Page 41 - Cyber Defense eMagazine for August 2021
P. 41

•  Microsoft released patches for three Windows operating system Zero-Day vulnerabilities that
                   were  already  being  exploited  by  Hackers.  The  vulnerabilities  included  Windows  SYSTEM
                   PRIVILEGE escalation issues, scripting engine memory corruption bug and drive-by attacks via
                   web browsers.

               •  Microsoft releases a security update for Windows Print Spooler vulnerability that allows a Hacker
                   to install programs; VIEW, CHANGE, or DELETE data; or create new accounts with full user
                   rights.

               •  Palo Alto Networks addressed vulnerabilities that could allow an attacker to execute arbitrary
                   JavaScript code in the web console or to execute programs with SYSTEM PRIVILEGES.

               •  SQL injection vulnerability in the WooCommerce plugin affected more than 5 million WordPress
                   websites.

               •  Healthcare DATA BREACHES spiked 185% in 2021. The Healthcare sector will remain a prime
                   target throughout 2021.

               •  Morgan Stanley disclosed a July, 2021 DATA BREACH where Hackers stole customer data such
                   as customer name, address, birth date, Social Security number, and corporate company
                   name. The data compromised did not include passwords that could be used to access financial
                   accounts. Morgan Stanley said the compromised files were encrypted; however, attackers were
                   able to obtain the decryption key during the data breach.

            Zero-Day Vulnerabilities that allow Hackers to operate with SYSTEM PRIVILEGES are a major threat
            to all organizations  encrypted  and unencrypted  confidential data.  Confidential data includes: credit
            card, tax ID, medical, social media, corporate, manufacturing, trade secrets, law enforcement, defense,
            homeland security, power grid and public utility data. This confidential data is almost always stored in
            DB2,  Informix,  MariaDB,  Microsoft  SQL  Server,  MySQL,  Oracle,  PostgreSQL  and  SAP  Sybase
            databases.


            How to Stop the Theft of Confidential Database Data

            Protecting  encrypted  and  unencrypted  confidential  database  data  is  much  more  than  securing
            databases, operating systems, applications and the network perimeter against Hackers, Rogue Insiders
            and Supply Chain Attacks.
            Non-intrusive network sniffing technology can perform a real-time full packet capture and deep packet
            inspection (DPI) of 100% the database query and SQL activity in real-time from a network tap or proxy
            server with no impact on the database server. This SQL activity is very predictable. Database servers
            servicing  1,000  to  10,000  end-users  typically  process  daily  2,000  to  10,000  unique  query  or  SQL
            commands  that  run  millions  of  times  a  day.  SQL  packet  sniffing  does  not  require  logging  into  the
            monitored networks, servers or databases. This approach can provide CISOs with what they can rarely
            achieve. Total visibility into the database activity 24x7 and protection of confidential database data.
            In 2020 the DHS, Department of State, U.S. Marine Corps and the Missile Defense Agency all issued
            requests for proposals (RFP) for network full packet data capture for deep packet analysis or deep






            Cyber Defense eMagazine – August 2021 Edition                                                                                                                                                                                               41
            Copyright © 2021, Cyber Defense Magazine.  All rights reserved worldwide.
   36   37   38   39   40   41   42   43   44   45   46