Security News > 2020 > January > Week in review: Windows crypto flaw, API security risks, exploits for Citrix security hole abound
Exploits for Citrix ADC and Gateway flaw abound, attacks are ongoingWith several exploits targeting CVE-2019-19781 having been released over the weekend and the number of vulnerable endpoints still being over 25,000, attackers are having a field day.
January 2020 Patch Tuesday: Microsoft nukes Windows crypto flaw flagged by the NSAAs forecasted, January 2020 Patch Tuesday releases by Microsoft and Adobe are pretty light: the "Star of the show" is CVE-2020-0601, a Windows flaw flagged by the NSA that could allow attackers to successfully spoof code-signing certificates and use them to sign malicious code or intercept and modify encrypted communications.
Cyber attackers turn to business disruption as primary attack objectiveOver the course of 2019, 36% of the incidents that CrowdStrike investigated were most often caused by ransomware, destructive malware or denial of service attacks, revealing that business disruption was often the main attack objective of cybercriminals.
Companies increasingly reporting attacks attributed to foreign governmentsMore than one in four security managers attribute attacks against their organization to cyberwarfare or nation-state activity, according to Radware.
2020 forecast: Attackers will target non-traditional systemsHere are four predictions of where attackers are headed in 2020 - areas that your technology security team should focus their efforts on.
News URL
http://feedproxy.google.com/~r/HelpNetSecurity/~3/wNAj6nCX2Ec/
Related news
- Hackers Exploit Misconfigured YARN, Docker, Confluence, Redis Servers for Crypto Mining (source)
- Hackers exploit Windows SmartScreen flaw to drop DarkGate malware (source)
- Crypto wallet providers urged to rethink security as criminals drain them of millions (source)
- 95% of companies face API security problems (source)
- Microsoft confirms memory leak in March Windows Server security update (source)
- GoFetch security exploit can't be disabled on M1 and M2 Apple chips (source)
- Ex-Security Engineer Jailed 3 Years for $12.3 Million Crypto Exchange Thefts (source)
- OpenAI's GPT-4 can exploit real vulnerabilities by reading security advisories (source)
- Hackers Exploit OpenMetadata Flaws to Mine Crypto on Kubernetes (source)
- Crooks exploit OpenMetadata holes to mine crypto – and leave a sob story for victims (source)
Related Vulnerability
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2020-01-14 | CVE-2020-0601 | Improper Certificate Validation vulnerability in multiple products A spoofing vulnerability exists in the way Windows CryptoAPI (Crypt32.dll) validates Elliptic Curve Cryptography (ECC) certificates.An attacker could exploit the vulnerability by using a spoofed code-signing certificate to sign a malicious executable, making it appear the file was from a trusted, legitimate source, aka 'Windows CryptoAPI Spoofing Vulnerability'. | 5.8 |
2019-12-27 | CVE-2019-19781 | Path Traversal vulnerability in Citrix products An issue was discovered in Citrix Application Delivery Controller (ADC) and Gateway 10.5, 11.1, 12.0, 12.1, and 13.0. | 9.8 |