Newsletters
Google Android OS Vulnerability
A vulnerability in Google's Android OS has been discovered that could allow an attacker to change or replace a seemingly safe Android application with malware during installation. An attacker exploiting this vulnerability could access and steal user data on compromised devices without user knowledge. Devices running Android version 4.4 or later are not vulnerable.
Digital Edge suggestions:
1. Make sure your OS level is up to date.
2. Download Applications only from Google Play as they are downloaded into a protected area.
3. Discuss with us how you can protect your mobile users and clients using Enterprise class mobile security.
Please feel free to contact us for any additional information.
Microsoft March 2015 Security Update
Microsoft has released updates to address Windows vulnerabilities as part of the Microsoft Security Bulletin Summary for March 2015. These vulnerabilities could allow remote code execution, spoofing, security feature bypass, denial of service, elevation of privilege, or disclosure of information.
Digital Edge encourages users and administrators to review Microsoft Security Bulletin Summary MS15-MAR and apply the necessary updates.
Digital Edge is committed to secure all controlled IT infrastructure environments and to advise the IT community about possible vulnerabilities, newly discovered weaknesses, hacks as well as security news and events.
No action is necessary for fully managed Digital Edge clients because your systems will be patched on regularly scheduled and approved basis
Security Warning – 2/10/2015 - Microsoft
Digital Edge distributes this notification as an effort to improve the IT community cybersecurity, coordinate cyber information sharing, and proactively manage cyber risks while protecting our clients.
On February 10, 2015, Microsoft issued new Security Bulletin MS15-011 which is marked critical
Digital Edge security team analyzed the vulnerabilities and possibilities to exploit. We think that the vulnerability reported in MS15-011 is critical but very hard to exploit. Even though Microsoft does not disclose details about Digital Edge Security Team feels that exploiting of the vulnerability is hard and in most common enterprise settings where infrastructures protected by firewalls and users access network through VPNs almost impossible.
Digital Edge strives to be a trusted leader in cybersecurity and managed services in complex enterprise IT environments.
Security Warning
Digital Edge distributes this notification as an effort to improve the IT community cybersecurity, coordinate cyber information sharing, and proactively manage cyber risks while protecting our clients.
On January 27, 2015, Qualys Security Advisory published new Linux vulnerability repot - CVE-2015-0235.
The report alerts about Linux glibc library is being vulnerable to a buffer overflow with a risk of potential remote execution and taking over the server. Linux systems that are liable to attack include:
- Debian 7 (Wheezy),
- RHEL 5/6/7
- CentOS 6/7
- Ubuntu 12.04
Even though exploit of such vulnerability is not obvious, Qualys has developed a proof of a concept when a specially crafted email can produce a remote shell to a vulnerable system.
Digital Edge will assess managed systems and work with affected clients individually.
Digital Edge security team advise all IT professionals to take this vulnerability seriously and contact us for any questions, consultations or help.
Digital Edge strives to be a trusted leader in cybersecurity and managed services in complex enterprise IT environments.
Inclement Weather Update
Dear Valued Client,
As of 11:00 EST there have been no updates or issues to report.
All weather affected facilities reporting the following statuses:
- Additional facility engineering staff scheduled and in the facilities currently, they will remain on site 24/7 until the storm is over.
- All systems have been tested and operational.
- Commercial power: is currently stable, no outages reported
- Backup generator status: ready for switch to backup generator.
- Diesel Fuel status: 90% capacity
- Commercial power: is currently stable, no outages reported
- Cooling Systems status: normal operations, no outages reported
- Telecommunications: normal operations, no outages reported
- Local Transportation: no outages reported, delays expected
As always, our technicians are onsite and available to give you reliability that is expected from us!
Any client using our Geographical Cluster may request to switch their operation to our datacenter in Dallas for additional security. Please contact our support team to do so.
We thank you for your business!
Inclement Weather Advisory
Dear Valued Client,
This message is to assure you of our continued 24/7 support during the inclement weather conditions affecting the New York City Metro Area between Monday, 1/26 and Wednesday 1/28.
Our technicians are onsite and available to give you reliability that is expected from us!
Any client using our Geographical Cluster may request to switch their operation to our datacenter in Dallas for additional security. Please contact our support team to do so.
We thank you for your business.
-Digital Edge
Millions Of Websites Hit By Drupal Hack Attack
Drupal Vulnerability
Digital Edge assisted its clients running Drupal with patching and security assessment after Drupal Security Team a security advisory on October 15, 2014 (SA-CORE-2014-005).
All our clients are secured, however we are concerned that other non-Digital Edge clients may still be affected without knowing even after the patch was applied. Digital Edge’s Security Team brings it to IT industry’s attention that there is speculation in the Black Hat community that automated way of exploiting Drupal vulnerability is possible. The effect of such automation can be much wider then Drupal assessed initially.
The concern is that a malicious code could be injected automatically prior to the patching into servers running vulnerable Drupal. After the patching, malware might stay on the server and can bring additional Trojans, spyware or open back doors into the system.
For more valuable information about security and this particular case please contact Digital Edge security team through:
https://www.digitaledge.net/contact/
Digital Edge Security Advisory
Last month, security community discovered critical security threats that affect multiple platforms, technologies and configurations.
Digital Edge is proactively working with its clients on assessing the effect, planning for remediation, scheduling and execution of patching.
Critical vulnerabilities are:
- SSLv3 encryption protocol weakness allowing man-in-the-middle to decrypt secured communication.
- 3 critical Microsoft vulnerabilities allowing a hacker to execute malicious code remotely and gain access to data, client computers or client’s servers.
- Bash vulnerability allowing a hacker to execute malicious code remotely and gain access to client’s servers.
All affected Digital Edge’s clients will be contacted and required actions will be discussed, scheduled and performed. If you feel that you need an additional help please contact us at: https://www.digitaledge.net/contact/
Bug in Linux “bash” shell causes “shellshock”
Security Advisory from Digital Edge
On Wednesday, September 24th, a vulnerability in Linux bash shell was discovered. The vulnerability may allow code execution to open door for other attacks causing OS to become fully compromised. In lots of environments this vulnerability is exploitable over the network.
Digital Edge is assessing our internal environment as well as our clients’ environments and will remediate the vulnerability within the next few days. Affected Digital Edge clients will be contacted and protective actions will be discussed.
Digital Edge is committed to secure all controlled IT infrastructure environments and to advise the IT community about possible vulnerabilities, newly discovered weaknesses, hacks as well as security news and events.
If you feel that you need assistance from Digital Edge Security team please contact us at “support@digitaledge.net”
Thank you,
Digital Edge
"Heartbleed Zero Day" Threat
NEW OpenSSL Vulnerability Advisory
Digital Edge has been and will be continuing to assess our clients risks and potential urgency for patching the new vulnerability, dubbed “Heartbleed”, which is a security concern for users of OpenSSL, a widely-used opensource cryptographic software library. It can allow attackers to read the memory of the systems using vulnerable versions of OpenSSL library (1.0.1 through 1.0.1f). This may disclose the secret keys of vulnerable servers, which allows attackers to decrypt and eavesdrop on SSL encrypted communications and impersonate service providers. In addition, other data in memory may be disclosed, which conceivably could include usernames and passwords of users or other data stored in server memory.
The vulnerability was discovered on April 7 and announced on April 8.
If you are a fully managed client and was not contacted yet, it means you are not under any risk.
If you are managing your own applications/services or part of the Digital Edge private or hybrid cloud, Digital Edge will assist you with upgrading vulnerable libraries.
If you have questions please contact our security team sending an email to support@digitaledge.net.
Thank you
Digital Edge