February 24, 2023

Hello all,
The Red-N Weekly Security newsletter is below the Notable Callouts as usual.

Notable Callouts:

  • Carbon Black from VMware has a critical injection vulnerability. Update immediately!
  • Fortinet bug revealed last week is now under active exploitation. Patch now!
  • Ava Labs Avalanche has a zero-day vulnerability with no patch. If your crypto company is using this protocol, switch your funds elsewhere as soon as possible.
  • Windows Server 2022 may have issues with the latest Patch Tuesday patches even in bare-metal installations when secure boot is enabled. It appears to be primarily older hardware with the issue. Reports are not conclusive.
  • VMware released a patch for the above issue for VMware ESXi 7.0. If you have any Windows 2022 servers with secure boot enabled in this environment, apply the VMware patch or risk your server becoming unbootable.
  • US Military has had some sensitive emails exposed online for two weeks via a misconfigured Azure server. Anyone that knew the IP could access the emails.
  • Microsoft is restricting new inbound connectors for Microsoft Exchange servers, necessitating a support call to have them activated.
  • Also in Microsoft Exchange news, Microsoft is now asking admins to re-enable AV/MDR/XDR scanning of some folders they’d previously asked to have excluded.
  • Dish Network at this point, appears to have been completely compromised by Ransomware or similar evil. Most everything is currently offline or inaccessible.
  • In Other News Events of Note and Interest, NIST is planning to overhaul and release a reform of their Cybersecurity Framework. The draft proposal is available for public review. Notably, “a new ‘Govern’ function will join the existing five precepts – Identify, Protect, Detect, Respond, and Recover”
  • In Cyber Insurance News, new threat actor HardBit is asking victims of their ransomware to secretly email them with policy payout amounts so that HardBit knows how much ransom to demand.

Having incomplete security coverage, meaning devices that don’t have your tools and monitoring on them, is worse than not having any coverage. In the latter case, you know you are exposed and as a result will likely be hyper vigilant. In the former case, you have a false sense of security and are ripe for the picking for a Threat Actor who stumbles upon the unprotected asset, who will then use it as their beachhead for attack. Proactive asset scanning, identification, and isolation (if needed) are vital to protect an enterprise.

Visc. Zebulon Wamboldt Pike

Headline NEWS

Ransomware, Malware, and Vulnerabilities News

Other News Events of Note and Interest

Cyber Insurance News

For a PDF version of this week’s report, click here.

Share this with: