How a Systems Administrator Role Preps You for a Cybersecurity Career

CompTIA on Cybersecurity

IT Security Specialist Jason Hernandez believes systems administration is valuable experience for IT pros – especially for those interested in cybersecurity

A Comparison Guide to Network Administrator vs. Systems Administrator Roles

USD on Cyber Security

Computer systems and networks. Networks and systems. It’s true that some terminology — for example, the job titles network administrator and systems administrator — are often used interchangeably. What’s the difference?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Security BSides Dublin 2021 – Jayme Hancock’s ‘Weaponizing Systems Administration: Leveraging IT Skills In Penetration Testing’

Security Boulevard

The post Security BSides Dublin 2021 – Jayme Hancock’s ‘Weaponizing Systems Administration: Leveraging IT Skills In Penetration Testing’ appeared first on Security Boulevard.

FBI warns of escalating Pysa ransomware attacks on education orgs

Bleeping Computer

The Federal Bureau of Investigation (FBI) Cyber Division has warned system administrators and cybersecurity professionals of increased Pysa ransomware activity targeting educational institutions. [.].

Yandex suffers data breach after sysadmin sold access to user emails

Bleeping Computer

Russian internet and search company Yandex announced today that one of its system administrators had enabled unauthorized access to thousands of user mailboxes. [.].

NSA shares guidance on securing voice, video communications

Bleeping Computer

The National Security Agency (NSA) has shared mitigations and best practices that systems administrators should follow when securing Unified Communications (UC) and Voice and Video over IP (VVoIP) call-processing systems. [.].

Kaseya Releases Patches for Flaws Exploited in Widespread Ransomware Attack

The Hacker News

Florida-based software vendor Kaseya on Sunday rolled out software updates to address critical security vulnerabilities in its Virtual System Administrator (VSA) software that was used as a jumping off point to target as many as 1,500 businesses across the globe as part of a widespread supply-chain ransomware attack.

Yandex Employee Caught Selling Access to Users' Email Inboxes

The Hacker News

The employee was one of three system administrators with the necessary accessRussian Dutch-domiciled search engine, ride-hailing and email service provider Yandex on Friday disclosed a data breach that compromised 4,887 email accounts of its users.

Kaseya Ransomware Supply-Chain Attack: What We Know So Far

Digital Shadows

On 02 July 2021, details started to emerge of a sophisticated supply-chain attack targeting Kaseya VSA, virtual system administrator software. Cybercrime and Dark Web Research Cyber Threats Cybercrime Kaseya Ransomware

SysAdmin of Billion-Dollar Hacking Group Gets 10-Year Sentence

The Hacker News

A high-level manager and systems administrator associated with the FIN7 threat actor has been sentenced to 10 years in prison, the U.S. Department of Justice announced Friday.

What Security Lessons Can Come From the Kaseya Ransomware Attack?

Security Boulevard

One of the latest examples in this trend is a ransomware attack on Kaseya’s Virtual System Administrator (VSA) solution for remote monitoring and management (RMM). This year will be remembered as annus horribilis for attacks against the software supply chain.

Kaseya Starts Recovery After REvil Attack

Security Boulevard

Kaseya is now reporting the software-as-a-service (SaaS) instance of its Virtual System Administrator (VSA) platform will be back online sometime between 4:00 p.m.

Chinese Hackers Stole an NSA Windows Exploit in 2014

Schneier on Security

Here’s the timeline : The timeline basically seems to be, according to Check Point: 2013: NSA’s Equation Group developed a set of exploits including one called EpMe that elevates one’s privileges on a vulnerable Windows system to system-administrator level, granting full control.

NSA Urges SysAdmins to Replace Obsolete TLS Protocols

Threatpost

The NSA released new guidance providing system administrators with the tools to update outdated TLS protocols. Government Vulnerabilities and Defense Industrial Base CloudFlare Department of Defense (DoD) government Heartbleed National Security System (NSS) NSA SSL TLS 1.0

Passwords Security: Past, Present, and Future

Security Boulevard

The recent report on The State Password Security in the Enterprise reveals several essential findings for system administrators and security professionals alike.

How to use Zarp for penetration testing

Tech Republic Security

Network or systems administrators must conduct pen testing to discover any possible security weaknesses. Find out why Zarp is a very powerful pen-testing tool to have at your disposal

What Is an Intrusion Prevention System – IPS? Definition and Benefits

Heimadal Security

The term IPS stands for Intrusion Prevention System and refers to a form of network security that aims to detect and prevent identified threats. An IPS system continuously monitors a network, looking for possible malicious activity and gathering information about it.

Microsoft’s New Security Update Guides Get Mixed Reviews

Doctor Chaos

The change was official in April, with Microsoft explaining it would allow system administrators to effectively pair specific patches with vulnerabilities, and that the introduction of API support would help customers automate some aspects of patching. Microsoft is receiving mixed reviews for its shift to delivering security update information via its newly launched Security Update Guides.

Boosting Security Effectiveness with 'Adjuvants'

Dark Reading

How integrating corporate resources like the IT help desk, system administration, quality assurance and HR can breathe new life into your security program

Google Glitch Left Passwords Unprotected for 14 Years

Adam Levin

Google has begun contacting system administrators whose organizations would have been affected by the glitch to encourage them to change their passwords. Google announced a glitch that stored unencrypted passwords belonging to several business customers, a situation that had been exploitable since 2005.

Yandex security team caught admin selling access to users’ inboxes

Security Affairs

Russian internet and search company Yandex discloses a data breach, a system administrator was selling access to thousands of user mailboxes. The employee was one of three system administrators with the necessary access rights to provide technical support for the service.

Exchange Week 2 – Ransomware Joins The Fray

Security Boulevard

Following exposure and publication of a major remote execution vulnerability like Exchange’s ProxyLogon (CVE-2021-26855), we expect other threat actors to join the race against system administrators trying to patch their systems.

Kaseya Left Customer Portal Vulnerable to 2015 Flaw in its Own Software

Krebs on Security

The attackers exploited a vulnerability in software from Kaseya , a Miami-based company whose products help system administrators manage large networks remotely. “We are continuing to do forensic analysis on the system and investigating what data is actually there.”

Microsoft Patch Tuesday May 2021 fixes 55 vulnerabilities, including 3 zero-days

Security Boulevard

With most organizations embracing a distributed workforce these days, system administrators are bound to be up to their ears in work for the next two weeks, testing and figuring …. This month’s Patch Tuesday is here and the hustle is on.

Ghost Blogging Platform Hacked To Mine Cryptocurrency

Adam Levin

Ghost, a Singapore-based blogging platform with 2,000,000 installations and 750,000 active users, announced that hackers had breached their systems. . As of May 4, Ghost announced that it had successfully purged the cryptocurrency mining malware from its systems.

Critical Microsoft Windows Vulnerability found

CyberSecurity Insiders

Microsoft Corporation is urging all Windows users including those using Win 7 and 8 operating systems to update their devices with the latest security patches.

Working BlueKeep Exploit Developed by DHS

Threatpost

The Department of Homeland Security urged system administrators to update their Windows machines after testing a working BlueKeep exploit for Windows 2000. Hacks Vulnerabilities bluekeep Bluekeep exploit critical vulnerability DHS Exploit Microsoft WannaCry Windows 2000

Brute Force attack launched by Russia APT28 using Kubernetes

CyberSecurity Insiders

And then is seen accessing the entire network through stolen credentials and sometimes exploiting vulnerabilities in targeting systems. All these days we have seen instances where Kubernetes were used to automate the deployment of containerized applications.

VPN 93

PyRoMine Uses NSA Exploit for Monero Mining and Backdoors

Threatpost

Not just a miner, the malware also sets up a hidden default account with system administrator privileges, to be used for re-infection and further attacks. Malware backdoor EternalRomance follow on attacks Monero pyromine remote desktop ShadowBrokers smb1

Latest on the SVR’s SolarWinds Hack

Schneier on Security

The New York Times has an in-depth article on the latest information about the SolarWinds hack (not a great name, since it’s much more far-reaching than that). Interviews with key players investigating what intelligence agencies believe to be an operation by Russia’s S.V.R.

Career Choice Tip: Cybercrime is Mostly Boring

Krebs on Security

The researchers concluded that for many people involved, cybercrime amounts to little more than a boring office job sustaining the infrastructure on which these global markets rely, work that is little different in character from the activity of legitimate system administrators.

Black Hat insights: Will Axis Security’s ZTNA solution hasten the sunsetting of VPNs, RDP?

The Last Watchdog

As Black Hat USA 2021 convenes in Las Vegas this week, consensus is quickening around the wisdom of sunsetting legacy remote access tools, like VPNs and RDP, and replacing them with systems based on Zero Trust, i.e. trust no one, principles. The deeper the intruders can get to encrypt critical systems, the more ransom they can try to extort by offering a decryption key. RDP is a system administrator’s remote access tool that’s built-into all Microsoft Windows networks.

VPN 173

New Paper: “Autonomic Security Operations?—?10X Transformation of the Security Operations Center”

Anton on Security

I’m pretty sure that Windows NT system administrators of the 1990s also did not want to become part of DevOps… Next, what about the other part of the SOC, namely the “C”? New Paper: “Autonomic Security Operations?—?10X 10X Transformation of the Security Operations Center” It is with much excitement that we announce a new paper about transforming your security operations ; it is published under the Office of the CISO at Google Cloud.

CISO 100

DDoS Mitigation Firm Founder Admits to DDoS

Krebs on Security

KrebsOnSecurity exposed the co-administrators of vDOS and obtained a copy of the entire vDOS database, including its registered users and a record of the attacks those users had paid vDOS to launch on their behalf.

DDOS 217

Russia-linked hackers actively exploit CVE-2020-4006 VMware flaw, NSA warns

Security Affairs

The flaw is a command injection bug that could be exploited by attackers to execute commands on the host Linux and Windows operating systems using escalated privileges. An attacker could exploit this vulnerability to take control of an affected system.”

FBI Issues Private Industry Notification in Light of Florida Water Plant Hack

Hot for Security

As reported earlier this week , the Oldsmar water treatment systems were remotely accessed by an unknown threat actor via TeamViewer, the popular software tool designed for remote control, desktop sharing, online meetings, and file transfer between computers.

Florence, Ala. Hit By Ransomware 12 Days After Being Alerted by KrebsOnSecurity

Krebs on Security

that their information technology systems had been infiltrated by hackers who specialize in deploying ransomware. ” But on Friday, Florence Mayor Steve Holt confirmed that a cyberattack had shut down the city’s email system.

MY TAKE: How SMBs can improve security via ‘privileged access management’ (PAM) basics

The Last Watchdog

As digital transformation kicks into high gear, it’s certainly not getting any easier to operate IT systems securely, especially for small- and medium-sized businesses. Yet all organizations today, no matter their size or sector, face the same daunting security challenge: how to preserve the integrity of their IT systems when the attack surface is expanding and intrusion attempts are intensifying. There are a lot of moving parts to modern IT systems.

Yandex Email Admin Sold His Inbox Access and Compromised Almost 5,000 Accounts

Hot for Security

The employee was one of three system administrators with the necessary access rights to provide technical support for the service.”

CISA Issues New Guidance to Help Admins Map Threat Actor Moves Based on MITRE ATT&CK Framework

Hot for Security

The objective is to encourage a common language in threat actor analysis, showing system administrators how to map adversary behavior through instructions and examples.

Racing against a real-life ransomware attack, with Ski Kacoroski: Lock and Code S02E12

Malwarebytes

Early the next morning, Northshore systems administrator Ski Kacoroski arrived on scene. At 11:37 pm on the night of September 20, 2019, cybercriminals launched a ransomware attack against Northshore School District in Washington state.

Lousy IoT Security

Schneier on Security

DTEN makes smart screens and whiteboards for videoconferencing systems. Arbitrary code execution: unauthenticated root shell access through Android Debug Bridge (ADB) leads to arbitrary code execution and system administration (CVE-2019-16273).

IoT 138

Hackers are targeting Soliton FileZen file-sharing servers

Security Affairs

The CVE-2021-20655 vulnerability could be exploited by a remote attacker with administrator rights to execute arbitrary OS commands via unspecified vectors. The vendor recommended changing system administrator account, reset access control, and installing the latest available version.