CVE 2018- 8453 MONTHLY RISK & THREAT ANALYSIS REPORT

December 16, 2018

On December 6, 2018, threat actor X advertised the sale of the CVE-2018-8453 one-day exploit in a cyber crime forum. The exploit enables privilege escalation for an attacker that facilitates the full compromise of a victimized system. There is limited information on X, though he is associated with the sale of one-day exploits and enjoys a favorable reputation level, bolstering his bona fides as a reliable seller of merchandise. To date, suspected state actors have been observed leveraging the CVE-2018-8453 exploit against targeted entities in the Middle East region; however, the publicity surrounding this vulnerability coupled with slow implementation of available patches make any organization susceptible to compromise.

Spotlight

PrivateCore

PrivateCore enables enterprises to deploy servers in outsourced environments while maintaining data security. We protect data-in-use from hackers trying to steal data such as encryption keys, certificates, intellectual property. Enterprises need our technology because of the increasingly sophisticated threat environment, larger amounts of sensitive data in memory, and the proliferation of servers in insecure, hosted environments. Specialties Privacy, Integrity, Cloud computing, x86, Data Protection, Memory Encryption

OTHER WHITEPAPERS
news image

The Trusted Data Security Solution for Cyber Recovery

whitePaper | December 30, 2022

Digital transformation has brought significant benefits to organizations, including increased agility and flexibility, but it has also led to a rise in cyber attack vectors. 66% of organizations were hit with ransomware within the last year, according to a 2022 Sophos survey. The widespread adoption of cloud services and Software-as-aService (SaaS) applications has expanded the attack surface, making it more challenging to manage and secure data. Additionally, the increased use of mobile devices and remote work have made it easier for cybercriminals to launch attacks from anywhere, at any time.

Read More
news image

2020 Cyber Security Predictions

whitePaper | January 28, 2020

This year there are some common themes that endure, so we’ll highlight these as “work in progress”. Transformations often take longer than 12 months to be identifi ed as necessary, to be executed and to become established. However, there are other themes emerging through a combination of drivers from audit, compliance security and governance that are now showing signs of infl uencing the way that cyber risks are managed in a much shorter timescale.

Read More
news image

Building a Successful Cloud Infrastructure Security and Compliance Practice

whitePaper | December 28, 2022

Cloud security truly is a team sport that requires strong collaboration between security, IT and line of business teams. The dynamic nature of cloud is forcing information security teams to rethink how they operate and partner with other groups to address emerging security and compliance challenges their organizations face.

Read More
news image

Cyber Security After the Pandemic

whitePaper | April 29, 2021

The cyber security industry has faced two major sets of challenges over the last twelve months. The attacks and exploits affecting Solar Winds, Accellion, Microsoft and their customers have focused attention on supply chain risk, but the impact of the coronavirus pandemic has been felt more broadly across cyber security domains and disciplines.

Read More
news image

Mid-Year Threat Landscape Report

whitePaper | November 17, 2019

The first half of 2019 brought interesting developments in malware targeting popular operating systems, in hardware and software vulnerabilities affecting consumer and businesses, and in the increased number of attacks aimed at (and even carried out by) IoTs. With the money motive driving the proliferation of malware, cybercriminals are nothing if not resourceful when developing new malware strands or coming up with more successful attack vectors. The number of malware samples roaming the internet is about to reach the 1 billion1 milestone.

Read More
news image

Cyber Threat Predictions for 2023

whitePaper | November 3, 2022

While “less is more” is the critical strategy behind consolidating networks and security, “more is more” seems to be the mantra cybercriminals continue to live by. The most troubling trend we’ve observed across the cyber landscape is one we see continuing into the future—that threats of all kinds are becoming increasingly ubiquitous. From Ransomware-as-a-Service (RaaS) to new attacks on nontraditional targets like edge devices to the emerging use of wipers, the volume and variety of cyberthreats will keep security teams on their toes in 2023 and beyond.

Read More

Spotlight

PrivateCore

PrivateCore enables enterprises to deploy servers in outsourced environments while maintaining data security. We protect data-in-use from hackers trying to steal data such as encryption keys, certificates, intellectual property. Enterprises need our technology because of the increasingly sophisticated threat environment, larger amounts of sensitive data in memory, and the proliferation of servers in insecure, hosted environments. Specialties Privacy, Integrity, Cloud computing, x86, Data Protection, Memory Encryption

Events