Ransomware group Stormous claims it has stolen 161GB of data from the soft drinks giant
Yearly Archives: 2022
Protecting on-premises Microsoft servers
We are still in an on-premises world, as Microsoft has recently acknowledged. The company announced an increase in its security bug bounty for on-premises Exchange, SharePoint, and other Office servers. Some of the most concerning recent attacks to on-premises servers have not been against Windows or web servers but rather SharePoint and especially Exchange servers.
Security researchers have long complained that Exchange on-premises servers received too little financial award to find security issues. This came to a head in March 2021 when the Hafnium attack targeted Exchange on-premises servers. The attack was so impactful that even the U.S. federal government reached out and “patched” impacted Exchange servers.
SOC modernization: 8 key considerations
The 2022 RSA Security Conference is just weeks away, and the security diaspora is boosted and ready to meet in person at the Moscone Center in San Francisco.
While we’ve certainly accomplished a lot working remotely over the past 2 years, cybersecurity remains in a precarious position in 2022, so an industry huddle is in order. We are at a point where the scale and complexity of historical security defenses either aren’t working or are stretched to their limits. This means CISOs need to think about security transformation, and as they do, every process and layer of the security technology stack is in play.
Now, there will be plenty of hype at the conference around security “platforms” like extended detection and response (XDR), cloud-native application protection platforms (CNAPPs), secure access service edge (SASE), and zero trust—all important topics but also strewn with industry hype and associated user confusion. My good friend Candy Alexander, president of ISSA International, and I will be discussing these trends during our RSA session on Tuesday morning (6/7). But when I’m not presenting with Candy, I’ll be learning everything I can about security operations center (SOC) modernization.
UK Schools Can Sign-Up to Free Government-Grade Security
Nimbuspwn Linux Bugs Could Provide Root Access
US Offers $10m for Russian NotPetya Sandworm Team
USN-5366-2: FriBidi vulnerabilities
USN-5366-1 fixed several vulnerabilities in FriBidi. This update provides the
corresponding updates for Ubuntu 22.04 LTS.
Original advisory details:
It was discovered that FriBidi incorrectly handled processing of input strings
resulting in memory corruption. An attacker could use this issue to cause
FriBidi to crash, resulting in a denial of service, or potentially execute
arbitrary code. (CVE-2022-25308)
It was discovered that FriBidi incorrectly validated input data to its CapRTL
unicode encoder, resulting in memory corruption. An attacker could use this
issue to cause FriBidi to crash, resulting in a denial of service, or
potentially execute arbitrary code. (CVE-2022-25309)
It was discovered that FriBidi incorrectly handled empty input when removing
marks from unicode strings, resulting in a crash. An attacker could use this
to cause FriBidi to crash, resulting in a denial of service, or potentially
execute arbitrary code. (CVE-2022-25310)
DSA-5125 chromium – security update
Multiple security issues were discovered in Chromium, which could result
in the execution of arbitrary code, denial of service or information
disclosure.
suricata-6.0.5-1.fc36
FEDORA-2022-e7bc9caf04
Packages in this update:
suricata-6.0.5-1.fc36
Update description:
Various security, performance, accuracy and stability issues have been fixed.
suricata-6.0.5-1.fc35
FEDORA-2022-1b9f9b2993
Packages in this update:
suricata-6.0.5-1.fc35
Update description:
Various security, performance, accuracy and stability issues have been fixed.