Microsoft Releases June 2018 Security Updates
Microsoft has released its monthly update to address vulnerabilities in its software.
Microsoft has released its monthly update to address vulnerabilities in its software.
On June 14, 2018, Google will roll-out a new G Suite sign-in page and wants users to be aware of the upcoming subtle changes to avoid confusion; G Suite users should familiarize themselves with the new look. There is no doubt Google’s announcement is a positive step to alleviate concern from users thinking they have landed on a phishing page.
As the city of Atlanta continues to recover from the epic ransomware incident that occurred in March, security researchers have discovered a rash of active Wi-Fi phishing attacks around Atlanta City Hall and the Georgia State Capital Building. As the prolonged aftermath of the SamSam ransomware attack plagues Atlanta, malicious actors seek ways to gain unauthorized access to the city's computer systems through phishing for valuable user credentials.
June 7, 2018
The NCCIC has updated this advisory with additional details on mitigating measures. NCCIC/ICS-CERT.
May 17, 2018
The NCCIC has released an advisory on an unquoted search path or element vulnerability in Rockwell RSLinx Classic and FactoryTalk Linx Gateway. Versions 3.90.01 and prior of the former product and versions 3.90.00 and prior of the latter product are affected. Successful exploitation of this vulnerability could allow an authorized, but non-privileged local user to execute arbitrary code and allow a threat actor to escalate user privileges on the affected workstation. Rockwell Automation recommends all users update to new versions of RSLinx Classic and FactoryTalk Linx Gateway.
Recent public research indicates the group responsible for the CRASHOVERRIDE (a.k.a., Industroyer) malware used to disrupt the Ukrainian electric grid in 2016 is expanding its target set, reportedly to include organizations in the water and wastewater sector. Additionally, the group is no longer solely geographically focused on targets within the Ukraine.
The original "Cyber Kill Chain" developed by Lockheed Martin, identifies seven steps adversaries perform to compromise networks and accomplish an objective. TechRepublic posted an article offering basic end-user awareness or endpoint-focused defense actions at each step of the Cyber Kill Chain to stop malicious actors from achieving their ultimate goal.
The NCCIC has released an advisory on out-of-bounds read, heap-based buffer overflow, and stack-based buffer overflow vulnerabilities in Delta Industrial Automation DOPSoft. Versions 4.00.04 and prior are affected. Successful exploitation of these vulnerabilities could allow a remote attacker to read sensitive information, execute arbitrary code, and/or crash the application. Delta Electronics recommends affected users update to the latest version.
The NCCIC has updated this advisory with additional details on mitigation measures. This advisory was initially published on May 10, 2018 and last updated on May 24. NCCIC/ICS-CERT.
The NCCIC has released an advisory on improper authentication, improper restriction of XML external entity reference, and relative path traversal vulnerabilities in GE MDS PulseNET and MDS PulseNET Enterprise. Versions 3.2.1 and prior of both GE MDS PulseNet and MDS PulseNET Enterprise are affected. Exploitation of these vulnerabilities may allow elevation of privilege and exfiltration of information on the host platform. GE has modified the product architecture and software of PulseNET. The latest version mitigates these specific vulnerabilities.