Recent news reminds us that vulnerabilities persist in critical infrastructure platforms targeted by financially motivated and state-sponsored espionage threat actors. We're constantly hearing about the exploitation of old and new vulnerabilities as part of cyberattacks. While vulnerability management may be challenging, we must be vigilant and look for ways to improve our cybersecurity defenses. Implementing … Continue reading External Attack Surface Management and its Integration with Cybersecurity Operations
Category: Vulnerability
Quick Take: Proof-of-Concept Exploiting Windows CryptoAPI Spoofing Vulnerability Released
On January 25, 2023, Akamai Security Research released proof-of-concept code that exploits CVE-2022-34689, Windows CryptoAPI Spoofing Vulnerability. The Windows CryptoAPI is the "de facto API in Windows for handling anything related to cryptography.", Akamai researchers explained. This point makes any vulnerability in the Windows CryptoAPI particularly concerning. "According to Microsoft, the vulnerability allows an attacker … Continue reading Quick Take: Proof-of-Concept Exploiting Windows CryptoAPI Spoofing Vulnerability Released
Quick Take: Microsoft Products Ending Support in 2023
On November 8, 2022, Microsoft posted information about their products ending support in 2023. Organization should check this information annually. If you haven't reviewed Microsoft's products ending support in 2023, now is a good time to do so. Microsoft's post includes: Product Retirements Release End of Servicing Products Reaching End of Support Products Moving to … Continue reading Quick Take: Microsoft Products Ending Support in 2023
The Assault on Microsoft Exchange Server
Microsoft products have been a favorite target of threat actors since the creation of computer viruses such as Brain and Morris in 1986 and 1988, respectively. Microsoft Exchange Server is an attractive target for threat actors trying to gain access to corporate networks to perform discovery operations and to deploy malware, including ransomware. Over the past two years, multiple sources have reported on their investigations and research … Continue reading The Assault on Microsoft Exchange Server