Newsletter

Networking Monitoring News – June 2016

Network Segmentation

As we build out our networks, we should start thinking about how to properly segment users and assets. Segmenting networks has been best practice for a long time now, but is rarely implemented. With the new normal of malware, we can greatly reduce our attack surface by limiting exposure to our critical systems. This also allows us to focus monitoring efforts where they will be most effective.

Flat networks are simple and have little management overhead, but this comes at a cost. Flat networks offer little protection as well.

Lenovo

The Lenovo Accelerator Application software package which is meant to speed up the launch of some Lenovo applications, has been found to be vulnerable to a man in the middle attack. The vulnerability lies within the “update mechanism where a Lenovo server is queried to identify if application updates are available.” Lenovo recommends removing this software immediately.

The full list of machines that are impacted is vast but include Lenovo Notebook 305, Edge 15, Flex2 Pro and Yoga product lines. Additionally, IdeaCenter and Yoga Home 500 are amongst the 39 desktop models impacted.

A full list of machines can be found here:

Lenovo Support

Microsoft

A Microsoft Windows zero-day exploit has hit the market with a $90,000 price tag. This unpatched vulnerability is being sold with claims that it works against all versions of Windows from Windows 2000 to the current Windows 10 OS. The purchase gets you all the source code and two proof of concept videos that show the exploit working. There is big money in malware, from finding the exploits on down to using them. Let ContentCatcher NSM help protect your network.

Ron Samson

Share
Published by
Ron Samson

Recent Posts

7 Best SOC Services for Cybersecurity in Financial Services: What You Need to Know

Financial institutions face more cyber threats than almost any other industry. Banks, credit unions, investment…

2 weeks ago

What’s the Best SIEM Software for Security Management in Healthcare: Top Solutions

Healthcare organizations face unique cybersecurity challenges that make choosing the right Security Information and Event…

56 years ago

5 Top Cybersecurity Trends 2025: How Automation and AI Will Enhance Incident Response

The cybersecurity industry continues to transform as threats become more sophisticated and attack surfaces expand.…

3 weeks ago

Why the Best SIEM for Security Operations Is Crucial for Cloud-Based Environments

Cloud computing has transformed how businesses operate, but it's also created new security challenges that…

3 weeks ago

Top 10 SIEM Tools for Integrating with Existing Security Systems

Security Information and Event Management (SIEM) platforms have become central to modern cybersecurity strategies. These…

4 weeks ago

Best EDR Software: Key Features to Ensure Maximum Protection

Cybersecurity threats are getting more sophisticated every day. Traditional antivirus programs can't keep up with…

4 weeks ago