CyberWatch Blog Header.jpg

CyberWatch

Is Google Chrome Leaving You Vulnerable?

Posted by Mike Lehmberg on Sep 13, 2017 2:59:44 PM

Google has recently released a patch to address multiple vulnerabilities within its browser, Google Chrome. These vulnerabilities could allow an attacker to take control of the affected system. If Google Chrome is implemented on your network, it is highly encouraged that those systems be updated to the latest version. The version that was released to patch these vulnerabilities is 61.0.3163.79.  

Visit the Google Chrome Help section on how to get the latest version.  

Read More

Topics: Vulnerability, Google Chrome, Web Browser

9 Ways You Can Protect Your Network

Posted by Mike Lehmberg on Aug 2, 2017 1:48:13 PM

Cyber security has been a growing topic over the course of the last several years. There have been many high-profile events that disrupted business operations, caused financial loss and damaged company reputations. Many tend to believe that most attackers are more interested in large companies, but that couldn’t be further from the truth. In many cases, small businesses are the easiest target. There are a few different layers of security that you can utilize to better protect your network. Each layer itself is minor, but when stacked up together, they provide a strong barrier of protection that can help you to safeguard your business. With your most vulnerable asset being the user, let us help you identify what can be done to help your business. 

Read More

Topics: Cyber Security

Could Your Browser Extension Leave You Vulnerable?

Posted by Mike Lehmberg on Jul 19, 2017 9:48:11 AM

Cisco has released an alert regarding a vulnerability in its Cisco WebEx browser extension for Google Chrome and Mozilla Firefox. This vulnerability allows for an unauthenticated remote attacker to execute arbitrary code with privileges of the affected browser on the system. The following releases are listed as vulnerable:

Read More

Topics: Vulnerability, Cisco, WebEx

New Fileless Ransomware Has the Ability to Go Undetected

Posted by Mike Lehmberg on Jun 29, 2017 11:36:07 AM

A fileless ransomware, SOREBRECT, that has recently been discovered, injects malicious code into a legitimate system process on the target system and will then remove itself in order to evade antivirus detection. SOREBRECT has targeted enterprise systems in varying industries. Upon infection, files on the system are encrypted and the attackers are capable of running remote commands on the affected system. SOREBRECT also has the capability to scan the network for computers and open shares, and will encrypt files at those locations. Although initially only affected systems in the middle east, it has since spread throughout the globe. In order to mitigate any potential infection, it is strongly encouraged that you restrict users write permissions on shared drives, keep systems up to date and have security mechanisms in place.

Read More

Topics: Ransomware, Critical

[UPDATE] The Latest Ransomware Attack That is Mimicking WannaCry

Posted by Mike Lehmberg on Jun 28, 2017 8:09:36 AM

[Update 6/29]

Indicators are now showing that, even though NotPetya disguises itself as ransomware, it actually works to lock the files permanently. Essentially, this is a cyber warfare tool that is being used to wipe the drive of the affected system and there is no way to recover the files. It appears that this began in the Ukraine and was potentially created and dispersed by Russia.  We will continue to update as information becomes available.

Read More

Topics: Ransomware, Critical

The Latest Ransomware Attack That is Mimicking WannaCry

Posted by Mike Lehmberg on Jun 27, 2017 6:36:07 PM

Today, another global ransomware attack has struck several nations and is using the same exploit utilized by WannaCry: EternalBlue. Currently, there have been several thousand infections which is comparable to WannaCry’s spread in its first several hours. If infected, the machine will display a black screen with red lettering demanding $300 worth of bitcoins. Currently there is no data on whether paying the ransom result in the decryption of your critical files.

Read More

Topics: Ransomware, Critical

How You Could Be Vulnerable to Recent North Korean Cyber Attacks

Posted by Mike Lehmberg on Jun 22, 2017 3:17:42 PM

The United States Computer Emergency Readiness Team (US-CERT), in joint efforts with the Department of Homeland Security (DHS), has recently been alerted to recent malicious actions of the North Korean Government. The intended targets of their activity is focused towards the media, aerospace, financial and critical infrastructure sectors of the United States.

Read More

Topics: Vulnerability

UIWIX Ransomware/Adylkuzz Malware

Posted by Mike Lehmberg on Jun 21, 2017 2:43:59 PM

UIWIX Ransomware

Read More

Topics: Ransomware, Malware

HP Keylogger Vulnerability

Posted by Mike Lehmberg on May 17, 2017 11:47:46 AM

In 2015 HP released an audio driver on a number of systems that inadvertently acted as a keylogger. This could potentially allow a malicious individual to record critical information from a user’s keystrokes on these machines. HP has released a listing of systems that are affected by this:

Read More

Topics: Keylogger, HP

WannaCry Ransomware Update

Posted by Mike Lehmberg on May 17, 2017 11:47:26 AM

Reports are now showing that WannaCry Ransomware has affected 200,000 victims in 150 different countries. On Monday experts expected the issue to escalate due to users returning to work following the initial attack. Microsoft released an emergency patch on Friday (5/12) but the attackers have now released a revised version of the ransomware.

Read More

Topics: Ransomware, Microsoft