The Impacts of Zero-Day Attacks

Last week, we explained what zero-day vulnerabilities and attacks are. Essentially, zero-day vulnerabilities exist in the wild, with no patch available to prevent hackers from exploiting it. Today, we would like to expand on the impacts of these attacks.
What Do Zero-Day Attacks Depend On?
The impact a zero-day attack can have on your online presence can vary. Some of these effects include lost revenue, compliance violations, wasted time, and damage to your brand reputation.
Continue reading The Impacts of Zero-Day Attacks at Sucuri Blog.

Link: https://blog.sucuri.net/2018/02/the-impacts-of-zero-day-attacks.html

Red Hat Security Advisory 2018-0368-01

Red Hat Security Advisory 2018-0368-01 – Erlang is a general-purpose programming language and runtime environment. Erlang has built-in support for concurrency, distribution and fault tolerance. Security Fix: An erlang TLS server configured with cipher suites using RSA key exchange, may be vulnerable to an Adaptive Chosen Ciphertext attack against RSA. This may result in plain-text recovery of encrypted messages and/or a man-in-the-middle attack, despite the attacker not having gained access to the serveras private key itself.

Link: https://packetstormsecurity.com/files/146602/RHSA-2018-0368-01.txt

Red Hat Security Advisory 2018-0369-01

Red Hat Security Advisory 2018-0369-01 – OpenStack Compute launches and schedules large networks of virtual machines, creating a redundant and scalable cloud computing platform. Compute provides the software, control panels, and APIs required to orchestrate a cloud, including running virtual machine instances and controlling access through users and projects. python-novaclient is the python client for the OpenStack Nova API. The client’s Python API and command-line script both implement 100% of the OpenStack Nova API. The following packages have been upgraded to a later upstream version: openstack-nova, python-novaclient.

Link: https://packetstormsecurity.com/files/146603/RHSA-2018-0369-01.txt

4 Steps to Monitor and Audit Privileged Users of Data Stores

Privileged database users can become an insider threat. Here are four steps to monitor and audit privileged users of data stores so you are immediately aware of anomalous activity and potential malicious behavior.

Link: http://feedproxy.google.com/~r/Imperviews/~3/riXBNkZQLsg/

Debian Security Advisory 4124-1

Debian Linux Security Advisory 4124-1 – Two vulnerabilities have been found in Solr, a search server based on Lucene, which could result in the execution of arbitrary code or path traversal.

Link: https://packetstormsecurity.com/files/146605/dsa-4124-1.txt

Red Hat Security Advisory 2018-0374-01

Red Hat Security Advisory 2018-0374-01 – Ansible is a simple model-driven configuration management, multi-node deployment, and remote-task execution system. Ansible works over SSH and does not require any software or daemons to be installed on remote nodes. Extension modules can be written in any language and are transferred to managed machines automatically. Ansible Tower helps you scale IT automation, manage complex deployments and speed productivity. Centralize and control your IT infrastructure with a visual dashboard, role-based access control, job scheduling, integrated notifications and graphical inventory management. And Ansible Tower’s REST API and CLI make it easy to embed Ansible Tower into existing tools and processes.

Link: https://packetstormsecurity.com/files/146607/RHSA-2018-0374-01.txt