Critical Path Security Grows!

We couldn't be more excited to announce two new additions to the Critical Path Security team! Virginia Kelley - Senior Accounts Manager / Women In Technology Outreach Virginia has been quietly working behind the scenes in the Information Security industry for nearly a decade.  She is a regular attendee at DEFCON where she volunteered in the Packet Hacking Village two years in a row. Additionally, she led all efforts for Critical Path Security's involvement in BSides Atlanta in 2018 and co-wrote Patrick Kelley's "CyberZoology" presentation, which has been presented over 25 times in 4 countries. She has attended or spoken at several security conferences in the United States and Canada and was most recently published on multiple news sites about becoming an Information Security Professional in a male-dominated field and Mental Illness Advocacy. Virginia Kelley is an incredibly valuable addition to Critical Path Security, where she will have dedicated time…

Comments Off on Critical Path Security Grows!

Aircraft Parts Manufacturer Suffers Cyberattack

1,000 of 1,400 employees were sent home and all manufacturing halted as Belgian company ASCO Industries, a key leader in manufacturing components for both civilian and military planes, fell victim to a ransomware attack on June 7. One week later, ASCO describes the incident as a "large-scale ransomware attack". It's important to note that the attack came two months after the European Commission approved the acquisition of the company by US-based Spirit Aerosystems. As ASCO Industries manufactures airplane parts for Airbus, Boeing, Bombardier Aerospace, Lockheed Martin and the new F-35 fighter plane, the impact has been felt around the world. The company has plants in Belgium, Germany, Canada and the US, as well as office representation in Brazil and France. A week later, the plants are still closed and an investigation by external experts seeks to determine the actual damage caused. The infection occurred at the production plant in Belgium,…

0 Comments

One Million Devices Open to Microsoft BlueKeep Flaw

Researchers have discovered one million internet connected devices that are vulnerable to a Microsoft flaw, which could open the door to a cyberattack. The flaw (CVE-2019-0708) was fixed during Microsoft’s May Patch Tuesday Security Bulletin earlier this month. System administrators were urged to immediately deploy fixes as the flaw could pave the way for a similar attack on the scale of WannaCry. Making matters worse, a spike in scans for vulnerable systems was spotted over the weekend – potentially indicating that bad actors are looking to sniff out the activity. The critical remote code-execution flaw exists in Remote Desktop Services and impacts older version of Windows, including Windows 7, Windows XP, Server 2003 and Server 2008 (Microsoft deployed patches to Windows XP and Windows 2003 for the bug during Patch Tuesday, neither of which is still supported via monthly Patch Tuesday updates). While Microsoft urged administrators to update impacted Windows…

0 Comments

Google Plaintext Password Warning

Google announced today that they have accidentally stored user passwords unprotected in plaintext. Google says that the bug affected "a small percentage of G Suite users," meaning it does not impact individual consumer accounts, but does affect some business and corporate accounts, which have their own risks and sensitivities. The company typically stores passwords in a cryptographic hash. However, a bug in G Suite's password recovery feature for administrators caused unprotected passwords to be stored in the infrastructure of the admin console. Google has disabled the features that contained the bug. Google is in the process of notifying G Suite administrators, and says that it will also automatically reset any impacted passwords that haven't already been changed. The company discovered the bug in April. Since all impacted passwords that haven't already been changed will be auto-reset by Google, you should focus on adding two-factor authentication to your G Suite account…

0 Comments