Here's an easier way to block the IE XXE zero day security hole

Credit to Author: Woody Leonhard| Date: Thu, 18 Apr 2019 09:57:00 -0700

The latest Internet Explorer XXE zero-day depends on you opening an infected MHT file. MHT is an old file format that’s almost always opened by IE — no matter which browser you’re using, no matter which version of Windows. Catalin Cimpanu has a good overview of this XXE vulnerability on ZDNet.

It’s a doozy of a security hole as it affects every recent version of IE, and it infects whether you’re actively browsing with IE or not.

To read this article in full, please click here

Read more

This Week in Security News: Medical Malware and Monitor Hacks

Credit to Author: Jon Clay (Global Threat Communications)| Date: Thu, 18 Apr 2019 13:00:42 +0000

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn how baby monitors may be susceptible to hacking. Also, learn about a medical flaw that enables hackers to hide malware. Read on: Is Your Baby Monitor…

The post This Week in Security News: Medical Malware and Monitor Hacks appeared first on .

Read more

What Did We Learn from the Global GPS Collapse?

Credit to Author: William “Bill” Malik (CISA VP Infrastructure Strategies)| Date: Wed, 17 Apr 2019 13:00:24 +0000

On April 6, 2019, a ten-bit counter rolled over. The counter, a component of many older satellites, marks the weeks since Jan 1, 1980. It rolled over once before, in the fall of 1999. That event was inconsequential because few complex systems relied on GPS. Now, more systems rely on accurate time and position data:…

The post What Did We Learn from the Global GPS Collapse? appeared first on .

Read more

Win7/8.1/Server patch conflicts abated, somewhat, but it’s still too early to install the April crop

Credit to Author: Woody Leonhard| Date: Tue, 16 Apr 2019 08:02:00 -0700

A week ago, Microsoft released six patches that brought many machines to their knees. As I explained last Friday, when the dust cleared, it was apparent that all six of these April patches:

  • Win7 and Server 2008 R2 Monthly Rollup (KB 4493472) and Security-only (KB 4493448) patches
  • Win8.1 and Server 2012 R2 Monthly Rollup (KB 4493446) and Security-only (KB 4493467) patches
  • Server 2012 Monthly Rollup (KB 4493451) and Security-only (KB 4493450 ) patches

would trigger blue screens on reboot on most systems running Sophos antivirus products, and many systems running AV products from Avast and Avira.

To read this article in full, please click here

Read more

Continuing Education On Cyber Threats And Defenses

Credit to Author: Jon Clay (Global Threat Communications)| Date: Tue, 16 Apr 2019 13:00:05 +0000

Anyone who has been in cybersecurity for any length of time knows, the threat landscape is constantly changing and requires regularly monitoring of news, blogs, podcasts, and other ways to ensure you know what is happening today. I have tried to bring this information to the public since starting my monthly threat webinar series in…

The post Continuing Education On Cyber Threats And Defenses appeared first on .

Read more