1-855-474-1700 - Call Now to Speak to a Client Account Manager
1-855-474-1700

Cyber Security Updates


US-CERT Current Activity https://www.us-cert.gov/ncas/current-activity.xml A regularly updated summary of the most frequent, high-impact security incidents currently being reported to the US-CERT. en Oracle Releases January 2019 Security Bulletin https://www.us-cert.gov/ncas/current-activity/2019/01/15/Oracle-Releases-January-2019-Security-Bulletin

Oracle has released its Critical Patch Update for January 2019 to address 284 vulnerabilities across multiple products. A remote attacker could exploit some of these vulnerabilities to take control of an affected system.

The National Cybersecurity and Communications Integration Center (NCCIC), part of the Cybersecurity and Infrastructure Security Agency (CISA), encourages users and administrators to review the Oracle January 2019 Critical Patch Update and apply the necessary updates.


This product is provided subject to this Notification and this Privacy & Use policy.


]]>
Tue, 15 Jan 2019 22:30:13 +0000 US-CERT 12071 at https://www.us-cert.gov
DNS Infrastructure Hijacking Campaign https://www.us-cert.gov/ncas/current-activity/2019/01/10/DNS-Infrastructure-Hijacking-Campaign

The National Cybersecurity and Communications Integration Center (NCCIC), part of the Cybersecurity and Infrastructure Security Agency (CISA), is aware of a global Domain Name System (DNS) infrastructure hijacking campaign. Using compromised credentials, an attacker can modify the location to which an organization’s domain name resources resolve. This enables the attacker to redirect user traffic to attacker-controlled infrastructure and obtain valid encryption certificates for an organization’s domain names, enabling man-in-the-middle attacks.

NCCIC encourages administrators to review the FireEye and Cisco Talos Intelligence blogs on global DNS infrastructure hijacking for more information. Additionally, NCCIC recommends the following best practices to help safeguard networks against this threat:

  • Implement multifactor authentication on domain registrar accounts, or on other systems used to modify DNS records.
  • Verify that DNS infrastructure (second-level domains, sub-domains, and related resource records) points to the correct Internet Protocol addresses or hostnames.
  • Search for encryption certificates related to domains and revoke any fraudulently requested certificates.

This product is provided subject to this Notification and this Privacy & Use policy.


]]>
Thu, 10 Jan 2019 21:13:54 +0000 US-CERT 12067 at https://www.us-cert.gov
Juniper Networks Releases Multiple Security Updates https://www.us-cert.gov/ncas/current-activity/2019/01/09/Juniper-Networks-Releases-Multiple-Security-Updates

Juniper Networks has released multiple security updates to address vulnerabilities in various Juniper products. A remote attacker could exploit some of these vulnerabilities to take control of an affected system.

The National Cybersecurity and Communications Integration Center (NCCIC), part of the Cybersecurity and Infrastructure Security Agency (CISA), encourages users and administrators to review Juniper’s Security Advisories webpage and apply the necessary updates.


This product is provided subject to this Notification and this Privacy & Use policy.


]]>
Wed, 09 Jan 2019 22:06:39 +0000 US-CERT 12064 at https://www.us-cert.gov
Cisco Releases Security Updates https://www.us-cert.gov/ncas/current-activity/2019/01/09/Cisco-Releases-Security-Updates
Cisco has released security updates to address vulnerabilities in Cisco AsyncOS Software for Cisco Email Security Appliance. A remote attacker could exploit these vulnerabilities to cause a denial-of-service condition.
 
The National Cybersecurity and Communications Integration Center (NCCIC), part of the Cybersecurity and Infrastructure Security Agency (CISA), encourages users and administrators to review the following Cisco Security Advisories and apply the necessary updates:

This product is provided subject to this Notification and this Privacy & Use policy.


]]>
Wed, 09 Jan 2019 19:27:56 +0000 US-CERT 12062 at https://www.us-cert.gov
Microsoft Releases January 2019 Security Updates https://www.us-cert.gov/ncas/current-activity/2019/01/08/Microsoft-Releases-January-2019-Security-Updates

Microsoft has released updates to address multiple vulnerabilities in Microsoft software. A remote attacker could exploit one of these vulnerabilities to take control of an affected system.

The National Cybersecurity and Communications Integration Center (NCCIC), part of the Cybersecurity and Infrastructure Security Agency (CISA), encourages users and administrators to review Microsoft’s January 2019 Security Update Summary and Deployment Information and apply the necessary updates.


This product is provided subject to this Notification and this Privacy & Use policy.


]]>
Tue, 08 Jan 2019 20:40:37 +0000 US-CERT 12061 at https://www.us-cert.gov
Adobe Releases Security Updates https://www.us-cert.gov/ncas/current-activity/2019/01/08/Adobe-Releases-Security-Updates

Adobe has released security updates to address vulnerabilities in Adobe Connect and Adobe Digital Editions. An attacker could exploit one of these vulnerabilities to take control of an affected system.

The National Cybersecurity and Communications Integration Center (NCCIC), part of the Cybersecurity and Infrastructure Security Agency (CISA), encourages users and administrators to review Adobe Security Advisories APSB19-05 and APSB19-04, and apply the necessary updates.


This product is provided subject to this Notification and this Privacy & Use policy.


]]>
Tue, 08 Jan 2019 17:36:07 +0000 US-CERT 12058 at https://www.us-cert.gov
CERT/CC Reports Critical Vulnerabilities in Microsoft Windows, Server https://www.us-cert.gov/ncas/current-activity/2019/01/04/CERTCC-Reports-Critical-Vulnerabilities-Microsoft-Windows-Server

The CERT Coordination Center (CERT/CC) has released information on vulnerabilities affecting versions of Microsoft Windows and Windows Server. A remote attacker could exploit these vulnerabilities to take control of an affected system.

The National Cybersecurity and Communications Integration Center (NCCIC), part of the Cybersecurity and Infrastructure Security Agency (CISA), encourages users and administrators to review CERT/CC’s Vulnerability Notes VU#289907 and VU#531281 and Microsoft’s security advisories for CVE-2018-8611 and CVE-2018-8626 and apply the necessary updates.


This product is provided subject to this Notification and this Privacy & Use policy.


]]>
Fri, 04 Jan 2019 18:34:15 +0000 US-CERT 12052 at https://www.us-cert.gov
Adobe Releases Security Updates https://www.us-cert.gov/ncas/current-activity/2019/01/03/Adobe-Releases-Security-Updates

Adobe has released security updates to address vulnerabilities in Adobe Acrobat and Reader. An attacker could exploit these vulnerabilities to take control of an affected system.

The National Cybersecurity and Communications Integration Center (NCCIC), part of the Cybersecurity and Infrastructure Security Agency (CISA), encourages users and administrators to review the Adobe Security Bulletin APSB19-02 and apply the necessary updates.


This product is provided subject to this Notification and this Privacy & Use policy.


]]>
Thu, 03 Jan 2019 19:08:15 +0000 US-CERT 12044 at https://www.us-cert.gov
Securing New Devices https://www.us-cert.gov/ncas/current-activity/2018/12/28/Securing-New-Devices

During the holidays, internet-connected devices also known as Internet of Things (IoT) are often popular gifts—such as smart TVs, watches, toys, phones, and tablets. This technology provides a level of convenience to our lives, but it requires that we share more information than ever. The security of this information, and the security of these devices, is not always guaranteed.

The National Cybersecurity and Communications Integration Center (NCCIC), part of the Cybersecurity and Infrastructure Security Agency (CISA), recommends these important steps you should consider to make your Internet of Things more secure:

Use strong passwords. Passwords are a common form of authentication and are often the only barrier between you and your personal information. Some internet-enabled devices are configured with default passwords to simplify setup. These default passwords are easily found online, so they don't provide any protection. Choose strong passwords to help secure your device. See Choosing and Protecting Passwords for more information.

Evaluate your security settings. Most devices offer a variety of features that you can tailor to meet your needs and requirements. Enabling certain features to increase convenience or functionality may leave you more at risk. It is important to examine the settings, particularly security settings, and select options that meet your needs without putting you at increased risk. If you install a patch or a new version of software, or if you become aware of something that might affect your device, reevaluate your settings to make sure they are still appropriate. See Good Security Habits for more information.

Ensure you have up-to-date software. When manufacturers become aware of vulnerabilities in their products, they often issue patches to fix the problem. Patches are software updates that fix a particular issue or vulnerability within your device’s software. Make sure to apply relevant patches as soon as possible to protect your devices. See Understanding Patches for more information.

Connect carefully. Once your device is connected to the internet, it’s also connected to millions of other computers, which could allow attackers access to your device. Consider whether continuous connectivity to the internet is needed. See Securing Your Home Network for more information.


This product is provided subject to this Notification and this Privacy & Use policy.


]]>
Fri, 28 Dec 2018 20:57:01 +0000 US-CERT 12032 at https://www.us-cert.gov
Chinese Malicious Cyber Activity https://www.us-cert.gov/ncas/current-activity/2018/12/20/Chinese-Malicious-Cyber-Activity

The Department of Homeland Security (DHS) Cybersecurity and Infrastructure Security Agency (CISA) released information on Chinese government malicious cyber activity targeting global information technology (IT) service providers—such as managed service providers and cloud service providers—and their customers. These threat actors are actively exploiting trust relationships between IT service providers and their customers.

NCCIC, part of CISA, encourages users and administrators to review the page on Chinese Malicious Cyber Activity for more information.


This product is provided subject to this Notification and this Privacy & Use policy.


]]>
Thu, 20 Dec 2018 16:21:41 +0000 US-CERT 12024 at https://www.us-cert.gov