IMPERVA DATA EXPOSURE – WAF CUSTOMERS AFFECTED

Priority: High Executive Summary: Imperva, an Internet Firewall Services provider has announced that on Tuesday 20th August they were alerted by a third party to a data exposure that includes email addresses, hashed and salted passwords and, for a subset of the Incapsula customers, hashed API keys and customer-provided SSL certificates for Cloud WAF customers […]

To the fullest extent possible

Last month my car was stolen and I have, out of necessity, been talking far too much to my insurance company, its agents, a recovery company, the Met, an unidentifiable intermediary of some kind and now a repair yard. Each has sent me numerous communications – some by post, some by email, one by Dropbox […]

Do not pass ‘Go’

Readers who managed to read this blog to the end last week will have read this: Finally, if you have implemented HTTP/2 services for public consumption, be aware that there are a number of network level bugs which can very simply take your servers off the air (the same servers that can be easily identified using […]

KUBERNETES DENIAL OF SERVICE VULNERABILITIES (CVE-2019-9512, CVE-2019-9514)

Priority: High Executive Summary: Two severe vulnerabilities allowing for easy Denial of Service attacks against almost all versions of Kubernetes clusters have been released this week as part of a set of HTTP/2 implementation vulnerabilities. Kubernetes is an open-source container-orchestration system – analogous to lightweight virtual machines, with less of a requirement for isolation from […]

Cyber Incident Response – Boardroom Planning is Key

Reacting immediately to a cyber event could save your reputation. Data breaches, resulting in exposed credentials and damage to brand and reputation, continue to make headline news. As a result, cyber incident response is gaining more high-profile attention in the media and, crucially, in boardrooms across all industries. But, according to the UK Government’s 2020 […]

Micro Soft Target

Over the previous weeks, months and even years you will have read about serious vulnerabilities in Microsoft’s RDP code which appear to be cropping up with increasing regularity. Only last week we talked about the fact that RDP code is used in the management connectivity for Hyper-V and was vulnerable to fairly straightforward abuse enabling […]

Who monitors employee monitoring when AI is in the driving seat?

Article by Davey Winder – SC Magazine Enterprises are increasingly monitoring employees by way of their email and social media usage. Given that increasingly this kind of monitoring is being done by AI-powered technologies, there are ethical questions that have to be asked. So SC Media UK asked them. When Gartner surveyed large organisations last […]

BLUEKEEP II, III, IV AND V REMOTE DESKTOP SERVICES AND DHCP ‘WORMABLE’ VULNERABILITIES

Priority: High Executive Summary: Microsoft have discovered 4 new remote code execution vulnerabilities in their Remote Desktop Services, similar to the recently patched ‘BlueKeep’ RDP vulnerability, affecting a number of Windows versions (see Affected Products for more information)[1-4]. The original BlueKeep vulnerability was reported by ITC in a previous Threat Horizon: https://itcsecure.com/remote-desktop-services-wormable-vulnerability/ The security flaws, […]

It’s all about the vector Vernon

Warning! This is a bit of a long one, a holiday special, but there is a prize for the most eagle-eyed readers. Details below. There we were post/during/pending holiday mode, rather hoping we would be resting on our laurels, when a wave of cyber breaches brought us to our senses just as we were trying […]