SoatDev IT Consulting
SoatDev IT Consulting
  • About us
  • Expertise
  • Services
  • How it works
  • Contact Us
  • News
  • August 18, 2023
  • Rss Fetcher

The CISA urges action on a Citrix ShareFile vulnerability, and more.
Welcome to Cyber Security Today. It’s Friday, August 18th, 2023. I’m Howard Solomon, contributing reporter on cybersecurity for ITWorldCanada.com and TechNewsday.com in the U.S.

A vulnerability in the storage zones controller of Citrix’s ShareFile file transfer application has caught the attention of the U.S. Cybersecurity and Infrastructure Security Agency. An alert and fix about this vulnerability was issued by Citrix in June. But the cybersecurity agency is now warning federal departments — and all organizations — using this application to install the fix. Vulnerable file transfer applications like Accelion FTA, GoAnywhere MFT and MOVEit have been targets for hackers over the past two years.
Separately, CNN reports that the White House has ordered federal departments to get cracking on complying with a 2021 executive order to boost their cybersecurity posture. As of the end of June many departments and agencies were behind, says a memo to senior officials. They have until the end of this year to meet their deadlines.
Still with the U.S. government, the Consumer Financial Protection Bureau is promising action to ensure data brokers comply with the U.S. Fair Credit Reporting Act. That act requires data being sold to third parties, such as credit and employment agencies, must be accurate. The bureau might also limit the ability of credit reporting companies to disclose personal information that could be used to contact people who don’t want to be bothered by marketers.
Microsoft still hasn’t closed a significant hole in the naming policies of modules developers can put in PowerShell Gallery. That’s according to researchers at Aqua Security. As a result threat actors can plunk malware in Gallery modules or scripts with similar names to legitimate packages. It’s the same tactic used by threat actors in open source libraries like GitHub, NPM and others. There are over 9 billion packages in PowerShell Gallery. What’s the risk? A Windows or Azure developer could download what they think is a legitimate package and infect their IT system.
UPDATE: After this podcast was recorded Microsoft told The Register that it has made some changes to help identify and remove from the Gallery packages with misleading names.
Last month researchers at vpnMentor completed a 14 month-long experiment. They set up a honeypot with fake data — an unprotected website purporting to be a fraud prevention company — to see what would happen. Within a month it had been found and somone started stealing data. Word must have spread because over the test period there were about 50,000 downloads a month. Lesson one: If your IT environment has data that can easily be stolen, someone will find it fast. The other thing the researchers noticed is no one tried to warn the fake company about its leaky website. Lesson two: Don’t expect Good Samaratins to warn you of security issues.
Here’s an interesting thing about that report: It outlines how hard it is now to misconfigure AWS S3 storage buckets. That’s because there are a number of warnings when setting up bucks. However, AWS application misconfigurations are a big problem. The director of the office of the CISO told Cybersecurity Dive that one big mistake AWS developers make is not limiting an application’s level of access and permissions. Not every operation of a piece of software needs to access every AWS function. Wide access means a successful hacker can also access everything the application can. It’s worth thinking about.
Finally, a service that allowed the sharing of files anonymously has shut because it was being abused by threat actors. Bleeping Computer reports that AnonFiles closed this week because crooks were using it to pass around stolen data and host malware. The service tried banning hundreds of thousands of files. But its hand was forced when the service’s proxy provider — which enabled the anonymity — had had enough.
Later today the Week in Review will be available. Among the topics being discussed is this week’s report by the Cyber Safety Review Board on why the Lapsus$ extortion gang was so successful.
Follow Cyber Security Today on Apple Podcasts, Google Podcasts or add us to your Flash Briefing on your smart speaker. Thanks for listening. I’m Howard SolomonThe post Cyber Security Today, August 18, 2023 – CISA urges action on a Citrix ShareFile vulnerability, and more first appeared on IT World Canada.

Previous Post
Next Post

Recent Posts

  • Octonions sometimes associate
  • Looking for keys under the lamppost
  • Why Intempus thinks robots should have a human physiological state
  • 48 hours left: What you won’t want to miss at the 20th TechCrunch Disrupt in October
  • Last 24 hours: TechCrunch Disrupt 2025 Early Bird Deals will fly away after today

Categories

  • Industry News
  • Programming
  • RSS Fetched Articles
  • Uncategorized

Archives

  • May 2025
  • April 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023

Tap into the power of Microservices, MVC Architecture, Cloud, Containers, UML, and Scrum methodologies to bolster your project planning, execution, and application development processes.

Solutions

  • IT Consultation
  • Agile Transformation
  • Software Development
  • DevOps & CI/CD

Regions Covered

  • Montreal
  • New York
  • Paris
  • Mauritius
  • Abidjan
  • Dakar

Subscribe to Newsletter

Join our monthly newsletter subscribers to get the latest news and insights.

© Copyright 2023. All Rights Reserved by Soatdev IT Consulting Inc.