Impress IT Solutions Cybersecurity Recap: Last Week’s Top Threats and Trends (September 23-29)
Sep 30, 2024
Impress IT Solutions

Hold onto your hats, folks—because the world of cybersecurity never sleeps, and neither does Impress IT Solutions! Last week, we narrowly dodged a potential crisis after discovering vulnerabilities in CUPS that could have exposed systems to remote attacks. Meanwhile, Google’s transition to Rust continues to pay off, significantly reducing memory-related vulnerabilities in Android devices.

But not all news was positive—Kaspersky’s exit from the U.S. market left many users in confusion. And in a shocking twist, vulnerabilities in Kia cars could have allowed hackers to take control of the vehicles using only a license plate!

Let’s break down these stories, equip ourselves with insights, and reinforce our defenses in this ever-changing digital landscape.

 

⚡ Threat of the Week:

Flaws Found in CUPS
A new set of vulnerabilities in the Common Unix Printing System (CUPS) was disclosed last week. These flaws could enable remote command execution on Linux systems under certain conditions. Red Hat Enterprise Linux categorized these vulnerabilities as “Important,” though the likelihood of successful exploitation is low due to specific prerequisites. Impress IT Solutions is already monitoring the situation, ensuring our clients’ systems are patched and protected against any potential threats.

🔔 Top News

Google’s Shift to Rust Paying Off
Google’s move to memory-safe languages like Rust is proving to be a smart one. In fact, memory-related vulnerabilities in Android have dropped from 76% to just 24% over the past six years. This development, coupled with enhanced collaboration between Google and ARM, has bolstered the security of the entire Android ecosystem. At Impress IT Solutions, we always advocate adopting new and secure programming languages to minimize vulnerabilities across all platforms.

Kaspersky’s Exit from the U.S. Market
The recent forced exit of Kaspersky from the U.S. left many users baffled, as their installations were automatically replaced by antivirus software from a lesser-known vendor, UltraAV. Kaspersky had informed users about the transition earlier, but the abrupt migration, without user action, sparked confusion. Impress IT Solutions encourages users to always stay vigilant when selecting security vendors, ensuring they partner with reliable and transparent solutions.

Kia Car Vulnerabilities Exposed
In a chilling discovery, vulnerabilities in Kia cars could have allowed hackers to remotely control essential functions using just a license plate! Thankfully, the vulnerabilities have since been patched, but the incident is a sobering reminder of how interconnected our world has become—and the growing need for robust security across all devices. Impress IT Solutions remains dedicated to safeguarding our clients from both digital and physical vulnerabilities as IoT expands its reach.

U.S. Sanctions Cryptex and PM2BTC
Two cryptocurrency exchanges, Cryptex and PM2BTC, were recently sanctioned by the U.S. government for allegedly facilitating the laundering of cryptocurrencies linked to cybercrime. This highlights the importance of a strong security posture in the evolving world of digital assets. Impress IT Solutions works closely with businesses to develop comprehensive security measures that protect them from such financial threats.

Three Iranian Hackers Charged
In another major development, the U.S. government charged three Iranian nationals affiliated with the IRGC for targeting government officials to steal sensitive data. At Impress IT Solutions, we constantly track nation-state activities to ensure our clients are shielded from targeted attacks and espionage attempts.

📰 Around the Cyber World:

Mysterious Internet Noise Storms
Since January 2020, large-scale “Noise Storms” containing spoofed internet traffic have been observed. This phenomenon, tracked by threat intelligence firms, involves millions of spoofed IPs flooding key internet providers while strategically avoiding platforms like AWS. Some suggest this could be a covert communications channel. Impress IT Solutions continues to analyze trends like these to stay ahead of potential threats and ensure our clients remain secure.

Tails and Tor Join Forces
The Tor Project, known for maintaining software for anonymous web browsing, has merged operations with Tails, a portable operating system focused on privacy. This merger is aimed at improving collaboration and addressing the growing digital threats. Impress IT Solutions supports the use of secure and private technologies and advises clients on best practices for protecting their privacy online.

NIST Proposes New Password Guidelines
NIST has issued new recommendations regarding password policies, suggesting an end to periodic password changes unless a compromise has occurred. They recommend passwords be between 15 and 64 characters long and allow ASCII and Unicode characters. Impress IT Solutions advocates for these forward-thinking policies to help businesses strengthen their authentication methods while simplifying the user experience.

PKfail Impacts More Devices
The critical Secure Boot vulnerability known as PKfail has been found to affect a wide range of devices, including medical equipment, gaming consoles, and even voting machines. This supply chain security failure underscores the importance of thorough vetting of third-party components. Impress IT Solutions is actively monitoring this situation, ensuring our clients’ devices are patched and secure.

Microsoft Updates AI-Powered Recall Feature
Microsoft’s AI-driven feature, Recall, initially received backlash for privacy concerns but has since undergone significant updates. Now, the screenshot processing occurs in a secure enclave, and Recall can be disabled by users. Impress IT Solutions values transparency in AI development and always prioritizes our clients’ security and privacy when integrating new technologies.


By partnering with Impress IT Solutions, you can stay ahead of the latest cybersecurity threats and ensure your business remains protected in this fast-moving digital world. Reach out to us today for more information on how we can help fortify your defenses.

 

Free For A Limited Time
We Want To Give You A Free Cyber-Security Risk Assessment That Gives You The Answers You Want And The Certainty You Need