Protecting on-premises Microsoft servers

Read Time:37 Second

We are still in an on-premises world, as Microsoft has recently acknowledged. The company announced an increase in its security bug bounty for on-premises Exchange, SharePoint, and other Office servers. Some of the most concerning recent attacks to on-premises servers have not been against Windows or web servers but rather SharePoint and especially Exchange servers.  

Security researchers have long complained that Exchange on-premises servers received too little financial award to find security issues. This came to a head in March 2021 when the Hafnium attack targeted Exchange on-premises servers. The attack was so impactful that even the U.S. federal government reached out and “patched” impacted Exchange servers.

To read this article in full, please click here

Read More

SOC modernization: 8 key considerations

Read Time:1 Minute, 2 Second

The 2022 RSA Security Conference is just weeks away, and the security diaspora is boosted and ready to meet in person at the Moscone Center in San Francisco.

While we’ve certainly accomplished a lot working remotely over the past 2 years, cybersecurity remains in a precarious position in 2022, so an industry huddle is in order. We are at a point where the scale and complexity of historical security defenses either aren’t working or are stretched to their limits. This means CISOs need to think about security transformation, and as they do, every process and layer of the security technology stack is in play.

Now, there will be plenty of hype at the conference around security “platforms” like extended detection and response (XDR), cloud-native application protection platforms (CNAPPs), secure access service edge (SASE), and zero trust—all important topics but also strewn with industry hype and associated user confusion. My good friend Candy Alexander, president of ISSA International, and I will be discussing these trends during our RSA session on Tuesday morning (6/7).  But when I’m not presenting with Candy, I’ll be learning everything I can about security operations center (SOC) modernization.

To read this article in full, please click here

Read More

USN-5366-2: FriBidi vulnerabilities

Read Time:45 Second

USN-5366-1 fixed several vulnerabilities in FriBidi. This update provides the
corresponding updates for Ubuntu 22.04 LTS.

Original advisory details:

It was discovered that FriBidi incorrectly handled processing of input strings
resulting in memory corruption. An attacker could use this issue to cause
FriBidi to crash, resulting in a denial of service, or potentially execute
arbitrary code. (CVE-2022-25308)

It was discovered that FriBidi incorrectly validated input data to its CapRTL
unicode encoder, resulting in memory corruption. An attacker could use this
issue to cause FriBidi to crash, resulting in a denial of service, or
potentially execute arbitrary code. (CVE-2022-25309)

It was discovered that FriBidi incorrectly handled empty input when removing
marks from unicode strings, resulting in a crash. An attacker could use this
to cause FriBidi to crash, resulting in a denial of service, or potentially
execute arbitrary code. (CVE-2022-25310)

Read More