoS attacks π¦Ώ
π Read
via "Tech Republic".
The security company expects these attacks to keep rising through the end of the year.π Read
via "Tech Republic".
TechRepublic
Kaspersky finds 31% increase in "smart" DDoS attacks
The security company expects these attacks to keep rising through the end of the year.
π΄ Why Self-Learning AI Is Changing the Paradigm of ICS Security π΄
π Read
via "Dark Reading".
By focusing on the organization rather than the threat, AI can identify subtle changes in your digital environment that point to a cyber threat.π Read
via "Dark Reading".
Dark Reading
Why Self-Learning AI Is Changing the Paradigm of ICS Security
By focusing on the organization rather than the threat, AI can identify subtle changes in your digital environment that point to a cyber threat.
β Not Punny: Angling Direct Breach Cripples Retailer for Days β
π Read
via "Threat Post".
A U.K. fishing retailerβs site has been hijacked and redirected to Pornhub.π Read
via "Threat Post".
Threat Post
Not Punny: Angling Direct Breach Cripples Retailer for Days
A U.K. fishing retailerβs site has been hijacked and redirected to Pornhub.
βοΈ Microsoft Patch Tuesday, November 2021 Edition βοΈ
π Read
via "Krebs on Security".
Microsoft Corp. today released updates to quash at least 55 security bugs in its Windows operating systems and other software. Two of the patches address vulnerabilities that are already being used in active attacks online, and four of the flaws were disclosed publicly before today -- potentially giving adversaries a head start in figuring out how to exploit them.π Read
via "Krebs on Security".
Krebsonsecurity
Microsoft Patch Tuesday, November 2021 Edition
Microsoft Corp. today released updates to quash at least 55 security bugs in its Windows operating systems and other software. Two of the patches address vulnerabilities that are already being used in active attacks online, and four of the flawsβ¦
π¦Ώ Security pros say federal government should do more to protect and secure private sector π¦Ώ
π Read
via "Tech Republic".
A full 95% of professionals surveyed by Tripwire believe the government should play a bigger role in securing non-governmental companies.π Read
via "Tech Republic".
TechRepublic
Security pros say federal government should do more to protect and secure private sector
A full 95% of professionals surveyed by Tripwire believe the government should play a bigger role in securing non-governmental companies.
βΌ CVE-2020-28419 βΌ
π Read
via "National Vulnerability Database".
During installation with certain driver software or application packages an arbitrary code execution could occur.π Read
via "National Vulnerability Database".
βΌ CVE-2021-20119 βΌ
π Read
via "National Vulnerability Database".
The password change utility for the Arris SurfBoard SB8200 can have safety measures bypassed that allow any logged-in user to change the administrator password.π Read
via "National Vulnerability Database".