Malware Devil

Thursday, March 11, 2021

Molson Coors Beer Operations Halted by Hack

Register for Dark Reading Newsletters

Subscribe to Newsletters

White Papers

Video

Cartoon

Current Issue

image2021 Top Enterprise IT TrendsWe’ve identified the key trends that are poised to impact the IT landscape in 2021. Find out why they’re important and how they will affect you today!
image

Flash Poll

How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
image

Twitter Feed

Dark Reading - Bug Report

Bug Report

Enterprise Vulnerabilities
From DHS/US-CERT’s National Vulnerability Database
CVE-2020-29045
PUBLISHED: 2021-03-11

The food-and-drink-menu plugin through 2.2.0 for WordPress allows remote attackers to execute arbitrary code because of an unserialize operation on the fdm_cart cookie in load_cart_from_cookie in includes/class-cart-manager.php.

CVE-2020-14988
PUBLISHED: 2021-03-11

An issue was discovered in Bloomreach Experience Manager (brXM) 4.1.0 through 14.2.2. It allows XSS in the login page via the loginmessage parameter, the text editor via the src attribute of HTML elements, the translations menu via the foldername parameter, the author page via the link URL, or the u…

CVE-2020-14989
PUBLISHED: 2021-03-11

An issue was discovered in Bloomreach Experience Manager (brXM) 4.1.0 through 14.2.2. It allows CSRF if the attacker uses GET where POST was intended.

CVE-2020-14987
PUBLISHED: 2021-03-11

An issue was discovered in Bloomreach Experience Manager (brXM) 4.1.0 through 14.2.2. It allows remote attackers to execute arbitrary code because there is a mishandling of the capability for administrators to write and run Groovy scripts within the updater editor. An attacker must use an AST transf…

CVE-2021-27679
PUBLISHED: 2021-03-11

Cross-site scripting (XSS) vulnerability in Navigation in Batflat CMS 1.3.6 allows remote attackers to inject arbitrary web script or HTML via the field name.

The post Molson Coors Beer Operations Halted by Hack appeared first on Malware Devil.



https://malwaredevil.com/2021/03/11/molson-coors-beer-operations-halted-by-hack/?utm_source=rss&utm_medium=rss&utm_campaign=molson-coors-beer-operations-halted-by-hack

Does XDR Mark the Spot? 6 Questions to Ask

Extended detection and response technology goes well beyond endpoint management to provide visibility into networks, servers, cloud, and applications. Could it be the answer to your security challenges?

The post Does XDR Mark the Spot? 6 Questions to Ask appeared first on Malware Devil.



https://malwaredevil.com/2021/03/11/does-xdr-mark-the-spot-6-questions-to-ask-2/?utm_source=rss&utm_medium=rss&utm_campaign=does-xdr-mark-the-spot-6-questions-to-ask-2

Does XDR Mark the Spot? 6 Questions to Ask

Extended detection and response technology goes well beyond endpoint management to provide visibility into networks, servers, cloud, and applications. Could it be the answer to your security challenges?
(Image: Gorodenkoff via Adobe Stock)

(Image: Gorodenkoff via Adobe Stock)

Extended detection and response – aka XDR – is one of those “buzzy” solution terms that seems to be everywhere in security lately. But despite the hype, there is still a lot of misunderstanding around the technology.

XDR promises to go beyond endpoint monitoring and detection to extend visibility into networks, servers, cloud, and applications. XDR analyzes data from all of these locations, takes action on threats, and sends information back to analysts.

Indeed, threat detection and response (TDR) is still a major pain point for security. According to research firm ESG, 83% of organizations will increase spending on threat detection and response this year.

“Organizations have been spending regularly on threat detection and response but still can’t detect sophisticated threats. And it takes too long to detect and respond to even common threats,” says Jon Oltsik, a senior principal analyst at ESG. “By aggregating threat detection and response across multiple controls, XDR promises to improve TDR efficacy and streamline operations. This value proposition is too good to ignore, so XDR is getting lots of attention.”

Is XDR right for your organization? Here are some common questions to ask as you think it through.

Joan Goodchild is a veteran journalist, editor, and writer who has been covering security for more than a decade. She has written for several publications and previously served as editor-in-chief for CSO Online. View Full Bio

Previous

1 of 7

Next

Recommended Reading:

Comment |

Email This |

Print |

RSS

More Insights

The post Does XDR Mark the Spot? 6 Questions to Ask appeared first on Malware Devil.



https://malwaredevil.com/2021/03/11/does-xdr-mark-the-spot-6-questions-to-ask/?utm_source=rss&utm_medium=rss&utm_campaign=does-xdr-mark-the-spot-6-questions-to-ask

Is XDR Right for Your Organization? 6 Questions to Ask

Extended detection and response technology goes well beyond endpoint management to provide visibility into networks, servers, cloud, and applications. Could it be the answer to your security challenges?
(Image: Gorodenkoff via Adobe Stock)

(Image: Gorodenkoff via Adobe Stock)

Extended detection and response – aka XDR – is one of those “buzzy” solution terms that seems to be everywhere in security lately. But despite the hype, there is still a lot of misunderstanding around the technology.

XDR promises to go beyond endpoint monitoring and detection to extend visibility into networks, servers, cloud, and applications. XDR analyzes data from all of these locations, takes action on threats, and sends information back to analysts.

Indeed, threat detection and response (TDR) is still a major pain point for security. According to research firm ESG, 83% of organizations will increase spending on threat detection and response this year.

“Organizations have been spending regularly on threat detection and response but still can’t detect sophisticated threats. And it takes too long to detect and respond to even common threats,” says Jon Oltsik, a senior principal analyst at ESG. “By aggregating threat detection and response across multiple controls, XDR promises to improve TDR efficacy and streamline operations. This value proposition is too good to ignore, so XDR is getting lots of attention.”

Is XDR right for your organization? Here are some common questions to ask as you think it through.

Joan Goodchild is a veteran journalist, editor, and writer who has been covering security for more than a decade. She has written for several publications and previously served as editor-in-chief for CSO Online. View Full Bio

Previous

1 of 7

Next

Recommended Reading:

Comment |

Email This |

Print |

RSS

More Insights

The post Is XDR Right for Your Organization? 6 Questions to Ask appeared first on Malware Devil.



https://malwaredevil.com/2021/03/11/is-xdr-right-for-your-organization-6-questions-to-ask/?utm_source=rss&utm_medium=rss&utm_campaign=is-xdr-right-for-your-organization-6-questions-to-ask

Ransomware Attack Strikes Spain’s Employment Agency

Reports say that the agency in charge of managing Spain’s unemployment benefits has been hit by the Ryuk ransomware.
Read More

The post Ransomware Attack Strikes Spain’s Employment Agency appeared first on Malware Devil.



https://malwaredevil.com/2021/03/11/ransomware-attack-strikes-spains-employment-agency/?utm_source=rss&utm_medium=rss&utm_campaign=ransomware-attack-strikes-spains-employment-agency

TrickBot Takes Over, After Cops Kneecap Emotet

TrickBot rises to top threat in February, overtaking Emotet in Check Point’s new index.
Read More

The post TrickBot Takes Over, After Cops Kneecap Emotet appeared first on Malware Devil.



https://malwaredevil.com/2021/03/11/trickbot-takes-over-after-cops-kneecap-emotet/?utm_source=rss&utm_medium=rss&utm_campaign=trickbot-takes-over-after-cops-kneecap-emotet

Microsoft Exchange Server Exploit Code Posted to GitHub

Register for Dark Reading Newsletters

Subscribe to Newsletters

White Papers

Video

Cartoon

Current Issue

image2021 Top Enterprise IT TrendsWe’ve identified the key trends that are poised to impact the IT landscape in 2021. Find out why they’re important and how they will affect you today!
image

Flash Poll

How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
image

Twitter Feed

Dark Reading - Bug Report

Bug Report

Enterprise Vulnerabilities
From DHS/US-CERT’s National Vulnerability Database
CVE-2020-29045
PUBLISHED: 2021-03-11

The food-and-drink-menu plugin through 2.2.0 for WordPress allows remote attackers to execute arbitrary code because of an unserialize operation on the fdm_cart cookie in load_cart_from_cookie in includes/class-cart-manager.php.

CVE-2020-14988
PUBLISHED: 2021-03-11

An issue was discovered in Bloomreach Experience Manager (brXM) 4.1.0 through 14.2.2. It allows XSS in the login page via the loginmessage parameter, the text editor via the src attribute of HTML elements, the translations menu via the foldername parameter, the author page via the link URL, or the u…

CVE-2020-14989
PUBLISHED: 2021-03-11

An issue was discovered in Bloomreach Experience Manager (brXM) 4.1.0 through 14.2.2. It allows CSRF if the attacker uses GET where POST was intended.

CVE-2020-14987
PUBLISHED: 2021-03-11

An issue was discovered in Bloomreach Experience Manager (brXM) 4.1.0 through 14.2.2. It allows remote attackers to execute arbitrary code because there is a mishandling of the capability for administrators to write and run Groovy scripts within the updater editor. An attacker must use an AST transf…

CVE-2021-27679
PUBLISHED: 2021-03-11

Cross-site scripting (XSS) vulnerability in Navigation in Batflat CMS 1.3.6 allows remote attackers to inject arbitrary web script or HTML via the field name.

The post Microsoft Exchange Server Exploit Code Posted to GitHub appeared first on Malware Devil.



https://malwaredevil.com/2021/03/11/microsoft-exchange-server-exploit-code-posted-to-github-2/?utm_source=rss&utm_medium=rss&utm_campaign=microsoft-exchange-server-exploit-code-posted-to-github-2

2021-03-11 – IcedID (Bokbot) from Excel spreadsheet macro

Read More

The post 2021-03-11 – IcedID (Bokbot) from Excel spreadsheet macro appeared first on Malware Devil.



https://malwaredevil.com/2021/03/11/2021-03-11-icedid-bokbot-from-excel-spreadsheet-macro-2/?utm_source=rss&utm_medium=rss&utm_campaign=2021-03-11-icedid-bokbot-from-excel-spreadsheet-macro-2

Microsoft Exchange Server Exploit Code Posted to GitHub

The proof-of-concept tool, which contained exploits for two Exchange Server vulnerabilities, was quickly removed from GitHub.

The post Microsoft Exchange Server Exploit Code Posted to GitHub appeared first on Malware Devil.



https://malwaredevil.com/2021/03/11/microsoft-exchange-server-exploit-code-posted-to-github/?utm_source=rss&utm_medium=rss&utm_campaign=microsoft-exchange-server-exploit-code-posted-to-github

NanoCore RAT Scurries Past Email Defenses with .ZIPX Tactic

A spam campaign hides a malicious executable behind file archive extensions.
Read More

The post NanoCore RAT Scurries Past Email Defenses with .ZIPX Tactic appeared first on Malware Devil.



https://malwaredevil.com/2021/03/11/nanocore-rat-scurries-past-email-defenses-with-zipx-tactic/?utm_source=rss&utm_medium=rss&utm_campaign=nanocore-rat-scurries-past-email-defenses-with-zipx-tactic

🔴 LIVE: Paul’s Security Weekly #686

This week, first we welcome David Hétu, Chief Research Officer at Flare Systems, then we jump right into this week’s Security News, and we close out the show with a special pre-recorded segment featuring Assaf Dahan, Head of Threat Research at Cybereason!

→Full Show Notes: https://securityweekly.com/psw686
→Join the Security Weekly Discord Server: https://discord.gg/pqSwWm4
→Visit our website: https://www.securityweekly.com
→Follow us on Twitter: https://www.twitter.com/securityweekly

The post 🔴 LIVE: Paul’s Security Weekly #686 appeared first on Malware Devil.



https://malwaredevil.com/2021/03/11/%f0%9f%94%b4-live-pauls-security-weekly-686/?utm_source=rss&utm_medium=rss&utm_campaign=%25f0%259f%2594%25b4-live-pauls-security-weekly-686

Barbary Pirates and Russian Cybercrime

In 1801, the United States had a small Navy. Thomas Jefferson deployed almost half that Navy—three frigates and a schooner—to the Barbary C...