+44 (0)203 88 020 88

Menu

Search

Author name: Ian Reynolds

600 failed login attempts per hour for public RDP servers

Recent research from Sophos highlights your public RDP server as the primary attack vector against your data centre. During April and May 2019, Sophos deployed 10 standard out-of-the-box configured Windows 2019 servers into AWS data centres around the world.  By default, Windows 2019 has RDP enabled.  They configured each server with uncrackably long passwords and […]

600 failed login attempts per hour for public RDP servers Read More »

1 million ProFTPD servers vulnerable to RCE

A potential remote code execution vulnerability has been discovered in the popular GPL-licensed FTP server ProFTPD ProFTPD is running on over a million servers exposed to the internet. It is included in several Linux distros including Debian, Suse and Ubuntu. The flaw, tracked under CVE-2019-12815 lives in the mod_copy module. The flaw allows an unauthenticated user to

1 million ProFTPD servers vulnerable to RCE Read More »

Critical vulnerability patched in Jira

Atlassian has released new versions of Jira Server and Jira Data Centre that address a critical vulnerability which has lived in the code for almost 8 years. The vulnerability, CVE-2019-11581 is a server-side template injection vulnerability. According to the security advisory from Atlassian: There was a server-side template injection vulnerability in Jira Server and Data Center,

Critical vulnerability patched in Jira Read More »

July patch Tuesday fixes RCE in DHCP

Microsoft’s July Patch Tuesday updates resolve 77 vulnerabilities in Windows software, including two zero-day vulnerabilities which are being actively exploited and remote code execution vulnerabilities in DHCP Server and MS SQL Server. DHCP Server RCE vulnerability If you have your Microsoft DHCP server configured with a failover server, an attacker can send a specially crafted

July patch Tuesday fixes RCE in DHCP Read More »

What are software supply chain attacks?

Software Supply chain attacks – do you know what you are importing? Many websites and applications routinely import additional code modules from external repositories.  These could be javascript libraries for a webpage or source code for an application. Two recent incidents illustrate the risks of supply chain attacks against the code of your applications and

What are software supply chain attacks? Read More »

0

No products in the basket.

No products in the basket.