Search results for: zero trust

Adobe patches latest Flash Player zero-day

Adobe has released Flash Player 16.0.0.305, a new version that fixes the latest zero-day flaw (CVE-2015-0313) that is currently exploited in mass malvertising campaigns. An exploit for the flaw has been recently added to the Hanjuan exploit kit, and malicious ads shown on a number of high-profile sites redirect users to sites hosting it. While the existence of the flaw was made public only this week, cyber crooks exploited it as far back as December … More

DMARC: The time is right for email authentication

It is a rare thing to be given the opportunity to right a historic wrong. The root of essentially every Internet security issue in history is the same—architects try to build fundamentally sound concepts, engineers try to strip out complexity, and developers just try to get their code to compile. Security is and always will be a secondary concern to primary functionality. This is not an editorial about how security should be “baked in”. There … More

Actions to strengthen your defense, minimize damage

IT professionals should use the nearly epic scale of the Sony cyber attacks to spur their companies into action versus panicking about potential risks. “The FBI is right when they said that less than 10 percent of companies could survive an attack like the one on Sony,” WatchGuard’s Global Director of Security Strategy, Corey Nachreiner. “And, unfortunately, it’s not a question of if, but when for these kinds of attacks.” Five actions to strengthen your … More

What to expect in the unpredictable world of IT security?

2014 has been particularly busy for IT security professionals. Many of the threats that we predicted at the start of the year duly emerged, while other significant issues caught the entire sector by surprise. We anticipated, and saw, increases in social engineering exploits, which led to major data breaches at several well-known organizations. Targeted malware campaigns also stepped up, with RAM scraper and ransomware attacks making headlines. Mobile security problems also continued to grow, as … More

Whitepaper: Zero Trust approach to network security

NOTE: This whitepaper is no longer available, thanks for your interest. Zero Trust is an alternative security model that addresses the shortcomings of failing perimeter-centric strategies by removing the assumption of trust. With Zero Trust there is no default trust for any entity—including users, devices, applications, and packets—regardless of what it is and its location on or relative to the corporate network. This paper discusses the need for a Zero Trust approach to network security, … More

Things that freak out IT security pros

Ghosts and zombies aren’t the only things coming back from the dead this Halloween. Below is a list of the top security threats that organisations should be most aware of, because these are the ones that always come back from the dead-¦ Fred Touchette, senior security analyst at AppRiver: Ah, Halloween. A time when people dress up in creepy costumes and enjoy a marathon of classic horror flicks. And while some people may be spooked … More

Attackers bypass Sandworm patch with new 0-day

The Sandworm vulnerability has been patched, but unfortunately attackers have discovered a way to bypass the patch and continue with their targeted attacks. “As with Sandworm, these attacks once again used infected PowerPoint documents, sent as email attachments, as the means of infection,” Symantec researchers warn. “The attacks are being used to deliver at least two different payloads to victims, Trojan.Taidoor and Backdoor.Darkmoon (also known as Poison Ivy).” The former can be linked to a … More

Windows 0-day exploited in ongoing attacks, temporary workarounds offered

Microsoft is warning users about a new Windows zero-day vulnerability that is being actively exploited in the wild and is primarily a risk to users on servers and workstations that open documents with embedded OLE objects. The vulnerability is currently being exploited via PowerPoint files. These specially crafted files contain a malicious OLE (Object Linking and Embedding) object. “Object Linking & Embedding (OLE) is legitimately used to display parts of a file within another file, … More

Microsoft patches two more 0-days actively used by attackers

With this month’s Patch Tuesday, Microsoft has provided patches for several critical vulnerabilities that allow remote code execution, some of which have been or are actively exploited in the wild. We have already written about the SandWorm (CVE-2014-4114), which was used by the eponymous cyber espionage group for targeting NATO, the EU, Ukrainian and Polish government organizations, and European companies in the telecommunications and energy sectors. The vulnerability could allow remote code execution if a … More

Free Android app identifies and uninstalls spyware

At Black Hat, SnoopWall announced the release of Privacy App for Android platform mobile devices. Privacy App is based upon the company’s counterveillance technology. It digs deep into the privacy risks of Android devices so consumers will know which apps are spying on them. It shows users of smartphones the dangers inherent in simply trusting their anti-virus software to protect them in online banking and other high-risk transactions. After 14 months of developing the technology … More

Week in review: Malicious USB device firmware, insecure IoT devices, and using Hollywood to improve your security program

Here’s an overview of some of last week’s most interesting news, reviews, articles and interviews: What influences corporate security strategies? Sixty eight percent of businesses stated that the NSA breach by Edward Snowden and the number of PoS system breaches in the past year were the most impactful in terms of changing security strategies to protect against the latest threats. I2P patched against de-anonymizing 0-day, Tails integration still to follow The improvement was made in … More

AV engines are riddled with exploitable bugs

A security researcher has found a great number of exploitable vulnerabilities in popular security solutions and the AV engines they use, proving not only that AV engines are as vulnerable to zero day attacks as the applications they try to protect, but can also lower the operating system’s exploit mitigations. “Installing an application in your computer makes you a bit more vulnerable,” says Joxean Koret, a researcher with Singapore-based Coseinc, and that is equally true … More