article thumbnail

Microsoft Patch Tuesday Includes Word, Streaming Service Zero-Days

eSecurity Planet

Natalie Silva, lead cyber security engineer at Immersive Labs, told eSecurity Planet that the Word vulnerability in particular poses a high risk, noting that the Preview Pane is a potential attack vector. CVE-2023-38148 , a remote code execution vulnerability in Internet Connection Sharing (ICS) with a CVSS score of 8.8

article thumbnail

VulnRecap 2/19/2024: News from Microsoft, Zoom, SolarWinds

eSecurity Planet

Among the vulnerabilities is CVE-2024-21412 , an Internet Shortcut Files flaw that allows an unauthenticated attacker to send a malicious file to a user. It bypasses Internet Shortcut Files’ security measures. The vulnerability, CVE-2020-3259 , was first discovered in May 2020.

VPN 112
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

October 2023 Patch Tuesday Includes Three Zero-Days Flaws

eSecurity Planet

Immersive Labs principal security engineer Rob Reeves told eSecurity Planet that the attack doesn’t require credentials or authentication in order to execute code on the system. Immersive Labs lead cyber security engineer Natalie Silva told eSecurity Planet that the HTTP/2 attack exploits a weakness in the protocol.

DDOS 108
article thumbnail

Microsoft’s December 2023 Patch Tuesday Includes Four Critical Flaws

eSecurity Planet

Two critical flaws in Internet Connection Sharing (ICS), CVE-2023-35630 and CVE-2023-35641 , have a CVSS score of 8.8. If your enterprise network is using Windows Defender as its default antivirus product, it is important to patch this vulnerability to maintain this security functionality.”

Antivirus 112
article thumbnail

Improve your AWS security posture, Step 3: Encrypt AWS data in transit and at rest

CyberSecurity Insiders

In the first two blogs in this series, we discussed properly setting up IAM and avoiding direct internet access to AWS resources. Note : an exception to this statement is if the generation of encryption keys occurs over a publicly available Internet connection (e.g., coffee shop WiFi). ” What Is AWS Certificate Manager?

article thumbnail

Volt Typhoon Disrupts US Organizations, CISA Issues Alerts

eSecurity Planet

government and defense institutions for intelligence gathering. Using web shells, they attacked weak internet servers, specifically a Houston port. Want to strengthen your organization’s digital defenses? Read the common types of network security solutions next.

Internet 112
article thumbnail

How Secure Is Cloud Storage? Features, Risks, & Protection

eSecurity Planet

Cloud storage is a cloud computing model that allows data storage on remote servers operated by a service provider, accessible via internet connections. It excels in remote access, scalability, and security, with distributed storage options and privacy adherence capabilities.

Risk 124