More than 120 vulnerabilities disclosed as part of Microsoft Patch Tuesday

“Microsoft released its monthly security update Tuesday, disclosing more than 120 vulnerabilities across its line of products and software, the most in a single Patch Tuesday in four months. This batch of updates also includes a fix for a new vulnerability in the Microsoft Windows Support Diagnostic Tool (MSDT) that’s actively being exploited in the wild, according to Microsoft. MSDT was already the target of the so-called “Follina” zero-day vulnerability in June. Two of the important vulnerabilities CVE-2022-35743 and CVE-2022-34713, are remote code execution vulnerabilities in MSDT. However, only CVE-2022-34713 has been exploited in the wild and Microsoft considers “more likely” to be exploited.” – SANS @RISK

Cisco Talos Intelligence Group – Comprehensive Threat Intelligence: Microsoft Patch Tuesday for August 2022 — Snort rules and prominent vulnerabilities

Ransomware based Data Leaks comparison 2022 and 2021

In its 2022 Global Threat Report, CrowdStrike warned that cyberattacks are “moving beyond malware” and increasingly “living off the land,” or using legitimate credentials and built-in tools to access their victims’ networks. Of all the detections indexed by CrowdStrike Security Cloud in the fourth quarter of 2021, the report said, 62% of them were malware-free, “exploiting stolen user credentials and identity to bypass legacy security solutions.”

Ransomware Data Leaks Doubled
CrowdStrike Report Shows 2021 Ransomware Data Leaks Doubled in Education Sector

Source: https://thejournal.com/articles/2022/02/15/cybercrime-report-shows-2021-ransomware-data-leaks-doubled-in-education-sector.aspx

 

Recognition Scheme of Cybersecurity Assessment Providers

BNShosting.Net is now a part of the Security and Protection Assessment by DICT in Recognizing Cybersecurity Assessment Providers.

DICT recognized Bitstop Network Services Inc. as a Cybersecurity Assessment Provider (ISMS) effective 3rd June 2022 and that Bitstop Network Services Inc., will now be included in the DICT-Recognized Cybersecurity Assessment Providers listed in the DICT website.

https://dict.gov.ph/recognition-scheme-cybersecurity-assessment-providers/

How to survive a DDoS attack

A DDoS attack is an attack that targets a website. It works by flooding the target website with bogus traffic. By doing this, the attackers are able to “flood” and disrupt the service. This makes it unavailable for legitimate users. The impact of such an attack can be significant. It can lead to prolonged downtime, lost revenue, and dissatisfied customers.

The most important step in dealing with DDoS is to be prepared. This is what you do BEFORE the attack is launched. Identify the potential targets: assets, including servers, applications, and services. Then, you need to determine what effect the outage will have on your customers and users. The cost of an outage is your justification for budgets to fund your countermeasures. Create an incident response playbook.

Preparation Step 1

Have you done capacity planning? How many concurrent visitors can your existing setup handle? Would it make sense to add more memory, CPUs, bandwidth and faster SSD to your storage? Have you optimized your current code so that more visitors can be served? Do you have SNMP monitoring and alerts? Did you enable firewall, web and event logging? It is also important to set up security policies to protect sensitive data. Are all your systems fully updated and patched?

Preparation Step 2

Have you hardened your defenses yet? Did you update your rules for Intrusion protection and detection systems? These are your first line of defense. The attacks that gets past your first line of defense can be stopped by a second line. This is your Web Application Firewall (WAF/modsec). The combination usually is enough to filter out a lot of unwanted traffic.

The key point is to filter out unwanted traffic. You need to create a filter that allows legitimate traffic and discards illegitimate traffic. But understand that it is still no defense against a flood of traffic that is 100X what the server is setup to handle.

Preparation Step 3

Notice that hackers concentrate their DDoS ‘firepower’ onto a target. You can force hackers to spread out their attacks by adding more webservers. You can use Content distribution Networks — CDNs Like CloudFlare, Google’s Project Shield, AWS Shield, Akamai to name but a few.

These CDNs not only provide more bandwidth but also diffuse the DDoS’ impact. The attacks are now spread across several locations. This is like the classic Colonel Blotto Game. It boils down to a matter of forcing your opponents to commit more resources. You do this by opening more ‘fronts’ in the battlefield. The CDN is one way to force the DDoS to attack multiple fronts — instead of just one.

Preparation Step 4

Have you considered a paradigm shift? An out of the box solution should consider the power of distributed web. Rather than a single source of web files, think of using a bit torrent like solution, where the web files sit on multitudes of PCs. The CDN killer app is Brave (browser) + IPFS.

You need to quickly identify the source of the problem. Your SNMP Monitoring can quickly zero in on the asset/s being attacked. You need to notify your customers as soon as you notice that they’re being attacked. It’s important that everyone is aware of the potential risk.

Your web and firewall log files come in handy to identify the assets that are impacted. You can use this data to see whether your customers are seeing a difference in service quality. Find out the Who, When, How of the attacks. And then respond accordingly.

Post Mortem

Hold a “Lessons Learned” after the attack and update your incident response playbook. How can your response teams react faster? Got more to add? Please share your thoughts.

 

 

 

WordPress Secured Hosting – What to Look For in a Secure WordPress Hosting Provider

Finding a WordPress Secured hosting service is an art. You need a service that combines rock-solid reliability with high security standards without breaking the bank. Here are some things to look for in a WordPress Secured hosting provider.

First, you should make sure that your host has proactive firewalls and daily malware scans. Second, you should ensure that your website is protected with SSL certificates. This secure technology encrypts all communication between web browsers and your site.

You also need to control the access to various technical areas, including the database and admin panel. You can make sure that the hosting provider controls this access by clearly stating the policies of its website owners. For example, you can control who has access to the WP-admin area. If the site administrator needs to modify any passwords, you can change the access path to the admin panel. By doing so, hackers will not be able to see the information on your site.

Moreover, you should also track the activities in the admin area. This is important to detect any malicious actions that may be performed by users on your site. If you have more than one user, you should consider using WP Activity Log. This feature lets you view all changes made to several areas of your website. It logs new files, deleted files, and any modifications to any file. This feature is essential for keeping your website secure.

The most secure WordPress hosts have two-factor authentication to prevent hackers from accessing your site with just their credentials. Some of them even offer automatic backups to ensure the safety of your data. You should also check out the customer reviews to make sure that they offer a high level of security. Then, sign up for a WordPress Secured hosting service. Keep in mind that most Web hosts offer WordPress services for free. However, it is important to remember that a secure hosting solution should not come cheap.

The best WordPress Secured hosting services should have an additional protection for your website.Wordfence is an effective plugin that monitors your WordPress installation activity. It records any changes and new files. It is also free to download. Furthermore, the software is free to use. In addition, Wordfence Security is a powerful WordPress plugin that alerts you to potential security issues. It is also compatible with the WP core. Having Wordfence installed on your website will increase protection of your content from malware.

While WordPress is an open source system, security vulnerabilities can still be present. This means that you need to keep up with the latest updates of the software to stay safe. It is also important to upgrade to the latest version of your server to avoid being hacked. Regular updates will keep your website secure. The security of your website is paramount, so you should choose a WordPress Secured hosting provider that provides the highest levels of security.

 

How to Optimize Your Moodle Server

How to optmize your moodle learning management systemTo increase the performance of your Moodle site, there are a number of ways to optimize your server. You should avoid enabling multiple filters, because this can increase the server’s load. Instead, consolidate features into smaller plugins and turn off filters that are rarely used. A great example is the Multi-Embed filter. It allows you to embed content from third-party websites and services and converts the URL into an embedded format.

To optimize your server, first, create a baseline benchmark. You can measure the performance of your system by looking at how long it takes to load a page. If the page is taking too long to load, try to decrease the number of sections that appear on a page. The smaller the pages are, the less RAM they take up, so this will increase your server’s performance. If you’re worried about RAM usage, you can use folders and core activities.

You should also make sure that your server can handle the load. Moodle requires a good amount of RAM and disk space. In addition, your host and browser must be high-performing. You should monitor the performance of each of these components monthly. If you don’t manage to achieve this, you might need to purchase a new computer. If you’re using Moodle on a server, the best way to optimize it is to purchase a powerful computer and upgrade it if necessary.

Why Your Website Needs to keep a Traffic Log

Why your websites traffic logs should be kept

 

 

 

 

 

 

 

 

 

Keeping a traffic log is vital for your website. They can give you a detailed look at how visitors find your website. The most useful logs can help you block malicious IP addresses and improve your website’s performance. These logs are typically enormous and contain a lot of juicy information. But why keep them? Let’s take a closer look. Here are some reasons. Read on to learn more!

Traffic logs provide valuable information on what pages are most popular. Web servers record every request for a web page. They can also be used to determine the popularity of a website. They can help you determine which pages are the most popular. In addition to the traffic logs, you can see how many visitors came back to your website on different days. Keeping a traffic log can help you improve the site’s performance.

Monitoring website logs can help you improve your customer experience. This information is vital to improving your product and your service. You’ll be able to determine which pages are most popular and what search terms are generating them. You can also take action based on your insights. It can help you create better content and boost your sales. You’ll know if you’re on the right track with your website.

A traffic log is very useful when you’re trying to diagnose problems with your website. It allows you to spot issues and fix them immediately. A good log management solution can help you monitor logs for more than just performance problems. They can also improve the stability of web applications. Commercial solutions typically have more advanced features. Papertrail has a lifetime free trial. You can switch to a more expensive plan if you need more features.

The most common reason for keeping traffic logs is to prevent malicious activity on your website. If you can detect a threat before it occurs, you can make changes and prevent it from happening again. Even a single visitor can exploit a website’s security. Therefore, a log is invaluable for your website’s security. There are many advantages to using a log management tool like Papertrail.

Google Analytics provides a user-friendly interface and easy-to-use reports. However, you can also use these reports to identify the specific source of your website’s traffic. If you’re trying to improve one particular page, you can also use a universal analytics tool that can show you which pages are getting the most traffic. In the long run, a traffic log will be the most valuable source of revenue for your website.