article thumbnail

It's 2022. Why do you keep using SMB?

Ivanti

During the last 25 years, companies have relied on SMB protocol to allow them to collaborate and centralize corporate documents. The history of SMB (and why it's no longer relevant). The latest iteration, SMB 3.1.1, encryption added in SMB3 and implemented a pre-authentication integrity check using?SHA-512?hash.

SMB 69
article thumbnail

Cybersecurity Snapshot: Log4j Anniversary, CI/CD Risks, Infostealers, Email Attacks, OT Security

Tenable

It was at around this time last year that the discovery of the zero-day Log4Shell vulnerability in the ubiquitous Log4j open source component sent shockwaves through the worlds of IT and cybersecurity. . 2 - OWASP’s top 10 CI/CD security risks.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Leverage Two-Factor Authentication for Maximized Security

Kaseya

Phishing, social engineering and unsecured networks have made password based authentication insecure for some time. Yet many businesses have not attempted to close this security gap. But, no one can afford to delay implementing basic security measures to protect the business. Increase Security with Two-Factor Authentication.

article thumbnail

Maximize Your Vulnerability Scan Value with Authenticated Scanning

Tenable

Start doing authenticated scanning. Performing authenticated scans of your environment offers essential benefits and is a practice widely recognized as valuable. The scan configurations we observe in Tenable’s SaaS products are telling: our customers run unauthenticated scans 20 times more than authenticated ones.

article thumbnail

MSPs are the Holy Grail for Cybercriminals! Are You Protected?

Kaseya

MSPs hold the keys to the kingdom when it comes to data access and, while a typical day won’t involve leaping from trains to protect it like the fictional professor, they still need to take action to keep themselves and their SMB customers safe. They can also jump from a partner or SMB customer over to you! Island Hopping.

SMB 83
article thumbnail

CVE-2022-37958: FAQ for Critical Microsoft SPNEGO NEGOEX Vulnerability

Tenable

CVE-2022-37958: FAQ for Critical Microsoft SPNEGO NEGOEX Vulnerability Microsoft recently reclassified a vulnerability in SPNEGO NEGOEX, originally patched in September, after a security researcher discovered that it can lead to remote code execution. According to IBM Security X-Force Red, it “has the potential to be wormable.”.

Windows 98
article thumbnail

Microsoft’s June 2020 Patch Tuesday Addresses 129 CVEs Including Newly Disclosed SMBv3 Vulnerability (CVE-2020-1206)

Tenable

This flaw can be exploited on an authenticated server or against an SMB client. An authenticated attacker would need to send a specially crafted packet to exploit this vulnerability against a vulnerable SMB server. CVE-2020-1301 | Windows SMB Remote Code Execution Vulnerability. Get more information.

SMB 104