Syntax Bearror

Top Menu

  • Home
  • PowerShell Resource
  • SpiceWorld 2019 Resources
  • Contact Us
  • About Us

Main Menu

  • Home
  • Blog
  • IT Guides
  • How-To’s
  • IT Fixes
  • Cybersecurity
  • Reviews
  • Home
  • PowerShell Resource
  • SpiceWorld 2019 Resources
  • Contact Us
  • About Us

logo

Header Banner

Syntax Bearror

  • Home
  • Blog
  • IT Guides
  • How-To’s
  • IT Fixes
  • Cybersecurity
  • Reviews
Bear Security
Home›Bear Security›Bear Security – Security News for the Week of July 19th, 2021

Bear Security – Security News for the Week of July 19th, 2021

By Christopher
July 19, 2021
3717
0
Share:
Colorado Flag Waving

These are the stories that relate to our careers, clients, and businesses in the cybersecurity world for the Week of July 19th, 2021. This week’s edition is blog-only so that I can focus on my studies for my CEH exam later this week. We will resume our full distribution next week. Thanks for understanding!

REvil Ransomware Group Goes MIA

The Register is reporting that the websites run by the ransomware group REvil have gone offline weeks after their massive exploitation of Kaseya’s VSA software that impacted more than 1,500 businesses. So far, no details have come out as to whether this was intentionally done by the group, or if this was the result of political or law enforcement action.

The shutdown also impacts anyone who was intending to pay the ransom, as the systems to pay it have also gone offline.

Read the full story over on The Register.

SolarWinds Serv-U Product Vulnerable with Exploit in the Wild

BleepingComputer is reporting that a vulnerability in SolarWinds Serv-U products are actively being exploited in the wild. So far, the exploitation seems to be sourced from a single threat actor performing targeted attacks according to Microsoft Security researchers.

The vulnerability affects Serv-U managed File Transfer Server and Serv-U Secured FTP, and if exploited, allows an attacker to run arbitrary code with privileges. Solarwinds has released patches to address the vulnerability which you can access in the SolarWinds customer portal.

Read the full story over on BleepingComputer or review the SolarWinds Security Advisory.

SonicWall SRA & SMA Devices at Risk of Ransomware

SonicWall published an urgent security advisory for customers of their Secure Mobile Access (SMA) 100 series and Secure Remote Access (SRA) products that are running unpatched or EOL 8.x firmware. Devices running this firmware are currently being targeted in a ransomware campaign through the use of stolen credentials.

Any devices that cannot be upgraded to the 9.x firmware or higher, should be shut down and decommissioned as they cannot be protected from the vulnerability. SonicWall also recommends that all credentials in their SMA or SRA devices should be reset, along with having multifactor authentication enabled.

Read the full security advisory over at SonicWall.

Another Print Spooler Vulnerability in Windows

If you were hoping we were in the clear on print spooler, we aren’t. TheHackerNews and others are reporting that Microsoft has shared fresh, limited guidance on another vulnerability in the print spooler. The new vulnerability is being tracked as CVE-2021-34481, and is a local privilege escalation flaw that can be used by an attacker to run code with SYSTEM level privileges. Unlike the other three vulnerabilities reported in recent weeks, this one can only be exploited locally, requiring a valid user account.

Microsoft’s current guidance as of writing is to disable the print spooler to be protected while they work on a patch. As this guidance is unrealistic for critical systems, we recommend you disable the print spooler (as a rule) on any system where printing isn’t required, and set the appropriate keys mentioned in our earlier coverage to block remote print access if the printers don’t need to be shared. Further, we encourage you to stay vigilant and monitor for unusual behavior on systems where the print spooler must be functional.

Read the full story over on TheHackerNews or the security advisory from Microsoft.

Colorado Joins Virginia and California in Passing a Consumer Privacy Law

SC Magazine is reporting that Colorado has become the third U.S. state to pass a comprehensive consumer privacy law, which takes effect in 2023. Consumer privacy has been a major issue for years as consumers recognize how companies have been using and abusing their data. While it’s good that more States are seeing the importance of such laws, a growing patchwork of laws with different rules and guidelines will complicate businesses that operate nationwide.

It’ll be interesting to see how they turn out over time. Will most States pass very similar laws, will they be all over the place, or will Congress finally do something? Only time will tell.

Read the full story over at SC Magazine.

Things Not Mentioned

  • Microsoft and Citizen Lab identify zero-day‘s used by Israeli Spyware Vendor, Candiru.
  • Kryptos Logic posts updates they found in Trickbot and Zeus.

That’s all for this week’s security news. Come back every Monday morning for the next rendition or check it out over on YouTube or on podcast. Stay safe out there friends.

TagsColoradoConsumer PrivacyMicrosoftPrint SpoolerPrintNightmareRansomwareREvilServ-USolarWindsSonicWall
Previous Article

Bear Security – Security News for the ...

Next Article

Bear Security – Security News for the ...

Share:

Christopher

Christopher Clai is a Senior Security Engineer, IT Generalist, and Developer from Chicago, IL with over 20 years of experience in Information Technology ranging from small businesses to Fortune 500's. Chris loves the Pacific Northwest, Sushi, Invader Zim, Rugby, World of Warcraft, raves, and is an avid user of Microsoft and Linux-based technologies.

Related articles More from author

  • Bear Security

    Bear Security – Security News for Week of April 17, 2021

    April 17, 2021
    By Christopher
  • Bear Security

    Bear Security – Security News for the Week of July 5th, 2021

    July 5, 2021
    By Christopher
  • Blog

    PrintNightmare Part II – Print Spooler Remains Vulnerable Across Windows

    July 3, 2021
    By Christopher
  • Looking suspiciously at a Lemon Duck
    Bear Security

    Bear Security – Security News For Week of May 22nd, 2021

    May 22, 2021
    By Christopher
  • Collage Photo Representing Story
    Bear Security

    Bear Security – Security News for the Week of July 12th, 2021

    July 12, 2021
    By Christopher
  • Picture of Service Listing with Print Spooler in Center
    Blog

    Disable Print Spooler on Domain Controllers (If You Can)

    June 30, 2021
    By Christopher

Leave a reply Cancel reply

  • Blog

    Tips From a Microsoft Ignite First Timer

  • Bear Security

    Bear Security – Security News for Week of May 1st, 2021

  • Blog

    Should the EC-Council Remain a Standard in Cybersecurity After Sexist Poll?

Follow Us on Social

See the Syntax at These Events

All appearances for 2020 have been cancelled due to COVID-19. Stay safe out there and see you all at events in 2021!

Like This Content?

Help Sytnax Bearror create more content, videos, podcasts, scripts, and more by contributing to our caffiene and technology addictions.

Subscribe to our Patreon

Buy Us a Coffee

Most Popular

IT Fixes

Fixing APC PowerChute Personal Edition Not Detecting UPS on Windows 10

  • Dell Laptops Showing “Press Power Button and Volume Down to Login”

    By Christopher
    September 13, 2019
  • How to Root AT&T Samsung S5 G900A (Up to Lollipop 5.0)

    By Christopher
    May 21, 2015
  • PrintNightmare Part II – Print Spooler Remains Vulnerable Across Windows

    By Christopher
    July 3, 2021
  • Picture of Service Listing with Print Spooler in Center

    Disable Print Spooler on Domain Controllers (If You Can)

    By Christopher
    June 30, 2021

Latest Tweets

  • T

    7 hours ago

Categories

Bear Security Blog Cybersecurity How To's IT Fixes Reviews

Copyright Statement

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
©2014 - 2021 - SyntaxBearror.io. All rights reserved unless otherwise noted.