This Week in Security News – December 3, 2021

This Week in Security News – December 3, 2021

Welcome to our weekly roundup, where we share what you need to know about cybersecurity news and events that happened over the past few days. This week, learn about how Squirrelwaffle utilized ProxyLogon and ProxyShell to hack email chains. Also, read on a recent data breach of the Los Angeles Planned Parenthood Network. Read on: Squirrelwaffle Exploits ProxyShell and ProxyLogon to Hijack Email Chains In September, Squirrelwaffle emerged as a new loader that is spread…

Read More

Vulnerabilities Exploited for Monero Mining Malware Delivered via GitHub, Netlify

Vulnerabilities Exploited for Monero Mining Malware Delivered via GitHub, Netlify

Vulnerabilities Exploited for Monero Mining Malware Delivered via GitHub, Netlify We looked into exploitation attempts we observed in the wild and the abuse of legitimate platforms Netlify and GitHub as repositories for malware. By: Nitesh Surana December 03, 2021 Read time:  ( words) Earlier this year, a security flaw identified as CVE-2021-41773 was disclosed to Apache HTTP Server Project, a path traversal and remote code execution (RCE) flaw in Apache HTTP Server 2.4.49. If this…

Read More

VMware Transit Connect Intra-Region Peering with AWS Transit Gateway

VMware Transit Connect Intra-Region Peering with AWS Transit Gateway

With the launch of AWS Transit Gateway Intra-region Peering, VMware Cloud on AWS adds the capability to connect VMware Transit Connect to an external AWS Transit Gateway in the same region, further simplifying networking between VMware Cloud on AWS SDDCs and native AWS VPC resources. At AWS re:Invent 2021, AWS announced the ability to peer VMware Transit Connect to AWS TGWs in the same region, also referred to as intra-region peering. VMware and AWS have…

Read More

There’s a 3-6 month wait for WI-Fi 6

There’s a 3-6 month wait for WI-Fi 6

Wi-Fi 6 is the most sought-after wireless LAN technology by enterprises, but the global chip shortage is preventing it from getting into the hands of IT pros as quickly as desired, according to the Dell’Oro Group. The usual amount of lead time required for a purchase of new Wi-Fi equipment is two to four weeks, according to the report’s author, Tam Dell’Oro, the CEO and founder of the group. “Now, we’re looking at between three…

Read More

Cyber-attack on Planned Parenthood

Cyber-attack on Planned Parenthood

A cyber-attack on Planned Parenthood Los Angeles (PPLA) has resulted in the exposure of patients’ personally identifying information (PII). The agency said in a notice posted to its website on Wednesday that suspicious activity was detected on its computer network on October 17. An investigation into the activity remains ongoing; however, it has been determined that an unauthorized person broke into PPLA’s system between October 9, 2021, and October 17, 2021.  PPLA said that during the attack…

Read More

Review of two Cradlepoint mobile routers

Review of two Cradlepoint mobile routers

At the transportation organization where I work, we employ two Cradlepoint mobile-router models in our vehicles: the industrial IBR-1700 vehicular routers in our 97 buses and eight smaller IBR-900 vehicular routers in maintenance trucks, operations vans, and other multipurpose vans. The reason for these cellular routers in the buses is to provide a WAN connection to systems on the buses including GPS, electronic signage, passenger counters, and fareboxes. How they are networked These information-gathering systems…

Read More

Phishing Scam Targets Military Families

Phishing Scam Targets Military Families

Threat researchers at Lookout are helping to take down a phishing campaign that has been targeting members of the United States military and their families.  The scammers behind the long-running campaign impersonate military support organizations and personnel to commit advance fee fraud, stealing sensitive personal and financial information for monetary gain. “Based on our analysis, it’s clear that the threat actor is looking to steal sensitive data from victims such as their photo identification, bank account information,…

Read More

A simplified Migration Process from Cisco Prime Infrastructure to Cisco DNA Center without disrupting Network Operations – Cisco Blogs

A simplified Migration Process from Cisco Prime Infrastructure to Cisco DNA Center without disrupting Network Operations – Cisco Blogs

You have been leveraging Cisco Prime Infrastructure for your wired and wireless networks needs and now you are wondering what’s next? Or you, perhaps started way before Prime Infrastructure, and have been looking at ways to make the solution more tuned to today’s technology evolution & digital transformation. Possibly it is hesitation about changing to yet another tool since Prime Infrastructure has been meeting all your network needs up until now. If this describes you,…

Read More

Snort 3 Anywhere – Cisco Blogs

Snort 3 Anywhere – Cisco Blogs

Introduction  We are proud to announce that Snort 3 is officially available in a container form factor (called “Snort 3 Anywhere”) on AWS Marketplace to be consumed in your Kubernetes cluster either running on AWS or On-prem. It’s yet another way that we are fulfilling our vision to simplify security for networks, workloads, and applications across your multi-cloud world.  I am pretty sure you know about Snort, Cisco’s very own piglet. Snort has a long…

Read More

Insider threats: How trustworthy are your employees?

Insider threats: How trustworthy are your employees?

While we often worry about outside threats to our business data, insider threats are a growing problem. Here’s how to secure your business. Image: Andrea Danti/Shutterstock Most organizations don’t want to consider the possibility of insider threats, but they are a serious issue that should always be in mind. Disgruntled or fired employees seeking revenge, employees moving to a competitor with intellectual property they stole before leaving or untrustworthy contractors can wreak havoc on your…

Read More
1 3,422 3,423 3,424 3,425 3,426 4,350