Malware Devil

Wednesday, September 9, 2020

Virtual Mail Room Exposes 50,000 Letters Sent by Banks and Local Authorities

Private details relating to more than 50,000 letters sent out by banks and local authorities were indexed by Google after a London-based outsourcing firm left its system hopelessly exposed.
Read More

The post Virtual Mail Room Exposes 50,000 Letters Sent by Banks and Local Authorities appeared first on Malware Devil.



https://malwaredevil.com/2020/09/09/virtual-mail-room-exposes-50000-letters-sent-by-banks-and-local-authorities/?utm_source=rss&utm_medium=rss&utm_campaign=virtual-mail-room-exposes-50000-letters-sent-by-banks-and-local-authorities

Secureworks to Acquire Vulnerability Management Startup Delve Laboratories

Terms of the acquisition were not disclosed. According to SecurityWeek’s research, Delve has raised roughly $1.5 million in Seed funding.
Read More

The post Secureworks to Acquire Vulnerability Management Startup Delve Laboratories appeared first on Malware Devil.



https://malwaredevil.com/2020/09/09/secureworks-to-acquire-vulnerability-management-startup-delve-laboratories/?utm_source=rss&utm_medium=rss&utm_campaign=secureworks-to-acquire-vulnerability-management-startup-delve-laboratories

Netwalker Ransomware Strikes Pakistan’s Largest Private Power Utility

K-Electric, the sole electricity provider for Karachi, Pakistan, has suffered a Netwalker ransomware attack that led to the disruption of billing and online services.
Read More

The post Netwalker Ransomware Strikes Pakistan’s Largest Private Power Utility appeared first on Malware Devil.



https://malwaredevil.com/2020/09/09/netwalker-ransomware-strikes-pakistans-largest-private-power-utility/?utm_source=rss&utm_medium=rss&utm_campaign=netwalker-ransomware-strikes-pakistans-largest-private-power-utility

Surge in Cyberattacks Puts Manufacturing OT Systems at Risk

The fourth industrial revolution has failed to address the extraordinary surge in cyberattacks that put manufacturing OT systems and automation at risk.

The post Surge in Cyberattacks Puts Manufacturing OT Systems at Risk appeared first on Nozomi Networks.

The post Surge in Cyberattacks Puts Manufacturing OT Systems at Risk appeared first on Security Boulevard.

Read More

The post Surge in Cyberattacks Puts Manufacturing OT Systems at Risk appeared first on Malware Devil.



https://malwaredevil.com/2020/09/09/surge-in-cyberattacks-puts-manufacturing-ot-systems-at-risk/?utm_source=rss&utm_medium=rss&utm_campaign=surge-in-cyberattacks-puts-manufacturing-ot-systems-at-risk

Strategies for Insider Threat Mitigation

In Part II of this blog series, we examine strategies for insider threat risk mitigation including key tenants of data visibility and advanced analytics to provide organizations a road map for addressing this evolving threat.

The post Strategies for Insider Threat Mitigation appeared first on Security Boulevard.

Read More

The post Strategies for Insider Threat Mitigation appeared first on Malware Devil.



https://malwaredevil.com/2020/09/09/strategies-for-insider-threat-mitigation/?utm_source=rss&utm_medium=rss&utm_campaign=strategies-for-insider-threat-mitigation

Keep It Simple: Choosing the Right DDoS Mitigation Strategy

The cyber industry offers a plenitude of DDoS mitigation solutions. Here are a few guidelines that can help simplify your selection process.

The post Keep It Simple: Choosing the Right DDoS Mitigation Strategy appeared first on Radware Blog.

The post Keep It Simple: Choosing the Right DDoS Mitigation Strategy appeared first on Security Boulevard.

Read More

The post Keep It Simple: Choosing the Right DDoS Mitigation Strategy appeared first on Malware Devil.



https://malwaredevil.com/2020/09/09/keep-it-simple-choosing-the-right-ddos-mitigation-strategy/?utm_source=rss&utm_medium=rss&utm_campaign=keep-it-simple-choosing-the-right-ddos-mitigation-strategy

Microsoft September 2020 Patch Tuesday fixes 129 vulnerabilities

This month, of the 129 vulnerabilities patched, 32 were classified as remote code execution issues, which are bugs that permit attackers to exploit vulnerable applications remotely, over a network.
Read More

The post Microsoft September 2020 Patch Tuesday fixes 129 vulnerabilities appeared first on Malware Devil.



https://malwaredevil.com/2020/09/09/microsoft-september-2020-patch-tuesday-fixes-129-vulnerabilities/?utm_source=rss&utm_medium=rss&utm_campaign=microsoft-september-2020-patch-tuesday-fixes-129-vulnerabilities

Spyware Labeled ‘TikTok Pro’ Exploits Fears of US Ban

Malware can take over common device functions as well as creates a phishing page to steal Facebook credentials.
Read More

The post Spyware Labeled ‘TikTok Pro’ Exploits Fears of US Ban appeared first on Malware Devil.



https://malwaredevil.com/2020/09/09/spyware-labeled-tiktok-pro-exploits-fears-of-us-ban/?utm_source=rss&utm_medium=rss&utm_campaign=spyware-labeled-tiktok-pro-exploits-fears-of-us-ban

Pakistani Electric Supply Company Struck by Netwalker Ransomware

An electric supply company based in Karachi, Pakistan suffered a Netwalker ransomware infection that disrupted its billing and online services. Bleeping Computer learned of the attack through Ransom Leaks, a ransomware researcher who received word from a local Pakistani company that the attack was affecting K-Electric’s internal services. According to Rewterz, the Netwalker attack began […]… Read More

The post Pakistani Electric Supply Company Struck by Netwalker Ransomware appeared first on The State of Security.

The post Pakistani Electric Supply Company Struck by Netwalker Ransomware appeared first on Security Boulevard.

Read More

The post Pakistani Electric Supply Company Struck by Netwalker Ransomware appeared first on Malware Devil.



https://malwaredevil.com/2020/09/09/pakistani-electric-supply-company-struck-by-netwalker-ransomware/?utm_source=rss&utm_medium=rss&utm_campaign=pakistani-electric-supply-company-struck-by-netwalker-ransomware

Opening Day for Hartford Public Schools Delayed After Ransomware Attack on Critical Network Systems

The city of Hartford, Connecticut, was forced to delay the first day of school on Tuesday after a ransomware attack took down critical network systems, including the system that communicates transportation routes to the school bus operator. “There will be no in-person or online learning on Tuesday, September 8,” Hartford Public Schools (HPS) said in […]

The post Opening Day for Hartford Public Schools Delayed After Ransomware Attack on Critical Network Systems appeared first on Security Boulevard.

Read More

The post Opening Day for Hartford Public Schools Delayed After Ransomware Attack on Critical Network Systems appeared first on Malware Devil.



https://malwaredevil.com/2020/09/09/opening-day-for-hartford-public-schools-delayed-after-ransomware-attack-on-critical-network-systems/?utm_source=rss&utm_medium=rss&utm_campaign=opening-day-for-hartford-public-schools-delayed-after-ransomware-attack-on-critical-network-systems

Tuesday, September 8, 2020

Microsoft September 2020 Patch Tuesday, (Tue, Sep 8th)

This month we got patches for 129 vulnerabilities. Of these, 23 are critical and none of them was previously disclosed or is being exploited according to Microsoft.

Amongst the critical ones, there is a remote code execution (RCE) vulnerability in Microsoft SharePoint (CVE-2020-1210) with a CVSS score of 9.9 (the highest this month). The vulnerability exists when the software fails to check the source markup of an application package. To exploit this vulnerability, an attacker has to upload a specially crafted SharePoint application package to a vulnerable SharePoint.

There is also an RCE in Microsoft Exchange (CVE-2020-16875), with a CVSS score of 9.1. To exploit this vulnerability, an attacker has to send a specially crafted e-mail to a vulnerable Exchange Server. An attacker who successfully exploits this vulnerability could run arbitrary code in the context of System user.

A third vulnerability worth mentioning is an RCE affecting Active Directory (CVE-2020-0761) when integrated with DNS (ADIDNS). An authenticated attacker could run arbitrary code in the context of Local System account if successfully exploits this vulnerability. To exploit the vulnerability, an authenticated attacker could send malicious requests to an Active Directory integrated DNS (ADIDNS) server. The CVSS score for this vulnerability is 8.8.

See Renato’s dashboard for a more detailed breakout: https://patchtuesdaydashboard.com

Description
CVE Disclosed Exploited Exploitability (old versions) current version Severity CVSS Base (AVG) CVSS Temporal (AVG)
ADFS Spoofing Vulnerability
%%cve:2020-0837%% No No Less Likely Less Likely Important 5.0 4.5
Active Directory Information Disclosure Vulnerability
%%cve:2020-0664%% No No More Likely More Likely Important 6.5 5.9
%%cve:2020-0856%% No No More Likely More Likely Important 6.5 5.9
Active Directory Remote Code Execution Vulnerability
%%cve:2020-0718%% No No Less Likely Less Likely Important 8.8 7.9
%%cve:2020-0761%% No No Less Likely Less Likely Important 8.8 7.9
Connected User Experiences and Telemetry Service Elevation of Privilege Vulnerability
%%cve:2020-1590%% No No Less Likely Less Likely Important 5.5 5.0
Diagnostics Hub Standard Collector Elevation of Privilege Vulnerability
%%cve:2020-1130%% No No Less Likely Less Likely Important 6.6 5.9
%%cve:2020-1133%% No No Less Likely Less Likely Important 5.5 5.0
DirectX Elevation of Privilege Vulnerability
%%cve:2020-1053%% No No Less Likely Less Likely Important 7.8 7.0
%%cve:2020-1308%% No No More Likely More Likely Important 7.0 6.3
GDI+ Remote Code Execution Vulnerability
%%cve:2020-1285%% No No Less Likely Less Likely Critical 8.4 7.6
Group Policy Elevation of Privilege Vulnerability
%%cve:2020-1013%% No No Less Likely Less Likely Important 7.5 6.7
Internet Explorer Browser Helper Object (BHO) Memory Corruption Vulnerability
%%cve:2020-16884%% No No Less Likely Less Likely Important 4.2 3.8
Jet Database Engine Remote Code Execution Vulnerability
%%cve:2020-1039%% No No Less Likely Less Likely Important 7.8 7.0
%%cve:2020-1074%% No No Less Likely Less Likely Important 7.8 7.0
Microsoft ASP.NET Core Security Feature Bypass Vulnerability
%%cve:2020-1045%% No No Less Likely Less Likely Important 7.5 6.7
Microsoft Browser Memory Corruption Vulnerability
%%cve:2020-0878%% No No Less Likely Less Likely Critical 4.2 3.8
Microsoft COM for Windows Elevation of Privilege Vulnerability
%%cve:2020-1507%% No No Less Likely Less Likely Important 7.9 7.1
Microsoft COM for Windows Remote Code Execution Vulnerability
%%cve:2020-0922%% No No Less Likely Less Likely Critical 8.8 7.9
Microsoft Dynamics 365 (On-Premise) Cross Site Scripting Vulnerability
%%cve:2020-16858%% No No Less Likely Less Likely Important 5.4 4.9
%%cve:2020-16859%% No No Less Likely Less Likely Important 5.4 4.9
%%cve:2020-16861%% No No Less Likely Less Likely Important 5.4 4.9
%%cve:2020-16864%% No No Less Likely Less Likely Important 5.4 4.9
%%cve:2020-16872%% No No Less Likely Less Likely Important 7.6 6.8
%%cve:2020-16878%% No No Less Likely Less Likely Important 5.4 4.9
%%cve:2020-16871%% No No Less Likely Less Likely Important 5.4 4.9
Microsoft Dynamics 365 (on-premises) Remote Code Execution Vulnerability
%%cve:2020-16860%% No No Less Likely Less Likely Important 6.8 6.1
%%cve:2020-16862%% No No Less Likely Less Likely Critical 7.1 6.4
Microsoft Dynamics 365 for Finance and Operations (on-premises) Remote Code Execution Vulnerability
%%cve:2020-16857%% No No Critical 7.1 6.4
Microsoft Excel Information Disclosure Vulnerability
%%cve:2020-1224%% No No Less Likely Less Likely Important 5.5 5.0
Microsoft Excel Remote Code Execution Vulnerability
%%cve:2020-1193%% No No Less Likely Less Likely Important 7.8 7.0
%%cve:2020-1332%% No No Less Likely Less Likely Important 7.8 7.0
%%cve:2020-1335%% No No Less Likely Less Likely Important 7.8 7.0
%%cve:2020-1594%% No No Less Likely Less Likely Important 7.8 7.0
Microsoft Exchange Memory Corruption Vulnerability
%%cve:2020-16875%% No No Less Likely Less Likely Critical 9.1 8.2
Microsoft Graphics Component Information Disclosure Vulnerability
%%cve:2020-0921%% No No Less Likely Less Likely Important 5.5 5.0
%%cve:2020-1083%% No No Less Likely Less Likely Important 5.5 5.0
Microsoft Office Information Disclosure Vulnerability
%%cve:2020-16855%% No No Less Likely Less Likely Important 5.5 5.0
Microsoft Office SharePoint XSS Vulnerability
%%cve:2020-1345%% No No Less Likely Less Likely Important 7.4 6.7
%%cve:2020-1575%% No No Less Likely Less Likely Important 5.4 4.9
%%cve:2020-1198%% No No Important 7.4 6.7
%%cve:2020-1227%% No No Important 5.4 4.9
%%cve:2020-1482%% No No Less Likely Less Likely Important 6.3 5.7
%%cve:2020-1514%% No No Less Likely Less Likely Important 5.4 4.9
Microsoft SharePoint Remote Code Execution Vulnerability
%%cve:2020-1452%% No No Less Likely Less Likely Critical 8.6 7.7
%%cve:2020-1453%% No No Less Likely Less Likely Critical 8.6 7.7
%%cve:2020-1576%% No No Less Likely Less Likely Critical 8.5 7.6
%%cve:2020-1200%% No No Less Likely Less Likely Critical 8.6 7.7
%%cve:2020-1210%% No No Less Likely Less Likely Critical 9.9 8.9
%%cve:2020-1595%% No No Less Likely Less Likely Critical 9.9 8.9
Microsoft SharePoint Server Remote Code Execution Vulnerability
%%cve:2020-1460%% No No Less Likely Less Likely Critical 8.6 7.7
Microsoft SharePoint Server Tampering Vulnerability
%%cve:2020-1440%% No No Less Likely Less Likely Important 6.3 5.7
%%cve:2020-1523%% No No Less Likely Less Likely Important 8.9 8.0
Microsoft SharePoint Spoofing Vulnerability
%%cve:2020-1205%% No No Less Likely Less Likely Important 4.6 4.2
Microsoft Store Runtime Elevation of Privilege Vulnerability
%%cve:2020-0766%% No No Less Likely Less Likely Important 7.8 7.0
%%cve:2020-1146%% No No Less Likely Less Likely Important 6.6 5.9
Microsoft Windows Codecs Library Remote Code Execution Vulnerability
%%cve:2020-1129%% No No Less Likely Less Likely Critical 8.8 7.9
%%cve:2020-1319%% No No Less Likely Less Likely Critical 7.3 6.6
Microsoft Word Remote Code Execution Vulnerability
%%cve:2020-1218%% No No Less Likely Less Likely Important 7.8 7.0
%%cve:2020-1338%% No No Less Likely Less Likely Important 7.8 7.0
Microsoft splwow64 Elevation of Privilege Vulnerability
%%cve:2020-0790%% No No Less Likely Less Likely Important 7.8 7.0
Microsoft splwow64 Information Disclosure Vulnerability
%%cve:2020-0875%% No No Less Likely Less Likely Important 5.5 5.0
NTFS Elevation of Privilege Vulnerability
%%cve:2020-0838%% No No Less Likely Less Likely Important 7.8 7.0
OneDrive for Windows Elevation of Privilege Vulnerability
%%cve:2020-16851%% No No Less Likely Less Likely Important 7.1 6.4
%%cve:2020-16852%% No No Less Likely Less Likely Important 7.1 6.4
%%cve:2020-16853%% No No Less Likely Less Likely Important 7.1 6.4
Projected Filesystem Information Disclosure Vulnerability
%%cve:2020-16879%% No No Less Likely Less Likely Important 5.5 5.0
Projected Filesystem Security Feature Bypass Vulnerability
%%cve:2020-0805%% No No Less Likely Less Likely Important 5.3 4.8
SQL Server Reporting Services Security Feature Bypass Vulnerability
%%cve:2020-1044%% No No Less Likely Less Likely Moderate 4.3 3.9
Scripting Engine Memory Corruption Vulnerability
%%cve:2020-1057%% No No Less Likely Less Likely Critical 4.2 3.8
%%cve:2020-1172%% No No Less Likely Less Likely Critical 4.2 3.8
%%cve:2020-1180%% No No Less Likely Less Likely Important 4.2 3.8
Shell infrastructure component Elevation of Privilege Vulnerability
%%cve:2020-0870%% No No Less Likely Less Likely Important 7.8 7.0
TLS Information Disclosure Vulnerability
%%cve:2020-1596%% No No Less Likely Less Likely Important 5.4 4.9
Visual Studio JSON Remote Code Execution Vulnerability
%%cve:2020-16881%% No No Less Likely Less Likely Important 7.8 7.0
Visual Studio Remote Code Execution Vulnerability
%%cve:2020-16856%% No No Less Likely Less Likely Important 7.8 7.0
%%cve:2020-16874%% No No Less Likely Less Likely Critical 7.8 7.0
Win32k Elevation of Privilege Vulnerability
%%cve:2020-1245%% No No More Likely More Likely Important 7.0 6.3
Win32k Information Disclosure Vulnerability
%%cve:2020-0941%% No No More Likely More Likely Important 5.5 5.0
%%cve:2020-1250%% No No Less Likely Less Likely Important 5.5 5.0
WinINet API Elevation of Privilege Vulnerability
%%cve:2020-1012%% No No Less Likely Less Likely Important 8.8 7.9
Windows Camera Codec Pack Remote Code Execution Vulnerability
%%cve:2020-0997%% No No Less Likely Less Likely Critical 7.8 7.0
Windows CloudExperienceHost Elevation of Privilege Vulnerability
%%cve:2020-1471%% No No Less Likely Less Likely Important 6.1 5.5
Windows Common Log File System Driver Elevation of Privilege Vulnerability
%%cve:2020-1115%% No No More Likely More Likely Important 7.8 7.0
Windows Cryptographic Catalog Services Elevation of Privilege Vulnerability
%%cve:2020-0782%% No No Less Likely Less Likely Important 7.8 7.0
Windows DHCP Server Information Disclosure Vulnerability
%%cve:2020-1031%% No No Less Likely Less Likely Important 7.5 6.7
Windows DNS Denial of Service Vulnerability
%%cve:2020-0836%% No No Less Likely Less Likely Important 7.5 6.7
%%cve:2020-1228%% No No Less Likely Less Likely Important 7.5 6.7
Windows Defender Application Control Security Feature Bypass Vulnerability
%%cve:2020-0951%% No No Less Likely Less Likely Important 6.7 6.0
Windows Elevation of Privilege Vulnerability
%%cve:2020-1376%% No No Less Likely Less Likely Important 7.8 7.0
%%cve:2020-1052%% No No Less Likely Less Likely Important 7.8 7.0
%%cve:2020-1159%% No No Less Likely Less Likely Important 5.3 4.8
Windows Function Discovery SSDP Provider Elevation of Privilege Vulnerability
%%cve:2020-0912%% No No Less Likely Less Likely Important 7.0 6.3
Windows Function Discovery Service Elevation of Privilege Vulnerability
%%cve:2020-1491%% No No Less Likely Less Likely Important 7.8 7.0
Windows GDI Information Disclosure Vulnerability
%%cve:2020-1256%% No No Less Likely Less Likely Important 5.5 5.0
Windows Graphics Component Elevation of Privilege Vulnerability
%%cve:2020-0998%% No No Less Likely Less Likely Important 7.8 7.0
Windows Graphics Component Information Disclosure Vulnerability
%%cve:2020-1091%% No No Less Likely Less Likely Important 6.5 5.9
%%cve:2020-1097%% No No Less Likely Less Likely Important 6.5 5.9
Windows Hyper-V Denial of Service Vulnerability
%%cve:2020-0890%% No No Less Likely Less Likely Important 6.5 5.9
%%cve:2020-0904%% No No Less Likely Less Likely Important 6.5 5.9
Windows Information Disclosure Vulnerability
%%cve:2020-1119%% No No Less Likely Less Likely Important 5.5 5.0
Windows InstallService Elevation of Privilege Vulnerability
%%cve:2020-1532%% No No Less Likely Less Likely Important 7.8 7.0
Windows Kernel Elevation of Privilege Vulnerability
%%cve:2020-1034%% No No Less Likely Less Likely Important 6.8 6.1
Windows Kernel Information Disclosure Vulnerability
%%cve:2020-1589%% No No Less Likely Less Likely Important 4.4 4.0
%%cve:2020-1592%% No No Less Likely Less Likely Important 5.1 4.6
%%cve:2020-0928%% No No Less Likely Less Likely Important 5.5 5.0
%%cve:2020-1033%% No No Less Likely Less Likely Important 4.0 3.6
%%cve:2020-16854%% No No Less Likely Less Likely Important 5.5 5.0
Windows Language Pack Installer Elevation of Privilege Vulnerability
%%cve:2020-1122%% No No Less Likely Less Likely Important 5.5 5.0
Windows Media Audio Decoder Remote Code Execution Vulnerability
%%cve:2020-1508%% No No Less Likely Less Likely Critical 7.6 6.8
%%cve:2020-1593%% No No Less Likely Less Likely Critical 7.6 6.8
Windows Mobile Device Management Diagnostics Information Disclosure Vulnerability
%%cve:2020-0989%% No No Less Likely Less Likely Important 5.5 5.0
Windows Modules Installer Elevation of Privilege Vulnerability
%%cve:2020-0911%% No No Less Likely Less Likely Important 7.8 7.0
Windows Print Spooler Elevation of Privilege Vulnerability
%%cve:2020-1030%% No No Less Likely Less Likely Important 7.8 7.0
Windows RSoP Service Application Elevation of Privilege Vulnerability
%%cve:2020-0648%% No No Less Likely Less Likely Important 7.8 7.0
Windows Remote Code Execution Vulnerability
%%cve:2020-1252%% No No Less Likely Less Likely Critical 7.8 7.0
Windows Routing Utilities Denial of Service
%%cve:2020-1038%% No No Less Likely Less Likely Important 5.5 5.0
Windows Runtime Elevation of Privilege Vulnerability
%%cve:2020-1169%% No No Less Likely Less Likely Important 7.8 7.0
%%cve:2020-1303%% No No Less Likely Less Likely Important 5.5 5.0
Windows Shell Infrastructure Component Elevation of Privilege Vulnerability
%%cve:2020-1098%% No No Less Likely Less Likely Important 7.8 7.0
Windows Start-Up Application Elevation of Privilege Vulnerability
%%cve:2020-1506%% No No Less Likely Less Likely Important 6.1 5.5
Windows State Repository Service Information Disclosure Vulnerability
%%cve:2020-0914%% No No Less Likely Less Likely Important 5.5 5.0
Windows Storage Services Elevation of Privilege Vulnerability
%%cve:2020-1559%% No No Less Likely Less Likely Important 7.8 7.0
%%cve:2020-0886%% No No Less Likely Less Likely Important 7.8 7.0
Windows Text Service Module Remote Code Execution Vulnerability
%%cve:2020-0908%% No No Less Likely Less Likely Critical 7.5 6.7
Windows UPnP Service Elevation of Privilege Vulnerability
%%cve:2020-1598%% No No Less Likely Less Likely Important 6.1 5.5
Windows Win32k Elevation of Privilege Vulnerability
%%cve:2020-1152%% No No More Likely More Likely Important 5.8 5.2
Windows dnsrslvr.dll Elevation of Privilege Vulnerability
%%cve:2020-0839%% No No Less Likely Less Likely Important 7.8 7.0
Xamarin.Forms Spoofing Vulnerability
%%cve:2020-16873%% No No Less Likely Less Likely Important 4.7 4.4


Renato Marinho
Morphus Labs| LinkedIn|Twitter

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License. Read More

The post Microsoft September 2020 Patch Tuesday, (Tue, Sep 8th) appeared first on Malware Devil.



https://malwaredevil.com/2020/09/08/microsoft-september-2020-patch-tuesday-tue-sep-8th/?utm_source=rss&utm_medium=rss&utm_campaign=microsoft-september-2020-patch-tuesday-tue-sep-8th

The Botnet Scoop

Avast Security, in a detailed blog post, explained how two DVB boxes are prone to both ransomware and botnet attacks. These boxes are Philips DTR3502BFTA and Thomson THT741FTA.
Read More

The post The Botnet Scoop appeared first on Malware Devil.



https://malwaredevil.com/2020/09/08/the-botnet-scoop/?utm_source=rss&utm_medium=rss&utm_campaign=the-botnet-scoop

Ekran System & Universal Insider Threat Protection – Part 1 – Oleg Shomonko – SCW #42

Ekran System is a universal insider threat protection platform that combines three essential insider security controls: activity monitoring, access management, and identity management. Functionality is provided in a single universal software platform delivering light-weight agents for all types of endpoints. This segment is sponsored by Ekran System.

Visit https://securityweekly.com/ekran to learn more about them!
Visit https://www.securityweekly.com/scw for all the latest episodes!
Show Notes: https://wiki.securityweekly.com/scw42

The post Ekran System & Universal Insider Threat Protection – Part 1 – Oleg Shomonko – SCW #42 appeared first on Malware Devil.



https://malwaredevil.com/2020/09/08/ekran-system-universal-insider-threat-protection-part-1-oleg-shomonko-scw-42/?utm_source=rss&utm_medium=rss&utm_campaign=ekran-system-universal-insider-threat-protection-part-1-oleg-shomonko-scw-42

The Passwordless Enterprise Era

How ForgeRock and Secret Double Octopus Are Paving the Way for a Passwordless User Journey    

We’re living in a world where managing digital identities is becoming an increasingly complex and tedious task. Every organization must deal with multiple accounts and credentials for users, employees, and devices. Sometimes, these siloed identities can span across dozens or hundreds of locations, and number in the thousands or even millions. All this chaos is accelerating the adoption of passwordless technologies. 

With all these moving parts, it can be extremely difficult to secure company information and this results in a frustrating experience for both users and IT teams. With the infrastructure inside many organizations becoming increasingly fragmented across different servers, cloud services, and online platforms, the identity and access management problem becomes even more complicated. 

This is where passwordless authentication can help. The ForgeRock Identity Platform enables fully password-free user journeys out of the box, and with technology partner Secret Double Octopus, the experience can be extended to the users workstation authentication. This frees employees and administrators from the pain of remembering and managing passwords throughout the enterprise. 

The Growing Challenge of Enterprise Identity and Access Management

Companies often struggle to set up identity and access management (IAM) solutions in a secure, easy-to-use, scalable, and future-proof way. Unfortunately, many organizations end up outsourcing this task to expensive integration specialists to make complex systems work together and to maintain these integrations over time. Either way, organizations gradually get stuck with overly complicated systems that are costly, create unnecessary risk, and can’t scale with their growing needs.

 The mounting challenge of identity management has spurred collaboration among different vendors to create scalable, integrated solutions that provide robust security and easily integrate with the different on-premises and cloud-based solutions that the enterprise has already invested in. These efforts have become even more important as the COVID-19 pandemic has driven  many companies to adopt work-from-home models, making them even more dependent on reliable and scalable digital infrastructure.

 The addition of Secret Double Octopus’ technology to the ForgeRock Trust Network extends the reach of Intelligent Authentication to the desktop login experience and provides passwordless authentication to any application protected by the ForgeRock Identity Platform 

As we’ve covered in a previous blog series, passwords are a weak spot that continues to give organizations IT cost overhead and security nightmares. The deployment of passwordless authentication provides increased security, lower operational costs, less downtime, and an enhanced user experience that results in improved productivity across the organization.

How Do We Do It?

With the integration of Secret Double Octopus, ForgeRock customers can improve security, creating a more pleasant user experience for employees, and change the way IT departments handle user authentication.

The change starts at the workstation level with a choice between Desktop Multi-Factor Authentication (MFA) using the ForgeRock app or a passwordless desktop experience that removes passwords altogether when logging in to Microsoft Windows, Apple Mac, or Linux workstations. With additional support for existing one-time password (OTP) tokens, offline scenarios, and FIDO2 keys, the workstation becomes the first step towards a passwordless enterprise.

Passwordless SDO Image 2.png

The next change happens at the directory level, with a choice to use to an existing Active Directory (AD) or Azure Active Directory (AAD) datastore, or to remove AD all together and rely on the ForgeRock Directory Service as the source of user profile data for workstation authentication.

Organizations have the flexibility to adopt different scenarios based on their policies, preferences, and available technology. For instance, they can choose between the ForgeRock Authenticator, the Octopus Authenticator, or a combination of both. If the work environment does not allow mobile devices, they can use FIDO2 keys as a second factor, or they can use an offline OTP if users can’t access the internet.

Integrating Octopus Authentication with the ForgeRock Identity Platform eliminates the need to create, change, manage or remember passwords, saving many headaches and complexities for IT teams and users. This directly results in boosted uptime and productivity, as well as increased security, thanks to a universal user experience across all applications.

 Together, ForgeRock and Secret Double Octopus provide customers with a clear path to transition from costly and risky user-managed passwords toward a passwordless future. Organizations can now deploy a single authentication mechanism to serve all their needs in a frictionless, cost-efficient way through a known and trusted platform.

Want to create simple and secure access experiences that just flow? Find out more about passwordless authentication here

 

The post The Passwordless Enterprise Era appeared first on Security Boulevard.

Read More

The post The Passwordless Enterprise Era appeared first on Malware Devil.



https://malwaredevil.com/2020/09/08/the-passwordless-enterprise-era/?utm_source=rss&utm_medium=rss&utm_campaign=the-passwordless-enterprise-era

China Trolls U.S. With ‘Fox in Henhouse’ Data Security Plan

China

China says countries shouldn’t attack critical infrastructure. Nor steal data. Nor do mass surveillance. Nor put backdoors in their products.

The post China Trolls U.S. With ‘Fox in Henhouse’ Data Security Plan appeared first on Security Boulevard.

Read More

The post China Trolls U.S. With ‘Fox in Henhouse’ Data Security Plan appeared first on Malware Devil.



https://malwaredevil.com/2020/09/08/china-trolls-u-s-with-fox-in-henhouse-data-security-plan/?utm_source=rss&utm_medium=rss&utm_campaign=china-trolls-u-s-with-fox-in-henhouse-data-security-plan

🔴 LIVE: Security Weekly News #63

This week, Dr. Doug talks Security Weekly sold to Cyber Risk Alliance, Argentina and Newcastle ransomwared, Cisco Jabber, the NSA wants to educate you, and Jason Wood returns for Expert Commentary on how Creepy ‘Geofence’ Finds Anyone Who Went Near a Crime Scene!

→Full Show Notes: https://www.wiki.securityweekly.com/swn63

→Join the Security Weekly Discord Server: https://discord.gg/pqSwWm4
→Visit our website: https://www.securityweekly.com
→Follow us on Twitter: https://www.twitter.com/securityweekly

The post 🔴 LIVE: Security Weekly News #63 appeared first on Malware Devil.



https://malwaredevil.com/2020/09/08/%f0%9f%94%b4-live-security-weekly-news-63/?utm_source=rss&utm_medium=rss&utm_campaign=%25f0%259f%2594%25b4-live-security-weekly-news-63

The Joy of Tech® ‘Woody Guthrie Sings At Amazon’

via the Comic Noggins of Nitrozac and Snaggy at The Joy of Tech® !

via the Comic Noggins of Nitrozac and Snaggy at The Joy of Tech®!

Permalink

The post The Joy of Tech® ‘Woody Guthrie Sings At Amazon’ appeared first on Security Boulevard.

Read More

The post The Joy of Tech® ‘Woody Guthrie Sings At Amazon’ appeared first on Malware Devil.



https://malwaredevil.com/2020/09/08/the-joy-of-tech-woody-guthrie-sings-at-amazon/?utm_source=rss&utm_medium=rss&utm_campaign=the-joy-of-tech-woody-guthrie-sings-at-amazon

City of Hartford Delays School Reopening Due to Ransomware Attack

Ransomware attack impacted the IT system that the school district uses to manage school buses and transportation routes.
Read More

The post City of Hartford Delays School Reopening Due to Ransomware Attack appeared first on Malware Devil.



https://malwaredevil.com/2020/09/08/city-of-hartford-delays-school-reopening-due-to-ransomware-attack/?utm_source=rss&utm_medium=rss&utm_campaign=city-of-hartford-delays-school-reopening-due-to-ransomware-attack

Critical Adobe Flaws Allow Attackers to Run JavaScript in Browsers

Five critical cross-site scripting flaws were fixed by Adobe in Experience Manager as part of its regularly scheduled patches.
Read More

The post Critical Adobe Flaws Allow Attackers to Run JavaScript in Browsers appeared first on Malware Devil.



https://malwaredevil.com/2020/09/08/critical-adobe-flaws-allow-attackers-to-run-javascript-in-browsers/?utm_source=rss&utm_medium=rss&utm_campaign=critical-adobe-flaws-allow-attackers-to-run-javascript-in-browsers

Reflected XSS in WordPress Plugin Admin Pages

Reflected XSS in WordPress Plugin Admin Pages

The administrative dashboard in WordPress is a pretty safe place: Only elevated users can access it. Exploiting a plugin’s admin panel would serve very little purpose here — an administrator already has the required permissions to do all of the actions a vulnerability could cause.

While this is usually true, there are a number of techniques bad actors are using to trick an administrator into performing actions they would not expect, such as Cross Site Request Forgery (CSRF) or Clickjacking attacks.

Continue reading Reflected XSS in WordPress Plugin Admin Pages at Sucuri Blog.

The post Reflected XSS in WordPress Plugin Admin Pages appeared first on Security Boulevard.

Read More

The post Reflected XSS in WordPress Plugin Admin Pages appeared first on Malware Devil.



https://malwaredevil.com/2020/09/08/reflected-xss-in-wordpress-plugin-admin-pages/?utm_source=rss&utm_medium=rss&utm_campaign=reflected-xss-in-wordpress-plugin-admin-pages

Barbary Pirates and Russian Cybercrime

In 1801, the United States had a small Navy. Thomas Jefferson deployed almost half that Navy—three frigates and a schooner—to the Barbary C...