Manage Google Meet and classic Hangouts separately in the Admin console

Quick launch summary

Google Meet can now be controlled independently of classic Hangouts chat in the Admin console. Please make sure your service settings are prepared by following the steps in the Help Center.

You can find more information about this change in an email that was sent to your domain’s primary admin between the 11th and 18th of May 2020.

Getting started

Admins: Visit the Help Center to learn more about turning Meet video calling on or off for your organization.

End users: End users are not impacted by this change.

Rollout pace

Availability

  • Applies to all G Suite customers

Resources

[ad_2]

Net Universe offers all Google devices with worldwide Delivery Services.
Send us an email to [email protected] for more information or visit https://www.netuniversecorp.com/google.
You can visit our Shop Online

 

Sophos Connect 2.0 Early Access Program is now available! – Sophos News

Sophos Connect is our free remote-access VPN client designed specifically to enable remote workers to access your XG Firewall protected network from anywhere.  And Sophos Connect 2.0 now includes many new features that you can start taking advantage of right away.

You should also know that as a licensed XG Firewall customer, there’s no extra charge for remote-access VPN connections – you can utilize as many as you want (up to your firewall’s capacity) to support your remote workforce – included for free as part of your base license.

What’s new in Sophos Connect 2.0

The early access program for Sophos Connect 2.0 is now underway, adding support for SSL VPN on Windows as well as a number of other enhancements.

  • SSL VPN support for Windows
  • Bulk deployment of SSL and/or IPSec VPN configurations via an enhanced provisioning file
    • The same convenient deployment as in Sophos Connect v1 for IPSec
    • Support for one-time-passwords (OTP)
    • Improved DUO multi-factor-authentication (MFA) support (when connecting to XG Firewall v18)
    • Auto-Connect option
    • Option to execute a logon script when connecting
    • Remote gateway availability probing
  • Automatic synchronization of the latest user policy if the SSL policy is updated on the firewall (when using the provisioning file to deploy) as well as a manual re-synchronization of the latest policy
  • Automatic failover to next firewall WAN link if one link fails
  • File extension association for policy files – import a policy file into Sophos Connect just by double-clicking it in Windows Explorer, or opening the file attached in an email

Getting started

Head on over to the XG Firewall Community to get started with the early access program.  There are full details on all the changes, instructions on how to use the new provisioning file, and the download itself.  Full instructions are also available online.

SSL vs IPSec

With Sophos Connect 2 now supporting both SSL and IPSec VPN technologies, you might be wondering about the pros and cons of each and which one you should use.

In general, SSL VPN, which can work over port 443 just like any encrypted website connection, will present fewer obstacles and work from more varied locations such as public WiFi hotspots and hotel networks.

IPSec is typically more efficient but uses UDP ports 500 and 4500 which can often result in connections being blocked by 3rd party firewalls.  If the user has full control over their firewall or router, and can open these ports, then they will find IPSec offers more predictable performance.

One of the great new benefits of Sophos Connect 2 is that you can now offer both with a single client, but we encourage you to take advantage of the new SSL VPN capability for the added flexibility it offers.

Net Universe offers all Sophos Devices and subscritpions also consultant services with worldwide Delivery Services.
Send us an email to [email protected] for more information or visit https://www.netuniversecorp.com/sophos.

Increasing IT efficiency and protection – Sophos News

Imagine cutting the time you spend on day-to-day security admin by over 90% and slashing the number of security incidents that need investigation by 85%. Almost sounds too good to be true, doesn’t it?

Almost. Because these are the real-world benefits that organizations are seeing from running a Sophos cybersecurity system, revealed in the Sophos Business Impact report.

With Sophos Intercept X protection on endpoints, Sophos XG Firewall at the gateway, and everything managed through Sophos Central, Sophos customers are seeing quantifiable improvements in both protection and IT efficiency.

Customer Impact

We interviewed five customers across North America, Europe, and Asia to understand the impact the Sophos cybersecurity system has had for them.

Each customer’s scenario was different, with varying organizational structures, challenges, and business requirements. However, one major finding was common to all:

Customers said that they would need to double their security headcount to maintain the same level of protection if they didn’t have a Sophos next-gen cybersecurity system.

They also told us that they experience fewer security incidents and can identify and respond quicker to issues that do occur.

Customer A: Healthcare Provider, USA

Customer A is a regional healthcare provider whose services include inpatient and outpatient care, medical practices, nursing homes, and a range of specialist services. They have 4,500 employees, including 80 IT staff, of which three are dedicated to cybersecurity. Benefits they have seen from running Sophos include:

  • 50% reduction in IT security resource requirements
    The customer currently employs three dedicated cybersecurity heads. They calculated they would need to employ three additional full-time security analysts solely to cover incident response if they didn’t use Sophos.
  • 90%+ reduction in day-to-day security administration
    The IT security manager spends 30 minutes each day reviewing logs and investigating anything of concern. Prior to Sophos, it used to take him an entire day to get the same level of information and confidence.
  • 85% reduction in security incidents
    Prior to Sophos, they experienced on average three incidents each day that were worthy of further investigation. With Sophos this has dropped to an average of one every three days.
  • 90%+ reduction in time to investigate an incident
    Before Sophos it used to take around three hours to conduct a thorough investigation into an incident, which included getting local access to the affected computer. Now it takes a maximum of 15 minutes with everything done remotely via the Sophos Central platform.

Customer B: Education Services Provider, India

Customer B provides educational services to colleges and universities across India and the wider Southeast Asia area. They secure tens of thousands of students via a centralized IT team based out of their head office in Bangalore, together with a team of local IT managers on site.  The impact of running a Sophos cybersecurity system includes:

  • 50% reduction in staff needed for day-to-day security management
    Previously, they employed four engineers to manage day-to-day security. Since moving to Sophos, they have only needed two engineers to cover security across the company.
  • 94% reduction in time to identify high-risk areas that require investigation
    Prior to Sophos it took the customer three to four hours to identify critical issues they needed to focus on for further investigation. Now it takes just 10 to 15 minutes to identify the security priorities across the organization in Sophos Central.
  • 98% reduction in time to identify the source of bad traffic on the network.
    With the previous network security implementation it would take two days (and sometimes longer) to identify which device on the network was causing performance or security issues. Now it takes just 15 minutes to pinpoint the issue and start addressing it.
  • 95% reduction in time spent managing firmware updates
    Before Sophos each firmware update would take between three and four hours. Now it takes just 10 minutes per update. With 20 to 25 updates a year, this equates to a savings of 75 hours a year.

To learn more and to check out all five case studies, read Cybersecurity Evolved: The Sophos Business Impact.

If you’d like to try out Sophos solutions for yourself you can start an instant online demo at www.sophos.com/demo.

Net Universe offers all Sophos Devices and subscritpions also consultant services with worldwide Delivery Services.
Send us an email to [email protected] for more information or visit https://www.netuniversecorp.com/sophos.

Fast & Secure Americas 2020 Digital Edition

Fortinet is excited to offer Carriers, Cloud Providers, MSSPs and Mobile Network Operators the opportunity to participate in a Digital Edition of Fast and Secure. Fortinet’s Fast & Secure Americas will take place June 18 in North America starting at 8am PT.  

Fortinet: A Trusted Partner of Carriers, MSSPs and Mobile Network Operators (MNOs)

Fortinet is a long-time trusted partner to the Carriers, MSSPs and Mobile Network Operators.  These providers are under constant pressure to transform business – being challenged with new models for customer interaction and being asked to reshape and redefine service delivery capabilities while seeking to maintain value within the enterprise IT ecosystem.   

Service Providers play a pivotal role in this new paradigm. More data than ever is going to be pushed across your networks. Content usage will continue to grow and demand more bandwidth, storage and compute resources. More users and devices than ever will need instant access to data wherever it is located, from just about any device imaginable. Security will be a key enabler of new service capability and revenue streams. Thoughtful engineering and careful planning – including the selection, deployment, and integration of security tools designed to work together across highly elastic and adaptive environments – are necessary if we are to meet the requirements of the new digital economy. 

Fast & Secure Americas 

Join Fortinet for Fast & Secure Americas, a digital symposium where we explore cybersecurity issues and topics relevant to the Service Provider and Telco industry. Our theme for this year’s event is change – what it means, what it offers and how we can provide an effective cybersecurity response to it. 

The symposium will consist of a 90 minute General Session followed by a set of Breakout Sessions.

Our general sessions will provide a thought provoking look at key cybersecurity concerns and priorities facing the Service Provider industry. Our speakers will share their expertise and insights on today’s security challenges, potential solutions and practices to maintain the networks that are an essential element of our social and economic infrastructure.

John Maddison, our CMO and EVP of Products will provide the opening remarks and discuss how we can create value together.  We also have a special guest, Dr. Ed Amoroso, currently Chief Executive Officer of TAG Cyber LLC. Dr. Amoroso will be talking about Securing Change, Enabling Innovation. Specifically, about change to infrastructure, threats and the role of the Service Providers in how they are responding to the change during the time of the Covid-19 pandemic. 

Breakout sessions will delve into the application of security technologies to a range of use-cases directly applicable to Service Providers and Telcos. The Breakout sessions will consist of two tracks, an MSP/MSSP track focused on issues related to the delivery of value-added services and capabilities and a Mobile Network Operator focused on the application of security to today’s fast-evolving mobile infrastructure. A wide range of topics will be addressed including SD-WAN, 5G security, cloud security, remote work, new security services and industry-aligned solutions.  

Join Fortinet for Fast & Secure Americas, a digital symposium where we explore cybersecurity issues and topics relevant to the Service Provider and Telco industry.

Sessions for our recently completed Fast and Secure EMEA are now available on demand.

 

As Fortinet partners, Net Universe offers all Fortinet devices and subscriptions with worldwide Delivery Services.
Send us an email to [email protected] for more information or visit https://www.netuniversecorp.com/fortinet.
You can visit our Shop Online

Edit Calendar events directly from Gmail and Docs

Quick launch summary

You can now edit Google Calendar events in the quick-access side panel in Gmail and Docs, without having to go to the full Calendar page in your browser. You can even use “Find a Time” to see others’ calendar availability when scheduling events.

Getting started

Admins: There is no admin control for this feature.

End users: There is no end user setting for this feature. Visit the Help Center to learn more about using Calendar in the side panel.

Rollout pace

  • Rapid Release domains: Gradual rollout (up to 15 days for feature visibility) starting on June 11, 2020
  • Scheduled Release domains: Extended rollout (potentially longer than 15 days for feature visibility) starting on June 24, 2020

Availability

  • Available to all G Suite customers

Resources

[ad_2]

Net Universe offers all Google devices with worldwide Delivery Services.
Send us an email to [email protected] for more information or visit https://www.netuniversecorp.com/google.
You can visit our Shop Online

 

Improvements to layouts in Google Meet

Quick launch summary

We’re making some changes in Meet to ensure you can better see who, and what, you need to see in your meetings. We hope that these improvements help remote meetings feel more like in-person meetings.

Tiled view with presentations
We recently announced tiled layout in Meet, where you can see up to 16 other participants in your meeting. We’re now making improvements to that layout to allow you to see other attendees even when someone is presenting. Presentations appear in a large tile, with the most active participants to the side or bottom.

Saved layout preference
When you choose a new layout, this layout will be automatically saved as your preferred layout. This means it will be automatically applied for your future meetings, until you select a new one.

Additional UI improvements
We’ve made some minor improvements to the meeting UI to better utilize the space on your screen.

Getting started



Admins: There is no admin control for this feature.

End users: To learn more about the different layout options in Meet, check out the Help Center

Rollout pace

  • This feature is available now for all users.

Availability

  • Available to all G Suite customers and users with personal Google Accounts

Resources

[ad_2]

Net Universe offers all Google devices with worldwide Delivery Services.
Send us an email to [email protected] for more information or visit https://www.netuniversecorp.com/google.
You can visit our Shop Online

 

3 key cyberthreats education institutes must guard against – Sophos News

With valuable, and often underprotected data, education institutes are prime targets for cyberattackers.

On top of regular security challenges faced, the new complexities stemming from COVID-19 are offering cybercriminals tailormade scenario for attacking school networks, and giving education institutes even more security challenges that need to be addressed to keep students and student data safe and secure.

Let’s take a closer look at some of the challenges these institutions must address:

1. Phishing scams

We’re seeing an uptick in coronavirus phishing scams, and so the chances of phishing emails making their way into the inboxes of teachers, administrators, and students is high.

Staff must be provided with comprehensive guidance that allows them to identify such emails. It’s critical to deploy advanced email security that blocks phishing emails, prevents data loss, encrypts email, and offers comprehensive protection against phishing.

2. Shortage of skilled IT security staff

This is a challenge not unique to schools, but lack of skilled IT staff particularly leaves a school network susceptible to threats.

Schools are shut down to control the spread of the pandemic. At most, there’s a skeletal staff at work, or else everyone is working from home. When this happens, who takes charge of your school’s IT security needs?

Schools can find themselves with no one pushing network security, device management, and endpoint security policies.

Critical reports identifying risky users, or which offer more information about regulatory compliance might not be leveraged effectively. This can give cybercriminals an opportunity to exploit weaknesses in your cybersecurity infrastructure to infect the network.

The answer to this challenge is managed threat response services (MTR). This service offers an expert team to deliver threat hunting, detection, and response services 24/7, so that you don’t have to. You don’t have to worry about spotting suspicious behaviors or whether your cybersecurity configuration is on point because the team manages all security needs for your education institute.

3. Advanced malware attacks

As students and teachers spend more time online during coronavirus lockdowns, they are susceptible to inadvertently becoming victims of an account takeover, unintentionally or carelessly sharing their information with cybercriminals.

This allows criminals to log in to your school’s network, launch a ransomware attack, and take control of sensitive student data.

The solution is to deploy advanced endpoint protection technologies to stop the attack chain and predictively prevent such attacks, features should also include automatic roll back to pre-altered state if files are encrypted. This will help protect data if students or teachers are using school-supplied laptops or tabs.

If they are using their own devices to access school resources, it is imperative they install a cybersecurity solution specifically catering to the needs of home users.

To maximize their safety, schools must also deploy a next-gen firewall that detects and blocks ransomware at the gateway, and also prevents its lateral movement.

Sophos can help

Sophos offers a powerful portfolio of products that deliver layered protection against evolving threats. Learn more about how Sophos can support efforts to secure your education institute on our   education protection page. Also, download our education reference card that offers more information on how Sophos can protect your institute against unique and sophisticated cybersecurity challenges.

Net Universe offers all Sophos Devices and subscritpions also consultant services with worldwide Delivery Services.
Send us an email to [email protected] for more information or visit https://www.netuniversecorp.com/sophos.

Evolution of Cyber Threats in OT Environments

FortiGuard Labs Perspectives

This year marks the 10th anniversary of the discovery of Stuxnet. The malicious computer worm made headlines by targeting supervisory control and data acquisition (SCADA) systems. 

Stuxnet code, notably large and sophisticated at over 500 kilobytes, managed to work its way into Windows machines and networks, replicating itself several times over before seeking out additional software. It targets programmable logic controllers (PLCs), which enable the automation of electromechanical processes such as machinery or industrial processes. 

Since the Stuxnet discovery, there have been many instances of equally sophisticated cyberattacks on operational technology (OT) systems worldwide. This may be due in part to the fact that OT networks are now increasingly connected to the Internet, making them more vulnerable to attacks by cybercriminals, nation-states, and hackers. In fact, in the “State of Operational Technology and Cybersecurity Report” by Fortinet, 74% of OT organizations had experienced a malware intrusion in the past 12 months, causing damages to productivity, revenue, brand trust, intellectual property, and physical safety.

Significant Cyberattacks on OT Environments and ICS 

By evaluating the most significant ICS cyberattacks over the past decade, we can witness just how far threat actors have come in their technical capabilities. Perhaps more unsettling, however, is their willingness to cause harm not only to digital infrastructures but physical infrastructures – even impacting workers and communities. Stuxnet is perhaps one of the first in a series of malicious attacks on ICS that have enlightened organizations around the globe regarding the extent and impact cyberattacks can have on the physical world. 

This rise in new threat and attack mechanisms have radically altered the way industrial control systems (ICS) and SCADA systems function. Here, we recap some of the most significant cyberattacks on ICS that have taken place over the past decade, as well as their influence on modern security strategies across critical infrastructure. 

2011: Duqu 

Hungarian cybersecurity researchers discovered malware, identified as Duqu, which closely resembled Stuxnet in terms of its structure and design. Duqu was designed to steal information by disguising data transmissions as normal HTTP traffic and transferring fake JPG files. The key takeaway from the Duqu discovery was understanding the importance of reconnaissance work in a threat actor’s cyber campaign, where information-stealing code is often the first cyber threat enacted in a planned series of additional attacks. 

2013: Havex 

Havex is a notable Remote Access Trojan (RAT) malware that was initially discovered in 2013. Tied to the threat actor group known as GRIZZLY STEPPE, Havex targets ICS systems and communicates with a C2 server that can deploy modular payloads. 

Its ICS-specific payload gathered open platform communications (OPC) server information, including CLSID, server name, Program ID, OPC version, vendor information, running state, group count, and server bandwidth – and was also capable of enumerating OPC tags. By communicating with a C2 infrastructure, Havex malware was significant in its ability to send instructions that provide enhanced and unknown capabilities to the malware. 

2015: BlackEnergy

In 2015, it was discovered that BlackEnergy malware had been used to exploit macros in Microsoft Excel documents; the malware entered networks via spear-phishing emails sent to employees. While the tactics employed by these attackers were relatively unsophisticated, the event proved that cybercriminals could indeed manipulate critical infrastructure on a large scale.  

2017: TRITON 

TRITON malware, discovered in 2017, targeted industrial safety systems. Specifically, it went after a safety instrumentedsystem (SIS), modifying in-memory firmware to add malicious functionality. This allowed the attacker to read or modify memory contents and implement custom code – along with additional programming to disable, inhibit, or modify the ability of an industrial process to fail safely. TRITON is the first known malware specifically designed to attack the industrial safety systems that protect human lives. 

Addressing ICS/SCADA Security Challenges

ICS comprises a large segment of the OT layered architecture, encompassing many different types of devices, systems, controls, and networks that manage industrial processes. The most common of these are SCADA systems and distributed control systems (DCS). 

While most organizations have been implementing IT security measures for years, OT security is somewhat new territory. With the rise of the Industrial Internet of Things (IIoT) and subsequent IT/OT convergence, industries have lost the “air gap” that protected their OT systems from hackers and malware. As a result, adversaries have increasingly begun targeting OT systems to steal proprietary information, disrupt operations, or commit acts of cyber terrorism against critical infrastructure, in part because existing malware works effectively against legacy systems deployed in OT networks that have likely not been patched or updated given the absence  of additional development or programming.

Several challenges have played a role in the evolution of cyberattacks that have impacted OT systems over the years, including: 

  • Lack of OT device inventory: It’s impossible for organizations to defend assets – whether by deploying patches or running security audits – if they do not have complete visibility and control of the environment. 
  • Lack of remote network accessibility: Most technology underpinning ICS relies on restricted physical access and obscure components and communications protocols.
  • Outdated hardware and software: Many ICS and SCADA systems rely on aging hardware or obsolete operating systems that are incompatible with or too delicate to support modern defense technologies. Many of that hardware is deployed in environments where systems cannot be taken offline for patching or updating.
  • Poor network segmentation: OT environments tend to operate under the assumption of inherent trust – a model that does not translate well to new converged IT/OT environments. The standard security practice of partitioning networks into functional segments that limit the data and applications that can migrate from one segment to another is largely underutilized within ICS as a whole. 
  • Limited access control and permission management: As previously isolated or closed systems become interconnected, the controls and processes that prescribed access often become convoluted.

Thankfully, the risks that lead to security threats targeting ICS/SCADA are becoming more widely recognized – and, as a result, more heavily prioritized – by many leading organizations. Government bodies, including the Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) in the US and the Centre for Protection of National Infrastructure (CPNI) in the UK, now publish advice and guidance on security best practices for ICS. 

Standards have also been developed by the International Society of Automation (ISA), with a “zones and conduits” framework that addresses the most pressing deficiencies of ICS network security and provides guidelines for improved management.  Likewise, the non-profit ICS-ISAC organization is focused on sharing knowledge about risks, threats, and best practices to help facilities develop situational awareness in support of local, national and international security.

The Need to Support Critical Infrastructure

Security considerations for ICS/SCADA should be made a top priority due to the potential repercussions of an attack on the physical safety of employees, customers, and communities. This also means that regulatory compliance must not be ignored. Fortunately, by taking a multi-layered approach to ICS/SCADA security, organizations can significantly improve their overall security posture and risk mitigation strategy.  

Learn how Fortinet can help you extend security and maintain compliance in any ICS/SCADA-connected environment.

Read these customer use cases to find out how Echoenergia and this major oil and gas company used Fortinet’s OT Security Solutions to protect their distributed networks and critical infrastructure. 

As Fortinet partners, Net Universe offers all Fortinet devices and subscriptions with worldwide Delivery Services.
Send us an email to [email protected] for more information or visit https://www.netuniversecorp.com/fortinet.
You can visit our Shop Online

Yubico releases Android SDK to improve mobile app security





Yubico releases Android SDK to improve mobile app security | Yubico




Yubico releases Android SDK to improve mobile app security | Yubico


























Yubico Privacy and Cookies Policy



Scroll to top

Net Universe offers all Yubikeys with worldwide Delivery Services.
Send us an email to [email protected] for more information or visit https://www.netuniversecorp.com/yubikey.
You can visit our Shop Online

 

Microsoft pushes fixes for 128 security bugs in June, 2020 Patch Tuesday – Sophos News

In this month’s Patch Tuesday, a total of 128 security vulnerabilities have been patched in Microsoft products, a slight increase compared to the last few months. Only twelve of the vulnerabilities are rated “Critical.” None of the bugs have been found being exploited in the wild (yet).

In addition, a remote code execution vulnerability in Adobe’s Flash player software is also rated critical, and an update (not distributed through the Windows Update mechanism) was released today by Adobe for Flash, for Adobe Framemaker, and for the Adobe Experience Manager.

Preceding this month’s update was a fix for an Elevation of Privilege vulnerability in Edge Chromium. As is the case with the browser, based on Chrome, updates to Edge Chromium are distributed from within the browser, independent of Patch Tuesday releases, and don’t require a system restart.

As usual all the additional details can be found in the Security Update Guide Release Notes and users can download patches manually from the Microsoft Security Update Catalog if there’s a delay getting updates automatically.

Some words about this month’s most notable bug fixes:

Office Remote Code Execution

Microsoft Word, CVE-2020-1321

Microsoft Excel, CVE-2020-1225, CVE-2020-1226

Word for Android, CVE-2020-1223

Remote Code Execution vulnerabilities in the Office suite can lead to compromise of a system if the user, running an unpatched version of the software, is enticed to open a malicious document by an attacker, most commonly delivered by way of email.

While such bugs in Office software for Windows come a dime a dozen, this month marks the first time that a CVE has been assigned to the Android version of Word.

While Sophos is a member of Microsoft’s MAPP program, the company provided no details about the specifics of this vulnerability in advance of the patch release. The company’s official notification indicates that the software doesn’t properly handle “a specially crafted URL file” but isn’t clear exactly what that means. The very nature of a remote code execution bug implies that the presence of this vulnerability in an Android app puts users of the not-up-to-date version of Word for Android at risk of having their Android phone hacked simply by opening the wrong document.

The updated version of this app has been made available through Google’s Play Store. As of this publication, the most recent version of Word for Android was released on May 18, 2020 and is version number 16.0.12827.20140.

Windows Elevation of Privilege

A whopping 69 bugs, more than a half of this month’s total count, fall under the category of Elevation of Privilege (EoP) vulnerabilities. The bugs are present in a wide range of Windows components and related packages.

EoP vulnerabilities could permit an attacker with limited access to a Windows system to gain more control over it, typically allowing for “escaping” a low integrity or sandboxed process by exploiting such a vulnerability, and subsequently gaining unlimited permissions to the system.

The following components of Windows are notable for their inclusion in this month’s update:

  • Windows Kernel Elevation of Privilege: 15 CVEs
  • Win32k Elevation of Privilege: 6 CVEs
  • OpenSSH for Windows Elevation of Privilege, CVE-2020-1292
  • Windows Lockscreen Elevation of Prvilege, CVE-2020-1279

Windows Kernel Security Feature Bypass

CVE-2020-1241

On its own, this bug is harmless to a system. However, when exploited, it allows for circumventing a security feature present in the Windows kernel, leaving the system more vulnerable to Elevation of Privilege attacks.

The security feature in question is the NULL Pointer Dereference protection, which was introduced in Windows 8.

The NULL Pointer Dereference bug class was once commonly exploited to attack operating system kernels in order to achieve Elevation of Privilege. In modern operating systems, security features have been put in place to prevent the conditions required for the successful exploitation of NULL Pointer Dereference bugs, effectively making this bug class largely obsolete.

By exploiting CVE-2020-1241, an attacker can “resurrect” this bug class on modern Windows systems, and open up the opportunity for them to be exploited.

Update about the CVE-2020-0796 (SMBGhost) vulnerability

As we wrote in March, Microsoft issued an patch to fix this vulnerability which, if exploited, can create a method for malware to copy itself from machine to machine. We typically call this type of potentially runaway behavior a wormable exploit, and we’ve seen this kind of thing used by increasing numbers of criminals in the form of, for example, EternalBlue. It’s hard to overstate the potential for damage these kinds of bugs can cause in a short period of time, as evidenced by the WannaCry ransomware outbreak a little over three years ago.

At the time we published that analysis, no known exploit existed for SMBGhost, but the situation has changed. At least two security teams claim to have developed a method to exploit the SMBGhost bug, a situation which prompted the US government’s Cybersecurity & Infrastructure Security Agency (CISA) to issue a warning about the bug, encouraging everyone to update Windows to eliminate this loophole.

If, for whatever reason, you have been deferring Windows updates since March, now is the time to pull the trigger on fixing this potentially very serious bug.

How is Sophos responding to these threats?

Here is a list of protection released by SophosLabs in response to this advisory to complement any existing protection and generic exploit mitigation capabilities in our products.

 

How long does it take to have Sophos detection in place?

We aim to add detection to critical issues based on the type and nature of the vulnerabilities as soon as possible. In many cases, existing detections will catch exploit attempts without the need for updates.

What if the vulnerability/0-day you’re looking for is not listed here?

If we haven’t released an update for a specific exploit, the most likely reason is that we did not receive the data that shows how the exploit works in the real world. As many of this month’s exploits were crafted in a lab and have not been seen in the wild, nobody has enough information (yet) about how criminals would, hypothetically, exploit any given vulnerability. If or when we receive information about real attacks, we will create new detections, as needed.

Net Universe offers all Sophos Devices and subscritpions also consultant services with worldwide Delivery Services.
Send us an email to [email protected] for more information or visit https://www.netuniversecorp.com/sophos.