Microsoft’s February Security Patches Deliver 12 “Critical” Fixes Among Others

Microsoft has released a hundred patches to Windows and other Microsoft software, including 12 vulnerabilities flagged as Critical, and 87 flagged as Important. Products such as Microsoft’s browsers, Windows, Office, Exchange Server and even the Windows Malicious Software Removal Tool received updates (see Release Notes).  Most of the critical bugs are remote code execution and memory corruption bugs […]

Microsoft claims new malware, Dexphot, infected more than 80,000 computers

Microsoft reportedly confirms that a new strain of malware called Dexphot has silently infected more than 80,000 computers since last year. While most malware are designed to gather confidential user information and other sensitive data, Dexphots operates a little differently. According to Microsoft’s security team, this malicious code works its way around the system and […]

Bridging the Office 365 Insider Threat Security Gap

While Microsoft Office 365 maintains robust  security features, it may not offer the granularity that many enterprises need. When Microsoft Office 365 isn’t maintained and configured properly, it can put  security and compliance requirements in doubt. Here’s what you need to know about the  security features  included in  Office 365 Enterprise, and what companies should […]

We are the enemy | A Look at Insider Threats

Every company needs to be aware of insider threats. The source of insider threats are employees or administrators that make mistakes or purposefully damage your organization’s IT Systems. Insider threats are pervasive and difficult to defend against, and they require proactive security measures and extensive training to defeat. A company’s worst enemies can be its employees—whether they […]

Microsoft Releases Security Updates to Address Remote Code Execution Vulnerabilities

Microsoft has released security updates to address two remote code execution vulnerabilities, CVE-2019-1181 and CVE-2019-1182, in the following operating systems: Windows 7 SP1 Windows Server 2008 R2 SP1 Windows Server 2012 Windows 8.1 Windows Server 2012 R2 Windows 10 Windows Server 2016 Windows Server 2019 An attacker could exploit these vulnerabilities to take control of […]

FBI charges former AWS engineer in Capital One breach

The FBI arrested a former AWS engineer who allegedly stole data for more than 100 million Capital One customers and credit card applications, thanks to a misconfigured firewall. The FBI arrested and charged a former AWS engineer Monday in connection with a massive data breach at Capital One. Paige A. Thompson, 33, is accused of […]

US Government Security Agency Warns of Office 365 Security Misconfigurations

On Monday, 5/13/2019, the Cybersecurity and Infrastructure Security Agency (CISA) warned Office 365 users and their technology partners about common Office 365 misconfigurations. Note: CISA is the new standalone agency within the Department of Homeland Security that functions as the lead national government unit on civilian cybersecurity. A CISA analysis report titled “Microsoft Office 365 […]

Verizons’ 2019 Data Breach Investigations Report

Every year Verizon creates a report that covers previous period cyber breaches. That report has now been released. Not only is this report relevant to IT security professionals, but anyone that regularly uses a device to connect to the internet. Check out Verizons’ Data Breach Investigations Report.

Is your Active Directory security relying on a single check-box?

Don’t trust your Active Directory Security to a single check-box! Trusting the disable check box in Active Directory is risky if additional steps are not taken to ensure the the user account will not be re-enabled with unintended (possibly disastrous) consequences. Often the best practice steps are overlooked or not followed because of the additional […]

Massive Attacks Bypass MFA on Office 365 and G Suite Accounts via IMAP Protocol

Multi-factor authentication can prevent accounts from being accessed if passwords are stolen or obtained using brute force tactics; however, Proofpoint has discovered that multi-factor authentication is being bypassed on Office 365 and G Suite accounts using the legacy IMAP protocol. Massive IMAP-based password-spraying attacks successfully breached Microsoft Office 365 and G Suite accounts, circumventing multi-factor […]