Page 20 - Threat Intelligence 11-27-2019
P. 20
Reminder: Malware Can Exploit Improper Configurations
Protect yourself from unwanted—and potentially harmful—files or programs by adhering to
vendor-recommended configurations for hardware and software. Doing so in addition to
maintaining regular patch maintenance, will help give your systems and networks the best security
possible.
The Cybersecurity and Infrastructure Security Agency (CISA) encourages users and administrators to
review the following tips and guidance:
• What is Cybersecurity?
• Handling Destructive Malware
• Protecting Against Malicious Code
• Understanding Patches and Software Updates
• CISA’s Cyber Essentials (for small businesses and small SLTT governments)
Flexera FlexNet Publisher
This advisory contains mitigations for improper input validation, and memory
corruption vulnerabilities in Flexera's FlexNet Publisher license manager software.
Vulnerabilities and Indicators of Compromise
➢ Weekly Vulnerability Summary from US-CERT
➢ Talos weekly alerts
➢ Due to the high amounts of new vulnerabilities in the past 60 days, please request IOCs
from us if you need them.
“It takes 20 years to build a reputation and few minutes of cyber-incident to
ruin it.”
― Stephane Nappo ,