Page 20 - Threat Intelligence 11-27-2019
P. 20

Reminder: Malware Can Exploit Improper Configurations
             Protect yourself from unwanted—and potentially harmful—files or programs by adhering to
             vendor-recommended configurations for hardware and software. Doing so in addition to
             maintaining regular patch maintenance, will help give your systems and networks the best security
             possible.

             The Cybersecurity and Infrastructure Security Agency (CISA) encourages users and administrators to
             review the following tips and guidance:
                    • What is Cybersecurity?
                    • Handling Destructive Malware
                    • Protecting Against Malicious Code
                    • Understanding Patches and Software Updates
                    • CISA’s Cyber Essentials (for small businesses and small SLTT governments)


             Flexera FlexNet Publisher
             This advisory contains mitigations for improper input validation, and memory
             corruption vulnerabilities in Flexera's FlexNet Publisher license manager software.





             Vulnerabilities and Indicators of Compromise


                    ➢ Weekly Vulnerability Summary from US-CERT
                    ➢ Talos weekly alerts
                    ➢ Due to the high amounts of new vulnerabilities in the past 60 days, please request IOCs
                       from us if you need them.



































                                              “It takes 20 years to build a reputation and few minutes of cyber-incident to

                                                                                                                  ruin it.”
                                                                                                     ― Stephane Nappo ,
   15   16   17   18   19   20   21   22   23