Your next move: Cloud systems administrator

Information Management Resources

Becoming a cloud systems administrator allows you to be on the leading edge of systems technology in heavily virtualized environments, in an IT niche that will grow

6 reflections on the key role that system administrators play

Information Management Resources

In recognition of July 27 as System Administrator Appreciation Day, six technology executives share their thoughts on why these professionals are so vital to the organization. Hardware and software Data management Data types

Working BlueKeep Exploit Developed by DHS

Threatpost

The Department of Homeland Security urged system administrators to update their Windows machines after testing a working BlueKeep exploit for Windows 2000.

The right way to migrate to the cloud: All in, but with the right tools – New white paper

Quest Software

Learn the right way from this DCIG paper on system administration practices and performance monitoring tools.( Going all in to migrate to the cloud? read more ). Foglight Foglight for Virtualization

Boosting Security Effectiveness with 'Adjuvants'

Dark Reading

How integrating corporate resources like the IT help desk, system administration, quality assurance and HR can breathe new life into your security program

PyRoMine Uses NSA Exploit for Monero Mining and Backdoors

Threatpost

Not just a miner, the malware also sets up a hidden default account with system administrator privileges, to be used for re-infection and further attacks. Malware backdoor EternalRomance follow on attacks Monero pyromine remote desktop ShadowBrokers smb1

Simplify records management while improving information governance

OpenText Information Management

Challenge: Your organization has many users involved in the lifecycle management of important information assets–from knowledge workers to legal associates to system administrators and, yes, Records Managers.

Nick Jovanovic, VP Federal of Thales eSecurity Federal, Speaks to Media about Data Security

Thales eSecurity

He suggests that protecting data that is on your system should be the focus. In other words, a system administrator should be able to maintain the system without seeing what is in the files he is backing up or transferring.

NEW TECH: LogicHub introduces ‘virtualized’ security analysts to help elevate SOAR

The Last Watchdog

Today there exists a widening shortage of security analysts talented and battle tested enough to make sense of the rising tide of data logs inundating their SIEM systems. Rising implementations of cloud services and IoT systems, not to mention the arrival of 5G, has quickened the pace of software development and multiplied data handling complexities. It’s all about making a software system that’s able to access those human capabilities,” Saurabh says.

Feds Allege Adconion Employees Hijacked IP Addresses for Spamming

Krebs on Security

For many years, Dye was a system administrator for Optinrealbig , a Colorado company that relentlessly pimped all manner of junk email, from mortgage leads and adult-related services to counterfeit products and Viagra.

XMR crypto miner switches from arm IoT devices to X86/I686 Intel servers

Security Affairs

Akamai researcher Larry Cashdollar reported that a cryptocurrency miner that previously hit only Arm-powered IoT devices it now targeting Intel systems. “This one seems to target enterprise systems.”

MY TAKE: Memory hacking arises as a go-to tactic to carry out deep, persistent incursions

The Last Watchdog

In fact, memory attacks have quietly emerged as a powerful and versatile new class of hacking technique that threat actors in the vanguard are utilizing to subvert conventional IT security systems. Memory hacking is being carried out across paths that have been left comparatively wide open to threat actors who are happy to take full advantage of the rather fragile framework of processes that execute deep inside the kernel of computer operating systems.

Canadian Police Raid ‘Orcus RAT’ Author

Krebs on Security

Rezvesz maintains his software was designed for legitimate use only and for system administrators seeking more powerful, full-featured ways to remotely manage multiple PCs around the globe. This makes it harder for targets to remove it from their systems.

Tips 206

ITALY: First GDPR fine issued!

DLA Piper Privacy Matters

the database of the Rousseau system to guarantee the integrity of data and at least the ex-post control of the activities carried out on the system which remained an unsolved issue. Additionally, the Garante challenged that system administrators were using shared accounts with quite large privileges in the operation of the platform.

GDPR 81

GUEST ESSAY: How stealth, persistence allowed Wipro attacker to plunder supply chain

The Last Watchdog

Our rising dependence on business systems that leverage cloud services and the gig economy to accomplish high-velocity innovation has led to a rise in productivity. One such go-to APT technique is to remotely leverage legit administrative tools to carry out malicious activities — under cover. The recent network breach of Wipro , a prominent outsourcing company based in India, serves as a stunning reminder that digital transformation cuts two ways.

Thangrycat: A Serious Cisco Vulnerability

Schneier on Security

That said, Thrangrycat only works once you have administrative access to the device. Attack #1 gets you remote administrative access, Attack #2 is Thrangrycat. Many systems don't even have administrative access configured correctly.

Backdoored Webmin versions were available for download for over a year

Security Affairs

Webmin is an open-source web-based interface for system administration for Linux and Unix. Webmin, the popular open-source web-based interface for Unix admin contained a remote code execution vulnerability for more than a year.

Rocket.Build 2019: Creating next-generation AI experiences

Rocket Software

Customers and legacy-businesses are having problems understanding all of the dark, unmapped mysteries of their IBM Z, Power Systems, and embedded database platforms. We can further use AIs to analyze system performance, and user behaviors to find patterns and predict outcomes.

A Russian cyber vigilante is patching outdated MikroTik routers exposed online

Security Affairs

Alexey is a Russian-speaking cyber vigilante that decided to fix the MikroTik routers and he claims to be e system administrator. A Russian-speaking hacker, who goes by the name of Alexey, claims to have hacked into over 100,000 MikroTik routers with a specific intent, disinfect them.

Q&A: Here’s why robust ‘privileged access management’ has never been more vital

The Last Watchdog

However, lacking robust protection, privileged accounts, which are intended to give administrators the access they need to manage critical systems, can instead be manipulated to enable attackers to move laterally across an organization’s network. The concept was based on the root access that the accounts provided to IT and systems administrators, who used these power accounts to maintain the network and systems.

Access 126

Protecting America’s Critical Infrastructure

Thales eSecurity

But the energy sector also underpins our emergency and response systems, our hospitals and healthcare, our schools, our businesses, and virtually everything we do as a society.

Wireshark fixed three flaws that can crash it via malicious packet trace files

Security Affairs

“To inject malformed packets that the Wireshark application may attempt to parse, the attacker may need access to the trusted, internal network where the targeted system resides. Administrators are advised to allow only trusted users to have network access.

FireEye experts found source code for CARBANAK malware on VirusTotal?

Security Affairs

Hladyr is suspected to be a system administrator for the group. Cybersecurity researchers from FireEye revealed that the Carbanak source code has been available on VirusTotal for two years, and none noticed it before.

Google will shut down consumer version of Google+ earlier due to a bug

Security Affairs

No third party compromised our systems, and we have no evidence that the app developers that inadvertently had this access for six days were aware of it or misused it in any way.”

Brazil expert discovers Oracle flaw that allows massive DDoS attacks

Security Affairs

In this type of distributed denial of service (DDoS) attack, the malicious traffic generated with the technique is greater than the once associated with the use of memcached, a service that does not require authentication but has been exposed on the internet by inexperienced system administrators.

USBAnywhere BMC flaws expose Supermicro servers to hack

Security Affairs

A baseboard management controller (BMC) is a specialized service processor that monitors the physical state of a computer, network server or other hardware device using sensors and communicating with the system administrator through an independent connection.

How to start your career in cyber security

IT Governance

Technically, you don’t need any cyber security experience to get started, though many people entering the field will come from jobs that have similar skillsets, such as systems administration or information analysis. A version of this blog was originally published on 8 December 2017.

Tips 79

Stealth Falcon’s undocumented backdoor uses Windows BITS to exfiltrate data

Security Affairs

The Windows Background Intelligent Transfer Service (BITS) service is a built-in component of the Microsoft Windows operating system. The BITS service is used by programmers and system administrators to download files from or upload files to HTTP web servers and SMB file shares. ESET researchers discovered a new malware associated with the Stealth Falcon APT group that abuses the Windows BITS service to stealthy exfiltrate data.

Thousands of RDM refrigeration systems exposed online are at risk

Security Affairs

Experts from Safety Detective discovered thousands of refrigeration systems made by Resource Data Management (RDM) exposed to remote attacks. Systems exposed online could be accessed via HTTP on ports 9000, 8080, 8100, or 80. SecurityAffairs – refrigeration systems, hacking).

User Conference Attendees Learn How to Maximize their DocuWare Experience

Document Imaging Report

The educational format provided system administrators and end users with training and best practices for applying DocuWare applications that empower their business to not just keep pace but to stay ahead. Integrating DocuWare with another system such as Outlook.

Crooks continue to abuse exposed Docker APIs for Cryptojacking

Security Affairs

“We recently observed cases of abuse of the systems running misconfigured Docker Engine-Community with Docker application program interface (API) ports exposed. Cybercriminals continue to abuse unprotected Docker APIs to create new containers used for cryptojacking, Trend Micro warns.

Experts discovered a severe command injection flaw in Cisco Webex Meetings Desktop

Security Affairs

An exploit could allow the attacker to run arbitrary commands with SYSTEM user privileges.” ” Cisco advisory reveals that the vulnerability could be exploited remotely by leveraging the operating system remote management tools.

MY TAKE: Michigan’s Cyber Range hubs provide career paths to high-schoolers, underutilized adults

The Last Watchdog

Both were well-equipped to teach, test and train individuals ranging from teen-agers and non-technical adults, to working system administrators and even seasoned tech security pros. Another cluster of students attempted to crack into an Alphaville industrial controls system. “I We want to spread awareness of the core principles of exploiting systems – as well as defending them.”.

Cloud Hopper operation hit 8 of the world’s biggest IT service providers

Security Affairs

Then the attackers used the stolen information to target into customer systems. “APT10 often attacked a service provider’s system by “spear-phishing” – sending company employees emails designed to trick them into revealing their passwords or installing malware.

Cloud 85

NEW TECH: Votiro takes ‘white-listing’ approach to defusing weaponized documents

The Last Watchdog

Unfortunately, despite steady advances in malware detection and intrusion prevention systems, and much effort put into training employees to be wary of suspicious email, weaponized email and document-based malware remain as virulent as pervasive as it was two decades ago. It was designed to make it convenient for system administrators to automate tasks and manage configurations across all Windows endpoints and servers in a company network.

Q&A: How certifying in-house IT staffers as cyber analysts, pen testers can boost SMB security

The Last Watchdog

Ransomware, business email compromises and direct ACH system hacks continue to morph and intensify. First, companies are more reliant on digital systems than ever before. So, for instance, we can walk through the benefits of sending, say a system administrator or help desk technician, through CompTIA CertMaster Learn , a self-paced eLearning platform that helps prepare them to earn the CompTIA Security+ certification.

FireEye experts found source code for CARBANAK malware on VirusTotal?

Security Affairs

Hladyr is suspected to be a system administrator for the group. Cybersecurity researchers from FireEye revealed that the Carbanak source code has been available on VirusTotal for two years, and none noticed it before.

More Cloud Means More Multi-Tenant Environments

Thales eSecurity

To ensure a secure multi-tenant environment for consolidation, you need a solution that: adequately isolates security for specific tenants or customers; authorizes access to the data itself without allowing even systems administrators or privileged users to see the data; and.

Cloud 74

Initial patch for Webex Meetings flaw WebExec was incomplete. Cisco fixed it again

Security Affairs

An exploit could allow the attacker to run arbitrary commands with SYSTEM user privileges.” Cisco advisory reveals that the vulnerability could be also exploited remotely by leveraging the operating system remote management tools. when running on a Microsoft Windows end-user system.

£60 million in recovery costs for Norsk Hydro after refusing ransom demand

IT Governance

For a few hundred thousand pounds, Norsk Hydro could have bought a decryptor from the blackmailers and restored its systems. On 19 March 2019, Norsk Hydro’s systems were infected with the LockerGoga ransomware. TrendMicro’s analysis into the ransomware found that it was the same system administration tool abused by the likes of SOREBRECT and Bad Rabbit. Backups enable organisations to wipe the infected systems and restore a previous version.