IT and Business Insights for SMB Solution Providers

Jay Ferron's blog

Ransomware Attack Via MSP Locks Customers Out of Systems

Vulnerable plugin for a remote management tool gave attackers a way to encrypt systems belonging to all customers of a US-based MSP.

An attacker this week simultaneously encrypted endpoint systems and servers belonging to all customers of a US-based managed service provider by exploiting a vulnerable plugin for a remote monitoring and management tool used by the MSP.

Googlle Store Has Vanity Apps Opens Users Up To Attack

    Some people like to look their best and sometimes reality just isn’t enough. With the addition of an altered reality landscape we can add and modify our worlds and ourselves through the lens of our phones. There are apps that can access your phone’s camera, detect your facial position, add features, correct color imbalances, enhance traits that we find desirable, and can remove elements that aren't so desirable. 

Shortcut to Fear

     Siri sets alarms, calls your mother, and finds you that piece of trivia that’s been itching in your brain for the past week. Siri helps people manage their electronic fears and control their digital world in a human way. So when Siri Shortcuts came along with iOS 12, I’m sure many people were elated at the thought of automating their daily ritual and streamlining repeated complex tasks. 

Chinese APT10 intrusion activities target Government, Cloud-Computing Managed Service Providers and Customer networks worldwide

The following information is being provided by the FBI, with no guarantees or warranties, for potential use at the sole discretion of recipients in order to protect against cyber threats. This data is provided in order to help cyber security professionals and system administrators to guard against the persistent malicious actions of cyber criminals.  

This FLASH has been released TLP:WHITE. Subject to standard copyright rules, TLP:WHITE information may be distributed without restriction.

Deploying the Azure Information Protection scanner to automatically classify and protect files

If you heard me talk I say many time we need to start classify our data so the we can protect the critical files and add additional security to those files that are at the highest risk.
We need to protect data based on the risk.  You may have heard me talk About RMS (Right Management Service) or AIP (Azure information Protection). Here is an article on an tool that will help you find and automatically classify file for you.

CERT/CC Reports Microsoft Exchange 2013 and Newer are Vulnerable to NTLM Relay Attacks

Original release date: January 28, 2019

The CERT Coordination Center (CERT/CC) has released information to address NTLM relay attacks affecting Microsoft Exchange 2013 and newer versions. A remote attacker could exploit this vulnerability to take control of an affected system.

Important Alert DNS Flag Day February 1, 2019 – Ensure Your Institution is Prepared

    On Friday, February 1, major DNS (Domain Name System) software and public DNS providers will remove support for workarounds accommodating authoritative DNS servers that don’t follow published operational standards1. Most EDU sites will not be affected; however, institutions using authoritative servers that don’t meet standards may find their IT-based resources unreachable by large portions of the Internet.

Manufacturing RF Vulnerabilities

      Radio-frequency (RF) remote controllers are everywhere: they open your car and your garage, they connect peripherals to your computer. You will also find them widely used in manufacturing and construction. Being able to remotely control large and/or multiple pieces of equipment from one device offers convenience and increased productivity, but remote solutions are often implemented with security as an afterthought, if thought of at all.

Pages

Subscribe to RSS - Jay Ferron's blog