You are here

Cybersecurity

Private Information Remains on Resold and Donated Technology

A researcher from cybersecurity company Rapid7 has published the results of six months of research into whether businesses that sell refurbished computers or accept donated items follow through on their promises to wipe them of data. With a total of $600, he bought 41 computers, 27 removable media devices (e.g., flash drives and memory cards), 11 hard disks, and 6 cell phones. While he could not get any extract any data from the cell phones (due mostly to their age), only two out of the 85 other devices had been erased properly.

Eighty Percent of the Top Exploited Vulnerabilities in 2018 Targeted Microsoft

A just released report from Recorded Future observes that eight out of ten vulnerabilities exploited via phishing attacks, exploit kits, or remote access trojans targeted Microsoft products. This was the second year in a row in which Microsoft was targeted the most. In 2017, seven of the top ten vulnerabilities affected Microsoft. The top exploited vulnerability on Recorded Future’s list, CVE-2018-8174, a Microsoft Internet Explorer vulnerability nicknamed “Double Kill,” was included in four exploit kits (RIG, Fallout, KaiXin, and Magnitude).

Microsoft Ending Support for Windows 7

All software products have a life-cycle. After January 14, 2020, Microsoft will no longer provide security updates or support for PCs running the Windows 7 operating system. After this date, this product will no longer receive free technical support for any issues, software updates, and security updates or fixes. Computers running the Windows 7 operating system will continue to work even after support ends. However, using unsupported software may increase the risks from viruses and other security threats.

Columbia Weather Systems MicroServer (ICSA-19-078-02)

The NCCIC has published an advisory on cross-site scripting, path traversal, improper authentication, improper input validation, and code injection vulnerabilities in Columbia Weather Systems MicroServer. Weather MicroServer firmware Version MS_2.6.9900 and prior are affected. Successful exploitation of these vulnerabilities may allow disclosure of data, cause a denial-of-service condition, and allow remote code execution. Columbia Weather Systems has released a firmware update, Version: MS_2.7.9973, that addresses all of the vulnerabilities.

AVEVA InduSoft Web Studio and InTouch Edge HMI (ICSA-19-078-01) – Product Used in the Water and Wastewater and Energy Sectors

The NCCIC has published an advisory on an uncontrolled search path element in AVEVA InduSoft Web Studio and InTouch Edge HMI. InduSoft Web Studio versions prior to v8.1 SP3 and InTouch Edge HMI versions prior to 2017 Update 3 are affected. Successful exploitation of this vulnerability could allow execution of unauthorized code or commands AVEVA recommends that users upgrade to the latest versions. The NCCIC also recommends a series of mitigating measures for this vulnerability.

Malvertising – It’s Back, Again

Malvertising – malicious online ads often requiring zero user interaction to infect unsuspecting website visitors. Cybersecurity firm Avast discusses how the current scourge of malvertising appears to be more dynamic, stealthy, and persistent than historically observed. Malicious ads are often invisible and embedded into well-known websites through online advertising networks.

Don't Take the Bait – Recognize the Most Common Phishing Subjects

Phishers are not a very creative lot. They do not have to be. Malicious actors have been using the same phishing tactics because the same tactics are still successful, even after all these years. After analyzing 360,000 phishing emails over three months, cybersecurity firm Barracuda Networks identified the most common subject lines used in targeting businesses. These subjects highlight how cyber criminals continue to use social engineering to coerce us through a false sense of urgency and trust to succumb to their requests.

Pages

Subscribe to Cybersecurity