Security News > 2020 > September

Cisco Patches Actively Exploited Flaws in Carrier-Grade Routers
2020-09-30 12:46

Cisco this week released patches for two high-severity vulnerabilities in IOS XR software that have been actively exploited in attacks for over a month. Tracked as CVE-2020-3566 and CVE-2020-3569 and featuring a CVSS score of 8.6, the two flaws were made public in late August, when Cisco revealed that hackers were already targeting them in attacks.

Rinki Sethi Named CISO of Twitter
2020-09-30 12:24

Twitter's search for a new chief information security officer has come to an end. According to her LinkedIn profile, Sethi previously held management positions at eBay, Intuit, Palo Alto Networks, IBM and Rubrik.

Russian Sentenced to Prison for Hacking LinkedIn, Dropbox
2020-09-30 12:11

A Russian national was sentenced to 88 months in prison in the United States for hacking LinkedIn, Dropbox, and Formspring in 2012. The man, Yevgeniy Aleksandrovich Nikulin, who will turn 33 next month, was charged in 2016 for using stolen employee credentials to access without authorization the systems of LinkedIn, Dropbox and Formspring.

Attacks on Flight Tracking Services Possibly Linked to Armenia-Azerbaijan Conflict
2020-09-30 12:04

Distributed denial-of-service attacks launched in recent days against popular flight tracking services may be linked to the conflict between Armenia and Azerbaijan. UK-based live flight tracking service Plane Finder, which is used by millions of people, informed users on Tuesday via Twitter that its services were disrupted by a cyberattack.

The biggest cyber threats organizations deal with today
2020-09-30 11:47

Based on over 8 trillion daily security signals and observations from the company's security and threat intelligence experts, the Microsoft Digital Defense Report 2020 draws a distinction between attacks mounted by cybercriminals and those by nation-state attackers. "While credential phishing and BEC continue to be the dominant variations, we also see attacks on a user's identity and credential being attempted via password reuse and password spray attacks using legacy email protocols such as IMAP and SMTP," Microsoft noted.

Negotiating with Ransomware Gangs
2020-09-30 11:19

For now, it seems that paying ransomware, while obviously risky and empowering/encouraging ransomware attackers, can perhaps be comported so as not to break any laws and even if payment is arguably unlawful, seems unlikely to be prosecuted. Payment is the least costly option; Payment is in the best interest of stakeholders; Payment can avoid being fined for losing important data; Payment means not losing highly confidential information; and Payment may mean not going public with the data breach.

Cisco Issues Patches For 2 High-Severity IOS XR Flaws Under Active Attacks
2020-09-30 09:49

Cisco yesterday released security patches for two high-severity vulnerabilities affecting its IOS XR software that were found exploited in the wild a month ago. Tracked as CVE-2020-3566 and CVE-2020-3569, details for both zero-day unauthenticated DoS vulnerabilities were made public by Cisco late last month when the company found hackers actively exploiting Cisco IOS XR Software that is installed on a range of Cisco's carrier-grade and data center routers.

FYI: If you're running HP Device Manager, anyone on your network can get admin on your server via backdoor
2020-09-30 08:32

HP Device Manager, software that allows IT administrators to manage HP Thin Client devices, comes with a backdoor database user account that undermines network security, a UK-based consultant has warned. Nicky Bloor, founder of Cognitous Cyber Security, reports that an HP Inc programmer appears to have set up an insecure user account in a database within HP Device Manager.

FYI: If you're running HP Device Manager, anyone on your network can get admin on your server via backdoor
2020-09-30 08:32

HP Device Manager, software that allows IT administrators to manage HP Thin Client devices, comes with a backdoor database user account that undermines network security, a UK-based consultant has warned. Nicky Bloor, founder of Cognitous Cyber Security, reports that an HP Inc programmer appears to have set up an insecure user account in a database within HP Device Manager.

Researchers Uncover Cyber Espionage Operation Aimed At Indian Army
2020-09-30 08:00

The campaign's starting point is an email with an embedded malicious attachment - either in the form of a ZIP file containing an LNK file or a Microsoft Word document - that triggers an infection chain via a series of steps to download the final-stage payload. Aside from identifying three different infection chains, what's notable is the fact that one of them exploited template injection and Microsoft Equation Editor flaw, a 20-year old memory corruption issue in Microsoft Office, which, when exploited successfully, let attackers execute remote code on a vulnerable machine even without user interaction. What's more, the LNK files have a double extension and come with document icons, thereby tricking an unsuspecting victim into opening the file.