Nvidia released updates to its users after security researchers and the Nvidias Product Security Team found 16 vulnerabilities in the Nvidia driver and software packages. One of the vulnerabilities found in the driver package allows for an escalation of privileges and could allow full control of the system. Drivers tend to have administrative privileges and so this creates a … [Read more...]
Zyxel Adds a Built-in User With A Easy To Find Password
Zyxel, a firewall and AP vendor, released a firmware update to their devices that included an unexpected, built-in admin user account called "zyfwp". Folks in information security often characterize this sort of hidden and hardcoded accounts as a “backdoor” account, even though it is hard to say if the vendors who do this do so intentionally or accidentally. First found by … [Read more...]
Understanding Fileless Malware Outside the Network
Fileless malware has been making headlines over the past year, taking center stage as one of today’s most prominent threat categories. According to Cisco, fileless attacks were the most common threat targeting endpoints in the first half of 2020. To prevent this type of malware effectively, organizations need to establish a deep understanding of how it works in … [Read more...]
SolarWinds Lenient Security Practices Are Not Unique to Any One Organization
The SolarWinds debacle has reminded us all of one crucial aspect of vital infrastructure: human error. Standards, procedures, and processes are in place to ensure the implementation of a secure baseline. These plans and mechanisms are developed so that organizations have clear instructions to follow for best security practices. The challenge with technology is it is developed … [Read more...]
FBI Indicates Possible Second Hack By APT29
As news of the recent SolarWinds hack still unfolds, new information about APT29 possibly hacking a second major technology supplier could cause major disruptions. "CISA is investigating other initial access vectors in addition to the SolarWinds Orion supply chain compromise. " the CISA report reads. This statement replaces a previous statement indicating there was another … [Read more...]