Over the past few days, you will have heard of the new vulnerabilities affecting Intel and AMD processes, but what does it really mean?
Named Spectre and Meltdown, there has been a lot of hype in the press about them “being the end of the computing environment” and “all processors should be replaced”.
Over the past few days our CEO, Peter Bassill, has been looking into the issue and working on some proof of concept code to understand the exposure more fully.
As the issue is gaining a lot of exposure and a lot of questions are being asked, here is an interim security bulletin, with a full report ready for the end of the week.
Both vulnerabilities require a highly complex attack which is only locally exploitable. This is fine if the servers are your own, as an attacker would first need to compromise a system or network in order to gain access to the system. Once on the server then the risk is increased. For cloud provisioned servers the issue is greater because if it is possible to perform the exploit on a local account on the cloud server then it would affect all users.
What do I need to do?
For the moment the only action available is to patch systems. Where cloud provisioned servers are used, a risk led decision should be taken to whether the system should be brought internally. Certainly, where confidential information is held on a cloud provisioned server we would strongly recommend bringing this server onto organisationally owned infrastructure.
Predictions for the next month
Both of these vulnerabilities presently pose a low risk to organisations but that will significantly change as attackers have more time to develop exploit code.
We fully expect to see exploit code and attack modules being made public in the coming weeks. Once the exploits become more available, the Real World Risk score will increase to a predicted 70/100 for cloud provisioned systems and 54/100 for private servers.
Peter has been in the Information Security world since 1999 and in IT in general since 1996. His work history contains a unique blended balance between the development of exceptional technical capabilities and business knowledge. Peter is a proud father of twins and enjoys GT endurance racing on the weekends.
Last week saw SB Tech Breached by the hacking group Maze. It seems that every week the group are announcing more victims. GameOn asked our CEO Peter Bassill, to give us some insight into the attack. The GameOn article is here.
In our “How to securely” series we asked our followers what tools they would like a simple guide on to help them stay secure online. There seemed to be a lot of confusion as to what a VPN is and why you should or should not use one. So we asked Peter to help.
WhatsApp is among the fastest-growing instant messengers out there, and almost a social network in its own way. But if you are using it, there are some steps you should take to protect your security and privacy.
The UK’s highest court ruled that Morrisons can not be liable for a criminal act of a person seeking to harm their business. On April 1st, 2020, a panel of five justices unanimously ruled that Morrisons was not “vicariously liable”.
With the current pandemic situation, we all need to be taking remote working considerations. While adjusting the work paradym, it is vital to keep a mind’s eye on the security and safety of the businesses information assets
In this guide we are looking at how to go about securing zoom. Since the onset of the global pandemic, we have seen surge in “zoom bombing”. This is where people with malicious intent look for in-progress zoom meetings to join and cause trouble.
A critical vulnerabiltiy has been identified in Dell EMC iDRAC7, iDRAC8 and iDRAC9. Some unknown processing is affected by this issue. Manipulation with an unknown input can lead to stack based memory corruption.
On March 27th, Hiscox Insurance Company Inc. filed a complaint against law firm Warden Grier for concealing a data breach that occurred back in 2016.
A critical vulnerability has been identified in Nginx Controller up to 3.1.x (web server,) affecting an unknown code block of the component Controller API.