Skip to main content
Monthly Archives

December 2017

|||

Nissan Finance Data Breach – 1.1 Million Customers Affected

By NewsNo Comments
[vc_single_image image=”13310″ img_size=”full”]

It’s the last month of the year, but probably not the last data breach report.

Nissan Canada revealed on Thursday that the personal information of some customers may have been compromised as a result of a data breach discovered by the company on 11th December.

The incident affects individuals who have financed their vehicles through Nissan Canada Finance (NCF) and INFINITI Financial Services Canada. Nissan is notifying all 1.13 million current and past customers.

The attacker could have stolen names, addresses, vehicle details, vehicle identification numbers (VINs), credit scores, loan amounts, and information on monthly payments.  Nissan Canada says the incident does not appear to involve payment card information.

This is not the first time Nissan has been targeted by hackers.  Back in 2012, the company reported finding malware on its global information systems network.  Last year, the company was forced to shut down its global websites due to a cyberattack.

Can You Prevent Becoming The Next Headline?

It is becoming increasingly difficult for companies to protect online data. To prevent a catastrophe, it’s important to implement rigorous patch management methods.

Updates should be tested and deployed in a safe, but rapid fashion. Reports and audit logs should also be provided to track the status of any tasks or view any systems that have been improperly accessed.

[vc_single_image image=”12545″ img_size=”180×180″ alignment=”center”]

Syxsense is the solution for managing your IT environment. Our content is thoroughly tested, so you can rely on a smooth deployment. Our reports and audit logs are detailed, so you won’t miss any critical information. With two-factor authentication and 2048-bit encryption, you won’t have to worry about your IT tool being a weak point.

Secure your environment and discover a better way to manage with Syxsense.

[vc_separator css=”.vc_custom_1494871528028{padding-top: 15px !important;padding-bottom: 5px !important;}”]

Start a Free Trial

Start a free, 14-day trial of Syxsense, which helps organizations from 50 to 10,000 endpoints monitor and manage their environment, all from just a web browser. An email will be automatically sent to the address you provide.

[dt_default_button link=”url:https%3A%2F%2Fwww.syxsense.com%2Fsyxsense-trial%2F|||” size=”big” button_alignment=”btn_center”]START FREE TRIAL[/dt_default_button]
||

Computerworld UK Names CMS Best IT Cloud Management Tool

By NewsNo Comments
[vc_single_image source=”featured_image” img_size=”full”]

Syxsense Named Top IT Solution

Computerworld UK has released a list of what they determined to be the ‘best cloud management tools for business’. We are pleased to see that Syxsense is #2 on the list!

Computerworld chose to highlight Syxsense and its ability to manage any device, anytime. The full article can be read here.

Since Syxsense is based in the cloud, any browser can become your management console. Our solution includes Device Discovery, Inventory, Patch Management, Software Deployment, Detailed Reports, Audit Logs, Remote Control, and more.

As one of the most secure solutions on the market, Syxsense has a multitude of security features. Two-factor authentication can be enabled and audit logs show who accessed the console and when. Communication with the cloud utilizes 2048-bit encryption. Also, CMS is based in Microsoft Azure, constantly monitored by Microsoft for stability and security.

Come discover a better IT management solution. Start a free trial of Syxsense today.

[vc_separator css=”.vc_custom_1494871528028{padding-top: 15px !important;padding-bottom: 5px !important;}”]

Start a Free Trial

Start a free, 14-day trial of Syxsense, which helps organizations from 50 to 10,000 endpoints monitor and manage their environment, all from just a web browser. An email will be automatically sent to the address you provide.

[dt_default_button link=”url:https%3A%2F%2Fwww.syxsense.com%2Fsyxsense-trial%2F|||” size=”big” button_alignment=”btn_center”]START FREE TRIAL[/dt_default_button]
|||

HP Keylogger Discovered Again

By NewsNo Comments
[vc_single_image image=”13271″ img_size=”full”]

How many of your devices are affected?

A security researcher, Twitter name ZwClose, has uncovered that 460 models of HP devices come with pre-installed keyloggers. Embedded in the SynTP.sys file, attackers could navigate around User Account Control and activate this keylogger.

This is the second time this year that a built-in keylogger was discovered on HP devices. In May, it was revealed that an HP audio driver was storing a log of the user’s keystrokes.

In a security bulletin, HP sought to ease the fears of their owners. “A party would need administrative privileges in order to take advantage of the vulnerability. Neither Synaptics nor HP has access to customer data as a result of this issue.” You can read more about the vulnerability and see a full list of effected device models.

Even though the keylogger is disabled by default, HP has released a driver update that should eliminate the issue. If you have any HP devices within your environment, you’ll want to update them immediately.

Take Action

With an IT management solution like Syxsense, it’s easy to see how many HP devices you have. You can run a scan to view every device with an IP address in your environment. Then a query can be created to view all HP models that are affected by the keylogger. Obtain the update from HP and upload it into the CMS console.

You can then take that query of HP devices and target it to rapidly deploy the update to any vulnerable endpoints. In no time at all, you’ll have detected, scanned, and patched all vulnerable HP devices.

[vc_single_image image=”13282″ img_size=”180×180″ alignment=”center”]
[vc_separator css=”.vc_custom_1494871528028{padding-top: 15px !important;padding-bottom: 5px !important;}”]

Start a Free Trial

Start a free, 14-day trial of Syxsense, which helps organizations from 50 to 10,000 endpoints monitor and manage their environment, all from just a web browser. An email will be automatically sent to the address you provide.

[dt_default_button link=”url:https%3A%2F%2Fwww.syxsense.com%2Fsyxsense-trial%2F|||” size=”big” button_alignment=”btn_center”]START FREE TRIAL[/dt_default_button]
|

Why You Need to Replace RDP

By VideoNo Comments
[vc_separator]

Start a Free Trial

Start a free, 14-day trial of Syxsense, which helps organizations from 50 to 10,000 endpoints monitor and manage their environment, all from just a web browser. An email will be automatically sent to the address you provide.

[dt_default_button link=”url:https%3A%2F%2Fwww.syxsense.com%2Fsyxsense-trial%2F|||” size=”big” button_alignment=”btn_center”]START FREE TRIAL[/dt_default_button]
||

December Patch Tuesday: Bad Winter

By News, Patch TuesdayNo Comments
[vc_single_image image=”13259″ img_size=”full”]

On the 12th day of December, Verismic sent to me … Top 10 Breaches of 2017!

Throughout this year we have been breaking some of the worst IT security breaches of 2017, which have impacted millions of users worldwide.  We continue to advise our clients the single most important decision you can make to achieve a level of protection for your organization is to onboard a tool like Syxsense to automate the detection of all devices and to automate a rigorous patching processes.  If you need help, please download our Avoiding Patch Doomsday whitepaper or get in touch.

Here are our top 10 IT security breaches for 2017: 

  1. TeamViewer Exploited.  A new vulnerability within TeamViewer has been making news across the internet. In an official statement by the company, they revealed that a GitHub user discovered a vulnerability in TeamViewer’s set of permissions.
  2. Worldwide Malware Attack: Exploring WannaCry.  WannaCry is the worst malware attack of 2017.  As computer virus outbreaks go, this ransomware attack is being called one of the biggest cyberattacks in history and continues to spread worldwide.
  3. Equifax Hack – Cyberattack.  Criminals gained access to certain files in Equifax’s system from mid-May to July by exploiting a weak point in website software affecting 143 million customers worldwide.
  4. Hyatt Hack: Major Data Breach.  41 of its hotels spread across 13 countries confirmed unauthorized access to payment card information.  Hyatt suffered a similar breach affecting 250 hotels located in 50 countries back in 2015.
  5. HBO – Game of Thrones series stolen.  The recent HBO hack may have exposed up to 1.5 terabytes of data.  This is 7 times what Sony lost in the 2014 cyberattack.
  6. CIA Hacks.  Wikileaks recently published the article “Vault 7: CIA Hacking Tools Revealed.”   This list of compromised software includes Notepad++.  When Notepad++ is launched, the original scilexer.dll is replaced by a modified scilexer.dll built by the CIA.
  7. BadRabbit: Newest Ransomware to Target Corporate Networks.  The outbreak began in Russia, infecting big Russian media outlets, but it has already spread.  Several US and UK firms, with corporate entities in the Ukraine and Russia, have already been infected.
  8. Hidden Cobra: North Korea’s History of Hacking.  Since 2009, Hidden Cobra actors have leveraged their capabilities to target and compromise a range of victims; some intrusions have resulted in the exfiltration of data while others have been disruptive in nature.
  9. Invasion of the Body Hackers.  On August 29th, the FDA issued an alert regarding Abbott pacemakers.  Formerly known as St. Jude Medical, the Abbott pacemakers have vulnerabilities in their software.
  10. BitPaymer Ransomware Hits NHS.  The hack caused major disruption, leading to thousands of cancelled appointments.

BREAKING NEWS: 1.4 Billion credentials leaked on the Dark Web!

A huge data dump has been found on the dark web containing 1.4 clear text credentials.  At over 41 gigabytes in size, this will take some time to pass through however you can be assured sophisticated programs will be ready soon to exploit software, apps or websites you are using.  Robert Brown, Director of Services at Verismic said, “No matter how complex your passwords are, it is not going to be complex enough if your password is discovered in this data dump.  Two-factor authentication has been around for years, and Syxsense has been using Two-factor since the beginning to protect our customer identity.  Two-factor authentication within Syxsense requires an additional automatically generated password be entered via email or Google Authenticator ensuring no single password gives you full access to the system.  We would highly encourage our clients to leave it enabled as it is enabled by default.”

Companies Plan to Change Third-Party Vendors that Pose Highest Risks!

Global consulting firm Protiviti and the Shared Assessments Program’s annual Vendor Risk Management Benchmark Study finds that a majority (53 percent) of organizations surveyed are likely to exit or change (de-risk) relationships with some vendors due to heightened risk levels.  The study finds that 71 percent of these organizations will likely change their high-risk relationships over the next 12 months.  Robert Brown, Director of Services for Verismic said, “Deployment of Third-party updates to bring them into compliancy is simple if you are using the right systems management toolset & the right approach to deployment of detected updates.”  The full article can be found here.

[dt_default_button link=”url:https%3A%2F%2Fwww.syxsense.com%2Fsyxsense-trial%2F|||” size=”big” button_alignment=”btn_center”]START FREE TRIAL[/dt_default_button]

[vc_single_image image=”10055″ img_size=”180×180 px” alignment=”center”]

[vc_separator css=”.vc_custom_1494871528028{padding-top: 15px !important;padding-bottom: 5px !important;}”]

December Patch Tuesday Release

Microsoft addressed 32 vulnerabilities in Microsoft Windows, Microsoft Internet Explorer, Microsoft Edge, Microsoft Exchange, Microsoft Excel, Microsoft PowerPoint, and Microsoft SharePoint.  The vulnerabilities could allow an attacker to execute arbitrary code, gain elevated privileges, bypass security protections, view sensitive information, or cause a denial of service condition.  We have chosen a few updates to prioritise this month, this recommendation has been made using evidence from industry experts (including our own), anticipated business impact & most importantly the independent CVSS score for the vulnerability.  The independent CVSS scores used in the table below range from 0 to 10.  Vulnerabilities with a base score in the range 7.0-10.0 are High, those in the range 4.0-6.9 are Medium, and 0-3.9 are Low.

 

CVE ID Vulnerability Alert CVSS Base Score Recommended
CVE-2017-11886 Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability 7.5 Yes
CVE-2017-11890 Microsoft Internet Explorer Memory Corruption Vulnerability 7.5 Yes
CVE-2017-11894 Microsoft Edge and Internet Explorer Memory Corruption Vulnerability 7.5 Yes
CVE-2017-11895 Microsoft Edge and Internet Explorer Memory Corruption Vulnerability 7.5 Yes
CVE-2017-11899 Microsoft Windows Security Feature Bypass Vulnerability 7.5 Yes
CVE-2017-11901 Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability 7.5 Yes
CVE-2017-11903 Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability 7.5 Yes
CVE-2017-11907 Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability 7.5 Yes
CVE-2017-11912 Microsoft Edge and Internet Explorer Memory Corruption Vulnerability 7.5 Yes
CVE-2017-11913 Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability 7.5 Yes
CVE-2017-11919 Microsoft Edge and Internet Explorer Information Disclosure Vulnerability 7.5 Yes
CVE-2017-11930 Microsoft Edge and Internet Explorer Memory Corruption Vulnerability 7.5 Yes
CVE-2017-11885 Microsoft Windows RRAS Arbitrary Code Execution Vulnerability 6.6 Yes
CVE-2017-11932 Microsoft Exchange Spoofing Vulnerability 5.4 Yes
CVE-2017-11936 Microsoft SharePoint Cross-Site Scripting Vulnerability 5.4 Yes
CVE-2017-11887 Microsoft Internet Explorer Scripting Engine Information Disclosure Vulnerability 4.3
CVE-2017-11906 Microsoft Internet Explorer Scripting Engine Information Disclosure Vulnerability 4.3
CVE-2017-11927 Microsoft Windows Information Disclosure Vulnerability 4.3
CVE-2017-11934 Microsoft PowerPoint Information Disclosure Vulnerability 4.3
CVE-2017-11888 Microsoft Edge Scripting Engine Memory Corruption Vulnerability 4.2
CVE-2017-11889 Microsoft Edge Memory Corruption Vulnerability 4.2
CVE-2017-11893 Microsoft Edge Scripting Engine Memory Corruption Vulnerability 4.2
CVE-2017-11905 Microsoft Edge Scripting Engine Memory Corruption Vulnerability 4.2
CVE-2017-11908 Microsoft Edge Scripting Engine Memory Corruption Vulnerability 4.2
CVE-2017-11909 Microsoft Edge Scripting Engine Memory Corruption Vulnerability 4.2
CVE-2017-11910 Microsoft Edge Scripting Engine Memory Corruption Vulnerability 4.2
CVE-2017-11911 Microsoft Edge Scripting Engine Memory Corruption Vulnerability 4.2
CVE-2017-11914 Microsoft Edge Scripting Engine Memory Corruption Vulnerability 4.2
CVE-2017-11916 Microsoft Edge and Internet Explorer Scripting Engine Memory Corruption Vulnerability 4.2
CVE-2017-11918 Microsoft Edge Scripting Engine Memory Corruption Vulnerability 4.2
CVE-2017-11935 Microsoft Excel Arbitrary Code Execution Vulnerability 4.2
CVE-2017-11939 Microsoft Office Information Disclosure Vulnerability 3.1
[vc_separator css=”.vc_custom_1494871528028{padding-top: 15px !important;padding-bottom: 5px !important;}”][dt_default_button link=”url:https%3A%2F%2Fwww.syxsense.com%2Fsyxsense-trial%2F|||” size=”big” button_alignment=”btn_center”]START YOUR FREE TRIAL OF SYXSENSE[/dt_default_button]
||

Critical: Massive Microsoft Vulnerability

By UncategorizedNo Comments
[vc_single_image source=”featured_image” img_size=”full”]

When Malware Protection Needs Malware Protection

An update has been released by Microsoft to fix a major vulnerability in the remote code execution (RCE) of its Malware Protection Engine.

According to the CVE-2017-11937 security update, Microsoft believes that the MPE could be tricked into scanning a specially crafted file that would lead to a memory corruption bug. Any hacker who used this exploit could execute code to take total control of the system.

At the time of the writing of this article, Microsoft believes they caught this exploit before it was manipulated in the wild. The update should be available automatically through Windows Update. It’s recommended that you run updates on all the devices that could be affected. For more information, view Microsoft’s Security update.

A Better Way to Patch

Syxsense takes the security of endpoints very seriously. This is why we developed a cloud-based, IT management solution capable of managing anything, anytime.

Come explore our comprehensive Patch Manager and start a free trial today!

[vc_single_image image=”13244″ img_size=”180×180″ alignment=”center”]
[vc_separator css=”.vc_custom_1494871528028{padding-top: 15px !important;padding-bottom: 5px !important;}”]

Start a Free Trial

Start a free, 14-day trial of Syxsense, which helps organizations from 50 to 10,000 endpoints monitor and manage their environment, all from just a web browser. An email will be automatically sent to the address you provide.

[dt_default_button link=”url:https%3A%2F%2Fwww.syxsense.com%2Fsyxsense-trial%2F|||” size=”big” button_alignment=”btn_center”]START FREE TRIAL[/dt_default_button]
|

TeamViewer Exploited

By NewsNo Comments
[vc_single_image source=”featured_image” img_size=”full”]

Who Views the TeamViewer?

A new vulnerability within TeamViewer has been making news across the internet. In an official statement by the company, they revealed that a GitHub user discovered a vulnerability in TeamViewer’s set of permissions.

In a post by one of their community managers, they sought to clarify that the product has not been hacked, just that a potential exploit had been discovered. TeamViewer has released a patch for the Windows version, with Mac and Linux to follow shortly.

What Should I Do?

Our first recommendation is to patch TeamViewer. Using Syxsense, you can easily deploy the update to any device that has this vulnerability. Our inventory scan will detect which devices have TeamViewer and then you can create a targeted task that fixes those devices.

If TeamViewer is widespread throughout your environment, don’t worry. Our deployment technology is resource light, preventing overwhelming bandwidth consumption.

Syxsense also has a comprehensive set of audit logs and reports. You can track who accessed a device and when. Reports can even be emailed out on a schedule, so you receive information to your inbox regularly.

It’s also advisable to replace TeamViewer. Syxsense has a secure Remote Control solution. With Syxsense, you can set prompts that have the end user allow or deny access to their device. They, and you, will know if someone is attempting to access their device without permission.

A vulnerability like this can cause massive headaches for your company. Switch to a secure solution like Syxsense. Start a free trial today!

[vc_single_image image=”12852″ img_size=”180×180″ alignment=”center”]
[vc_separator css=”.vc_custom_1494871528028{padding-top: 15px !important;padding-bottom: 5px !important;}”]

Start a Free Trial

Start a free, 14-day trial of Syxsense, which helps organizations from 50 to 10,000 endpoints monitor and manage their environment, all from just a web browser. An email will be automatically sent to the address you provide.

[dt_default_button link=”url:https%3A%2F%2Fwww.syxsense.com%2Fsyxsense-trial%2F|||” size=”big” button_alignment=”btn_center”]START FREE TRIAL[/dt_default_button]
|

Syxsense Announces MacOS Support

By NewsNo Comments

Syxsense Now Offers MacOS Functionality

Verismic, a global leader in cloud-based IT management technology, has announced MacOS support for Syxsense.

The latest update allows customers to manage MacOS devices across their IT environments.

With Syxsense, users can now detect Mac vulnerabilities and patch any MacOS device within their network. A full inventory of devices as well as patch management are readily available to customers.

“We are thrilled to bring this major enhancement to Syxsense,” said Ashley Leonard, president and CEO of Verismic. “Our customers will experience greater efficiency and security in their IT environments with MacOS support alongside Windows and Linux.”

Cloud Management includes patching for Microsoft, Linux, and MacOS with a growing list of third-party vendors such as Adobe, Java, and Chrome.

With predictive patch management, Syxsense provides true network security by automatically detecting and managing vulnerabilities. Get started with Syxsense and start a free trial today.

[vc_single_image image=”10902″ img_size=”large” alignment=”center”]

[vc_separator css=”.vc_custom_1494871528028{padding-top: 15px !important;padding-bottom: 5px !important;}”]

Start a Free Trial

Start a free, 14-day trial of Syxsense, which helps organizations from 50 to 10,000 endpoints monitor and manage their environment, all from just a web browser. An email will be automatically sent to the address you provide.

[dt_default_button link=”url:https%3A%2F%2Fwww.syxsense.com%2Fsyxsense-trial%2F|||” size=”big” button_alignment=”btn_center”]START FREE TRIAL[/dt_default_button]