Forums
New posts
Search forums
News
Security News
Technology News
Giveaways
Giveaways, Promotions and Contests
Discounts & Deals
Reviews
Users Reviews
Video Reviews
Support
Windows Malware Removal Help & Support
Mac Malware Removal Help & Support
Mobile Malware Removal Help & Support
Blog
Log in
Register
What's new
Search
Search titles only
By:
Search titles only
By:
Reply to thread
Menu
Install the app
Install
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Forums
Security
General Security Discussions
Why are we even messing with anything other than WD these days?
Message
<blockquote data-quote="Andy Ful" data-source="post: 888727" data-attributes="member: 32260"><p>Yes, I do not have any license. It would be easier for me to have one (instead of installing a trial several times). You know my email. Thank you.<img src="data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7" class="smilie smilie--sprite smilie--sprite109" alt=":)" title="Smile :)" loading="lazy" data-shortname=":)" /><img src="data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7" class="smilie smilie--sprite smilie--sprite130" alt="(y)" title="Thumbs up (y)" loading="lazy" data-shortname="(y)" /></p><p>...</p><p></p><p>Enterprises have many more vectors of attack as compared to home users.</p><p>Nowadays, most attacks start from emails with phishing links. The second initial vector is related to email attachments. Both vectors often use documents as payloads. One popular method uses the MS Office old equation editor exploit. But, there are several exploiting possibilities too, because many enterprises do not update properly MS Office.</p><p>[URL unfurl="true"]https://www.us-cert.gov/ncas/alerts/aa20-133a#:~:text=U.S.%20Government%20reporting%20has%20identified,and%20CVE%2D2018%2D7600[/URL].</p><p></p><p>But it seems that exploits in Enterprises are especially popular in successful attacks on servers. Here is the useful report (not new):</p><p>[URL unfurl="true"]https://www.helpnetsecurity.com/2018/02/09/server-side-exploits/[/URL]</p><p>Such malware is not used to attack home users. Servers use different Windows editions (often different OS too, like Linux servers) and different software as compared to home users. Furthermore, the attacks are often targetted to enterprise servers and not home users. Here is a useful reference for Windows Server 2008:</p><p>[URL unfurl="true"]https://www.upguard.com/articles/top-20-critical-windows-server-2008-vulnerabilities-and-remediation-tips[/URL]</p><p></p><p>The cybercriminals are not stupid. Using well known (not new) exploits is the simplest way to bypass enterprise security and obtain persistence, so they are often used in attacks. The popularity of the WannaCry ransomware family is the simplest example of it.</p></blockquote><p></p>
[QUOTE="Andy Ful, post: 888727, member: 32260"] Yes, I do not have any license. It would be easier for me to have one (instead of installing a trial several times). You know my email. Thank you.:)(y) ... Enterprises have many more vectors of attack as compared to home users. Nowadays, most attacks start from emails with phishing links. The second initial vector is related to email attachments. Both vectors often use documents as payloads. One popular method uses the MS Office old equation editor exploit. But, there are several exploiting possibilities too, because many enterprises do not update properly MS Office. [URL unfurl="true"]https://www.us-cert.gov/ncas/alerts/aa20-133a#:~:text=U.S.%20Government%20reporting%20has%20identified,and%20CVE%2D2018%2D7600[/URL]. But it seems that exploits in Enterprises are especially popular in successful attacks on servers. Here is the useful report (not new): [URL unfurl="true"]https://www.helpnetsecurity.com/2018/02/09/server-side-exploits/[/URL] Such malware is not used to attack home users. Servers use different Windows editions (often different OS too, like Linux servers) and different software as compared to home users. Furthermore, the attacks are often targetted to enterprise servers and not home users. Here is a useful reference for Windows Server 2008: [URL unfurl="true"]https://www.upguard.com/articles/top-20-critical-windows-server-2008-vulnerabilities-and-remediation-tips[/URL] The cybercriminals are not stupid. Using well known (not new) exploits is the simplest way to bypass enterprise security and obtain persistence, so they are often used in attacks. The popularity of the WannaCry ransomware family is the simplest example of it. [/QUOTE]
Insert quotes…
Verification
Post reply
Top