Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Attacker's Playbook Top 5 Is High On Passwords, Low On Malware
Newest First  |  Oldest First  |  Threaded View
SchemaCzar
SchemaCzar,
User Rank: Strategist
10/8/2016 | 9:57:21 AM
Get rid of Microsoft Windows!
How many exploits, such as cleartext passwords in ill-protected memory, are unique to Windows?  Ransomware barely exists outside Windows.  These security companies make a lot of money from Microsoft's security weaknesses.  If they cared about their customers' needs, they'd push them off Windows.
SteveMorris
SteveMorris,
User Rank: Apprentice
9/23/2016 | 5:16:23 AM
Encryption
I`m personally thinking that password managers are the best way to protect you data. I am feeling more comfortable, when my passwords are encrypted and stored in the cloud. This is not that expensive, and i can reccomend 3 of them - Keeper, Lastpass and Passwork (https://passwork.me). The last one is better for an entrepreneurs
jlepich
jlepich,
User Rank: Apprentice
9/21/2016 | 12:39:56 PM
"insufficient network segmentation"
I really think "insufficient network segmentation" should be something along the lines of "insufficient network isolation" or "insufficient network protection." I talk to a good number of network and security people who seem to assume that if they have different VLANs/subnets (network segmentation) then they are somehow protected from attackers moving laterally inside the network. This is unfortunately a common misconception. Without the appropriate network traffic isolation/filter/protection, threats can move from one layer 2 segment to another layer 2 segment very easily. I personally think that network/security admins need to start looking at implementing rudimentary security controls like ACLs, (which I know this piece mentions, but not soon enough in my opinion) on strategic network devices through the enterprise. Don't even worry about drilling down to the UDP/TCP port level at the point, but put in place easy to understand IP based ACLs that, for instance reduce attack surface by limiting desktop PCs from reaching other desktop PCs, etc. or the end user community from reaching the desktops/laptops of company executives. Your CEOs PC simply should not be reachable from end user devices.     

 
Jenpen
Jenpen,
User Rank: Apprentice
9/8/2016 | 2:09:09 PM
Creating a strong password
It is necessary for the parents to teach the simple ways of ensuring cyber security to their children. It will help preventing irreparable loss due to breach of information on a shared computer.
EricP436
EricP436,
User Rank: Apprentice
8/23/2016 | 11:15:46 AM
password "strength"?
"increase Active Directory password length requirements to at least 15 characters and enhance password policy enforcements (expiration, etc.)"

What good does that do?  if passwords are read from memory, length and age do not matter in the least.  The longer the password the more likely it will be deliberately weakened by whoever generates it.  Password aging is a much worse idea and is specifiically not recommended by NIST now.  If password hashes are stolen it means the system is compromised and cannot be trusted to leak any other valuable information including cleartext passwords read from memory.  It will be great when people finally get away from the 1980's mentality of vulnerable hashes.

At least two factor authentication made the list.


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Black Hat USA 2022 Attendee Report
Black Hat attendees are not sleeping well. Between concerns about attacks against cloud services, ransomware, and the growing risks to the global supply chain, these security pros have a lot to be worried about. Read our 2022 report to hear what they're concerned about now.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-37452
PUBLISHED: 2022-08-07
Exim before 4.95 has a heap-based buffer overflow for the alias list in host_name_lookup in host.c when sender_host_name is set.
CVE-2022-26979
PUBLISHED: 2022-08-06
Foxit PDF Reader before 12.0.1 and PDF Editor before 12.0.1 allow a NULL pointer dereference when this.Span is used for oState of Collab.addStateModel, because this.Span.text can be NULL.
CVE-2022-27944
PUBLISHED: 2022-08-06
Foxit PDF Reader before 12.0.1 and PDF Editor before 12.0.1 allow an exportXFAData NULL pointer dereference.
CVE-2022-2688
PUBLISHED: 2022-08-06
A vulnerability was found in SourceCodester Expense Management System. It has been rated as critical. This issue affects the function fetch_report_credit of the file report.php of the component POST Parameter Handler. The manipulation of the argument from/to leads to sql injection. The attack may be...
CVE-2022-2689
PUBLISHED: 2022-08-06
A vulnerability classified as problematic has been found in SourceCodester Wedding Hall Booking System. Affected is an unknown function of the file /whbs/?page=contact_us of the component Contact Page. The manipulation of the argument Message leads to cross site scripting. It is possible to launch t...