Malware Devil

Wednesday, February 10, 2021

Guiding Principles For Your Digital Transformation Strategy

Businesses embrace transformative technologies in hopes of enhancing processes needed to survive and thrive in the long term. Collaboration between firms, better customer engagement, simplified operations, and valuable insights are just some of the benefits of implementing new technologies to help businesses prosper.

The post Guiding Principles For Your Digital Transformation Strategy appeared first on Security Boulevard.

Read More

The post Guiding Principles For Your Digital Transformation Strategy appeared first on Malware Devil.



https://malwaredevil.com/2021/02/10/guiding-principles-for-your-digital-transformation-strategy-6/?utm_source=rss&utm_medium=rss&utm_campaign=guiding-principles-for-your-digital-transformation-strategy-6

Guiding Principles For Your Digital Transformation Strategy

Businesses embrace transformative technologies in hopes of enhancing processes needed to survive and thrive in the long term. Collaboration between firms, better customer engagement, simplified operations, and valuable insights are just some of the benefits of implementing new technologies to help businesses prosper.

The post Guiding Principles For Your Digital Transformation Strategy appeared first on Security Boulevard.

Read More

The post Guiding Principles For Your Digital Transformation Strategy appeared first on Malware Devil.



https://malwaredevil.com/2021/02/10/guiding-principles-for-your-digital-transformation-strategy-5/?utm_source=rss&utm_medium=rss&utm_campaign=guiding-principles-for-your-digital-transformation-strategy-5

Guiding Principles For Your Digital Transformation Strategy

Businesses embrace transformative technologies in hopes of enhancing processes needed to survive and thrive in the long term. Collaboration between firms, better customer engagement, simplified operations, and valuable insights are just some of the benefits of implementing new technologies to help businesses prosper.

The post Guiding Principles For Your Digital Transformation Strategy appeared first on Security Boulevard.

Read More

The post Guiding Principles For Your Digital Transformation Strategy appeared first on Malware Devil.



https://malwaredevil.com/2021/02/10/guiding-principles-for-your-digital-transformation-strategy-4/?utm_source=rss&utm_medium=rss&utm_campaign=guiding-principles-for-your-digital-transformation-strategy-4

Guiding Principles For Your Digital Transformation Strategy

Businesses embrace transformative technologies in hopes of enhancing processes needed to survive and thrive in the long term. Collaboration between firms, better customer engagement, simplified operations, and valuable insights are just some of the benefits of implementing new technologies to help businesses prosper.

The post Guiding Principles For Your Digital Transformation Strategy appeared first on Security Boulevard.

Read More

The post Guiding Principles For Your Digital Transformation Strategy appeared first on Malware Devil.



https://malwaredevil.com/2021/02/10/guiding-principles-for-your-digital-transformation-strategy-3/?utm_source=rss&utm_medium=rss&utm_campaign=guiding-principles-for-your-digital-transformation-strategy-3

Guiding Principles For Your Digital Transformation Strategy

Businesses embrace transformative technologies in hopes of enhancing processes needed to survive and thrive in the long term. Collaboration between firms, better customer engagement, simplified operations, and valuable insights are just some of the benefits of implementing new technologies to help businesses prosper.

The post Guiding Principles For Your Digital Transformation Strategy appeared first on Security Boulevard.

Read More

The post Guiding Principles For Your Digital Transformation Strategy appeared first on Malware Devil.



https://malwaredevil.com/2021/02/10/guiding-principles-for-your-digital-transformation-strategy-2/?utm_source=rss&utm_medium=rss&utm_campaign=guiding-principles-for-your-digital-transformation-strategy-2

Guiding Principles For Your Digital Transformation Strategy

Businesses embrace transformative technologies in hopes of enhancing processes needed to survive and thrive in the long term. Collaboration between firms, better customer engagement, simplified operations, and valuable insights are just some of the benefits of implementing new technologies to help businesses prosper.

The post Guiding Principles For Your Digital Transformation Strategy appeared first on Security Boulevard.

Read More

The post Guiding Principles For Your Digital Transformation Strategy appeared first on Malware Devil.



https://malwaredevil.com/2021/02/10/guiding-principles-for-your-digital-transformation-strategy/?utm_source=rss&utm_medium=rss&utm_campaign=guiding-principles-for-your-digital-transformation-strategy

Tuesday, February 9, 2021

Florida Water Utility Hack Highlights Risks to Critical Infrastructure

The intrusion also shows how redundancy and detection can minimize damage and reduce impact to the population.

The post Florida Water Utility Hack Highlights Risks to Critical Infrastructure appeared first on Malware Devil.



https://malwaredevil.com/2021/02/09/florida-water-utility-hack-highlights-risks-to-critical-infrastructure-2/?utm_source=rss&utm_medium=rss&utm_campaign=florida-water-utility-hack-highlights-risks-to-critical-infrastructure-2

Florida Water Utility Hack Highlights Risks to Critical Infrastructure

The intrusion also shows how redundancy and detection can minimize damage and reduce impact to the population.

The post Florida Water Utility Hack Highlights Risks to Critical Infrastructure appeared first on Malware Devil.



https://malwaredevil.com/2021/02/09/florida-water-utility-hack-highlights-risks-to-critical-infrastructure/?utm_source=rss&utm_medium=rss&utm_campaign=florida-water-utility-hack-highlights-risks-to-critical-infrastructure

Microsoft Fixes Windows Zero-Day in Patch Tuesday Rollout

Microsoft’s monthly security fixes addressed a Win32k zero-day, six publicly known flaws, and three bugs in the Windows TCP/IP stack.

Microsoft today patched a Windows zero-day vulnerability as a part of its monthly Patch Tuesday rollout, which fixed a relatively low number of Common Vulnerabilities and Exposures (CVEs) but a high number of publicly known bugs.

The 56 vulnerabilities patched today exist in Microsoft Windows, .NET framework, Windows Defender, Azure IoT, Azure Kubernetes Service, Exchange Server, Skype for Business and Lync, Office and Office Services and Web Apps, and Microsoft Edge for Android. Eleven of these flaws are classified as critical in severity, 43 are important, and two are moderate.

Under active attack is CVE-2021-1732, an important local privilege escalation flaw in Windows Win32k. If exploited, this vulnerability would allow a logged-on attacker to execute their code with higher privileges. Microsoft reports this flaw requires low attack complexity, low privileges, and no user interaction to exploit. However, the threat to confidentiality, integrity, and availability is high.

“The exploitation of this vulnerability would allow an attacker to execute code in the context of the kernel and gain system privileges, essentially giving the attacker free rein to do whatever they wanted with the compromised machine,” says Chris Hass, director of information security and research at Automox.

Microsoft did not share details of how this flaw has been exploited in the wild. It credits three researchers with DBAPPSecurity, a Chinese security company, with finding the vulnerability.

CVE-2021-1732 is “a prime example” of why organizations should prioritize patching based on risk and not necessarily by Microsoft’s severity rating, says Chris Goettl, senior director of product management and security at Ivanti.

“If you base your prioritization off of vendor severity and focus on critical, you could have missed this vulnerability in your prioritization,” Goettl explains. “This vulnerability should put Windows 10 and Server 2016 and later editions into your priority bucket for remediation this month.”

The Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA) published an alert to spread awareness of the patch and is urging users and administrators to apply the fix to Windows 10 and Windows 2019 servers.

In addition to the zero-day, Microsoft issued fixes for an unusually high number of publicly known vulnerabilities. The details of six flaws were shared online before patches were released for CVE-2021-26701 in .NET Core and Visual Studio, CVE-2021-1721 in .NET Core and Visual Studio, CVE-2021-1733 in Sysinternals PsExec, CVE-2021-24098 in Windows Console Driver, CVE-2021-24106 in Windows DirectX, and CVE-2021-1727 in Windows Installer.

So far there is no indication these vulnerabilities have been exploited, despite the details shared ahead of patches being released.

Warning for Windows TCP/IP Stack Vulnerabilities
Microsoft published a blog post to warn of three vulnerabilities in the Windows TCP/IP stack, all of which are patched today: two critical remote code execution (RCE) vulnerabilities (CVE-2021-24074 and CVE-2021-24094) and one important denial-of-service (DoS) flaw (CVE-2021-24086).

“The two RCE vulnerabilities are complex which make it difficult to create functional exploits, so they are not likely in the short term,” the Microsoft Security Response Center wrote. “We believe attackers will be able to create DoS exploits much more quickly and expect all three issues might be exploited with a DoS attack shortly after release.”

Experts elaborate on how the two are different. CVE-2021-24074 exists in IPv4 source routing, which should be disabled by default, said Dustin Childs of Trend Micro’s Zero-Day Initiative, in a blog post.

“You can also block source routing at firewalls or other perimeter devices,” he wrote.

CVE-2021-24094 affects IPv6 and would require an attacker to already have a foothold in the network, explains Kevin Breen, director of cyber threat research at Immersive Labs. However, it could ultimately give an attacker a high level of access on domain controllers, for example.

“This vulnerability would be most dangerous to those who operate a flat network,” Breen says. “Segmentation will help with mitigation.”

Users are urged to patch the vulnerabilities as soon as possible. If patching quickly is not practical, Microsoft details workarounds in the CVEs that don’t require restarting a server.

Despite the workaround guidance, Hass emphasizes the importance of patching.

“Because these affect the network stack, require zero interaction from a user, and [can] be exploited by sending malicious network traffic to a device, it’s only a matter of time before we see attackers leveraging these vulnerabilities to carry out cyberattacks,” he says.

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance & Technology, where she covered financial … View Full Bio

Recommended Reading:

Comment |

Email This |

Print |

RSS

More Insights

The post Microsoft Fixes Windows Zero-Day in Patch Tuesday Rollout appeared first on Malware Devil.



https://malwaredevil.com/2021/02/09/microsoft-fixes-windows-zero-day-in-patch-tuesday-rollout-2/?utm_source=rss&utm_medium=rss&utm_campaign=microsoft-fixes-windows-zero-day-in-patch-tuesday-rollout-2

Microsoft Fixes Windows Zero-Day in Patch Tuesday Rollout

Microsoft’s monthly security fixes addressed a Win32k zero-day, six publicly known flaws, and three bugs in the Windows TCP/IP stack.

The post Microsoft Fixes Windows Zero-Day in Patch Tuesday Rollout appeared first on Malware Devil.



https://malwaredevil.com/2021/02/09/microsoft-fixes-windows-zero-day-in-patch-tuesday-rollout/?utm_source=rss&utm_medium=rss&utm_campaign=microsoft-fixes-windows-zero-day-in-patch-tuesday-rollout

We Wear the Mask

by Paul Laurence Dunbar …born in Dayton, Ohio, on June 27, 1872. His parents, Joshua Dunbar and Matilda Murphy Dunbar, were married six months earlier, on December 24, 1871. Both slaves prior to the Civil War, Joshua Dunbar escaped and served in both the 55th Massachusetts Infantry Regiment and the 5th Massachusetts Colored Cavalry Regiment … Continue reading We Wear the Mask

The post We Wear the Mask appeared first on Security Boulevard.

Read More

The post We Wear the Mask appeared first on Malware Devil.



https://malwaredevil.com/2021/02/09/we-wear-the-mask/?utm_source=rss&utm_medium=rss&utm_campaign=we-wear-the-mask

Emotet Dismantled, Trickbot, ZLoader, and BazarLoader Step In

Recently, we published a piece highlighting
early stage loaders often used in ransomware attacks. One of the most prolific was Emotet, which has since been
taken down via a coordinated, multi-national effort. How will this impact the threat landscape? In this post, we take a look at loader activity in the aftermath of the Emotet takedown.
 

The post Emotet Dismantled, Trickbot, ZLoader, and BazarLoader Step In appeared first on Security Boulevard.

Read More

The post Emotet Dismantled, Trickbot, ZLoader, and BazarLoader Step In appeared first on Malware Devil.



https://malwaredevil.com/2021/02/09/emotet-dismantled-trickbot-zloader-and-bazarloader-step-in/?utm_source=rss&utm_medium=rss&utm_campaign=emotet-dismantled-trickbot-zloader-and-bazarloader-step-in

The Security Digest: #47

Hello and welcome to TSD, your weekly blog post with top of mind security issues. TSD began as an internal newsletter that our Security Lead, …

The post The Security Digest: #47 appeared first on Cyral.

The post The Security Digest: #47 appeared first on Security Boulevard.

Read More

The post The Security Digest: #47 appeared first on Malware Devil.



https://malwaredevil.com/2021/02/09/the-security-digest-47/?utm_source=rss&utm_medium=rss&utm_campaign=the-security-digest-47

Spotify Accounts Leaked, SonicWall Zero-Day, & Multiple Google Attacks! – SWN #99

This week, hundred thousand Spotify accounts leaked in credential stuffing attack, Hacker breached Florida water facility, raising chemical levels to dangerous levels, SonicWall Zero-Day in the SMA 100 Series, and Multiple Google attacks.

Time Stamps:

1:41 – Hundred thousand Spotify accounts leaked in credential stuffing attack
2:37 – Hacker Raised Chemical Settings at Water Treatment Plant to Dangerous Levels
3:24 – SonicWall Zero-Day
4:15 – Android App Infects Millions of Devices With a Single Update
5:25 – Fake Forcepoint Google Chrome Extension Hacks Windows Users
6:46 – The Great Suspender Chrome extension used by millions was malware
7:44 – Google Fixed A Chrome Zero-Day Under Active Attack

Visit https://www.securityweekly.com/swn for all the latest episodes!

Show Notes: https://securityweekly.com/swn99

The post Spotify Accounts Leaked, SonicWall Zero-Day, & Multiple Google Attacks! – SWN #99 appeared first on Malware Devil.



https://malwaredevil.com/2021/02/09/spotify-accounts-leaked-sonicwall-zero-day-multiple-google-attacks-swn-99/?utm_source=rss&utm_medium=rss&utm_campaign=spotify-accounts-leaked-sonicwall-zero-day-multiple-google-attacks-swn-99

Microsoft Patch Tuesday February 2021 fixes 56 vulnerabilities

With cybersecurity threats on the rise thanks to the pandemic, it is essential to understand the importance of Patch Tuesday releases, and find ways to deploy them to remote endpoints efficiently.

 This Patch Tuesday, Microsoft has released fixes for 56 …

The post Microsoft Patch Tuesday February 2021 fixes 56 vulnerabilities appeared first on ManageEngine Blog.

The post Microsoft Patch Tuesday February 2021 fixes 56 vulnerabilities appeared first on Security Boulevard.

Read More

The post Microsoft Patch Tuesday February 2021 fixes 56 vulnerabilities appeared first on Malware Devil.



https://malwaredevil.com/2021/02/09/microsoft-patch-tuesday-february-2021-fixes-56-vulnerabilities/?utm_source=rss&utm_medium=rss&utm_campaign=microsoft-patch-tuesday-february-2021-fixes-56-vulnerabilities

Microsoft February 2021 Patch Tuesday, (Tue, Feb 9th)

This month we got patches for 56 vulnerabilities. Of these, 11 are critical, 1 is being exploited and 6 were previously disclosed.

The exploited vulnerability is an elevation of privilege vulnerability affecting Win32k (CVE-2021-1732). This is a local vulnerability, which means that to exploit the vulnerability, an attacker would have to have local access to the machine (console or SSH for example) or rely on user interaction, like a user opening a malicious document.  The CVSS v3 score for this vulnerability is 7.80.

The highest CVSS score this month (9.80) was given to 4 vulnerabilities. One of those is a critical Remote Code Execution (RCE) vulnerability in Microsoft DNS Server (CVE-2021-24078). This vulnerability would allow a remote unauthenticated attacker to execute code with the service privilege on the target host. As this vulnerability does not require user interaction, this is a potentially wormable vulnerability that requires your attention if you have Microsoft DNS Server in your network – specially exposed to the Internet.

There are also two RCEs worth mentioning this month affecting Windows TCP/IP. The first (CVE-2021-24074) affects IPV4 and involve source routing. Despite source routing being blocked by default in Windows, the system will process the request and return an ICMP message denying the request. There is a workaround for this vulnerability documented in Microsoft advisory that will cause the system to drop these requests altogether without any processing. The vulnerability affecting IPV6 (CVE-2021-24094) is related to package fragmentation. Both vulnerabilities are CVSS v3 9.80.

Amongst already disclosed vulnerabilities, there is a critical RCE affecting .Net Core 2.0, 3.1 and 5.0 (CVE-2021-26701). The CVSS v3 for this vulnerability is 8.10. There are no details.

See Renato’s dashboard for a more detailed breakout: https://patchtuesdaydashboard.com.

February 2021 Security Updates

Description
CVE Disclosed Exploited Exploitability (old versions) current version Severity CVSS Base (AVG) CVSS Temporal (AVG)
.NET Core Remote Code Execution Vulnerability
%%cve:2021-24112%% No No Less Likely Less Likely Critical 8.1 7.3
%%cve:2021-26701%% Yes No Less Likely Less Likely Critical 8.1 7.1
.NET Core and Visual Studio Denial of Service Vulnerability
%%cve:2021-1721%% Yes No Less Likely Less Likely Important 6.5 5.9
.NET Framework Denial of Service Vulnerability
%%cve:2021-24111%% No No Less Likely Less Likely Important 7.5 6.5
Azure IoT CLI extension Elevation of Privilege Vulnerability
%%cve:2021-24087%% No No Less Likely Less Likely Important 7.0 6.1
Microsoft Azure Kubernetes Service Elevation of Privilege Vulnerability
%%cve:2021-24109%% No No Less Likely Less Likely Moderate 6.8 5.9
Microsoft Dataverse Information Disclosure Vulnerability
%%cve:2021-24101%% No No Less Likely Less Likely Important 6.5 5.9
Microsoft Defender Elevation of Privilege Vulnerability
%%cve:2021-24092%% No No Less Likely Less Likely Important 7.8 6.8
Microsoft Dynamics Business Central Cross-site Scripting Vulnerability
%%cve:2021-1724%% No No Less Likely Less Likely Important 6.1 5.5
Microsoft Edge for Android Information Disclosure Vulnerability
%%cve:2021-24100%% No No Less Likely Less Likely Important 5.0 4.5
Microsoft Excel Remote Code Execution Vulnerability
%%cve:2021-24067%% No No Less Likely Less Likely Important 7.8 6.8
%%cve:2021-24068%% No No Less Likely Less Likely Important 7.8 6.8
%%cve:2021-24069%% No No Less Likely Less Likely Important 7.8 6.8
%%cve:2021-24070%% No No Less Likely Less Likely Important 7.8 6.8
Microsoft Exchange Server Spoofing Vulnerability
%%cve:2021-24085%% No No Less Likely Less Likely Important 6.5 5.7
%%cve:2021-1730%% No No Less Likely Less Likely Important 5.4 4.9
Microsoft SharePoint Information Disclosure Vulnerability
%%cve:2021-24071%% No No Less Likely Less Likely Important 5.3 4.8
Microsoft SharePoint Remote Code Execution Vulnerability
%%cve:2021-24066%% No No More Likely More Likely Important 8.8 7.7
Microsoft SharePoint Server Remote Code Execution Vulnerability
%%cve:2021-24072%% No No More Likely More Likely Important 8.8 7.7
Microsoft SharePoint Spoofing Vulnerability
%%cve:2021-1726%% No No Less Likely Less Likely Important 8.0 7.0
Microsoft Teams iOS Information Disclosure Vulnerability
%%cve:2021-24114%% No No Less Likely Less Likely Important 5.7 5.0
Microsoft Windows Codecs Library Remote Code Execution Vulnerability
%%cve:2021-24081%% No No Less Likely Less Likely Critical 7.8 7.0
Microsoft Windows VMSwitch Information Disclosure Vulnerability
%%cve:2021-24076%% No No Less Likely Less Likely Important 5.5 5.0
Microsoft.PowerShell.Utility Module WDAC Security Feature Bypass Vulnerability
%%cve:2021-24082%% No No Less Likely Less Likely Important 4.3 3.8
PFX Encryption Security Feature Bypass Vulnerability
%%cve:2021-1731%% No No Less Likely Less Likely Important 5.5 4.8
Package Managers Configurations Remote Code Execution Vulnerability
%%cve:2021-24105%% No No Less Likely Less Likely Important 8.4 7.6
Skype for Business and Lync Denial of Service Vulnerability
%%cve:2021-24099%% No No Less Likely Less Likely Important 6.5 5.7
Skype for Business and Lync Spoofing Vulnerability
%%cve:2021-24073%% No No Less Likely Less Likely Important 6.5 5.9
Sysinternals PsExec Elevation of Privilege Vulnerability
%%cve:2021-1733%% Yes No Less Likely Less Likely Important 7.8 7.0
System Center Operations Manager Elevation of Privilege Vulnerability
%%cve:2021-1728%% No No Less Likely Less Likely Important 8.8 7.7
Visual Studio Code Remote Code Execution Vulnerability
%%cve:2021-1639%% No No Less Likely Less Likely Important 7.0 6.1
Visual Studio Code npm-script Extension Remote Code Execution Vulnerability
%%cve:2021-26700%% No No Less Likely Less Likely Important 7.8 6.8
Windows Address Book Remote Code Execution Vulnerability
%%cve:2021-24083%% No No Less Likely Less Likely Important 7.8 6.8
Windows Backup Engine Information Disclosure Vulnerability
%%cve:2021-24079%% No No Less Likely Less Likely Important 5.5 4.8
Windows Camera Codec Pack Remote Code Execution Vulnerability
%%cve:2021-24091%% No No Less Likely Less Likely Critical 7.8 6.8
Windows Console Driver Denial of Service Vulnerability
%%cve:2021-24098%% Yes No Less Likely Less Likely Important 5.5 4.8
Windows DNS Server Remote Code Execution Vulnerability
%%cve:2021-24078%% No No More Likely More Likely Critical 9.8 8.5
Windows DirectX Information Disclosure Vulnerability
%%cve:2021-24106%% Yes No Less Likely Less Likely Important 5.5 4.8
Windows Event Tracing Elevation of Privilege Vulnerability
%%cve:2021-24102%% No No Less Likely Less Likely Important 7.8 6.8
%%cve:2021-24103%% No No Less Likely Less Likely Important 7.8 6.8
Windows Fax Service Remote Code Execution Vulnerability
%%cve:2021-1722%% No No Less Likely Less Likely Critical 8.1 7.1
%%cve:2021-24077%% No No Less Likely Less Likely Critical 9.8 8.5
Windows Graphics Component Remote Code Execution Vulnerability
%%cve:2021-24093%% No No Less Likely Less Likely Critical 8.8 7.7
Windows Installer Elevation of Privilege Vulnerability
%%cve:2021-1727%% Yes No More Likely More Likely Important 7.8 7.0
Windows Kernel Elevation of Privilege Vulnerability
%%cve:2021-24096%% No No Less Likely Less Likely Important 7.8 6.8
Windows Local Spooler Remote Code Execution Vulnerability
%%cve:2021-24088%% No No Less Likely Less Likely Critical 8.8 7.7
Windows Mobile Device Management Information Disclosure Vulnerability
%%cve:2021-24084%% No No Less Likely Less Likely Important 5.5 4.8
Windows Network File System Denial of Service Vulnerability
%%cve:2021-24075%% No No Less Likely Less Likely Important 6.8 5.9
Windows PKU2U Elevation of Privilege Vulnerability
%%cve:2021-25195%% No No Less Likely Less Likely Important 7.8 6.8
Windows Remote Procedure Call Information Disclosure Vulnerability
%%cve:2021-1734%% No No Less Likely Less Likely Important 7.5 6.5
Windows TCP/IP Denial of Service Vulnerability
%%cve:2021-24086%% No No More Likely More Likely Important 7.5 6.5
Windows TCP/IP Remote Code Execution Vulnerability
%%cve:2021-24074%% No No More Likely More Likely Critical 9.8 8.5
%%cve:2021-24094%% No No More Likely More Likely Critical 9.8 8.5
Windows Trust Verification API Denial of Service Vulnerability
%%cve:2021-24080%% No No Less Likely Less Likely Moderate 6.5 5.7
Windows Win32k Elevation of Privilege Vulnerability
%%cve:2021-1732%% No Yes Detected Detected Important 7.8 7.2
%%cve:2021-1698%% No No More Likely More Likely Important 7.8 6.8


Renato Marinho
Morphus Labs| LinkedIn|Twitter

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License. Read More

The post Microsoft February 2021 Patch Tuesday, (Tue, Feb 9th) appeared first on Malware Devil.



https://malwaredevil.com/2021/02/09/microsoft-february-2021-patch-tuesday-tue-feb-9th/?utm_source=rss&utm_medium=rss&utm_campaign=microsoft-february-2021-patch-tuesday-tue-feb-9th

An Inside Look at the Collegiate Penetration Testing Competition

Curious about the Collegiate Penetration Testing Competition (CPTC)? In this podcast, Heather welcomes Tom Kopchak, Josh Neubecker, and Meredith Kasper to chat about their experiences working to bring the competition to life. Learn more about CPTC from Tom’s blog posts and by visiting the CPTC website and Twitter profile: CPTC Review Part 1: The […]

The post An Inside Look at the Collegiate Penetration Testing Competition appeared first on Hurricane Labs.

The post An Inside Look at the Collegiate Penetration Testing Competition appeared first on Security Boulevard.

Read More

The post An Inside Look at the Collegiate Penetration Testing Competition appeared first on Malware Devil.



https://malwaredevil.com/2021/02/09/an-inside-look-at-the-collegiate-penetration-testing-competition/?utm_source=rss&utm_medium=rss&utm_campaign=an-inside-look-at-the-collegiate-penetration-testing-competition

Attackers Exploit Critical Adobe Flaw to Target Windows Users

A critical vulnerability in Adobe Reader has been exploited in “limited attacks.”
Read More

The post Attackers Exploit Critical Adobe Flaw to Target Windows Users appeared first on Malware Devil.



https://malwaredevil.com/2021/02/09/attackers-exploit-critical-adobe-flaw-to-target-windows-users/?utm_source=rss&utm_medium=rss&utm_campaign=attackers-exploit-critical-adobe-flaw-to-target-windows-users

Security & Compliance Legal Highlights – SCW #61

Our co-host, Priya Chaudry will enlighten us on several other topics of interest to our community. There might be a mention of Solarwinds, Southwest Airlines, HIQ Labs, and more.

Visit https://www.securityweekly.com/scw for all the latest episodes!

Show Notes: https://securityweekly.com/scw61

The post Security & Compliance Legal Highlights – SCW #61 appeared first on Malware Devil.



https://malwaredevil.com/2021/02/09/security-compliance-legal-highlights-scw-61/?utm_source=rss&utm_medium=rss&utm_campaign=security-compliance-legal-highlights-scw-61

SentinelOne Buys Data Analytics Company Scalyr

Register for Dark Reading Newsletters

Subscribe to Newsletters

White Papers

Video

Cartoon

Current Issue

image2021 Top Enterprise IT TrendsWe’ve identified the key trends that are poised to impact the IT landscape in 2021. Find out why they’re important and how they will affect you today!
image

Flash Poll

Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today’s Enterprises
COVID-19 has created a new IT paradigm in the enterprise — and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
image

Twitter Feed

Dark Reading - Bug Report

Bug Report

Enterprise Vulnerabilities
From DHS/US-CERT’s National Vulnerability Database
CVE-2020-26191
PUBLISHED: 2021-02-09

Dell EMC PowerScale OneFS versions 8.1.0 – 9.1.0 contain a privilege escalation vulnerability. A user with ISI_PRIV_JOB_ENGINE may use the PermissionRepair job to grant themselves the highest level of RBAC privileges thus being able to read arbitrary data, tamper with system software or deny service…

CVE-2020-26192
PUBLISHED: 2021-02-09

Dell EMC PowerScale OneFS versions 8.2.0 – 9.1.0 contain a privilege escalation vulnerability. A non-admin user with either ISI_PRIV_LOGIN_CONSOLE or ISI_PRIV_LOGIN_SSH may potentially exploit this vulnerability to read arbitrary data, tamper with system software or deny service to users. Note: no n…

CVE-2020-26193
PUBLISHED: 2021-02-09

Dell EMC PowerScale OneFS versions 8.1.0 – 9.1.0 contain an improper input validation vulnerability. A user with the ISI_PRIV_CLUSTER privilege may exploit this vulnerability, leading to the execution of arbitrary OS commands on the application’s underlying OS, with the privileges of the vulnerable …

CVE-2020-26194
PUBLISHED: 2021-02-09

Dell EMC PowerScale OneFS versions 8.1.2 and 8.2.2 contain an Incorrect Permission Assignment for a Critical Resource vulnerability. This may allow a non-admin user with either ISI_PRIV_LOGIN_CONSOLE or ISI_PRIV_LOGIN_SSH privileges to exploit the vulnerability, leading to compromised cryptographic …

CVE-2020-26195
PUBLISHED: 2021-02-09

Dell EMC PowerScale OneFS versions 8.1.2 – 9.1.0 contain an issue where the OneFS SMB directory auto-create may erroneously create a directory for a user. A remote unauthenticated attacker may take advantage of this issue to slow down the system.

The post SentinelOne Buys Data Analytics Company Scalyr appeared first on Malware Devil.



https://malwaredevil.com/2021/02/09/sentinelone-buys-data-analytics-company-scalyr-2/?utm_source=rss&utm_medium=rss&utm_campaign=sentinelone-buys-data-analytics-company-scalyr-2

Barbary Pirates and Russian Cybercrime

In 1801, the United States had a small Navy. Thomas Jefferson deployed almost half that Navy—three frigates and a schooner—to the Barbary C...