Security News > 2022 > July

Get one year of this leading VPN for just $30
2022-07-01 11:00

Get one year of this leading VPN for just $30 We may be compensated by vendors who appear on this page through methods such as affiliate links or sponsored partnerships. As an absolute base measure of security, you should consider using a VPN whenever you connect to the internet, especially while connecting to unprotected Wi-Fi networks.

Jenkins discloses dozens of zero-day bugs in multiple plugins
2022-07-01 10:12

On Thursday, the Jenkins security team announced 34 security vulnerabilities affecting 29 plugins for the Jenkins open source automation server, 29 of the bugs being zero-days still waiting to be patched. The zero-days' CVSS base scores range from low to high severity, and, according to Jenkins' stats, the impacted plugins have a total of more than 22,000 installs.

CISA Warns of Active Exploitation of 'PwnKit' Linux Vulnerability in the Wild
2022-07-01 08:53

The U.S. Cybersecurity and Infrastructure Security Agency this week moved to add a Linux vulnerability dubbed PwnKit to its Known Exploited Vulnerabilities Catalog, citing evidence of active exploitation. Polkit is a toolkit for controlling system-wide privileges in Unix-like operating systems, and provides a mechanism for non-privileged processes to communicate with privileged processes.

New 'SessionManager' Backdoor Targeting Microsoft IIS Servers in the Wild
2022-07-01 08:53

A newly discovered malware has been put to use in the wild at least since March 2021 to backdoor Microsoft Exchange servers belonging to a wide range of entities worldwide, with infections lingering in 20 organizations as of June 2022. Dubbed SessionManager, the malicious tool masquerades as a module for Internet Information Services, a web server software for Windows systems, after exploiting one of the ProxyLogon flaws within Exchange servers.

Microsoft gives its partners power to change AD privileges on customer systems – without permission
2022-07-01 06:02

Microsoft has created a window of time in which its partners can - without permission - create new roles for themselves in customers' Active Directory implementations. Microsoft wised up to the fact that its partners would likely be targeted, too, and spotted a weakness in the delegated admin privileges that partners are given to manage their customers' software purchases.

Solving the indirect vulnerability enigma - fixing indirect vulnerabilities without breaking your dependency tree
2022-07-01 04:06

Fixing indirect vulnerabilities is one of those complex, tedious and, quite frankly, boring tasks that no one really wants to touch. You see, indirect dependencies are introduced deep down the dependency tree and it's very tricky to get to the exact version you want.

The challenges and advantages of building behavior-based threat detection
2022-07-01 04:00

In this video for Help Net Security, Scott Sutherland, Senior Director, Adversary Simulation and Infrastructure Testing, NetSPI, discusses how, in order to stay ahead of malicious actors,...

Product showcase: Group-IB Unified Risk Platform
2022-07-01 03:30

To address these challenges, Group-IB has developed the Unified Risk Platform, a comprehensive set of solutions that understands each organization's threat profile and configures defenses, and responds to threats in real-time. At the heart of the Unified Risk Platform is Group-IB's Single Data Lake, which contains the industry's richest body of adversary intelligence.

Infosec products of the month: June 2022
2022-07-01 03:00

Cynet Automated Response Playbooks empowers security teams to reduce their alert investigation. Cynet's Automated Response Playbooks automate manual tasks and workflows, empowering security teams to reduce their alert investigation and response times by 90%. In addition to freeing up valuable time for security teams, the playbooks provide a defined, consistent response process for more accurate security decisions and ensure that all alerts are properly addressed.

Microsoft Warns of Cryptomining Malware Campaign Targeting Linux Servers
2022-07-01 01:20

A cloud threat actor group tracked as 8220 has updated its malware toolset to breach Linux servers with the goal of installing crypto miners as part of a long-running campaign. "The updates include the deployment of new versions of a crypto miner and an IRC bot," Microsoft Security Intelligence said in a series of tweets on Thursday.