article thumbnail

Critical flaw in ManageEngine Desktop Central MSP tool exploited in the wild

CSO Magazine

Hackers are exploiting a critical authentication bypass vulnerability in ManageEngine Desktop Central MSP, an endpoint management tool used by managed service providers (MSPs). To read this article in full, please click here ManageEngine is a division of business software developer Zoho that's focused on IT management software.

article thumbnail

Latest on the SVR’s SolarWinds Hack

Schneier on Security

The New York Times has an in-depth article on the latest information about the SolarWinds hack (not a great name, since it’s much more far-reaching than that). Interviews with key players investigating what intelligence agencies believe to be an operation by Russia’s S.V.R.

Hacking 326
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

A journey into forgotten Null Session and MS-RPC interfaces

SecureList

Today, although null sessions still exist and are enabled by default on domain controllers (most likely for compatibility purposes), most system administrators close this capability by hardening the security policies and monitoring domain controller activities, including anonymous access through SMB.

article thumbnail

Microsoft provides more mitigation instructions for the PetitPotam attack

Malwarebytes

In a revision of KnowledgeBase article KB5005413 , Microsoft has provided more elaborate mitigation instructions for the PetitPotam attacks that were disclosed a week ago. The attack could force remote Windows systems to reveal password hashes that could then be easily cracked. PetitPotam. Pass the hash. The hash is enough.

article thumbnail

ETWHash – “He who listens, shall receive”

LRQA Nettitude Labs

These messages can be captured and analysed by security professionals or system administrators for various purposes, including debugging and performance analysis. However, as demonstrated in this short article, ETW can also be a great resource for offense, finding providers useful for passive situational awareness.

article thumbnail

Top 10 web application vulnerabilities in 2021–2023

SecureList

Broken Authentication 5. Broken Authentication 5. Mitigation: implement authentication and authorization controls according to the role-based access model. An XSS attack against the application’s clients can be used for obtaining user authentication information, such as cookies, phishing or spreading malware.

Passwords 107
article thumbnail

Take action! Multiple Pulse Secure VPN vulnerabilities exploited in the wild

Malwarebytes

Cybersecurity sleuths Mandiant report that they are tracking “12 malware families associated with the exploitation of Pulse Secure VPN devices” operated by groups using a set of related techniques to bypass both single and multi-factor authentication. According to some articles the threat-actors are linked to China.

VPN 73