Default title

EXPLOIT WEDNESDAY

PATCH TUESDAY IS NOW FOLLOWED BY EXPLOIT WEDNESDAY

For years we were satisfied that within a couple of weeks after Patch-Tuesday the latest rounds of patches would go through deployment and stability testing then be applied to production systems in due time.

THIS WAS ACCEPTABLE UNTIL RECENTLY

Over recent months, using advanced reverse engineering technologies Advanced Persistent Threat organizations have been effectively using the patch releases for Microsoft Products against the very users of the products being patched. This significant change in posture is forcing organizations to shrink patch testing windows considerably and push more patches into production with less and less testing. While this of course is riskier behavior, security is always a balance of risk.

If you haven't reviewed your organizational patch management strategies recently it might be time to consider updating your policies. Automated Patch Deployment and Patch Testing systems are available to ensure organizations aren't unknowingly accepting risks that are completely avoidable. When was the last time you verified that all your servers and workstations were up to date. Have you verified that all patches were being applied to all needed software systems successfully, not every update can be applied using Windows Update.

IT SECURITY IS ABOUT DISPENSING WITH PRECONCEPTIONS AND BECOMING AWARE OF CHANGING REALITIES

Talk with ALT* about how our Managed Service Solutions can solidify your patch management strategies and help secure your business operations. We would be happy to review your systems and help evaluate and reduce your technology risks.

RECENT THREAT POSTS

- Tara Seals
FIN7 Lures Unwitting Security Pros to Carry Out Ransomware Attacks
The infamous Carbanak operator is looking to juice its ransomware game by recruiting IT staff to its fake Bastion Secure "pen-testing" company.
- Lisa Vaas
REvil Servers Shoved Offline by Governments – But They’ll Be Back, Researchers Say
A multi-country effort has given ransomware gang REvil a taste of its own medicine by pwning its backups and pushing its leak site and Tor payment site offline.
- Tara Seals
Cisco SD-WAN Security Bug Allows Root Code Execution
The high-severity bug, tracked as CVE-2021-1529, is an OS command-injection flaw.
- Elizabeth Montalbano
Threat Actors Abuse Discord to Push Malware
The platform’s Content Delivery Network and core features are being used to send malicious files—including RATs--across its network of 150 million users, putting corporate workplaces at risk.
- Becky Bracken
U.S. Ban on Sales of Cyberattack Tools Is Anemic, Experts Warn
Meanwhile, Zerodium's quest to buy VPN exploits is problematic, researchers said.
- Tara Seals
TA551 Shifts Tactics to Install Sliver Red-Teaming Tool
A new email campaign from the threat group uses the attack-simulation framework in a likely leadup to ransomware deployment.
- Lisa Vaas
Gigabyte Allegedly Hit by AvosLocker Ransomware
If AvosLocker stole Gigabyte's master keys, threat actors could force hardware to download fake drivers or BIOS updates in a supply-chain attack a la SolarWinds.
- Nate Warfield
Why is Cybersecurity Failing Against Ransomware?
Hardly a week goes by without another major company falling victim to a ransomware attack. Nate Warfield, CTO at Prevailion, discusses the immense challenges in changing that status quo.
- Elizabeth Montalbano
Ransomware Sinks Teeth into Candy-Corn Maker Ahead of Halloween
Chicago-based Ferrara acknowledged an Oct. 9 attack that encrypted some systems and disrupted production.
- Lisa Vaas
Google Crushes YouTube Cookie-Stealing Channel Hijackers
Google has caught and brushed off a bunch of cookie-stealing YouTube channel hijackers who were running cryptocurrency scams on, or auctioning off, ripped-off channels. 

Archives

Leave a Reply

Your email address will not be published. Required fields are marked *

four × two =