{"id":26884,"date":"2022-08-15T08:26:39","date_gmt":"2022-08-15T12:26:39","guid":{"rendered":"https:\/\/www.itworldcanada.com?p=498139"},"modified":"2022-08-16T11:20:04","modified_gmt":"2022-08-16T15:20:04","slug":"cyber-security-today-aug-15-2022-watch-for-patches-from-palo-alto-networks-microsoft-and-others","status":"publish","type":"post","link":"https:\/\/technewsday.com\/staging\/cyber-security-today-aug-15-2022-watch-for-patches-from-palo-alto-networks-microsoft-and-others\/","title":{"rendered":"Cyber Security Today, Aug. 15, 2022 \u2013 Watch for patches from Palo Alto Networks, Microsoft and others"},"content":{"rendered":"<p data-ar-index=\"0\">Watch for these patches from Palo Alto Networks, Microsoft and others.<\/p>\n<p data-ar-index=\"1\">Welcome to Cyber Security Today. It\u2019s Monday August 15th, 2022. I\u2019m Howard Solomon, contributing reporter on cybersecurity for ITWorldCanada.com.<\/p>\n<p data-ar-index=\"2\"><iframe style=\"border: none;\" title=\"Libsyn Player\" src=\"https:\/\/html5-player.libsyn.com\/embed\/episode\/id\/24048417\/height\/90\/theme\/custom\/thumbnail\/yes\/direction\/forward\/render-playlist\/no\/custom-color\/000000\/\" width=\"100%\" height=\"90\" scrolling=\"no\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\n<table style=\"width: 100%;\">\n<tbody>\n<tr>\n<td><a href=\"https:\/\/www.amazon.com\/ITWC-Cyber-Security-Today\/dp\/B07BRNG89P\/ref=sr_1_1?s=digital-skills&amp;ie=UTF8&amp;qid=1522688435\" rel=\"noopener noreferrer\"><img decoding=\"async\" class=\"aligncenter wp-image-396718 size-full\" src=\"https:\/\/i.itworldcanada.com\/wp-content\/uploads\/2017\/09\/sub-alexa-200.png\" alt=\"Cyb er Security Today on Amazon Alexa\" width=\"200\" height=\"74\" border=\"none\" \/><\/a><\/td>\n<td><a href=\"https:\/\/www.google.com\/podcasts?feed=aHR0cDovL2N5YmVyc2VjdXJpdHl0b2RheS5saWJzeW4uY29tL3Jzcw%3D%3D\" rel=\"noopener noreferrer\"><img decoding=\"async\" class=\"thumbnail aligncenter wp-image-408712 size-full\" src=\"https:\/\/i.itworldcanada.com\/wp-content\/uploads\/2018\/09\/sub-gp-200.png\" alt=\"Cyber Security Today on Google Podcasts\" width=\"200\" height=\"74\" \/><\/a><\/td>\n<td><a href=\"https:\/\/itunes.apple.com\/ca\/podcast\/cyber-security-today\/id1363182054\" rel=\"noopener noreferrer\"><img decoding=\"async\" class=\"aligncenter wp-image-396720 size-full\" src=\"https:\/\/i.itworldcanada.com\/wp-content\/uploads\/2017\/09\/sub-itunes-200.png\" alt=\"Subscribe to Cyber Security Today on Apple Podcasts\" width=\"200\" height=\"74\" border=\"none\" \/><\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p data-ar-index=\"3\">Today\u2019s edition reports on a number of vulnerabilities and patches that IT and security teams should be watching for.<\/p>\n<p data-ar-index=\"4\"><strong>Administrators with firewalls<\/strong> from Palo Alto Networks in their environments<a href=\"https:\/\/security.paloaltonetworks.com\/CVE-2022-0028\" rel=\"noopener\"> should be on the lookout this week for security updates to fix a high-severity vulnerability<\/a>\u00a0used by PA, VM and CN-series firewalls. That misconfiguration could allow an attacker to leverage the device for denial of service attacks. The issue has been resolved for all Palo Alto Network cloud next generation firewalls and the Prisma Access service. Updates for other devices will come this week. In the meantime there are workarounds. There\u2019s a link to the document explaining them in the text version of this podcast. By the way, Palo Alto Networks said it learned about this problem because a threat actor is looking for vulnerabilities in firewalls from a number of manufacturers. Network administrators should watch for alerts coming from their firewall vendors.<\/p>\n<p data-ar-index=\"5\"><strong>Windows administrators<\/strong> need to watch for and install a <a href=\"https:\/\/support.microsoft.com\/en-us\/topic\/kb5012170-security-update-for-secure-boot-dbx-august-9-2022-72ff5eed-25b4-47c7-be28-c42bd211bb15\" rel=\"noopener\">security patch from Microsoft or their server and PC equipment manufacturers<\/a> to fix vulnerabilities in third-party bootloaders in products they may use. Windows allows approved third party bootloaders to affect the operating systems\u2019 boot process. <a href=\"https:\/\/kb.cert.org\/vuls\/id\/309662\" rel=\"noopener\">But researchers at Eclypsium recently found<\/a> vulnerabilities that could bypass the Secure Boot capability that protects Windows from being abused. So far three affected bootloaders have been identified. The patch will update Windows\u2019 Secure Boot Forbidden Signature Database.<\/p>\n<p data-ar-index=\"6\"><strong>Email administrators<\/strong> with the Zimbra Collaboration Suite email server in their environment must install the latest patch. This comes after <a href=\"https:\/\/www.volexity.com\/blog\/2022\/08\/10\/mass-exploitation-of-unauthenticated-zimbra-rce-cve-2022-27925\/\" rel=\"noopener\">researchers at Volexity discovered<\/a> a serious vulnerability while investigating breaches at organizations that use the suite. Hackers were getting around a patch that was released in March to patch a hole. It was thought that an attacker would need administrative privileges to exploit the vulnerability. But the researchers found that wasn\u2019t so. Zimbra released a new patch at the end of July. It should have been installed by now.<\/p>\n<p data-ar-index=\"7\"><strong>Security researchers<\/strong> at a firm in Argentina have discovered a high severity vulnerability that may affect network devices from 20 manufacturers including D-Link, Tenda, Nexxt, Intelbras and others. <a href=\"https:\/\/www.securityweek.com\/realtek-sdk-vulnerability-exposes-routers-many-vendors-remote-attacks\" rel=\"noopener\">According to Security Week<\/a>, which interviewed the researchers, the problem is in the software development kit that manufacturers used if they bought certain processing chips from a company called Realtek. The manufacturers were warned about the problem in March. It\u2019s up to them to distribute the patch.<br \/>\nSmall businesses and individuals should regularly check the websites of the manufacturers of their routers and WiFi access points for security patches. That\u2019s because often warnings often don\u2019t get sent directly to IT departments and device owners.<\/p>\n<p data-ar-index=\"8\"><strong>Police in the Netherlands<\/strong> <a href=\"https:\/\/www.fiod.nl\/arrest-of-suspected-developer-of-tornado-cash\/\" rel=\"noopener\">have arrested a man<\/a> believed to be involved in cryptocurrency money laundering through the Tornado Cash mixing service. Mixing services change one type of cryptocurrency for others, helping crooks hide stolen and ransomed funds. Police have long suspected that Tornado Cash is used for cryptocurrency laundering. Dutch police suspect hundreds of millions of dollars in criminal-related cryptocurrency has gone through that particular mixer. The arrest came after the U.S. put Tornado Cash on a sanctioned list.<\/p>\n<p data-ar-index=\"9\"><strong>Finally,<\/strong> since May the U.S has been offering million-dollar rewards for information on the leaders of the Conti ransomware gang. The government knows their online usernames. Now it claims to have a photo of what it calls a gang associate. <a href=\"https:\/\/twitter.com\/RFJ_USA\/status\/1557804081552523267\" rel=\"noopener\">It tweeted the photo<\/a> last week of a bearded man who allegedly uses the name \u201cTarget.\u201d Under the government\u2019s <a href=\"https:\/\/rewardsforjustice.net\/rewards\/conti\/\" rel=\"noopener\">Rewards for Justice program<\/a> there are a number of ways to report information and claim a reward. The Conti gang allegedly disbanded earlier this year but it is believed a number of group members work with other ransomware operators.<\/p>\n<p data-ar-index=\"10\">Remember links to details about podcast stories are in the text version at ITWorldCanada.com.\u00a0 Follow Cyber Security Today on Apple Podcasts, Google Podcasts or add us to your Flash Briefing on your smart speaker.<\/p>\n<p data-ar-index=\"11\">The post <a href=\"https:\/\/www.itworldcanada.com\/article\/cyber-security-today-aug-15-2022-watch-for-patches-from-palo-alto-networks-microsoft-and-others\/498139\">Cyber Security Today, Aug. 15, 2022 \u2013 Watch for patches from Palo Alto Networks, Microsoft and others<\/a> first appeared on <a href=\"https:\/\/www.itworldcanada.com\/\">IT World Canada<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This episode reports on important security updates IT administrators should b<\/p>\n","protected":false},"author":17,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[360,16],"tags":[389],"class_list":["post-26884","post","type-post","status-publish","format-standard","hentry","category-podcasts","category-security","tag-cyber-security-today"],"acf":[],"_links":{"self":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts\/26884","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/comments?post=26884"}],"version-history":[{"count":3,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts\/26884\/revisions"}],"predecessor-version":[{"id":26925,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts\/26884\/revisions\/26925"}],"wp:attachment":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/media?parent=26884"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/categories?post=26884"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/tags?post=26884"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}