Author: DEFENDEDGE

  • Incident Response Plan

    Due to the ever-changing threat that cybersecurity poses, any organization is at risk of being a victim of a cyber-attack. This means a company risks their reputation, revenue, and their client’s trust if they do not have the proper security measures in place to prevent their data from being compromised.   An Incident Response Plan (IRP) is a set of tools and… Read more

  • Netgear Authentication Bypass Allows Router Takeover

    Microsoft researchers discovered the firmware flaws in the DGN-2200v1 series router that can enable authentication bypass to take over devices and access stored credentials. Read more

  • Indexsinas SMB Worm Campaign Infests Whole Enterprises

    The self-propagating malware’s attack chain is complex, using former NSA cyberweapons, and ultimately drops cryptominers on targeted machines. Read more

  • PrintNightmare, Critical Windows Print Spooler Vulnerability

    Original release date: June 30, 2021 The CERT Coordination Center (CERT/CC) has released a VulNote for a critical remote code execution vulnerability in the Windows Print spooler service, noting: “while Microsoft has released an update for CVE-2021-1675, it is important to realize that this update does not address the public exploits that also identify as… Read more

  • CISA’s CSET Tool Sets Sights on Ransomware Threat

    Original release date: June 30, 2021 CISA has released a new module in its Cyber Security Evaluation Tool (CSET): the Ransomware Readiness Assessment (RRA). CSET is a desktop software tool that guides network defenders through a step-by-step process to evaluate their cybersecurity practices on their networks. CSET—applicable to both information technology (IT) and industrial control… Read more

  • Why MTTR is Bad for SecOps

    Kerry Matre, senior director at Mandiant, discusses the appropriate metrics to use to measure SOC and analyst performance, and how MTTR leads to bad behavior. Read more

  • Zero-Day Used to Wipe My Book Live Devices

    Threat actors may have been duking it out for control of the compromised devices, first using a 2018 RCE, then password-protecting a new vulnerability. Read more

  • PoC Exploit Circulating for Critical Windows Print Spooler Bug

    The “PrintNightmare” bug may not be fully patched, some experts are warning, leaving the door open for widespread remote code execution attacks. Read more

  • Microsoft Translation Bugs Open Edge Browser to Trivial UXSS Attacks

    The bug in Edge’s auto-translate could have let remote attackers pull off RCE on any foreign-language website just by sending a message with an XSS payload. Read more

  • CISA Begins Cataloging Bad Practices that Increase Cyber Risk

    Original release date: June 29, 2021 In a blog post by Executive Assistant Director (EAD) Eric Goldstein, CISA announced  the creation of a catalog to document bad cybersecurity practices that are exceptionally risky for any organization and especially dangerous for those supporting designated Critical Infrastructure or National Critical Functions. While extensive guidance on cybersecurity “best practices” exists,… Read more