If not mitigated, potential remote exploits to an Apache component called Log4J can be executed by a malicious attacker. This vulnerability is known worldwide as CVE-2021-44228.
Passwordless Authentication simply means MFA without a password: authenticating with other methods other than a password, such as biometrics, one-off email, or phone verification. MFA is often thought of as a second factor -in addition to a password- typically tied to a phone and approved with a phone call, push, or temporary numerical code. But MFA is more than that.
Alert: New Malware called “FoggyWeb” enables hackers to steal Admin Credentials Urgency/Severity: CRITICAL Issue / Vulnerability Digitaltrends.com summarizes the issue as follows: Microsoft has recently discovered another type of malware, named FoggyWeb by Microsoft, that hackers are currently using to remotely steal network admin credentials. The credentials allow the attacker group, which the company has called Nobelium, to hack into admin accounts of the Active Directory Federation Services’ (AD FS) servers and control users’ access [...]
Ask us how we can help secure your environment with the top 10-12 security enhancements every firm should have. #ITCornerView Product Security Alert: Windows Print Spooler Remote Code Execution Vulnerability Urgency/Severity: CRITICAL Issue / Vulnerability Microsoft is aware of and investigating a remote code execution vulnerability that affects Windows Print Spooler and has assigned CVE-2021-34527 to this vulnerability. This is an evolving situation and we will update the CVE as more information is available. A [...]
New York, NY, June 24, 2021 – Cornerstone.IT has taken security to the next level by adopting the National Institute of Standards and Technology (NIST) controls typically used for government agencies and Department of Defense contractors.
Ask us how we can help secure your environment with the top 10-12 security enhancements every firm should have. #ITCornerView Product Security Alert: Critical Citrix Vulnerability Allowing Malicious Attack Urgency/Severity: HIGH Issue / Vulnerability Multiple vulnerabilities have been discovered in Citrix ADC (formerly known as NetScaler ADC), Citrix Gateway (formerly known as NetScaler Gateway), and Citrix SD-WAN WANOP Edition appliance models 4000-WO, 4100-WO, 5000-WO, and 5100-WO.These vulnerabilities, if exploited, could result in the following security [...]
Ask us how we can help secure your environment with the top 10-12 security enhancements every firm should have. #ITCornerView Product Security Alert: Secure Your Dell Laptops and Desktops Now Issue/Vulnerability:Critical Vulnerability on Dell Laptops and Desktops running on Windows may lead to escalation of privileges, denial of service, or information disclosure Urgency/Severity: HIGH Scope A driver (dbutil_2_3.sys) packaged with Dell Client firmware update utility packages and software tools contains an insufficient access control vulnerability [...]
Hafnium operators deploy web shells on compromised server, creating software backdoors that allow attackers to steal data and perform additional malicious actions that lead to further compromise.
As of February 9, 2021, any Microsoft customer that has a supported version of Windows Server that is used as a Domain Controller in their environment will no longer allow legacy, unsupported Windows systems to talk to the supported Windows Server Domain Controller unless specific action takes place.
On February 11, 2020: Barton LLP, NYC hosted, “How Does the New NYS Cybersecurity & Privacy Law (SHIELD Act) Impact Your Business?”, an ILTA event presented by Jim Moreo of Cornerstone.IT & Kenneth N. Rashbaum of Barton LLP