Introducing LevelBlue’s 24/7 Managed Threat Detection and Response Service for Government  

Read Time:2 Minute, 53 Second

As new threat vectors emerge and cybercriminals leverage sophisticated technologies to orchestrate more targeted attacks, staying ahead of threats is more challenging than ever. We are excited to announce the launch of a new managed security service designed to protect highly regulated data and help ensure critical services are efficiently delivered. 

LevelBlue Managed Threat Detection and Response for Government (MTDR for Gov) bolsters the cybersecurity capabilities of government and commercial entities with around-the-clock monitoring and management by seasoned, US-based security analysts using our FedRAMP Moderate-authorized platform. 

Enhanced Cybersecurity for Mission-Critical Data 

With operations running 24/7/365, our experts are always on, ensuring rapid detection and remediation across all infrastructure types. The service supports security teams with proactive threat hunting, comprehensive threat intelligence, continuous security monitoring, root-cause analysis, and rapid, collaborative incident response. We understand the challenges that accompany complex cybersecurity implementations. Our high-touch service delivery model provides customers with dedicated teams to help deploy and configure advanced technology and integrations during onboarding and growth.  

Technical Excellence and Seamless Integrations 

The service operates on the LevelBlue platform, simplifying security operations and centralizing visibility by giving analysts a single view from which to monitor and manage complex environments. It helps organizations better protect sensitive data against sophisticated attacks by integrating curated threat intelligence from LevelBlue Labs and the Open Threat Exchange (OTX). This service extends the security perimeter and integrates seamlessly with endpoint protection agents, firewalls, vulnerability scanners, and identity systems, automating responses to swiftly neutralize threats.  

Meet Stringent Compliance and Security Standards 

With this service, all data is stored in AWS GovCloud (US), providing customers with an isolated environment that not only meets compliance requirements but can also scale with evolving business needs. The LevelBlue platform is FedRAMP Moderate-authorized and meets 325 cybersecurity controls required to protect government data. It utilizes the FIPS 140-2 US government computer security standard, which is used to validate cryptographic modules. 

The platform also adheres to multiple industry-standard frameworks, including PCI, ISO, HIPAA, and SOC, and our detections align with the MITRE ATT&CK framework. We also provide organizations with the reporting tools they need to stay in compliance through a comprehensive library of predefined templates, including CMMC, HITRUST, PCI DSS, HIPAA, NIST CSF, ISO, GDPR, Essential Eight, ADHICS, as well as the ability to create custom reports.   

A Leader in Cybersecurity Innovation 

LevelBlue continues to set the standard for excellence and innovation in cybersecurity. Our   managed detection and response services are tailored to meet the complex challenges faced by today’s enterprises, particularly in the government sector. We have been recognized time and again in various analyst reports, with our most recent accolades including being recognized by Frost & Sullivan as a leader in the Global MDR market and being named a Leader in the 2024 IDC MarketScape for U.S. National Government Professional Security Services. 

A Partner for Risk Management and Compliance 

LevelBlue also offers broader services to help organizations identify and address security gaps and improve resiliency. Our consultants can assist with incident readiness and response planning and help organizations meet new and upcoming government mandates for reporting on governance, risk and compliance. 

Get Started with LevelBlue 

Looking for a comprehensive threat detection and response service that is designed to secure highly sensitive data? Contact our account team to learn how LevelBlue’s new MTDR for Government service can help protect your data and meet compliance requirements. 

Read More

USN-6885-3: Apache HTTP Server vulnerabilities

Read Time:48 Second

USN-6885-1 fixed several vulnerabilities in Apache. This update provides
the corresponding update for Ubuntu 16.04 LTS and Ubuntu 18.04 LTS.

Original advisory details:

Orange Tsai discovered that the Apache HTTP Server mod_rewrite module
incorrectly handled certain substitutions. A remote attacker could
possibly use this issue to execute scripts in directories not directly
reachable by any URL, or cause a denial of service. Some environments
may require using the new UnsafeAllow3F flag to handle unsafe
substitutions. (CVE-2024-38474, CVE-2024-38475)

Orange Tsai discovered that the Apache HTTP Server incorrectly handled
certain response headers. A remote attacker could possibly use this issue
to obtain sensitive information, execute local scripts, or perform SSRF
attacks. (CVE-2024-38476)

Orange Tsai discovered that the Apache HTTP Server mod_proxy module
incorrectly handled certain requests. A remote attacker could possibly use
this issue to cause the server to crash, resulting in a denial of service.
(CVE-2024-38477)

Read More

Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution

Read Time:28 Second

Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution. Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution in the context of the logged on user. Depending on the privileges associated with the user an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.

Read More

USN-7018-1: OpenSSL vulnerabilities

Read Time:1 Minute, 5 Second

Robert Merget, Marcus Brinkmann, Nimrod Aviram, and Juraj Somorovsky
discovered that certain Diffie-Hellman ciphersuites in the TLS
specification and implemented by OpenSSL contained a flaw. A remote
attacker could possibly use this issue to eavesdrop on encrypted
communications. This was fixed in this update by removing the insecure
ciphersuites from OpenSSL. (CVE-2020-1968)

Paul Kehrer discovered that OpenSSL incorrectly handled certain input
lengths in EVP functions. A remote attacker could possibly use this issue
to cause OpenSSL to crash, resulting in a denial of service.
(CVE-2021-23840)

Elison Niven discovered that OpenSSL incorrectly handled the c_rehash
script. A local attacker could possibly use this issue to execute arbitrary
commands when c_rehash is run. (CVE-2022-1292)

Chancen and Daniel Fiala discovered that OpenSSL incorrectly handled the
c_rehash script. A local attacker could possibly use this issue to execute
arbitrary commands when c_rehash is run. (CVE-2022-2068)

It was discovered that OpenSSL incorrectly handled excessively large
Diffie-Hellman parameters. An attacker could possibly use this issue
to cause a denial of service. (CVE-2023-3446)

Bahaa Naamneh discovered that OpenSSL incorrectly handled certain malformed
PKCS12 files. A remote attacker could possibly use this issue to cause
OpenSSL to crash, resulting in a denial of service. (CVE-2024-0727)

Read More

The AI Fix #16: GPT-4o1, AI time travelers, and where’s my driverless car?

Read Time:36 Second

In episode 16 of The AI Fix, Mark and Graham meet GPT-4o1 and ask if it knows how many cousins Alice’s sister has, a top cop wants AI injected into his colleagues “like heroin”, Mark finds an AI that might actually be able to help with that, and our hosts start a conspiracy theory about an AI that stops you believing in conspiracy theories.

Graham peers into his crystal ball and discover’s Reddit’s bargain basement John Connor, and Mark is tired of waiting for the “tens of millions” of driverless cars we were promised.

All this and much more is discussed in the latest edition of “The AI Fix” podcast by Graham Cluley and Mark Stockley.

Read More

Remotely Exploding Pagers

Read Time:27 Second

Wow.

It seems they all exploded simultaneously, which means they were triggered.

Were they each tampered with physically, or did someone figure out how to trigger a thermal runaway remotely? Supply chain attack? Malicious code update, or natural vulnerability?

I have no idea, but I expect we will all learn over the next few days.

EDITED TO ADD: I’m reading nine killed and 2,800 injured. That’s a lot of collateral damage. (I haven’t seen a good number as to the number of pagers yet.)

Read More