Skip to content

Finding Ivanti Connect Secure and Policy Secure Gateways with runZero

Today, January 10th, 2024, Ivanti disclosed two serious vulnerabilities in the Ivanti Connect Secure and Ivanti Policy Secure products.

The first issue, CVE-2023-46805, allows attackers to bypass authentication controls to access restricted resources without authentication. This vulnerability has a CVSS score of 8.2 out of 10, indicating a high degree of impact.

The second issue, CVE-2024-21887, allows attackers to inject arbitrary commands to be executed on the affected device. Attackers must be authenticated to exploit this vulnerability, but attackers may be able to use the authentication bypass vulnerability above to achieve this. This vulnerability has a CVSS score of 9.1 out of 10, indicating a critical vulnerability.

The vendor reports that there are indications that these vulnerabilities have been exploited in the wild.

What is the impact? #

Upon successful exploitation of these vulnerabilities, attackers can execute arbitrary commands on the vulnerable system. This includes the creation of new users, installation of additional modules or code, and, in general, system compromise.

Are updates or workarounds available? #

Ivanti has released an update to mitigate this issue. Users are urged to update as quickly as possible.

How do I find potentially vulnerable Ivanti devices with runZero? #

From the Services Inventory, use the following query to locate assets running the vulnerable products in your network that expose a web interface and which may need remediation or mitigation:

_asset.protocol:http AND protocol:http AND http.body:"welcome.cgi?p=logo"

Additional fingerprinting research is ongoing, and additional queries will be published as soon as possible.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About runZero
runZero, a network discovery and asset inventory solution, was founded in 2018 by HD Moore, the creator of Metasploit. HD envisioned a modern active discovery solution that could find and identify everything on a network–without credentials. As a security researcher and penetration tester, he often employed benign ways to get information leaks and piece them together to build device profiles. Eventually, this work led him to leverage applied research and the discovery techniques developed for security and penetration testing to create runZero.

Scale Computing Launches New Business Continuity & Disaster Recovery Campaign to Help Protect Your Business

INDIANAPOLIS – January 9, 2024 — Scale Computing, a market leader in edge computing, virtualization, and hyperconverged solutions, today announced a new campaign aimed at helping IT leaders looking to build IT resilience with native, built-in data protection and disaster recovery capabilities. 

In 2023, the average cost of a data breach globally reached an all-time high of $4.45 million. This represents a 2.3% increase from 2022 and a 15.3% rise from 2020. Scale Computing Platform (SC//Platform) makes it easier to shield businesses from malicious and accidental incidents alike, ensuring maximum security and uptime. By combining SC//Platform with the company’s new Business Continuity/Disaster Recovery (BCDR) Planning Service, available on a subscription basis, organizations establish a comprehensive and regulated plan for responding to unforeseen downtime.

“No matter the size or industry of a business, downtime, data loss, and data corruption can have a serious and long-lasting impact on both the bottom line and the reputation of an organization. It is imperative in today’s complex IT and security landscapes for companies to establish IT resilience. IT leaders around the globe are defending their data with the native, built-in data protection and disaster recovery capabilities of Scale Computing Platform. Our innovative solutions ensure that critical systems are protected, validated, tested, and ready for recovery anytime,” said Jeff Ready, CEO and co-founder of Scale Computing.

SC//Platform brings simplicity, high availability, and scalability together, replacing the existing infrastructure for running virtual machines in a single, easy-to-manage platform. IT leaders from across the globe defend their data with the native, scalable, data and ransomware protection of SC// Platform, the industry-leading Hyperconvergence and Edge Computing platform.

Join the Scale Computing team for a discovery meeting to learn about SC//Platform data protection. For a limited time, the company is gifting a Garmin Dash Cam 66W — featuring an extra-wide 180-degree field of view that captures and saves important details in 1440p HD video — when you receive a generated, customized quote. Complete the form to schedule your discovery meeting with the team and begin your journey to bulletproofing your IT infrastructure.

To learn more about the award-winning SC//Platform, please visit scalecomputing.com/sc-platform.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Scale Computing 
Scale Computing is a leader in edge computing, virtualization, and hyperconverged solutions. Scale Computing HC3 software eliminates the need for traditional virtualization software, disaster recovery software, servers, and shared storage, replacing these with a fully integrated, highly available system for running applications. Using patented HyperCore™ technology, the HC3 self-healing platform automatically identifies, mitigates, and corrects infrastructure problems in real-time, enabling applications to achieve maximum uptime. When ease-of-use, high availability, and TCO matter, Scale Computing HC3 is the ideal infrastructure platform. Read what our customers have to say on Gartner Peer Insights, Spiceworks, TechValidate and TrustRadius.

The Silent Epidemic: Understanding & Preventing Compromised Credentials

In the shadowy corners of the digital realm, a silent epidemic is lurking, one that poses a grave threat to the security of personal and organizational data. This insidious danger is known as compromised credentials. It’s a digital predator, often invisible until it strikes, leading to catastrophic consequences. This blog post serves as a crucial beacon, illuminating the ominous and often overlooked world of compromised credentials. We aim to dissect the leading causes of this digital menace and unveil the most effective strategies for safeguarding against the theft of credentials. In doing so, we fortify your defenses in a world where digital security is not just a luxury, but a necessity for survival.

Understanding Compromised Credentials

Compromised credentials refer to situations where unauthorized individuals gain access to someone else’s login information. This can lead to unauthorized access to sensitive data, financial loss, and severe reputational damage for individuals and organizations alike.

Leading Causes of Compromised Credentials

Venturing into the heart of the storm, let’s uncover the key factors that contribute to the unsettling reality of compromised credentials:

  1. Phishing Attacks: Phishing is a common technique used by cybercriminals to trick individuals into revealing their login credentials. These attacks often involve sending emails or messages that appear to be from legitimate sources, urging the recipient to enter their credentials on a fake website.
  2. Weak Passwords: The use of weak or easily guessable passwords is a significant contributor to credential compromise. Many users still rely on simple passwords that are easy for attackers to guess.
  3. Third-Party Breaches: When service providers or third-party vendors experience a data breach, your credentials can be compromised if they were stored or managed by the affected entity.
  4. Keylogging and Spyware: Malware such as keyloggers and spyware can stealthily record keystrokes, capturing login credentials without the user’s knowledge.
  5. Social Engineering: Beyond technical means, attackers often use social engineering tactics to manipulate individuals into divulging their credentials.

Preventing Stolen Credentials: Top Methods

Armed with knowledge, we now turn to our arsenal of defense – the top methods to fortify our digital fortress against the theft of credentials:

  1. Use Strong, Unique Passwords: Ensure that all your passwords are strong, unique, and changed regularly. Consider using a mix of letters, numbers, and special characters.
  2. Enable Multi-Factor Authentication (MFA): MFA adds an additional layer of security by requiring a second form of verification (like a text message or an authentication app) in addition to your password.
  3. Educate and Train Employees: Regular training on cybersecurity best practices can significantly reduce the risk of credential compromise due to human error.
  4. Regularly Update Software and Systems: Keeping your software and systems up to date helps protect against vulnerabilities that attackers could exploit to steal credentials.
  5. Monitor for Suspicious Activity: Implementing tools that monitor for unusual login attempts or strange patterns can help in quickly identifying compromised credentials.
  6. Use a Password Manager: Password managers can generate and store complex passwords, reducing the risk of using weak or repeated passwords.
  7. Be Wary of Phishing Attempts: Always verify the authenticity of emails or messages asking for personal information. Be cautious of clicking on links or downloading attachments from unknown sources.
  8. Secure Physical Devices: Physical security is just as important. Ensure that devices like laptops and smartphones are secure and not easily accessible to unauthorized individuals.
  9. Implement Access Controls: Limiting the access rights of users based on their role can minimize the risk of credential abuse.
  10. Regular Security Audits: Conducting regular security audits can help identify potential vulnerabilities before they can be exploited.

The issue of compromised credentials is a persistent threat in the digital landscape. However, by understanding the causes and implementing robust preventive measures, individuals and organizations can significantly reduce their risk. Remember, in the world of cybersecurity, being proactive is not just an option, but a necessity. Stay safe, stay secure, and keep your credentials under lock and key. Your digital safety is worth every effort.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Portnox
Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit http://www.portnox.com, and follow us on Twitter and LinkedIn.。

The Rise of the Virtual CISO

The cybersecurity landscape is in a constant state of evolution, compelling organizations to seek innovative solutions to protect their digital assets. One such emerging trend is the Virtual Chief Information Security Officer (vCISO), a concept that marks a significant shift in the way companies address cybersecurity challenges. Today, we deep dive into the vCISO phenomenon, exploring its growing popularity, benefits, potential drawbacks, and what companies should consider before opting for this route. 

What is a Virtual CISO?

A Virtual CISO provides the expertise of a seasoned Chief Information Security Officer in a flexible and often remote arrangement. Unlike a traditional, full-time executive CISO, a vCISO can be a consultant or a part of a service from a specialized firm. This model is particularly beneficial for small to medium-sized businesses (SMBs), enabling access to top-tier security expertise without the financial burden of a full-time executive hire.

The Growing Popularity of Virtual CISOs

Several factors drive the increasing adoption of the vCISO model. The well-documented cybersecurity skill gap is a primary motivator, with the vCISO model serving as a bridge, connecting companies to experienced professionals. For SMBs, the cost-effectiveness of a vCISO is particularly appealing, as hiring a full-time CISO can be prohibitively expensive. Additionally, vCISOs offer scalability and flexibility, tailoring their services to the size and specific needs of an organization. They often bring diverse perspectives and innovative solutions, having worked with multiple clients across various industries.

Advantages of a Virtual CISO

The most notable advantage of a vCISO is the availability of expertise on demand. These professionals bring a wealth of knowledge and experience, focusing on strategic-level guidance, policy development, and compliance. This model allows for better cost control, as organizations pay for what they need when they need it. Moreover, the flexibility and adaptability of vCISOs mean they can quickly respond to changing needs and can be brought in for specific projects or periods.

Disadvantages of a Virtual CISO

However, there are challenges to consider. A vCISO might not always be available in crisis situations due to their limited availability. Being external, they may require time to fully understand the unique challenges and culture of the organization. There are also potential security risks associated with remote working arrangements if not properly managed. Additionally, building trust and rapport with internal teams can be more challenging for a non-full-time executive.

What Companies Need to Know Before Going Virtual

Before adopting a vCISO, companies should have a clear understanding of their needs. Whether it’s strategic guidance or compliance assistance, this clarity is crucial. It’s important to conduct thorough due diligence when selecting a vCISO, looking for experience, qualifications, and a successful track record. Ensuring effective integration with existing security teams and company culture is vital. Clear communication channels and regular reporting structures should be established. Moreover, any remote working arrangements must adhere to the company’s data protection and privacy policies. Lastly, the chosen vCISO service should be capable of scaling and adapting as the organization evolves.

Looking Ahead

The virtual CISO represents a transformative approach in managing cybersecurity. It combines expertise, flexibility, and cost-effectiveness, making it an attractive option for a wide range of organizations, especially those that cannot afford a full-time CISO. However, this approach is not without its challenges, such as potential limited availability and a period of adjustment to understand the organization’s unique environment. As with any significant business decision, careful consideration is key. Companies should ensure they choose a vCISO who aligns with their strategic objectives and corporate culture.

As cyber threats continue to evolve, the role of the CISO – virtual or otherwise – remains critical. The vCISO model offers an innovative solution to a complex problem, making top-tier cybersecurity leadership accessible to more organizations. Looking ahead, it’s likely that the adoption of this model will increase, reshaping the landscape of cybersecurity leadership in the digital age.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Portnox
Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit http://www.portnox.com, and follow us on Twitter and LinkedIn.。

Turning Pain into Power: Adapting to the Rising Costs of Data Breaches

Understanding the True Cost of Data Breaches

The stakes are high when it comes to data breaches. They’ve quickly transformed from being a peripheral IT concern to a paramount business issue with profound repercussions.  Data breaches are a growing concern for businesses and consumers alike. The price tag attached to these incidents, however, stretches far beyond direct financial losses. It envelopes an intricate web of intangible costs such as disruption to normal operations, a marked erosion of customer trust, hefty legal penalties, and often irreparable reputational damage.

Referencing IBM’s 2020 Cost of a Data Breach report, we find that the global average cost of a data breach hovers around $3.86 million. This figure, though staggering in its own right, is on an upwards trajectory as we steer towards 2024. As cyber threats grow in complexity and sophistication, and our reliance on digital platforms deepens, these costs are expected to inflate further.

To frame this in context, a holistic understanding of the cost of data breaches necessitates a perspective that encapsulates both immediate and cascading impacts. Direct costs, such as those associated with incident response and mitigation, are just the tip of the iceberg. As we delve deeper, the monetary implications of loss of business due to customer mistrust and potential regulatory penalties come to the surface. Moreover, businesses have to shoulder the costs associated with reinforcing their cybersecurity infrastructure in the aftermath of a breach.

Perhaps one of the most significant, but often overlooked, costs is the devaluation of a company’s intellectual property following a breach. The consequences of a data breach can be severe and far-reaching. The repercussions of such devaluation can be long-lasting, impacting the company’s competitive position in the market.

Therefore, as we navigate towards 2024, understanding the true cost of data breaches is an essential step in informing a proactive cybersecurity strategy. With this knowledge, CISOs are better equipped to make decisions that protect their organizations from the devastating financial impacts of these breaches.

The Domino Effect: Long-Term Financial Implications

A data breach is not a solitary event, but rather the initial tremor in a series of ripple effects that can reverberate for years within an organization. Far from being confined to immediate response and recovery expenditures, the financial implications extend like an unseen iceberg beneath the water’s surface.

Envisage the follow-on expenses necessitated by bolstered cybersecurity measures, born out of the newfound awareness of vulnerabilities that a breach brings to light. The cost of fortifying defenses and implementing more stringent protocols can add significantly to the financial burden.

Consider the potential legal ramifications. Regulatory fines, under ever-evolving data protection laws, could pose a daunting prospect. In worst-case scenarios, litigation costs might ensue, as impacted parties seek reparation for any harm suffered. It is worth noting that maintaining vigilance and proactive compliance can potentially shield organizations from such regulatory penalties.

An often-underestimated consequence of a data breach is the erosion of customer trust and its subsequent impact on business. The fear of personal information falling into the wrong hands can drive clients away, impacting not only revenue but also market standing. Restoring public confidence post-breach is a long and costly process that extends far beyond the incident itself.

Possibly one of the most devastating impacts of a data breach is the devaluation of a company’s intellectual property. This could diminish a company’s market position and competitive edge, an effect that may persist long after the breach. It further underscores the importance of robust, preemptive cybersecurity measures to safeguard valuable proprietary information.

In essence, each data breach sets off a chain reaction, a domino effect that magnifies the initial financial damage, extending it over a longer period. For CISOs, understanding these potential long-term financial implications can be invaluable in shaping proactive, robust cybersecurity strategies that aim to prevent breaches rather than merely reacting to them. This domino effect is an essential consideration in developing a forward-thinking security framework that effectively mitigates potential risks while ensuring the organization’s resilience in the face of a breach.

The Role of Leadership in Navigating the Rising Cost of Data Breaches

In an era marked by escalating data breach costs, it falls upon the shoulders of Chief Information Security Officers (CISOs) to guide their organizations safely through this shifting cybersecurity landscape. Being at the helm, these strategic leaders are poised to turn challenges into opportunities, minimizing the pain and capitalizing on the lessons that these breaches may bring.

A critical part of a CISO’s mandate is to foster a robust security culture within their organizations. This means instilling an understanding of the importance of cybersecurity across all levels of the organization, from entry-level employees to the C-suite. Building such a culture is more than just about implementing rules and procedures; it’s about fostering a mindset where security is seen not as an afterthought but as an integral part of everyday operations.

To navigate the increasing cost of data breaches, CISOs must also prioritize the development and enforcement of stringent data management practices. This could range from ensuring the secure storage and transmission of sensitive data, to implementing multi-factor authentication, to regular auditing of data access and usage.

Incident response plans are another crucial element that CISOs must ensure are not only in place but are robust, comprehensive, and regularly tested. In the face of a data breach, every second counts. Having a well-defined, practiced response can greatly reduce the time taken to detect and contain the breach, thereby reducing its cost.

Navigating the complexities of regulatory compliance is a critical aspect of a CISO’s role. With data protection laws continually evolving, CISOs must ensure that their organizations stay compliant. They should be proactive in staying abreast of these changes and incorporating them into their organization’s data privacy and security frameworks. Failure to comply can result in hefty fines that can significantly add to the financial burden of a data breach.

Finally, as cyber threats evolve and increase in sophistication, CISOs must stay ahead of the curve. This could involve the strategic deployment of the latest technologies, such as AI and machine learning, to detect and respond to threats more swiftly. It also involves fostering a continuous learning environment, where training and education play a pivotal role in equipping employees with the necessary skills to identify and respond to cyber threats.

In these challenging times, visionary leadership will be paramount in guiding organizations through the ever-rising costs of data breaches. Embodying this leadership, CISOs can transform these threats into catalysts for growth, resilience, and enduring cybersecurity.

Adapting to Increasingly Sophisticated Cyber Threats

As we traverse the labyrinth of digital risks, we encounter threats that are ceaselessly evolving in complexity, cunning, and sophistication. CISOs, the esteemed captains at the helm, face the monumental task of navigating this mercurial landscape. Success in this endeavor is not rooted in reactive measures but in proactivity and foresight. The capacity to anticipate emerging threats, understand their potential impact, and design strategic defenses can fortify an organization against these escalating risks.

Embracing automation in cybersecurity can be a powerful weapon in this arsenal. Technologies such as artificial intelligence and machine learning can be enlisted to augment our defenses, driving our capacity to detect and respond to threats at an accelerated pace. These technological aids serve as advanced sentinels, identifying anomalies and potential breaches that might elude human detection, and responding with alacrity that surpasses manual capabilities.

However, technology alone cannot be our solitary shield. It must be buttressed with a proactive security culture, nurtured by continuous education and training. This human-centric approach enables the workforce to recognize potential threats, respond appropriately, and contribute actively to the overall security framework of the organization. It serves to transform employees from potential points of vulnerability to empowered guardians of the organization’s digital assets.

CISOs must also cultivate adaptability, a trait crucial in this era of perpetual digital flux. It is about more than just keeping abreast of the latest threats; it’s about constantly refining our strategies, adapting our defenses, and ensuring our cybersecurity infrastructure remains robust and resilient in the face of new challenges.

In the chessboard of cybersecurity, being a proactive player rather than a reactive bystander can spell the difference between a strategic win or a devastating checkmate. It is in this transformative approach that CISOs can turn the formidable challenges of cyber threats into stepping stones towards fortified defenses, enduring resilience, and ultimately, a powerful testament to their visionary leadership.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Portnox
Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit http://www.portnox.com, and follow us on Twitter and LinkedIn.。

×

Hello!

Click one of our contacts below to chat on WhatsApp

×