You are here

Cybersecurity

Microsoft Releases July 2019 Security Updates

Microsoft has released its monthly update to address vulnerabilities in its software. For this month, Microsoft has released security updates for Microsoft Windows, Internet Explorer, Microsoft Edge, Microsoft Office and Microsoft Office Services and Web Apps, Azure DevOps, Open Source Software, .NET Framework, Azure, SQL Server, ASP.NET, Visual Studio, and Microsoft Exchange Server. Read the update at Microsoft.

Compliance Does Not Mean Secure – Using ICS Threat Intelligence to Go Beyond the Basics

Meeting compliance requirements does provide a basic level of security, but for a comprehensive ICS risk management strategy, it is prudent to apply ICS-specific threat intelligence to go beyond the basics. ICS cybersecurity firm Dragos, Inc. stresses as the number of adversaries and ICS attacks increase, companies will greatly benefit from using real-life scenarios such as the CRASHOVERRIDE and TRISIS incidents to implement better defenses.

Schneider Electric Zelio Soft 2 (ICSA-19-190-03)

The NCCIC has published an advisory on user after free vulnerability in Schneider Electric Zelio Soft 2. Zelio Soft 2 versions 5.2 and prior are affected. Successful exploitation of this vulnerability could allow remote code execution through the opening of a specially crafted project file. Schneider Electric reports that version 5.3 of the affected software mitigates the reported vulnerability. The NCCIC also advises of a series of measures for mitigating this vulnerability.

Rockwell Automation PanelView 5510 (ICSA-19-190-02) – Product Used in the Water and Wastewater Sector

The NCCIC has published an advisory on an improper access control vulnerability in Rockwell Automation PanelView 5510. All versions manufactured before March 13, 2019, that have never been updated to v4.003, v5.002, or later, are affected. Successful exploitation of this vulnerability could allow a remote unauthenticated user to gain root privileges on the device. Rockwell Automation encourages users of the affected products to update to an available revision that addresses the vulnerability. The NCCIC also advises of a series of measures for mitigating this vulnerability.

Emerson DeltaV Distributed Control System (ICSA-19-190-01) – Product Used in the Energy Sector

The NCCIC has published an advisory on a use of hard-coded credentials vulnerability in Emerson DeltaV Distributed Control System. Versions 11.3.x and 12.3.x are affected. Successful exploitation of this vulnerability could allow an attacker to gain administrative access to DeltaV Smart Switches. Emerson recommends users patch affected products. The NCCIC also advises of a series of measures for mitigating this vulnerability. Read the advisory at CISA.

U.S. Cyber Command Issues Alert about Hackers Exploiting Outlook Vulnerability

Last week, U.S. Cyber Command issued an alert via Twitter about threat actors abusing an Outlook vulnerability to plant malware on government networks. The vulnerability is CVE-2017-11774, a security bug that Microsoft patched in Outlook in October 2017. U.S. Cyber Command recommends immediate patching, if not done already.

The True Cost of Paying Ransoms – Pay a Lot Now, or Pay a Lot More Later

Paying ransom demands in the hopes of regaining access to critical data is controversial, to say the least. Succumbing to extortion goes against conventional advice and wisdom against incentivizing the cybercrime business model, but sometimes organizations feel they have no other choice and paying seems like the best option at the time. However, paying a ransom is not straightforward.

Quest KACE Systems Management Appliance (ICSA-19-183-02)

The NCCIC has published an advisory on an improper input validation vulnerability in KACE Systems Management Appliance. All versions of 8.0.x, 8.1.x, and 9.0.x are affected. Successful exploitation of this vulnerability could allow an administrative user unintentional access to the underlying operating system of the device. Quest recommends affected users upgrade to Version 9.1 or newer. The NCCIC also advises of a series of measures for mitigating the vulnerability. Read the advisory at CISA.

Pages

Subscribe to Cybersecurity