CyberHoot’s Chief Information Security Officer constantly monitors the cybersecurity threats MSPs and SMBs face.
Recently, a critical vulnerability was patched by Microsoft in August 2020. This vulnerability was so severe, it got an extremely rare 10/10 severity rating from Microsoft. If this flaw were weaponized, it could compromise an Enterprise network in under three seconds. Dubbed the “Zerologon” bug, it affects all domain controllers serving the netlogon protocol (when you boot your computer and authenticate to your domain account this protocol is used).
This bug allows an attacker to manipulate netlogon authentication procedures to:
Microsoft quietly released a patch in August to fix this issue. However, its significance didn’t come to light until last week when security researchers at Secura B.V., a Dutch security firm, published technical details in a whitepaper on their Blog.
CyberHoot strongly recommends that you patch your domain controllers for this vulnerability now, today, before you do anything else. It’s that serious!
Additional Reading:
ZDNet Article: Zerologon attack lets hackers take over enterprise networks: Patch now
Sophos Video: Sophos Naked Security: NetLogon: Are you at Risk
Microsoft KB: Microsoft CVS-2020-1472
Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.
And How to Fix Them Let me make an educated guess. You moved to Google Workspace because it was supposed to...
Read more
Remember Heartbleed? That security nightmare from a few years back that made everyone panic about their...
Read more
Remember 2020? We scanned QR codes for everything. Restaurant menus. Parking meters. That awkward moment at a...
Read moreGet sharper eyes on human risks, with the positive approach that beats traditional phish testing.
