July 29, 2023


Hello all,

When the Headline NEWS list started this week, it appeared that the company names would begin only with the English vowels, but as the week went on a few other companies and items merited inclusion. We start with several A-List vendors, going all the way down to Z for Zimbra.

As usual, the complete the Red-N Weekly Cyber Security News newsletter report is below the Notable Callouts. Don’t forget, our site, https://red-n-security.com, also has searchable archives of past newsletters.

Notable Callouts:

  • AMD has had a new chip bug revealed, Zenbleed. It appears trivial to exploit, watch for patches from AMD and apply them when available.
  • Apple shipped updates for most of their devices for actively exploited vulnerabilities. If you have iFruit, update quickly.
  • Atera has a critical zero-day in their installers for Windows. New installers have been made available that do not have this flaw.
  • Atlassian has been quiet for a while, but this week they’ve patched RCE’s in Confluence and Bamboo. “Successful exploitation of these bugs could lead to system takeover…”
  • Axis makes Cameras and Door controllers. This week several vulnerabilities were revealed in their Axis A1001 network door controller.
  • Elon Musk in a somewhat unusual move, has chosen to rebrand the iconic Twitter brand and blue bird to “X”. Just X. We’ll have to wait and see how this plays out.
  • IBM reported this week, that the average cost of a data breach has risen 2.3% to $4.45 million.
  • Ivanti has a severe bug in their Endpoint Manager Mobile (EPMM), formerly known as MobileIron Core. A patch has been made available.
  • Incandescent Lightbulb Ban goes into effect on Tuesday, marking the end of an era of a technology that revolutionized the world. You can still own and use them, but the USA has made their sale illegal. “Manufacturers who violate the ban could face a maximum penalty of $542 per illicit bulb.”
  • Oracle in their new licensing terms, has decided that companies need to pay 2 to 5 times more for the right to use Java.
  • MikroTik Routers are back in the news, a severe privilege escalation flaw has been identified. Patches and guidance are available from the vendor.
  • SEC the United States Security Exchange Commission has new rules coming to public companies that require reporting of cyber incidents within 4 business days of discovery.
  • Zimbra has finally released a patch for the flaw in their Zimbra Collaboration Suite (ZCS) email server that was revealed on July 13th. There has been mitigation guidance available, but now there is a fix from them as well.
  • In Ransomware, Malware, and Vulnerabilities News, an emerging item is the Terrestrial Trunked Radio (TETRA) system has been shown to have flaws that allow communication to be intercepted, and even altered or injected. The European Telecommunications Standards Institute (ETSI) takes umbrage at the findings and responded by saying, “it adheres to export control regulations, and that any weaknesses in the security of TETRA would be due to that rather than a deliberate backdooring of the technology.”

    In a bit of good news, there is a report that security training does in fact work and Human Cyber-Risk can be demonstrably mitigated.

    And finally, in what is supposed to be a good report, CSO Online reports that only 23% of organizations are still vulnerable to MOVEit flaws. That’s nearly a quarter of the organizations that use it!
  • In Other News Events of Note and Interest, Microsoft has a bunch of entries, one of particular note is that Windows Software Update Servers (WSUS) will need some PowerShell scripting to be added to their schedulers so that they continue to function.
  • In Cyber Insurance News, a good read about why CISO’s should be involved in Cyber Insurance Negotiation. “Having the CISO at the table when negotiating with insurance brokers or carriers is a best practice for ensuring that insurers understand not only which security controls are in place, but why the controls are configured the way they are and the organization’s strategy.”

Security is only as good as your weakest link. If you fortify all of the electronic external points of entry but allow the “cable guy” into your server room unsupervised, you may be exposing yourself to any number of physical attacks. Make sure your physical security is as effective as your electronic.

Viscount Zebulon Wamboldt Pike
Red-N Weekly Cyber Security News

Headline NEWS

Ransomware, Malware, and Vulnerabilities News

Other News Events of Note and Interest

Cyber Insurance News

Share this with: