CVE-2020-1350: Wormable Remote Code Execution Vulnerability in Windows DNS Server Disclosed (SIGRed)

CVE-2020-1350: Wormable Remote Code Execution Vulnerability in Windows DNS Server Disclosed (SIGRed) https://ift.tt/2OvInYp Researchers disclose a 17-year-old wormable flaw in Windows DNS servers. Organizations are strongly encouraged to apply patches as soon as possible. Background On July 14, Microsoft patched a critical vulnerability in Windows Domain Name System (DNS) Server as part of Patch Tuesday […]

Critical RCE Flaw (CVSS 10) Affects F5 BIG-IP Application Security Servers

Critical RCE Flaw (CVSS 10) Affects F5 BIG-IP Application Security Servers https://ift.tt/2ZBIuab Cybersecurity researchers today issued a security advisory warning enterprises and governments across the globe to immediately patch a highly-critical remote code execution vulnerability affecting F5’s BIG-IP networking devices running application security servers. The vulnerability, assigned CVE-2020-5902 and rated as critical with a CVSS […]

Why should you worry about DNS attacks?

Why should you worry about DNS attacks? https://ift.tt/3imhFPU Domain Name System (DNS) is a very basic protocol and service that enables Internet users and network devices to discover websites using human-readable hostnames instead of numeric IP addresses. This article provides a detailed explanation of how DNS works. If the DNS service is attacked or doesn’t […]

Defending Exchange servers under attack

Defending Exchange servers under attack https://ift.tt/3fNTc3M Securing Exchange servers is one of the most important things defenders can do to limit organizational exposure to attacks. Any threat or vulnerability impacting Exchange servers should be treated with the highest priority because these servers contain critical business data, as well as highly privileged accounts that attackers attempt […]

Docker Desktop danger discovered, patch now

Docker Desktop danger discovered, patch now https://ift.tt/3d6f4GF Docker has fixed a vulnerability that could have allowed an attacker to gain control of a Windows system using its service. The bug, discovered by Ceri Coburn, a researcher at security consultancy Pen Test Partners, exposed Docker for Windows to privilege elevation. Docker is a container system that […]

Identifying Let’s Encrypt Revoked Certificates

Identifying Let’s Encrypt Revoked Certificates https://ift.tt/2VPS8Wj Let’s Encrypt is a free, automated, open certificate authority (CA) run for the public’s benefit as a service from the Internet Security Research Group (ISRG). It provides free digital certificates to enable HTTPS (SSL/TLS) for websites via user-friendly means. Earlier this week, Let’s Encrypt announced that a bug in its validation code forced it to revoke more […]