Blog

Vulnerability Research

Analysis of NUUO NVRmini2 Stack Overflow Vulnerability

Exploiting CVE-2018-19864- Samuel S., Senior Vulnerability ResearcherDuring an audit of NUUO’s NVRmini2, a stack overflow vulnerability was discovered in a request handling function in the ‘lite_mv’ custom SIP service binary. The NUUO NVRmini2 runs a custom SIP service on TCP ports 5160 and 5150 via a binary at /NUUO/bin/lite_mv. In order to examine this bug more closely, we analyze the function...
Blog

Why Corporate Networks are Key Targets for Cryptojacking

The days of being able to ignore cryptocurrency is over. Even if you don’t use it, you’re now at risk of being adversely affected by it through cryptomining malware, also known as cryptojacking. Read on to find out what cryptocurrency is, how cryptojacking is on the rise, and how you can protect your organization.
Vulnerability Research

NUUO Firmware Disclosure

NUUO Zero-Day BlogA vulnerability identified in NUUO NVRmini2 Network Video Recorder devices discovered by our Vulnerability Research Team (VRT). We commend NUUO for their prompt response to the identified flaws and their engineering team’s work with VRT to provide fixes for these cyber security issues.NUUO has provided a patch for the vulnerability identified on the application. The patched...
Blog

Arcserve Zero-Day Disclosure

We are disclosing four previously undisclosed vulnerabilities within the Arcserve Unified Data Protection platform. The vulnerabilities can open the door for potential compromise of sensitive data through access to credentials, phishing attacks and the ability for a hacker to read files without authentication from the hosting system.________________________________________TitleDDI-VRT-2018-18 -...
Blog

Network Scanning for Complicated, Growing or Distributed Networks

Upgrade Your Network ScannerFree scanners are great – up to a point. That point is when your network reaches a critical size, your assets have acquired a critical value or your company, industry (or Uncle Sam) has set new compliance requirements that those freebee tools just can’t handle.Running multiple network scanning tools is a painEveryone has a half dozen network scanners sitting around and...
Blog

Port Scanning Tools VS Vulnerability Assessment Tools

Port scanning tools – just the first step to network securityYour port scanning tools are nice, but...When your network reaches a critical size, your assets have acquired a critical value or when new compliance standards hit, your port scanning tools may have reached their limit. It’s the job of vulnerability assessment and management tools to combine port scanning with the investigation of...
Blog

What GDPR Fines Mean for IBM i

The EU’s General Data Protection Regulation (GDPR) has changed the way organisations around the world approach data security. Even if your centre of operations is nowhere near Europe, you must take stock of your IBM i security controls and evaluate what this compliance law means for you if you are processing personal data from people located in the...
Blog

The Solution to IP Scanning Headaches

IP scanning for growing or distributed networksYour IP Scanner more problem than help?When your network reaches a critical size, your assets have acquired a critical value or you have new compliance requirements - your freebee IP scanner just can't handle it. beSECURE (now part of Fortra Vulnerability Management) can. It your best step up into the corporate vulnerability assessment and management...
Blog

Your IFS Is Probably a Treasure Trove of Unsecured Data

Consider the type of information contained in the PDFs in your directories and spooled files in your output queues. Aside from taking up disk space and consuming time during a backup, what's the issue with leaving these reports on the system? The issue is the contents of those reports, along with who has access to them.
Blog

Tips for Managing Physical, Virtual, Cloud Environments

IT infrastructure is complex today. On-prem. Off-prem. Virtualization. The cloud. It’s up to IT to build this infrastructure, then distribute resources from its many miscellaneous parts to various services in the most efficient way possible. With so many different environments to track—many of them walled off from one another in data silos—service issues can be difficult to diagnose and...
Blog

How to Generate Revenue in AP

Accounts Payable not only doesn't have to be a cost center these days. But automating AP can actually make it a profit center.