News

Latest news on the subject of B2B cyber security >>> PR agencies: Add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Samsung server software attacked by exploit
B2B Cyber ​​Security ShortNews

A vulnerability was discovered in Samsung MagicINFO 9 in August 2024. After a research report was published in April, an exploit for the CVE-2024-7399 vulnerability emerged and was immediately exploited. Recent security reports from Huntress and Arctic Wolf address a critical vulnerability in Samsung MagicINFO 9 Server, registered as CVE-2024-7399. This is a security flaw in a content management system used to manage digital advertising displays. The vulnerability allows unauthorized file transfer, allowing attackers to upload a web shell and subsequently execute remote code.

Read more

Security platform for cloud and on-premise environments
Security platform for cloud and on-premise environments - Image by Urban Origami on Pixabay

New security platform for converging cloud and on-premises environments: The AlgoSec Horizon platform enables organizations to secure applications in complex, converging cloud and on-premises network environments with AI-driven visibility, automation, and risk mitigation. The first application-centric security management and automation platform, the AlgoSec Horizon platform, was specifically designed for hybrid networks. Through its application-centric security approach, the platform enables security teams to consistently manage application connectivity and security policies across both cloud and data center environments. Greater visibility for complex networks: "Networks today are 100 times more complex than they used to be, partly due to the rapid acceleration of application delivery. Therefore, organizations must…

Read more

Cloud SIEM for real-time threat detection 
Cloud SIEM for real-time threat detection Image: Bing - AI

Modern cloud SIEM is designed to provide real-time threat detection and efficient monitoring. Datadog's cloud SIEM uses modern architectures and machine learning to better protect companies. Cloud SIEM gives companies comprehensive, risk-based insights and is a scalable solution - without the need for dedicated employees or specialized teams. This approach simplifies onboarding, reduces migration risks and makes security practices more accessible, while at the same time making traditional, costly models obsolete. Cloud SIEM for better source integration Traditional SIEM solutions are increasingly facing major challenges. They often have difficulty integrating data from different sources...

Read more

Five local vulnerabilities discovered in needrestart
Five local vulnerabilities discovered in needrestart

A provider of cloud-based IT, security and compliance solutions, announced that the Qualys Threat Research Unit (TRU) identified five Local Privilege Escalation (LPE) vulnerabilities in the needrestart component, which is installed by default on Ubuntu Servers. These vulnerabilities can be exploited by any non-privileged user to gain full root access without requiring user interaction. The identified vulnerabilities have been assigned CVE identifiers CVE-2024-48990, CVE-2024-48991, CVE-2024-48992, CVE-2024-10224 and CVE-2024-11003, highlighting the need for immediate remediation to protect system integrity. The Qualys TRU team has successfully developed functional exploits for…

Read more

BSI: Thousands of Exchange servers still vulnerable
B2B Cyber ​​Security ShortNews

The current figures from CERT regarding outdated Microsoft Exchange servers in Germany are alarming. According to the report, 28% of Exchange servers 2016/2019 with open Outlook Web Access (OWA) are on a patch level that is more than six months old. The warnings from CERT - the Computer Emergency Response Team of the BSI are alarming, especially since the issue of unpatched Exchange servers is not new, but an ongoing issue. According to CERT, the patch level for CVE-28-2016 is more than six months old for 2019 percent of Exchange servers 2024/26198 with open Outlook Web Access (OWA). Even more critical is the fact that...

Read more

Microsoft: Defender updates for installation images
B2B Cyber ​​Security ShortNews

Microsoft is updating Windows Defender in the WIM and VHD installation images, including anti-malware definitions and software binaries. Administrators should only use these packages so that new devices are reasonably up-to-date immediately and do not have to wait hours for an update. The Defender update for Windows installation images now also applies to the Windows Imaging Format (WIM) and VHD (Virtual Hard Disk) formats. Windows 11, 10 and Server are supported in this new update, including Server 2016, whose maintenance status ends next year. For this reason, Microsoft has published detailed instructions for uninstalling and decommissioning. Windows Defender…

Read more

Europol: Almost 600 criminal Cobalt Strike servers shut down
B2B Cyber ​​Security ShortNews

Old and unlicensed versions of Cobalt Strike, the legitimate testing tool used by pentesters and red teams, are in the hands of cyber attackers. To counter this, Europol has taken down nearly 600 IP addresses of servers in 27 countries in Operation MORPHEUS. Law enforcement agencies have joined forces with the private sector to combat the misuse of a legitimate security tool by criminals who use it to penetrate victims' IT systems. Older, unlicensed versions of the red teaming tool Cobalt Strike were targeted during an operation coordinated by Europol headquarters. 690 IP addresses in 27 countries…

Read more

400.000 Linux servers were part of the Ebury botnet
B2B Cyber ​​Security ShortNews

IT security manufacturer ESET has published a new research report that reveals the malicious activities of the hacker group "Ebury". It has infected more than 400.000 Linux, FreeBSD and OpenBSD servers with its malware over the past 15 years. In the past 18 months alone, 100.000 new affected servers have been added. In many cases, the Ebury operators were able to gain full access to large servers of Internet providers and well-known hosting providers. The activities of the Ebury group and its botnet over the years have included spreading spam, redirecting web traffic and stealing login data. In recent years,...

Read more

Intel closes critical and highly dangerous security gaps
B2B Cyber ​​Security ShortNews

Intel has almost unobtrusively closed many security gaps in its products. There is a critical gap with the CVSS value of 10.0 for its Neural Compressor software, a tool for optimizing deep learning models. But other highly dangerous gaps with CVSS values ​​7.2 to 7.5 in UEFI server firmware also need to be patched. Intel has identified security vulnerabilities in Intel Neural Compressor Software prior to version 2.5.0 that could lead to elevation of privilege and information leaks. Two vulnerabilities have been identified: CVE-2024-22476 with a critical rating of 10.0 due to insufficient input validation, remote privilege escalation...

Read more

Keylogger steals login data from Exchange servers
B2B Cyber ​​Security ShortNews

The PT ESC Incident Response Team has discovered a new type of keylogger in the main page of a Microsoft Exchange Server. Everyone who logged in there handed over their login data. Many of the victims were probably in contact with government authorities. While responding to an incident, the Positive Technologies Expert Security Center (PT ESC) Incident Response Team discovered an unknown keylogger embedded in the main page of one of their customers' Microsoft Exchange Servers. This keylogger collected account credentials in a file that could be accessed from the Internet via a special path….

Read more