Network Security News Weekly

Current cybersecurity news to keep you informed.
IT Services | Government | Financial | Healthcare | Non-Profit

Articles of interest from the week of May 7, 2018


FacexWorm Targets Cryptocurrency Trading Platforms, Abuses Facebook Messenger for Propagation
FacexWorm is delivered through socially engineered links sent to Facebook Messenger. The links redirect to a fake YouTube page that will ask unwitting users to agree and install a codec extension (FacexWorm) in order to play the video on the page. It will then request privilege to access and change data on the opened website. (By: , Trend Micro)

Microsoft Releases Security Update For Windows Host Compute Service Shim (hcsshim)
A remote code execution vulnerability exists when the Windows Host Compute Service Shim (hcsshim) library fails to properly validate input while importing a container image. To exploit the vulnerability, an attacker would place malicious code in a specially crafted container image which, if an authenticated administrator imported (pulled), could cause a container management service utilizing the Host Compute Service Shim library to execute malicious code on the Windows host. (By: , Microsoft)

A critical security flaw in popular industrial software put power plants at risk
A severe vulnerability in a widely used industrial control software could have been used to disrupt and shut down power plants and other critical infrastructure. It's the latest vulnerability that risks an attack to the core of any major plant's operations at a time when these systems have become a greater target in recent years. The report follows a recent warning, issued by the FBI and Homeland Security, from Russian hackers. (By: , Zero Day)

Two-thirds of critical infrastructure firms have suffered service outages in last two years
More than two-thirds of critical infrastructure firms have suffered service outages within the last 2 years, with 35% of these down to cyber-attacks. 70% of CNI firms, including fire & rescue services, police forces, health care & energy suppliers, have suffered from IT service outages in the past 2 years, according to a recent study. (By: , Information Age)

THE HIDDEN RISKS OF SSH
Because SSH comes pre-installed, most organizations have no group or individual responsible for monitoring SSH activities. In fact, most businesses make the leap that SSH equals encryption and encryption equals security. And who doesn’t want more encryption and security? The premise that encryption alone negates the need for vigilance and oversight of SSH use is dangerously flawed. (By: , Data Center Journal)

KRACK Wi-Fi vulnerability can expose medical devices, patient records
KRACK, which stands for Key Reinstallation Attack, exploits a flaw in the Wi-Fi Protected Access II (WPA2) protocol which is used to secure modern wireless networks. If exploited, KRACK gives threat actors the key required to join wireless networks which would otherwise require a password for authentication. Once they have joined, they can snoop on network traffic, perform Man-in-The-Middle (MiTM) attacks, hijack connections, and potentially send out crafted, malicious network packets. (By: , Zero Day)

Why the Rest of the World Can’t Free Ride on Europe’s GDPR Rules
GDPR could become a model for the rest of the world, the argument goes, since many global companies serve users in the EU. Firms will have to adapt to these regulations anyway, and it could make business sense for them to implement these digital privacy principles worldwide. Either way, it’s tempting to think that the biggest challenges to privacy in the digital age would be addressed and that would be the end of the matter. (By: , Harvard Business Review)

NIST Updates Cybersecurity Framework to Tackle Supply Chain Threats, Vulnerability Disclosure
Four years after the initial iteration was released, the National Institute of Standards and Technology (NIST) has released version 1.1 of the Framework for Improving Critical Infrastructure Cybersecurity. (By: , Threat Post)



Sign Up For Netsec News Weekly

Ingalls Information Security
TOP