OpenBCM V1.07b11 (WIN32)

Packet Radio Mailbox

DBO595

[LAU JN59RM]

 Login: GAST





  

HB1PMS > TECH     29.02.20 20:42l 69 Lines 2777 Bytes #999 (0) @ WW
BID : 2285HB1PMS
Read: GAST
Subj: Unpatched systems are still one of the significant
Path: DBO595<DBX320<FRB024<NL3TD<NL3PRC<GY1BBS<HB1BBS
Sent: 200229/1606Z 8602@HB1BBS.ZL.NLD.EU BPQ6.0.19

Van: HB1PMS@HB1BBS.ZL.NLD.EU

Unpatched systems are still one of the significant attack vectors to launch 
cyberattacks
The issue can turn worse when the organization can be compromised to steal 
confidential data or launch DDoS attacks.
Most of these vulnerabilities are found to be exploited via phishing attacks 
and exploit kits that specifically target flaws in Microsoft products.
Leaving a vulnerable system unpatched can invite troubles for an 
organization. The issue can turn worse when the organization suffers a 
cyberattack that can result in, but not limited to, compromise of 
confidential data, DDoS attacks or stealing of customers’ details.

According to a report released by Recorded Future, it has been found that 
the same vulnerabilities kept showing up year-after-year. An interesting 
aspect of the report was that most of these vulnerabilities were found to be 
exploited via phishing attacks and exploit kits that specifically target 
flaws in Microsoft products.

Prevalent old flaws

Some of the old flaws that have been quite actively used to launch attacks 
are:

CVE-2016-0189 - Memory corruption flaw in Microsoft’s Internet Explorer

CVE-2017-8570 - Remote code execution flaw in Microsoft Office

CVE-2017-0143 - Affects SMBv1 protocol

CVE - 2018-11776 -Remote code execution Apache Struts

CVE-2017-11882 - Remote code execution Microsoft Office

CVE-2009-3129 - Remote code execution in Microsoft Excel/Word

CVE-2017-11774 - Security Feature Bypass vulnerability in Microsoft Outlook

Bottom line

It is no surprise that the vulnerabilities above are leveraged in 
cyberattacks since there are public exploits for all of them. With growing 
numbers of threats taking advantage of well-known and old vulnerabilities, 
it is very much necessary for organizations to patch out date systems to 
protect their data, systems and critical infrastructure against hackers.

73 Henk.

======================================================================
  _    _ ____  __ ____  ____   _____ 
 | |  | |  _ \/_ |  _ \|  _ \ / ____|  SYS: Henk (hb1nos@hb1bbs.com)
 | |__| | |_) || | |_) | |_) | (___    QTH: Ouwerkerk - JO11XO
 |  __  |  _ < | |  _ <|  _ < \___ \   BBS: HB1BBS.ZLD.NLD.EU
 | |  | | |_) || | |_) | |_) |____) |  QRV: 27.235 MHz (FM 1200bps)
 |_|  |_|____/ |_|____/|____/|_____/   WEB: www.hb1bbs.com

======================================================================

** Host of BPQ Netrom/Node NLDHUB::NL9HUB 85.214.163.10 UDP 93  

======================================================================
** This message is generated with Sally 7.2.033
----------------------------------------------------------------------
** Timed zaterdag 29 februari 2020  17:03 West-Europa (standaardtijd)
** BBS HB1PMS@HB1BBS.ZL.NLD.EU





Lese vorherige Mail | Lese naechste Mail


 05.05.2024 13:44:09lZurueck Nach oben