July 8, 2023


Hello all,

The Red-N Weekly Cyber Security News newsletter is below the Notable Callouts as usual and can be found online as well at https://red-n-security.com, where we have a searchable archive.

Notable Callouts:

  • Barracuda leads the headlines with an ongoing email gateway login issue that they say they’ll have fixed by July 14. This new problem is right on the heels of their unprecedented compromise issue that prompted a recall and free replacement of infected Email Secure Gateway devices in May.
  • Cisco has a major bug in some of their data-center class switches that allow for traffic eavesdropping.
  • Fortinet despite having made patches available, still has over 300,000 firewalls out on the internet that are vulnerable to a critical Remote Code Execution attack. Unbelievable, sounds like some people need to find a new line of work.
  • Google used to have the motto of “Do no evil.” I suspect their new motto is we’ll do whatever we want to do. Their newly updated “privacy policy” essentially says that if it is publicly available on the internet, they’ll use it in their AI projects. Sounds a bit malevolent to me.
  • JumpCloud directory services has apparently experienced an incident. If you use this service, get in touch with them ASAP for guidance if they haven’t already contacted you.
  • Kyocera released firmware patches and notices for European Union customers to address a significant security vulnerability. But North American Kyocera customers have been kept in the dark. There have been no notices, nor items published on Kyocera’s North American servers. So far, no explanation has been offered for this disparity.
  • Linux Kernels have a new update to mitigate a vulnerability named “StackRot”. Check if your favorite distro has an update and apply it if it does.
  • MOVEit continues to make news for bad reasons. New victims continue to be exposed, and now three new vulnerabilities were found and subsequently patched. Progress Software just can’t catch a break.
  • In Ransomware, Malware, and Vulnerabilities News, a developer from the US Navy has created and published a Red Team tool named TeamsPhisher to hack Microsoft Teams. Nevertheless, Microsoft maintains that the exploit method used is a feature, not a bug, and they won’t fix it since administrators can mitigate it. One more item of particular note is that Ghostscript, an open-source PDF rendering engine, has a ‘feature’ that can be used for Local Privilege Escalation (LPE). A fix has been created, and if you have a stand-alone version, update it. However, this bug will be around for a while because Ghostscript is part of many other projects and software that render PDFs.
  • In Other News Events of Note and Interest, Microsoft has a new product, Windows 365 Frontline, whose licensing model appears to finally make economic sense to use their cloud PCs in a business environment, particularly if you have multiple shifts of workers.
  • In Cyber Insurance News, an article about the University of California’s legal fight with Lloyd’s of London. And one encouraging news report, rates actually appear to have dropped 10% in June.

Situational awareness is a personal responsibility, and so is Security Awareness. You cannot let your guard down and must remain vigilant. It is vital that you pay attention to potential red flags in email, web search results, and shopping pages. Mrs. Visc. ZW. Pike was a victim of credit-card fraud this past week. Fortunately, she was vigilant and noticed the nearly $5,000 charge in less than 24 hours when checking her online statement and was able to institute a timely dispute. Based on web history, my best guess is that an online shopping cart she’d recently used for the first time had been compromised.

Remain vigilant, they really are out to get you!

Viscount Zebulon Wamboldt Pike
Red-N Weekly Cyber Security News

Headline NEWS

Ransomware, Malware, and Vulnerabilities News

Other News Events of Note and Interest

Cyber Insurance News

Share this with: