6 reflections on the key role that system administrators play

Information Management Resources

In recognition of July 27 as System Administrator Appreciation Day, six technology executives share their thoughts on why these professionals are so vital to the organization. Hardware and software Data management Data types

The right way to migrate to the cloud: All in, but with the right tools – New white paper

Quest Software

Learn the right way from this DCIG paper on system administration practices and performance monitoring tools.( Going all in to migrate to the cloud? read more ). Foglight Foglight for Virtualization

Google Glitch Left Passwords Unprotected for 14 Years

Adam Levin

Google has begun contacting system administrators whose organizations would have been affected by the glitch to encourage them to change their passwords.

Boosting Security Effectiveness with 'Adjuvants'

Dark Reading

How integrating corporate resources like the IT help desk, system administration, quality assurance and HR can breathe new life into your security program

PyRoMine Uses NSA Exploit for Monero Mining and Backdoors

Threatpost

Not just a miner, the malware also sets up a hidden default account with system administrator privileges, to be used for re-infection and further attacks. Malware backdoor EternalRomance follow on attacks Monero pyromine remote desktop ShadowBrokers smb1

Simplify records management while improving information governance

OpenText Information Management

Challenge: Your organization has many users involved in the lifecycle management of important information assets–from knowledge workers to legal associates to system administrators and, yes, Records Managers.

Canadian Police Raid ‘Orcus RAT’ Author

Krebs on Security

Rezvesz maintains his software was designed for legitimate use only and for system administrators seeking more powerful, full-featured ways to remotely manage multiple PCs around the globe. This makes it harder for targets to remove it from their systems.

Tips 220

Nick Jovanovic, VP Federal of Thales eSecurity Federal, Speaks to Media about Data Security

Thales eSecurity

He suggests that protecting data that is on your system should be the focus. In other words, a system administrator should be able to maintain the system without seeing what is in the files he is backing up or transferring.

ITALY: First GDPR fine issued!

DLA Piper Privacy Matters

the database of the Rousseau system to guarantee the integrity of data and at least the ex-post control of the activities carried out on the system which remained an unsolved issue. Additionally, the Garante challenged that system administrators were using shared accounts with quite large privileges in the operation of the platform.

GDPR 81

GUEST ESSAY: How stealth, persistence allowed Wipro attacker to plunder supply chain

The Last Watchdog

Our rising dependence on business systems that leverage cloud services and the gig economy to accomplish high-velocity innovation has led to a rise in productivity. One such go-to APT technique is to remotely leverage legit administrative tools to carry out malicious activities — under cover. The recent network breach of Wipro , a prominent outsourcing company based in India, serves as a stunning reminder that digital transformation cuts two ways.

MY TAKE: Memory hacking arises as a go-to tactic to carry out deep, persistent incursions

The Last Watchdog

In fact, memory attacks have quietly emerged as a powerful and versatile new class of hacking technique that threat actors in the vanguard are utilizing to subvert conventional IT security systems. Memory hacking is being carried out across paths that have been left comparatively wide open to threat actors who are happy to take full advantage of the rather fragile framework of processes that execute deep inside the kernel of computer operating systems.

A Russian cyber vigilante is patching outdated MikroTik routers exposed online

Security Affairs

Alexey is a Russian-speaking cyber vigilante that decided to fix the MikroTik routers and he claims to be e system administrator. A Russian-speaking hacker, who goes by the name of Alexey, claims to have hacked into over 100,000 MikroTik routers with a specific intent, disinfect them.

Mining 100

FireEye experts found source code for CARBANAK malware on VirusTotal?

Security Affairs

Hladyr is suspected to be a system administrator for the group. Cybersecurity researchers from FireEye revealed that the Carbanak source code has been available on VirusTotal for two years, and none noticed it before.

Q&A: Here’s why robust ‘privileged access management’ has never been more vital

The Last Watchdog

However, lacking robust protection, privileged accounts, which are intended to give administrators the access they need to manage critical systems, can instead be manipulated to enable attackers to move laterally across an organization’s network. The concept was based on the root access that the accounts provided to IT and systems administrators, who used these power accounts to maintain the network and systems.

Access 126

Google will shut down consumer version of Google+ earlier due to a bug

Security Affairs

No third party compromised our systems, and we have no evidence that the app developers that inadvertently had this access for six days were aware of it or misused it in any way.”

Brazil expert discovers Oracle flaw that allows massive DDoS attacks

Security Affairs

In this type of distributed denial of service (DDoS) attack, the malicious traffic generated with the technique is greater than the once associated with the use of memcached, a service that does not require authentication but has been exposed on the internet by inexperienced system administrators.

Thousands of RDM refrigeration systems exposed online are at risk

Security Affairs

Experts from Safety Detective discovered thousands of refrigeration systems made by Resource Data Management (RDM) exposed to remote attacks. Systems exposed online could be accessed via HTTP on ports 9000, 8080, 8100, or 80. SecurityAffairs – refrigeration systems, hacking).

Risk 90

Wireshark fixed three flaws that can crash it via malicious packet trace files

Security Affairs

“To inject malformed packets that the Wireshark application may attempt to parse, the attacker may need access to the trusted, internal network where the targeted system resides. Administrators are advised to allow only trusted users to have network access.

How to start your career in cyber security

IT Governance

Technically, you don’t need any cyber security experience to get started, though many people entering the field will come from jobs that have similar skillsets, such as systems administration or information analysis. A version of this blog was originally published on 8 December 2017.

Tips 75

User Conference Attendees Learn How to Maximize their DocuWare Experience

Document Imaging Report

The educational format provided system administrators and end users with training and best practices for applying DocuWare applications that empower their business to not just keep pace but to stay ahead. Integrating DocuWare with another system such as Outlook.

Crooks continue to abuse exposed Docker APIs for Cryptojacking

Security Affairs

“We recently observed cases of abuse of the systems running misconfigured Docker Engine-Community with Docker application program interface (API) ports exposed. Cybercriminals continue to abuse unprotected Docker APIs to create new containers used for cryptojacking, Trend Micro warns.

FireEye experts found source code for CARBANAK malware on VirusTotal?

Security Affairs

Hladyr is suspected to be a system administrator for the group. Cybersecurity researchers from FireEye revealed that the Carbanak source code has been available on VirusTotal for two years, and none noticed it before.

Experts discovered a severe command injection flaw in Cisco Webex Meetings Desktop

Security Affairs

An exploit could allow the attacker to run arbitrary commands with SYSTEM user privileges.” ” Cisco advisory reveals that the vulnerability could be exploited remotely by leveraging the operating system remote management tools.

NEW TECH: Votiro takes ‘white-listing’ approach to defusing weaponized documents

The Last Watchdog

Unfortunately, despite steady advances in malware detection and intrusion prevention systems, and much effort put into training employees to be wary of suspicious email, weaponized email and document-based malware remain as virulent as pervasive as it was two decades ago. It was designed to make it convenient for system administrators to automate tasks and manage configurations across all Windows endpoints and servers in a company network.

MY TAKE: Michigan’s Cyber Range hubs provide career paths to high-schoolers, underutilized adults

The Last Watchdog

Both were well-equipped to teach, test and train individuals ranging from teen-agers and non-technical adults, to working system administrators and even seasoned tech security pros. Another cluster of students attempted to crack into an Alphaville industrial controls system. “I We want to spread awareness of the core principles of exploiting systems – as well as defending them.”.

Q&A: How certifying in-house IT staffers as cyber analysts, pen testers can boost SMB security

The Last Watchdog

Ransomware, business email compromises and direct ACH system hacks continue to morph and intensify. First, companies are more reliant on digital systems than ever before. So, for instance, we can walk through the benefits of sending, say a system administrator or help desk technician, through CompTIA CertMaster Learn , a self-paced eLearning platform that helps prepare them to earn the CompTIA Security+ certification.

More Cloud Means More Multi-Tenant Environments

Thales eSecurity

To ensure a secure multi-tenant environment for consolidation, you need a solution that: adequately isolates security for specific tenants or customers; authorizes access to the data itself without allowing even systems administrators or privileged users to see the data; and.

Cloud 86

Initial patch for Webex Meetings flaw WebExec was incomplete. Cisco fixed it again

Security Affairs

An exploit could allow the attacker to run arbitrary commands with SYSTEM user privileges.” Cisco advisory reveals that the vulnerability could be also exploited remotely by leveraging the operating system remote management tools. when running on a Microsoft Windows end-user system.

Only now we known that International Civil Aviation Organization (ICAO) was hacked in 2016

Security Affairs

“Mail server, domain administrator and system administrator accounts were all affected, giving cyberespions access to the past and current passwords of more than 2,000 ICAO system users.

Podcast Episode 138: Hacker President? Joseph Menn of Reuters talks Beto and Cult of the Dead Cow

The Security Ledger

Everything from O’Rourke’s positions on key policy issues to his uncanny knack for garnering media attention and an online following might be seen as the products of his formative years as a CDC member -where he contributed as a writer, organizer and system administrator for a bulletin board system (or BBS), an early online forum.

Five Eyes Intelligence agencies warn of popular hacking tools

Security Affairs

To aid the work of network defenders and systems administrators, we also provide advice on limiting the effectiveness of these tools and detecting their use on a network.” It poses a threat to several different operating systems, including Windows, Linux, MAC OS X, and Android.” Security agencies belonging to Five Eyes (United States, United Kingdom, Canada, Australia and New Zealand) have released a joint report that details some popular hacking tools.

Tools 87

Three members of FIN7 (Carbanak) gang charged with stealing 15 million credit cards

Security Affairs

Hladyr is suspected to be a system administrator for the group. Three members of the cybercrime group tracked as FIN7 and Carbanak have been indicted and charged with 26 felony counts.

Italy: Privacy law integrating the GDPR adopted, what to do?

DLA Piper Privacy Matters

The scope of the potentially applicable previous orders is quite broad as it goes from the role of the so called system administrator, to stringent security measures provided for specific data processing activities (e.g. The Italian budget law of 2017 had introduced a system of notification/authoritization for data processing activities performed by automated means and based on legitimate interest.

GDPR 43

Stealing computing power: A growing trend in cyber crime that can target all Internet-connected devices

CGI

What is most alarming is that, in addition to advanced cyber attacks aimed at elaborate systems, criminals will use any device connected to the Internet – for example, your mobile phone or a remotely controlled heat pump. Is it just one device or a whole system?

First Multistate HIPAA Data Breach Lawsuit May Signal Increased State Interest in Data Security Enforcement

Data Matters

million individuals from the Company’s systems. According to the complaint, over a period of 19 days, hackers were able to infiltrate the Company’s computer systems. They argue that the Company failed to protect its computer systems adequately, take steps to prevent the breach, disclose material facts to consumers, and provide timely and adequate notice, among other things.

New Linux/DDosMan threat emerged from an evolution of the older Elknot

Security Affairs

But let’s see what are the execution binaries and what an administrator will see because this analysis IS for rise the system administration awareness: Code execution: execve("/tmp/upgrade""); // to execute upgrade.

GAO Report shed the lights on the failures behind the Equifax hack

Security Affairs

The reports also refers documents from the Internal Revenue Service (IRS), Social Security Administration (SSA), and U.S. “In July 2017, Equifax system administrators discovered that attackers had gained. A new report from the U.S.

Georgia Governor Vetoes Broad-Reaching Computer Crime Bill, Highlighting Debate Around Bug Bounty Programs

Data Matters

Specifically, researchers believed that the current version of SB 315 could chill security research—both the purely academic and the “white hats”—ultimately discouraging individuals from identifying vulnerabilities in networks and alerting system administrators of the issues. Organizations have employed bug bounty programs in an effort to encourage researchers to report security flaws in their systems.

Trust, but Verify: Keeping Watch over Privileged Users

Thales eSecurity

Privileged users today can include a multitude of people from system administrators, network engineers, and database administrators, to data center operators, upper management, and security personnel.

Weekly podcast: Memcached DDoS attacks, Equifax (once again) and Alexa

IT Governance

An Akamai blog explained that memcached is “meant to cache data and reduce strain on heavier data stores […] and is only intended to be used on systems that are not exposed to the Internet”. According to Akamai, there are “currently more than 50,000 known vulnerable systems exposed”.