Default title

EXPLOIT WEDNESDAY

PATCH TUESDAY IS NOW FOLLOWED BY EXPLOIT WEDNESDAY

For years we were satisfied that within a couple of weeks after Patch-Tuesday the latest rounds of patches would go through deployment and stability testing then be applied to production systems in due time.

THIS WAS ACCEPTABLE UNTIL RECENTLY

Over recent months, using advanced reverse engineering technologies Advanced Persistent Threat organizations have been effectively using the patch releases for Microsoft Products against the very users of the products being patched. This significant change in posture is forcing organizations to shrink patch testing windows considerably and push more patches into production with less and less testing. While this of course is riskier behavior, security is always a balance of risk.

If you haven't reviewed your organizational patch management strategies recently it might be time to consider updating your policies. Automated Patch Deployment and Patch Testing systems are available to ensure organizations aren't unknowingly accepting risks that are completely avoidable. When was the last time you verified that all your servers and workstations were up to date. Have you verified that all patches were being applied to all needed software systems successfully, not every update can be applied using Windows Update.

IT SECURITY IS ABOUT DISPENSING WITH PRECONCEPTIONS AND BECOMING AWARE OF CHANGING REALITIES

Talk with ALT* about how our Managed Service Solutions can solidify your patch management strategies and help secure your business operations. We would be happy to review your systems and help evaluate and reduce your technology risks.

RECENT THREAT POSTS

- Elizabeth Montalbano

Latest version of UnC0ver uses unpatched zero-day exploit to take complete control of devices, even those running iOS 13.5.

- Lindsey O'Donnell

Even seeing data breaches in the news, more than half of consumers are still reusing passwords.

- Tara Seals

A lack of awareness about where and how open-source libraries are being used is problematic, researchers say.

- Lindsey O'Donnell

Attackers used malicious Excel 4.0 documents to spread the weaponized NetSupport RAT in a spear-phishing campaign.

- Tara Seals

The meal-kit company's customer records were leaked as part of the Shiny Hunters breach.

- Tara Seals

An investigation traces an NSO Group-controlled IP address to a fake Facebook security portal.

- Lindsey O'Donnell

Government and air transportation companies in Kuwait and Saudi Arabia were targeted in a recent attack tracked back to the Chafer APT.

- Chris Calvert

Looking for niche anomalies in an automated way with AI and machine learning is the future.

- Lindsey O'Donnell

Cisco has fixed a critical remote code-execution flaw in its popular customer interaction management solution.

- Tara Seals

The malware-as-a-service is advanced, obfuscated and modular -- and built for mass campaigns.

Archives

Leave a Reply

Your email address will not be published. Required fields are marked *