+44 (0)203 88 020 88

Author name: secureteampstg

NetLogon Security Changes coming in February

Microsoft continues to roll out changes to mitigate the Zerologon vulnerability and a change due in the February Patch Tuesday could break non-Windows device’s ability to connect to the domain. The Zerologon vulnerability is a flaw in the Microsoft NetLogon protocol. Tracked as CVE-2020-1472 the vulnerability allows an unauthenticated user to change passwords on the […]

NetLogon Security Changes coming in February Read More »

CISA Warns of Pass-the-Cookie attack

The American CISA has warned they have detected ongoing attacks against several organisations cloud services. The alert from CISA states that: The Cybersecurity and Infrastructure Security Agency (CISA) is aware of several recent successful cyberattacks against various organizations’ cloud services. Threat actors are using phishing and other vectors to exploit poor cyber hygiene practices within

CISA Warns of Pass-the-Cookie attack Read More »

Microsoft Patches Critical Bugs

Microsoft starts the year with their first patch Tuesday bundle of security fixes targeting 10 Critical vulnerabilities include a zero-day being exploited in Windows Defender. The Windows Defender vulnerability (CVE-2021-1647) is reported by Microsoft as having been detected under active exploitation in the wild – but precious little context information is provided under the firm’s

Microsoft Patches Critical Bugs Read More »

100000 Zyxel firewalls have hardcoded backdoor exposed

Taiwan based Zyxel Networks has issued patches for their enterprise grade firewalls after a hard coded credential vulnerability was discovered by security researchers.  The vulnerability provides attackers with root level access over SSH or the Web Administration interface allowing firewall rules to be changed to permit easy access to the network behind the firewall. Zyxel

100000 Zyxel firewalls have hardcoded backdoor exposed Read More »

When Good Employees Go Bad

A recent court case underlines the importance of good operational security procedures to manage employee and contractor exits to ensure all their access is revoked. A man has been sentenced to two years after deleting 456 virtual machines from Cisco’s infrastructure – 4 months after resigning from the firm. As a result of the malicious

When Good Employees Go Bad Read More »

SolarWinds hack sends chills through security industry

SolarWinds provides tools used by security and network managers in many of the largest businesses and governments in the world.  Since March 2020 hackers inserted their own code into SolarWinds Orion software which was downloaded by some 18,000 customers – providing a backdoor into those customers’ networks. SolarWinds Orion is a network health and performance

SolarWinds hack sends chills through security industry Read More »

What is file integrity monitoring?

File Integrity Monitoring systems generate alerts when intruders make unexpected changes to the files on your servers – either by changing existing files or creating new ones. Robust cybersecurity can be most effectively achieved by adopting a ‘defence in depth’ approach.  This means deploying several layers of protection, using different technologies so that the overlapping

What is file integrity monitoring? Read More »

Scroll to Top