/* ---- Google Analytics Code Below */
Showing posts with label Vulnerabilities. Show all posts
Showing posts with label Vulnerabilities. Show all posts

Sunday, March 13, 2022

Another look at IOT and especially Healthcare Vulnerabilities

 Seven key vulnerabilities mentioned.

Medical, IoT Devices Vulnerable to Attack   By Dark Reading, March 11, 2022 

Researchers at Forescout's Vedere Labs cybersecurity intelligence team and CyberMDX cybersecurity service provider discovered seven vulnerabilities, known collectively as "Access:7," in more than 150 Internet of Things (IoT) devices made by more than 100 companies. Three of the bugs, rated critical, allow attackers to gain full control of devices by remotely executing malicious code.

The remainder, rated moderate to high in severity, allow attackers to steal data or execute denial-of-service attacks. The flaws were found in multiple versions of PTC Axeda agent and PTC Desktop Server, which are used in many IoT devices to enable remote access and management.

All versions of the Axeda technology below 6.9.3 are affected. PTC has released patches for the vulnerabilities .... 

In addition to healthcare-related technologies, affected devices include ATMs, SCADA systems, vending machines, cash management systems, IoT gateways, and asset monitoring technologies .... 

From Dark Reading

View Full Article    

Monday, July 05, 2021

Cloud Computing Under Attack

Thoughts on vulnerability of the cloud. 

Russia’s Hacking Success Shows How Vulnerable the Cloud Is

The cloud is everywhere. It’s critical to computing. And it’s under attack.

By Bruce Schneier, a fellow and lecturer at the Harvard Kennedy School, and Trey Herr, the director of the Cyber Statecraft Initiative at the Atlantic Council’s Scowcroft Center for Strategy and Security.

U.S. Deputy Attorney General Jeffrey A. Rosen at a press conference concerning a hacking campaign tied to the Chinese government at the U.S. Department of Justice in Washington on  Sept. 16, 2020.

Russia’s Sunburst cyberespionage campaign, discovered late last year, impacted more than 100 large companies and U.S. federal agencies, including the Treasury, Energy, Justice, and Homeland Security departments. A crucial part of the Russians’ success was their ability to move through these organizations by compromising cloud and local network identity systems to then access cloud accounts and pilfer emails and files.

Hackers said by the U.S. government to have been working for the Kremlin targeted a widely used Microsoft cloud service that synchronizes user identities. The hackers stole security certificates to create their own identities, which allowed them to bypass safeguards such as multifactor authentication and gain access to Office 365 accounts, impacting thousands of users at the affected companies and government agencies.

It wasn’t the first time cloud services were the focus of a cyberattack, and it certainly won’t be the last. Cloud weaknesses were also critical in a 2019 breach at Capital One. There, an Amazon Web Services cloud vulnerability, compounded by Capital One’s own struggle to properly configure a complex cloud service, led to the disclosure of tens of millions of customer records, including credit card applications, Social Security numbers, and bank account information.

This trend of attacks on cloud services by criminals, hackers, and nation states is growing as cloud computing takes over worldwide as the default model for information technologies. Leaked data is bad enough, but disruption to the cloud, even an outage at a single provider, could quickly cost the global economy billions of dollars a day.

Cloud computing is an important source of risk both because it has quickly supplanted traditional IT and because it concentrates ownership of design choices at a very small number of companies. First, cloud is increasingly the default mode of computing for organizations, meaning ever more users and critical data from national intelligence and defense agencies ride on these technologies. Second, cloud computing services, especially those supplied by the world’s four largest providers—Amazon, Microsoft, Alibaba, and Google—concentrate key security and technology design choices inside a small number of organizations. The consequences of bad decisions or poorly made trade-offs can quickly scale to hundreds of millions of users.  ... '