Default title

EXPLOIT WEDNESDAY

PATCH TUESDAY IS NOW FOLLOWED BY EXPLOIT WEDNESDAY

For years we were satisfied that within a couple of weeks after Patch-Tuesday the latest rounds of patches would go through deployment and stability testing then be applied to production systems in due time.

THIS WAS ACCEPTABLE UNTIL RECENTLY

Over recent months, using advanced reverse engineering technologies Advanced Persistent Threat organizations have been effectively using the patch releases for Microsoft Products against the very users of the products being patched. This significant change in posture is forcing organizations to shrink patch testing windows considerably and push more patches into production with less and less testing. While this of course is riskier behavior, security is always a balance of risk.

If you haven't reviewed your organizational patch management strategies recently it might be time to consider updating your policies. Automated Patch Deployment and Patch Testing systems are available to ensure organizations aren't unknowingly accepting risks that are completely avoidable. When was the last time you verified that all your servers and workstations were up to date. Have you verified that all patches were being applied to all needed software systems successfully, not every update can be applied using Windows Update.

IT SECURITY IS ABOUT DISPENSING WITH PRECONCEPTIONS AND BECOMING AWARE OF CHANGING REALITIES

Talk with ALT* about how our Managed Service Solutions can solidify your patch management strategies and help secure your business operations. We would be happy to review your systems and help evaluate and reduce your technology risks.

RECENT THREAT POSTS

- Chris Calvert
Making Sense of the Security Sensor Landscape
Chris Calvert of Respond Software (now part of FireEye) outlines the challenges that reduce the efficacy of network security sensors.
- Tom Spring
High-Severity Chrome Bugs Allow Browser Hacks
Desktop versions of the browser received a total of eight fixes, half rated high-severity.
- Tara Seals
Novel Online Shopping Malware Hides in Social-Media Buttons
The skimmer steals credit-card data, using steganography to hide in plain sight in seemingly benign images.
- Tara Seals
VMware Rolls a Fix for Formerly Critical Zero-Day Bug
VMware has issued a full patch and revised the severity level of the NSA-reported vulnerability to "important."
- Elizabeth Montalbano
Vancouver Metro Disrupted by Egregor Ransomware
The attack, which prevented Translink users from using their metro cards or buying tickets at kiosks, is the second from the prolific threat group just this week.
- Tara Seals
Kmart, Latest Victim of Egregor Ransomware – Report
The struggling retailer's back-end services have been impacted, according to a report, just in time for the holidays.
- Tara Seals
TrickBot Returns with a Vengeance, Sporting Rare Bootkit Functions
A new "TrickBoot" module scans for vulnerable firmware and has the ability to read, write and erase it on devices.
- Tara Seals
DeathStalker APT Spices Things Up with PowerPepper Malware
A raft of obfuscation techniques turn the heat up for the hacking-for-hire operation.
- Threatpost
Reverse Engineering Tools: Evaluating the True Cost
Breaking down the true cost of software tools in the context of reverse engineering and debugging may not be as clear-cut as it appears.
- Lindsey O'Donnell
Cyberattacks Target COVID-19 Vaccine ‘Cold-Chain’ Orgs
Cybercriminals try to steal the credentials of top companies associated with the COVID-19 vaccine supply chain in an espionage effort.

Archives

Leave a Reply

Your email address will not be published. Required fields are marked *

4 × 2 =