November 18, 2023


Hello all,

Patch-mageddon happened this past week – Adobe, AMD, Fortinet, Intel, Microsoft, VMware, and others, released patches for fixes and vulnerabilities in their products. The sheer volume is a tad overwhelming, and as we’re seeing, it is showing no signs of slowing down. It is a continual struggle for defenders to keep up with the needed measures to maintain both function and security. So, without further ado, let’s get to the news so we can understand what’s out there and what to prioritize.

The volume of news and other can appear overwhelming, the best strategy is to read the Notable Callouts below and then skim the full list of linked news item titles that follow for things that pertain to you or your environment or simply interest you, and then selecting them for more information. So, let’s get to it. And don’t forget, our site, https://red-n-security.com also has searchable archives of past newsletters.

Notable Callouts:

  • Adobe releases patches on the same cycle as Microsoft, so the fact that they released them this past Tuesday was no surprise. However, the volume was. Adobe put forth 72 patches and made special mention regarding Acrobat Reader which has 17 flaws that on unpatched Windows and macOS systems lead to arbitrary code execution and memory leaks.
  • AMD and Intel both released a massive amount of updates – 130 of them together – to address recently revealed issues in their processors. AMD also released patches for graphics drivers.
  • CrushFTP is a very capable graphical FTP server for both Windows and Linux. They’ve released updates for a critical vulnerability in their software. Anything below version 10.5.5 is vulnerable and needs to be upgraded.
  • Fortinet has been quiet for a month and must have been needing to see their name in the patch cycle again. They’ve released patches for FortiClient, FortiGate, and FortiSIEM. They state, “Cyber threat actors may exploit some of these vulnerabilities to take control of an affected system.” So, check your versions and patch quickly if you are affected.
  • Microsoft unleashed patches to address 64 vulnerabilities on Tuesday. 5 are classified as zero-day, meaning that they are already in active exploitation in the wild. Vet the patches quickly, and apply them soon or risk falling victim.
  • Ransomware dirtbags ALPHV/BlackCat have had the audacity to file an SEC complaint that one of their victims, MeridianLink, didn’t file form K-8 within the four-day reporting period. Actually evil-dark-kitty, the rule requiring notification doesn’t go into effect until December 15.
  • VMware has revealed that their Virtual Cloud Director Appliance has a critical auth bypass, if it was upgraded from an earlier version. They offered no patch but have provided mitigation guidance.
  • Zero Days in Edge Devices, things such as cameras, industrial routers, internet connected pumps, motors, etc. are the new prize for threat actors. These things are rarely updated, nor are they effectively monitored. This makes them the perfect beachhead for deeper attacks into a company that has them in use. This is rapidly evolving into the next frontier of cyberwarfare.

In Ransomware, Malware, and Vulnerabilities News:

  • ACSC (Australian Cyber Security Centre) and CISA have released step-by-step instructions in how to do Business Continuity (Business Continuity in a Box). If your business doesn’t have one, this would be a great place to start.

In Other News Events of Note and Interest:

  • Amazon’s new operating system named, Vega OS, has been seen in the wild on a 3rd generation Echo Show. It will be interesting to see how many places this appears in the near future and how quickly Amazon replaces their dependence on Android.
  • Microsoft has unleashed an new AI tool to create deepfakes. Oh sure, they claim that it won’t do that and that it is to be used for creating avatars for personal use. Time will tell.
  • Windows 11 23H2 is starting to get pushed out by Microsoft.

In Cyber Insurance News:

  • Companies are getting smarter, less companies are paying ransoms due to better backups and encryption practices. Score a small win for the good guys.

Here in North America, this coming week is Thanksgiving Day. It is a day set aside to show gratitude, both to our maker, and to our fellow man. I’m grateful for our readers and pray that you have a blessed week. Remember to keep the shields up. The Threat Actors of the world know that a long weekend is coming up – and they don’t take a holiday.

Viscount Zebulon Wamboldt Pike
Red-N Weekly Cyber Security News

Headline NEWS

Ransomware, Malware, and Vulnerabilities News

Other News Events of Note and Interest

Other News Events of Note and Interest

Share this with: