Weekly Infosec News Brief – Mar 02-08, 2015

Law Firms Create Industry System for Sharing Data on Cyber Threats

The banking, defense, and energy industries all have created systems for sharing cyber threat data, clearinghouses where organizations dealing with attacks or breaches can share information to help their peer organizations detect and deal with similar threats. Now a group of large, international law firms is doing the same for their industry.
http://thehill.com/policy/cybersecurity/234722-law-firms-to-share-info-about-cyber-threats


Federal Cybersecurity Incidents up 15% in FY 2014

An OMB report released February 27th shows federal cybersecurity incidents at over 70,000 in fiscal year 2014. The total number may due as much (or more) to improved detection as to increased attacks. The most interesting aspect was the fact that the report says nearly half of the incidents could have been prevented by the use of stronger authentication methods, such as two-factor authentication. Is your organization using two-factor authentication?
http://www.whitehouse.gov/sites/default/files/omb/assets/egov_docs/final_fy14_fisma_report_02_27_2015.pdf
http://thehill.com/policy/cybersecurity/234601-cyberattacks-on-government-hit-record-high


“Domain Shadowing” on the Rise as it is Leveraged by Angler Exploit Kit

The phenomenon of “domain shadowing” refers to the malicious practice of breaking into organization’s hosted DNS settings and adding subdomains to point to malicious sites. This can happen with your organization’s domain and can easily go undetected for a long time if you’re not checking frequently. SANS’ Internet Storm Center has an old post from 2011 on the phenomenon with good suggestions on avoiding it and monitoring if it’s happening.
http://blogs.cisco.com/security/talos/angler-domain-shadowing


New Chrome Release, Chrome 41, Fixes 51 Vulnerabilities

A new release of Google Chrome was released last Tuesday. The new release fixes fifty-one security flaws, many of them serious. Chrome has a robust and highly automated update mechanism, so your Chrome installations have most likely already updated themselves. If your organization runs a centrally-managed deployment of Chrome, be sure to test and release this update if you haven’t already.
http://googlechromereleases.blogspot.com/2015/03/stable-channel-update.html
http://www.scmagazine.com/chrome-41-update-includes-51-security-fixes/article/401937/


D-Link Releases Firmware Updates for a Number of Vulnerable Routers

A major vulnerability in D-Link router/firewalls was publicized last Monday, and an update is now available. Like most router/firewall vulnerabilities, this one is most dangerous when administration is allowed from outside the protected network. These routers are most often used in homes and very small organizations, but may be in use in some branch offices as well. Also, the threat is significant enough to pass the information off to your users if they work from home at all. This vulnerability also highlights the danger of disallowing remote administration of your firewall; THIS is an issue that affects many organizations’ enterprise-class firewalls as well as many home firewalls.
http://www.scmagazine.com/d-link-issues-firmware-updates-to-address-router-vulnerabilities/article/401707/

Comments

Popular posts from this blog

Weekly Infosec News Brief: 14-20 March

Weekly Infosec News Brief 20-26 July

Critical Vulnerability Discovered in IIS 6.0 Web Services