[HackerNews] The Increased Liability of Local In-home Propagation

Today I discuss an attack vector conducive to cross-organizational spread, in-home local propagation. Though often overlooked, this vector is especially relevant today, as many corporate employees remain working from home.
In this post, I contrast in-home local propagation with traditional vectors through which a threat (ransomware in particular) spreads throughout an organization. I discuss the

Source: Read More (The Hacker News)

You might be interested in …

[BleepingComputer] Microsoft pushes emergency update for Windows PrintNightmare zero-day

Microsoft has released the KB5004945 emergency security update to address the actively exploited PrintNightmare zero-day vulnerability in the Windows Print Spooler service impacting all Windows versions. […] Source: Read More (BleepingComputer)

Read More

Daily NCSC-FI news followup 2021-07-07

Out-of-Band (OOB) Security Update available for CVE-2021-34527 msrc-blog.microsoft.com/2021/07/06/out-of-band-oob-security-update-available-for-cve-2021-34527/ Today Microsoft released an Out-of-Band (OOB) security update for CVE-2021-34527, which is being discussed externally as PrintNightmare. This is a cumulative update release, so it contains all previous security fixes and should be applied immediately to fully protect your systems.. Lisäksi:https://us-cert.cisa.gov/ncas/current-activity/2021/07/06/microsoft-releases-out-band-security-updates-printnightmare. Lisäksi: msrc.microsoft.com/update-guide/vulnerability/CVE-2021-34527. Lisäksi: www.darkreading.com/endpoint/microsoft-releases-emergency-patch-for-printnightmare-flaw. Lisäksi: www.bleepingcomputer.com/news/security/microsoft-pushes-emergency-update-for-windows-printnightmare-zero-day/. […]

Read More

[BleepingComputer] Microsoft: SEO poisoning used to backdoor targets with malware

Microsoft is tracking a series of attacks that use SEO poisoning to infect targets with a remote access trojan (RAT) capable of stealing the victims’ sensitive info and backdooring their systems. […] Source: Read More (BleepingComputer)

Read More

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.