A zero-day vulnerability (and PoC) to blind defenses relying on Windows event logs

A zero-day vulnerability that, when triggered, could crash the Windows Event Log service on all supported (and some legacy) versions of Windows could spell trouble for enterprise defenders. Discovered by a security researcher named Florian and reported… Continue reading A zero-day vulnerability (and PoC) to blind defenses relying on Windows event logs

SolarWinds Detected Six Months Earlier

New reporting from Wired reveals that the Department of Justice detected the SolarWinds attack six months before Mandiant detected it in December 2020, but didn’t realize what it detected—and so ignored it.

WIRED can now confirm that the operation was actually discovered by the DOJ six months earlier, in late May 2020­—but the scale and significance of the breach wasn’t immediately apparent. Suspicions were triggered when the department detected unusual traffic emanating from one of its servers that was running a trial version of the Orion software suite made by SolarWinds, according to sources familiar with the incident. The software, used by system administrators to manage and configure networks, was communicating externally with an unfamiliar system on the internet. The DOJ asked the security firm Mandiant to help determine whether the server had been hacked. It also engaged Microsoft, though it’s not clear why the software maker was also brought onto the investigation…

Continue reading SolarWinds Detected Six Months Earlier

CISA releases free tool for detecting malicious activity in Microsoft cloud environments

Network defenders searching for malicious activity in their Microsoft Azure, Azure Active Directory (AAD), and Microsoft 365 (M365) cloud environments have a new free solution at their disposal: Untitled Goose Tool. Released by the Cybersecurity and In… Continue reading CISA releases free tool for detecting malicious activity in Microsoft cloud environments

Microsoft announces automatic BEC, ransomware attack disruption capabilities

Last year, Microsoft announced automatic attack disruption capabilities in Microsoft 365 Defender, its enterprise defense suite. On Wednesday, it announced that these capabilities will now help organizations disrupt two common attack scenarios: BEC (bu… Continue reading Microsoft announces automatic BEC, ransomware attack disruption capabilities

Intruder dwell time jumps 36%

Sophos released the Active Adversary Playbook 2022, detailing attacker behaviors that Sophos’ Rapid Response team saw in the wild in 2021. The findings show a 36% increase in dwell time, with a median intruder dwell time of 15 days in 2021 versus 11 da… Continue reading Intruder dwell time jumps 36%

Attackers are leveraging Follina. What can you do?

As the world is waiting for Microsoft to push out a patch for CVE-2022-30190, aka “Follina”, attackers around the world are exploiting the vulnerability in a variety of campaigns. A complex vulnerability Microsoft has described CVE-2022-301… Continue reading Attackers are leveraging Follina. What can you do?

Perimeter intrusion detection systems market to reach $21.3 billion by 2026

The global market for perimeter intrusion detection systems estimated at $11 billion in the year 2020, is projected to reach a revised size of $21.3 billion by 2026, growing at a CAGR of 11.9% over the analysis period, according to ResearchAndMarkets. … Continue reading Perimeter intrusion detection systems market to reach $21.3 billion by 2026

Perimeter intrusion detection systems market to reach $5.98 billion by 2026

The global perimeter intrusion detection systems market is expected to witness an incremental growth of $5.98 billion between 2021 and 2026. Technavio expects the growth to accelerate at a CAGR of 9.2% during the forecast period and the market will obs… Continue reading Perimeter intrusion detection systems market to reach $5.98 billion by 2026

How much can you trust your printer?

In this interview with Help Net Security, Scott Best, Director of anti-tamper security technology at Rambus, talks about what organizations should be aware of when it comes to printer security and what they should do to remain secure. Printers often go… Continue reading How much can you trust your printer?