Call us today on: +44 (0)203 88 020 88
SecureTeamSecureTeamSecureTeamSecureTeam
  • Home
  • Our Services
    • Infrastructure Testing
      • Internal Network Penetration Test
      • External Network Penetration Test
      • Wireless Network Penetration Test
      • Vulnerability Assessment
      • Network Segregation Test
      • Voice over IP (VoIP) Penetration Test
    • Application Testing
      • Web Application Penetration Test
      • Mobile Application Penetration Test
      • Desktop Application Security Assessment
      • Citrix Breakout Test
    • Configuration Review
      • Windows Server Build Review
      • Linux Server Build Review
      • Citrix Configuration Review
    • Information Assurance
      • ISO 27001 Gap Analysis
    • Cyber Essentials
  • News
  • Articles
  • About
    • About SecureTeam
    • STORM Appliances
      • Installing a STORM Device
      • Returning a STORM Device
    • White-Label Consultancy
    • Jobs
    • Cookie Policy
    • Privacy Notice
    • Website Terms & Conditions
  • Contact Us

Blog

Home 2021 March

What is a Pass-The-Cookie Attack?

By Mark Faithfull | Articles, Web Applications | 25 March, 2021 | 0

By using Pass-the-cookie techniques, attackers can access web applications without knowing a userid, password or even the one-time password from a multi-factor system. And if the web application in question is the management console for your AWS, Google or Azure environment then they stolen have the keys to your kingdom. In January 2021, CISA drewRead more

Phishing attacks use email senders to avoid spam filters

By Mark Faithfull | News, Vulnerabilities | 24 March, 2021 | 0

A large phishing campaign has captured 400,000 Office 365 credentials by using compromised commercial email marketing services to avoid spam filters. The Compact Phishing operation has been using compromised accounts with services including SendGrid, MailGun and Amazon SES. Commercial email marketeers work hard to ensure their email systems have a high reputation, so their emailsRead more

Why Java is recommending you uninstall Java

By Mark Faithfull | News | 24 March, 2021 | 0

Java is used by 90% of the Fortune 500 companies, is the second most popular programming language on the planet.  So why does Java prompt users to uninstall it? Remove Java when it is no longer needed All software contains bugs and vulnerabilities, so one method to limit the number of ways your computer canRead more

Google demonstrates Spectre attack in Chrome

By Mark Faithfull | News, Vulnerabilities | 17 March, 2021 | 0

At the start of 2018 details were first published of the theoretical Spectre attack which exploits flaws in the design of modern CPU to allow data to be stolen from memory.  Now Google has published a working proof-of-concept. Spectre is the name given to a number of attacks that are variations on a theme –Read more

Microsoft releases One-Click ProxyLogon workaround for Exchange

By Mark Faithfull | News, Tools, Vulnerabilities | 17 March, 2021 | 0

Microsoft has released an easy to install one-click mitigation tool for the critical Exchange security vulnerability known as ProxyLogon as the NCSC issues an urgent alert to UK firms. The Hafnium/Proxylogon attack against Microsoft Exchange servers worldwide is escalating.  Security researchers at Checkpoint report a 10 fold increase in daily attacks against Exchange e-mail serversRead more

What is a Business Continuity Plan?

By Mark Faithfull | Articles, Information Assurance | 10 March, 2021 | 0

Business Continuity Planning (BCP) is the deliberate assessment of the risks to the organisation’s people and information – and then taking steps to mitigate those risks should they occur. Business Leaders may be tempted to think ‘it would never happen to us’ or allow survivorship bias to cloud their risk appetite. But, without a BusinessRead more

Browsers block more ports to prevent NAT Slipstream attacks

By Mark Faithfull | News, Tools | 10 March, 2021 | 0

Web browsers are adding more TCP ports to their block lists in an attempt to prevent exploitation of NAT Slipstream attacks. NAT Slipstreaming is an attack which tricks the NAT router into allowing external traffic through the NAT firewall to target any internal network device by abusing protocols such as SIP or H.323 where thisRead more

How to identify ProxyLogon – Hafnium attacks on your Exchange Server

By Mark Faithfull | News, Vulnerabilities | 10 March, 2021 | 0

Microsoft has updated their Microsoft Safety Scanner (MSERT) tool so that it detects Web Shells installed on your Exchange servers through the ProxyLogon vulnerability. Last week Microsoft issued emergency patches to address four zero-day exploits that were being exploited by the Hafnium group.  Since the disclosures, criminal groups have been targeting Microsoft Exchange Servers aroundRead more

Rockwell Automation Critical Vulnerability in PLC

By Mark Faithfull | News, Vulnerabilities | 3 March, 2021 | 0

Programmable Logic Controllers manage industrial systems of all kinds, from oil rigs to vaccine production and one of the leading manufacturers of PLC is Rockwell Automation. A bad-as-it-gets (CVSS 10) vulnerability has been discovered that affects the Logix line of PLC devices. According to the alert issued by the US CERT: Successful exploitation of thisRead more

Exchange 0-day exploits need patching today

By Mark Faithfull | News, Vulnerabilities | 3 March, 2021 | 0

Microsoft has published details and out of cycle patches for several 0-day Exchange exploits under active attack. Microsoft Security Response Center advises: Due to the critical nature of these vulnerabilities, we recommend that customers apply the updates to affected systems immediately to protect against these exploits and to prevent future abuse across the ecosystem.   The exploits have been linked to theRead more

Recent Posts

  • What is a Security Incident Response Plan?
  • NCSC Warns of Critical Risk to unpatched Fortinet VPN devices
  • April patch Tuesday tackles zero days and new Exchange vulnerabilities
  • SAP systems under active attack via unpatched vulnerabilities
  • What are the implications of the Facebook data breach?

Tags

Android Apple Bluetooth Business Continuity Chrome Cisco credential stuffing cyber crime cyber essentials cyber security cyber security news Data Protection DDoS DNS Exchange Server exim fileless formjacking GDPR IoT Linux MacOS Meltdown microsoft ncsc patching penetration testing phishing ransomware RDP SAP security breach Security operations security testing SIEM software development Spectre supply chain attacks Sysinternals Tomcat Unix vulnerability management web applications web browsers wireless

Archives

  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • July 2020
  • June 2020
  • April 2020
  • March 2020
  • February 2020
  • January 2020
  • December 2019
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019
  • December 2018
  • November 2018
  • July 2018
  • June 2018
  • April 2018
  • January 2018
  • October 2017
BCS Cyber Essentials Cyber Essentials Cyber Essentials PLUS ISO 9001 ISO 27001
information. secured.
  • Home
  • Our Services
    • Infrastructure Testing
      • Internal Network Penetration Test
      • External Network Penetration Test
      • Wireless Network Penetration Test
      • Vulnerability Assessment
      • Network Segregation Test
      • Voice over IP (VoIP) Penetration Test
    • Application Testing
      • Web Application Penetration Test
      • Mobile Application Penetration Test
      • Desktop Application Security Assessment
      • Citrix Breakout Test
    • Configuration Review
      • Windows Server Build Review
      • Linux Server Build Review
      • Citrix Configuration Review
    • Information Assurance
      • ISO 27001 Gap Analysis
    • Cyber Essentials
  • News
  • Articles
  • About
    • About SecureTeam
    • STORM Appliances
      • Installing a STORM Device
      • Returning a STORM Device
    • White-Label Consultancy
    • Jobs
    • Cookie Policy
    • Privacy Notice
    • Website Terms & Conditions
  • Contact Us
SecureTeam