Page 41 - Cyber Defense eMagazine for August 2021
P. 41
• Microsoft released patches for three Windows operating system Zero-Day vulnerabilities that
were already being exploited by Hackers. The vulnerabilities included Windows SYSTEM
PRIVILEGE escalation issues, scripting engine memory corruption bug and drive-by attacks via
web browsers.
• Microsoft releases a security update for Windows Print Spooler vulnerability that allows a Hacker
to install programs; VIEW, CHANGE, or DELETE data; or create new accounts with full user
rights.
• Palo Alto Networks addressed vulnerabilities that could allow an attacker to execute arbitrary
JavaScript code in the web console or to execute programs with SYSTEM PRIVILEGES.
• SQL injection vulnerability in the WooCommerce plugin affected more than 5 million WordPress
websites.
• Healthcare DATA BREACHES spiked 185% in 2021. The Healthcare sector will remain a prime
target throughout 2021.
• Morgan Stanley disclosed a July, 2021 DATA BREACH where Hackers stole customer data such
as customer name, address, birth date, Social Security number, and corporate company
name. The data compromised did not include passwords that could be used to access financial
accounts. Morgan Stanley said the compromised files were encrypted; however, attackers were
able to obtain the decryption key during the data breach.
Zero-Day Vulnerabilities that allow Hackers to operate with SYSTEM PRIVILEGES are a major threat
to all organizations encrypted and unencrypted confidential data. Confidential data includes: credit
card, tax ID, medical, social media, corporate, manufacturing, trade secrets, law enforcement, defense,
homeland security, power grid and public utility data. This confidential data is almost always stored in
DB2, Informix, MariaDB, Microsoft SQL Server, MySQL, Oracle, PostgreSQL and SAP Sybase
databases.
How to Stop the Theft of Confidential Database Data
Protecting encrypted and unencrypted confidential database data is much more than securing
databases, operating systems, applications and the network perimeter against Hackers, Rogue Insiders
and Supply Chain Attacks.
Non-intrusive network sniffing technology can perform a real-time full packet capture and deep packet
inspection (DPI) of 100% the database query and SQL activity in real-time from a network tap or proxy
server with no impact on the database server. This SQL activity is very predictable. Database servers
servicing 1,000 to 10,000 end-users typically process daily 2,000 to 10,000 unique query or SQL
commands that run millions of times a day. SQL packet sniffing does not require logging into the
monitored networks, servers or databases. This approach can provide CISOs with what they can rarely
achieve. Total visibility into the database activity 24x7 and protection of confidential database data.
In 2020 the DHS, Department of State, U.S. Marine Corps and the Missile Defense Agency all issued
requests for proposals (RFP) for network full packet data capture for deep packet analysis or deep
Cyber Defense eMagazine – August 2021 Edition 41
Copyright © 2021, Cyber Defense Magazine. All rights reserved worldwide.

