Security News

Alert: Hackers Exploit Barracuda Email Security Gateway 0-Day Flaw for 7 Months
2023-05-31 05:25

Enterprise security firm Barracuda on Tuesday disclosed that a recently patched zero-day flaw in its Email Security Gateway appliances had been abused by threat actors since October 2022 to backdoor the devices. The latest findings show that the critical vulnerability, tracked as CVE-2023-2868, has been actively exploited for at least seven months prior to its discovery.

Organizations spend 100 hours battling post-delivery email threats
2023-05-30 03:00

The research shows that cybercriminals continue to barrage organizations with targeted email attacks, and many companies are struggling to keep up. While spear-phishing attacks are low-volume, they are widespread and highly successful compared to other types of email attacks.

Barracuda Warns of Zero-Day Exploited to Breach Email Security Gateway Appliances
2023-05-26 04:04

Email protection and network security services provider Barracuda is warning users about a zero-day flaw that it said has been exploited to breach the company's Email Security Gateway appliances. "The vulnerability stems from incomplete input validation of a user-supplied.tar file as it pertains to the names of the files contained within the archive. As a consequence, a remote attacker can specifically format these file names in a particular manner that will result in remotely executing a system command through Perl's qx operator with the privileges of the Email Security Gateway product."

Augmenting Your Microsoft 365 EOP and MDO Email Security Infrastructure
2023-05-25 16:00

TechRepublic Premium Bring your own device policy PURPOSE The purpose of this Bring your own device policy from TechRepublic Premium is to provide requirements for BYOD usage and establish the steps that both users and the IT department should follow to initialize, support and remove devices from company access. These requirements must be followed as documented in order to protect company systems .....

CISO Guide to Business Email Compromise
2023-05-25 16:00

TechRepublic Premium Bring your own device policy PURPOSE The purpose of this Bring your own device policy from TechRepublic Premium is to provide requirements for BYOD usage and establish the steps that both users and the IT department should follow to initialize, support and remove devices from company access. These requirements must be followed as documented in order to protect company systems .....

The Essential Guide to Cloud Email Security
2023-05-25 16:00

TechRepublic Premium Bring your own device policy PURPOSE The purpose of this Bring your own device policy from TechRepublic Premium is to provide requirements for BYOD usage and establish the steps that both users and the IT department should follow to initialize, support and remove devices from company access. These requirements must be followed as documented in order to protect company systems .....

Barracuda email security appliances hacked via zero-day vulnerability (CVE-2023-2868)
2023-05-25 09:50

A vulnerability in Barracuda Networks' Email Security Gateway appliances has been exploited by attackers, the company has warned. CVE-2023-2868 is a critical remote command injection vulnerability affecting only physical Barracuda Email Security Gateway appliances, versions 5.1.3.001 - 9.2.0.006.

Barracuda warns of email gateways breached via zero-day flaw
2023-05-24 15:42

Barracuda, a company known for its email and network security solutions, warned customers today that some of their Email Security Gateway appliances were breached last week by targeting a now-patched zero-day vulnerability. While the flaw was patched over the weekend, Barracuda warned on Tuesday that some of its customers' ESG appliances were compromised by exploiting the now-patched security bug.

Malicious links and misaddressed emails slip past security controls
2023-05-22 03:30

The level of concern is high for attacks evading security controls by leveraging siloed communication and collaboration tools outside of email. "This raises the question of whether expanding collaboration tools simply increases the potential attack surface for bad actors. As organizations continue to adopt new technologies, they must remain vigilant in their efforts to protect against these threats and ensure the security of their communication channels," concluded Gruber.

How business email compromise attacks emulate legitimate web services to lure clicks
2023-05-19 18:10

Call it BEC 3.0 - phishing attacks that bury the hook in legitimate web services like Dropbox. SEE: Another hide-the-malware attack focuses on DNS. "Leveraging legitimate websites to host malicious content is a surefire way to get into the inbox," he said.