<img src="https://secure.ruth8badb.com/159098.png" alt="" style="display:none;">

IT Security Newsletter - 8/3/2021

SHARE

Top News

Suspected Chinese hackers took advantage of Microsoft Exchange vulnerability to steal call records

Hackers with ties to China took advantage of vulnerabilities in Microsoft Exchange for several months starting in late 2020 to steal call logs from a Southeast Asia telecommunication company, researchers at Cybereason report. The White House last month formally blamed Chinese government-affiliated hacking group HALFNIUM for a massive hacking campaign exploiting vulnerabilities in Microsoft Exchange servers, a kind of mail technology. READ MORE...

Hacking

With Crime-as-a-Service, anyone can be an attacker

Crime-as-a-Service (CaaS) is the practice of experienced cybercriminals selling access to the tools and knowledge needed to execute cybercrime - in particular, it's often used to create phishing attacks. For hackers, phishing is one of the easiest ways to steal your organization's data. Traditionally, executing a successful phishing campaign required a seasoned cybercriminal with technical expertise and knowledge of social engineering. READ MORE...

Malware

The Kaseya ransomware attack: A timeline

The attack on US-based software provider Kaseya by notorious Russia-linked ransomware group REvil in July 2021 is estimated to have affected up to 2,000 global organizations. REvil targeted a vulnerability (CVE-2021-30116) in a Kaseya remote computer management tool to launch the attack, with the fallout lasting for weeks as more and more information on the incident came to light. READ MORE...

Information Security

Windows PetitPotam attacks can be blocked using new method

Security researchers have devised a way to block the recently disclosed PetitPotam attack vector that allows hackers to take control of a Windows domain controller easily. Last month, security researcher GILLES Lionel disclosed a new method called PetitPotam that forces a Windows machine, including a Windows domain controller, to authenticate against a threat actor's malicious NTLM relay server using the Microsoft Encrypting File System Remote Protocol (EFSRPC). READ MORE...

Exploits/Vulnerabilities

SAP applications more vulnerable than users might think

Many application owners are unaware of how vulnerable their SAP applications may be, significantly increasing the risks to their core enterprise systems. This is the overall conclusion of a Turnkey Consulting and Onapsis report. Only 14.3% of respondents believe an external attack is the greatest risk to their SAP environment, despite digital transformation, cloud-first approaches and mobile access increasing the levels of external threat faced by SAP systems. READ MORE...

On This Date

  • ...in 1492, Christopher Columbus leaves Spain on his voyage to the new world.
  • ...in 1807, former Vice President Aaron Burr is put on trial for treason, after allegedly leading a secessionist plot to take over the western territories.
  • ...in 1958, the first nuclear submarine, USS Nautilus, passes under the North Pole.
  • ...in 1977, Tandy unveils the TRS-80 PC, which with Apple and Commodore would form the "1977 Trinity" of affordable home computers.