Default title

EXPLOIT WEDNESDAY

PATCH TUESDAY IS NOW FOLLOWED BY EXPLOIT WEDNESDAY

For years we were satisfied that within a couple of weeks after Patch-Tuesday the latest rounds of patches would go through deployment and stability testing then be applied to production systems in due time.

THIS WAS ACCEPTABLE UNTIL RECENTLY

Over recent months, using advanced reverse engineering technologies Advanced Persistent Threat organizations have been effectively using the patch releases for Microsoft Products against the very users of the products being patched. This significant change in posture is forcing organizations to shrink patch testing windows considerably and push more patches into production with less and less testing. While this of course is riskier behavior, security is always a balance of risk.

If you haven't reviewed your organizational patch management strategies recently it might be time to consider updating your policies. Automated Patch Deployment and Patch Testing systems are available to ensure organizations aren't unknowingly accepting risks that are completely avoidable. When was the last time you verified that all your servers and workstations were up to date. Have you verified that all patches were being applied to all needed software systems successfully, not every update can be applied using Windows Update.

IT SECURITY IS ABOUT DISPENSING WITH PRECONCEPTIONS AND BECOMING AWARE OF CHANGING REALITIES

Talk with ALT* about how our Managed Service Solutions can solidify your patch management strategies and help secure your business operations. We would be happy to review your systems and help evaluate and reduce your technology risks.

RECENT THREAT POSTS

- Nate Nelson
Link Found Connecting Chaos, Onyx and Yashma Ransomware
A slip-up by a malware author has allowed researchers to taxonomize three ransomware variations going by different names.
- Sagar Tiwari
Zoom Patches ‘Zero-Click’ RCE Bug
The Google Project Zero researcher found a bug in XML parsing on the Zoom client and server.
- Elizabeth Montalbano
Verizon Report: Ransomware, Human Error Among Top Security Risks
2022’s DBIR also highlighted the far-reaching impact of supply-chain breaches and how organizations and their employees are the reasons why incidents occur.
- Sagar Tiwari
Fronton IOT Botnet Packs Disinformation Punch
Fronton botnet has far more ability than launching DDOS attack, can track social media trends and launch suitable propaganda.
- Threatpost
Zero Trust for Data Helps Enterprises Detect, Respond and Recover from Breaches
Mohit Tiwari, CEO of Symmetry Systems, explores Zero Trust, data objects and the NIST framework for cloud and on-prem environments.
- Elizabeth Montalbano
Snake Keylogger Spreads Through Malicious PDFs
Microsoft Word also leveraged in the email campaign, which uses a 22-year-old Office RCE bug.
- Threatpost
Closing the Gap Between Application Security and Observability
Daniel Kaar, global director application security engineering at Dynatrace, highlights the newfound respect for AppSec-enabled observability in the wake of Log4Shell. 
- Elizabeth Montalbano
380K Kubernetes API Servers Exposed to Public Internet
More than 380,000 of the 450,000-plus servers hosting the open-source container-orchestration engine for managing cloud deployments allow some form of access.
- Elizabeth Montalbano
Critical Vulnerability in Premium WordPress Themes Allows for Site Takeover
Privilege escalation flaw discovered in the Jupiter and JupiterX Core Plugin affects more than 90,000 sites.
- Nate Nelson
DOJ Says Doctor is Malware Mastermind
The U.S. Department of Justice indicts middle-aged doctor, accusing him of being a malware mastermind.

Archives

Leave a Reply

Your email address will not be published.

9 + 7 =