Terry Cutler the Ethical Hacker | Call me at 1-844-296-5649 x 24
Terry Cutler – The Ethical Hacker
Home » Cyber Security Today, Feb. 26, 2021 – Reports on vulnerabilities, and a warning to the defence sector
Blog Media Radio Media

Cyber Security Today, Feb. 26, 2021 – Reports on vulnerabilities, and a warning to the defence sector

Howard Solomon
Howard Solomon

Published: February 26th, 2021

Reports on vulnerabilities, and a warning to the defence sector.

Welcome to Cyber Security Today. It’s Friday, February 26th. I’m Howard Solomon, contributing reporter on cybersecurity for ITWorldCanada.com. To hear the podcast click on the arrow below:

Two reports on vulnerabilities were released this week: A security firm called Imperva said the number of web and database vulnerabilities discovered last year dropped just over two per cent compared to 2019. On the other hand, Skybox Security said the number of malware, ransomware and other vulnerabilities it found last year was record-breaking. I’ll deal with that report in a minute.

The dominant root cause of web and database vulnerabilities found by Imperva was web site coding flaws called cross-site scripting. The second most common root cause was vulnerabilities that allowed hackers to inject malicious code into websites. Taking advantage of injection-related vulnerabilities was the tactic most favoured by attackers last year. Attackers usually deploy this tactic through malicious email and social media links. In addition the report found that hackers are also taking advantage of vulnerabilities in application programming interfaces, or APIs.

For defenders a web application firewall will help protect websites and databases from these kinds of attacks. But it will also help if web and software developers improve the rigorousness of their coding to close holes.

In its report Skybox Security said the number of new software and application vulnerabilities continues to increase. In fact, it says, many were actually discovered in 2019 but only reported on last year.

It also warned IT departments to be careful how they prioritize patching of vulnerabilities. Usually administrators put a priority on bugs rated critical by the Common Vulnerability Scoring System, followed by high severity vulnerabilities and then medium severity. But, the report says, a medium-severity bug may be high risk in a particular organization. Determine risk first, then the priority of patching.

(Clarification: The original story said the Imperva and Skybox sections on vulnerabilities conflicted. It should have made clear each measured vulnerabilities in different ways. The Imperva report only looked at vulnerabilities in web applications and databases. The Skybox report had a wider definition)

Finally, a threat group dubbed Lazarus has recently been targeting the defence sector of a number of companies, according to a new report from Kaspersky. The way they do it is through targeted spear-phishing emails with a malicious Microsoft Word document attached. Usually, the messages claimed to have updates on COVD-19 infections, and look like they come from a medical centre. If the potential victim has macros in Microsoft Office turned off, there will be instructions on how to turn them on so when the document opens malware is downloaded.

One victim organization had a good protection strategy of separating its corporate network with internet access and a restricted network with sensitive data but with no internet access. The attacker got around that by getting the login credentials for the router used by network administrators that connected to both systems. It isn’t clear how those credentials were obtained but one possibility is the passwords was saved in a browser password manager, or the administrators didn’t use multifactor authentication.

The FBI says Lazarus has links to North Korea.

Don’t forget on this afternoon you can catch the Week In Review edition of the podcast, where I discuss some of this week’s news with a guest commentator. Today Terry Cutler and I will discuss the need for mandatory incident reporting and the valuable IT network information hackers get from scanning the internet. You can listen on your way home or on the weekend. The podcast should be live after 3 pm Eastern.

That’s it for today. Links to details about these stories are in the text version of this podcast at ITWorldCanada.com. That’s where you’ll also find my news stories aimed at cybersecurity professionals.

Subscribe to Cyber Security Today on Apple Podcasts, Google Podcasts or add us to your Flash Briefing on your smart speaker.

Subscribe to our mailing list

* indicates required

Related posts

Information leaked from Montreal police SPVM website not sensitive and already public

Terry Cutler

Monitor, not surveillance, more important role of adults in kids’ online lives, says study.

Terry Cutler

How to create a strong password

Terry Cutler

Cyber Security Today Week In Review for Nov. 6, 2020

Terry Cutler

Digital Transformation Week 2020: Advice when you need it most

Terry Cutler

Cryptowall Ransomware: A new way of online extortion

Terry Cutler


Privacy & Cookies Policy