3 Triggers for Conducting a DPIA

Here’s a funny thing – recital 84 of the EU’s GDPR legislation states “…where processing operations are likely to result in a high risk to the rights and freedoms of natural persons, the controller should be responsible for the carrying-out of a data protection impact assessment…”. Paragraph 1 of Article 35 says pretty much the […]

“Delivery“ Malicious NPM Packages Target Amazon and Slack with Dependency Attacks

Malicious NPM Packages

Threat actors are targeting companies to include Zillo, Amazon and Slack’s NodeJS applications by using a new vulnerability known as “Dependency Confusion”. By utilising this vulnerability, attacks can steal Unix based system password files and open reverse shells back to an attacker. The attacker creates packages utilising the same names as a company’s internal component […]

MacOS Malware “Not So Silver Linings”

Apple’s new M1 chips had no known malware for them…until now. A vulnerability dubbed the “Silver Sparrow” is an activity cluster that includes a malicious binary compiled to run on the new model. What is unique about this vulnerability, and does it lack a payload? Silver Sparrow uses a launch agent to establish persistence, which […]

What KPIs Should be Tracked for Security Penetration Testing?

security testing kpis

Cyber security is a journey and not just a destination. In the ever-changing security landscape, regular testing and mitigation are required. To prevent testing efforts from feeling like a sinkhole in time and funding, KPIs can be used to track the output of testing to show progress and motivate internal teams to improve their practices. […]

“Sharing is Caring” Unpatched ShareIT Android App Vulnerability Could Allow Hackers to Inject Malware

ShareIT Android App

Several unpatched vulnerabilities were discovered in the ShareIT Android application by Trend Micro, an app with over one billion downloads that is used for sharing files between users and their devices. The vulnerability is believed to have been unpatched for three months, which allows an attacker to achieve remote code execution (RCE) on the victim’s […]

“Infernal” Actively Exploited Windows Kernel EoP Bug Allows Takeover

Microsoft bug

Microsoft has secured 56 vulnerabilities in the February patch Tuesday, this includes 11 critical vulnerabilities, 6 of which were publicly known. The patches cover components in Microsoft Windows, the .NET framework, Azure IoT, Azure Kubernetes Service, Edge for Android, Exchange server, MSS office services, and web applications, Sky for Business and Lynx, and Microsoft Defender. […]

Ransomware Gangs are Abusing VMWare ESXi Exploits to Encrypt Virtual Hard Disks

Ransomware attack

Two CVE’s associated with VMWare ESXi are being exploited in the Wild. One major ransomware gang abuses vulnerabilities on the ESXi platform to take over virtual machines deployed in enterprise environments by encrypting their virtual hard drives. CVE’s 2019-5544 and 2020-3992 impact the Service Location Protocol (SLP), used by devices on the same network to […]

”Forged DNA”: Cisco DNA Center Bug Opens Enterprises to Remote Attack

cisco dna center

A Cross-Site Request Forgery (CSRF) vulnerability has been discovered in the Cisco Digital Network Architecture (DNA) center, which could put enterprise users at risk of remote attacks and takeovers. CVE-2021-1257 as it is designated, is present in the web management interface of the Cisco DNA Center. This web interface is a centralised network-management and orchestration […]

Risk Crew