Category: Security

Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Qualcomm’s Medical Gateway Critical Vulnerability

Cybersecurity Threat Advisory: Qualcomm’s Medical Gateway Critical Vulnerability

What is the Issue? Recently, an undocumented vulnerability in the Qualcomm Life’s Capsule Datacaptor Terminal Server (DTS) medical device gateway was found to be exposed to the “misfortune Cookie” vulnerability CVE-2014-9222. This opens the possibility for remote attackers to gain...

/ May 15, 2019
Catch hackers with a honeypot in your security service

Catch hackers with a honeypot in your security service

I once visited an Amish farm where green plastic 2-liter 7-Up bottles dangled from the lower branches of the fruit trees. The bottles were filled about halfway with some sort of liquid. Upon closer inspection, I could see a banana peel...

/ May 15, 2019
Rising tide of data privacy concerns bodes well for MSPs

Rising tide of data privacy concerns bodes well for MSPs

Data protection is increasingly becoming a board level issue, as the average consumer becomes more cognizant of how the data that organizations collect is being used and abused. On an almost daily basis, a company or organization is being forced...

/ May 9, 2019
Bad actors are using AI in their cyber attacks

Bad actors are using AI in their cyber attacks

The alarms have been going off for some time about the growing role of AI in cyber attacks. In 2017, a survey of cybersecurity professionals found that 91 percent are concerned about AI-powered attacks against companies. More recently, an article in Fortune...

/ May 8, 2019
Making sense of sensors

Making sense of sensors

From pacemakers, to industrial thermostats, to traffic regulation devices, sensors are becoming as ubiquitous as the human population itself. Experts predict that 1 trillion networked sensors will be transmitting data around the world by 2022, emitting information from the mundane to the meaningful....

/ May 2, 2019
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Apache Struts Framework Remote Code Execution Vulnerability

Cybersecurity Threat Advisory: Apache Struts Framework Remote Code Execution Vulnerability

What is the Issue? Apache Struts web framework versions 2.3 to 2.3.34 and 2.5 to 2.5.16 suffer from a critical Remote Code Execution vulnerability that could be exploited by attackers to fully control the application. Apache Struts 2 is a...

/ April 29, 2019
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Trickbot Trojan Continues to Evolve

Cybersecurity Threat Advisory: Trickbot Trojan Continues to Evolve

What is the Issue: A new Trickbot iteration features a sneaky method of performing process-hollowing using direct system calls, anti-analysis techniques and the disabling of security tools. Process-hollowing is a technique used by malware in which a legitimate process is...

/ April 28, 2019
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: DoS Vulnerability in Cisco Web Security Appliance

Cybersecurity Threat Advisory: DoS Vulnerability in Cisco Web Security Appliance

What is the Issue? There exists a vulnerability in the web proxy functionality of Cisco AsyncOS Software for Cisco Web Security Appliances. This happens because of the improper handling of memory resources by this software for TCP connections on any...

/ April 27, 2019
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Microsoft ADFS Multi-Factor Authentication Bypass

Cybersecurity Threat Advisory: Microsoft ADFS Multi-Factor Authentication Bypass

What is the Issue? A vulnerability was discovered in the way multi factor authentication requests are handled by Microsoft’s Active Directory Federation Services (ADFS). It appears that an attacker can compromise a user’s account by bypassing the multi-factor token request....

/ April 26, 2019
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Bitcoin Blackmail Ransom Emails

Cybersecurity Threat Advisory: Bitcoin Blackmail Ransom Emails

What is the Issue? Cyber criminals are sending Bitcoin ransom emails that are attempting to blackmail users into paying ransoms based on leaked password being exposed. These cyber criminals create false narratives that attempt to blackmail you by claiming they...

/ April 25, 2019