Security News > 2020 > March > 2020 cybersecurity risks: Insecure security tools, supply chains, abandonware
During 2019 a SafeBreach research team discovered major vulnerabilities in widely used security products that were written and tested by reputable cybersecurity companies.
Product What can happen Underlying flaws Trend Micro Maximum Security 2019 and 2020 DLL Search-Order Hijacking Signed Execution Whitelisting Bypass Uncontrolled search path, no digital certificate validation against the binary.
Kaspersky Internet Security Whitelisting Bypass Defense Evasion Uncontrolled search path, no digital certificate validation Comodo Internet Security DLL Preloading No digital certificate validation, AV has no self-protection on its folders McAfee - All Editions Defense Evasion Signed Execution Whitelisting Bypass No digital signature validation Avira Antivirus 2019 Defense Evasion Signed Execution Whitelisting Bypass No digital certificate validation, no self-protection for the Launcher folder.
Identifying risks of potential UEPs should be a collective goal of the security community in 2020.
Some technology providers make it very easy to find the right people by publicly posting security policies and providing dedicated security emails.
News URL
http://feedproxy.google.com/~r/HelpNetSecurity/~3/7y6mdPlFavg/
Related news
- The ROI of Security Investments: How Cybersecurity Leaders Prove It (source)
- THN Recap: Top Cybersecurity Threats, Tools, and Practices (Nov 04 - Nov 10) (source)
- THN Recap: Top Cybersecurity Threats, Tools, and Practices (Nov 11 - Nov 17) (source)
- Cybersecurity Blind Spots in IaC and PaC Tools Expose Cloud Platforms to New Attacks (source)
- THN Recap: Top Cybersecurity Threats, Tools, and Practices (Nov 18 - Nov 24) (source)
- Australia Passes Groundbreaking Cyber Security Law to Boost Resilience (source)
- Hottest cybersecurity open-source tools of the month: November 2024 (source)
- Supply chain managers underestimate cybersecurity risks in warehouses (source)
- THN Recap: Top Cybersecurity Threats, Tools and Tips (Nov 25 - Dec 1) (source)
- Top 5 Cyber Security Trends for 2025 (source)