Flaws in Popular RDP Clients Allow Malicious Servers to Reverse Hack PCs

Posted on February 15th, 2019 by Responsible Cyber

You’ve always been warned not to share remote access to your computer with any untrusted people for many reasons—it’s basic cyber security advice, and common sense, right?But what if I say, you should not even trust anyone who invites or offers you full remote access to their computers?Security researchers at cybersecurity firm Check Point have […]

Read More

Flaws in Popular RDP Clients Allow Malicious Servers to Reverse Hack PCs

Posted on February 6th, 2019 by Responsible Cyber

You’ve always been warned not to share remote access to your computer with any untrusted people for many reasons—it’s basic cyber security advice, and common sense, right?But what if I say, you should not even trust anyone who invites or offers you full remote access to their computers?Security researchers at cybersecurity firm Check Point have […]

Read More

iCloud Possibly Suffered A Privacy Breach Last Year That Apple Kept a Secret

Posted on February 1st, 2019 by Responsible Cyber

Late last year when an unknown group of hackers stole secret access tokens for millions of Facebook accounts by taking advantage of a flaw in its website, the company disclosed the incident and informed its affected users.Similarly, when Twitter was hit by multiple vulnerabilities (#1, #2, #3) in the last few months, the social media […]

Read More

It’s mop-up time for WebStresser DDoS-for-hire users

Posted on January 30th, 2019 by Responsible Cyber

by Lisa Vaas In April 2018, Dutch police inflicted a whole lot of “access denied” when they shut down Webstresser, the world’s biggest market for distributed-denial-of-service (DDoS) attacks. Law enforcement working in multiple countries nabbed at least four of the attack-for-hire site’s admins, and then they went knocking on the doors of its users. Some […]

Read More

Microsoft Exchange Vuln Enables Attackers to Gain Domain Admin Privileges

Posted on January 30th, 2019 by Responsible Cyber

Anyone with access to an Exchange mailbox can take control of domain, security researcher says. Microsoft Exchange 2013 and newer versions are vulnerable to a privilege escalation attack that gives anyone with a mailbox a way to gain domain administrator rights at potentially 90% of organizations running Active Directory and Exchange, according to a security […]

Read More

Remote Access & the Diminishing Security Perimeter

Posted on January 30th, 2019 by Responsible Cyber

Where security really matters, the enterprise is only as secure as the endpoints it allows to access its sensitive core systems. Long gone are the days of the physical perimeter, where a company’s IT infrastructure was entirely on-site. Today’s increasingly decentralized enterprises depend on a workforce that operates both at home and on mobile devices, […]

Read More