<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://stage-community-sophos-comv11.telligenthosting.net/cfs-file/__key/system/syndication/atom.xsl" media="screen"?><feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en-US"><title type="html">Community Security Blog</title><subtitle type="html" /><id>https://stage-community-sophos-comv11.telligenthosting.net/b/security-blog/atom</id><link rel="alternate" type="text/html" href="https://stage-community-sophos-comv11.telligenthosting.net/b/security-blog" /><link rel="self" type="application/atom+xml" href="https://stage-community-sophos-comv11.telligenthosting.net/b/security-blog/atom" /><generator uri="http://telligent.com" version="12.1.9.35025">Telligent Community (Build: 12.1.9.35025)</generator><updated>2021-01-19T18:23:00Z</updated><entry><title>3CX Desktop Application Attack</title><link rel="alternate" type="text/html" href="https://stage-community-sophos-comv11.telligenthosting.net/b/security-blog/posts/3cx-desktop-application-attack" /><id>https://stage-community-sophos-comv11.telligenthosting.net/b/security-blog/posts/3cx-desktop-application-attack</id><published>2023-03-31T00:09:53Z</published><updated>2023-03-31T00:09:53Z</updated><content type="html">Overview
On Wednesday, March 29, 2023, Sophos MDR Operations and Sophos X-Ops Threat Intelligence started investigating an attack on the Voice Over Internet Protocol (VOIP) client, 3CXDesktop.
The attack includes a digitally signed and trojanized ver...(&lt;a href="https://stage-community-sophos-comv11.telligenthosting.net/b/security-blog/posts/3cx-desktop-application-attack"&gt;read more&lt;/a&gt;)&lt;img src="https://stage-community-sophos-comv11.telligenthosting.net/aggbug?PostID=1478&amp;AppID=51&amp;AppType=Weblog&amp;ContentType=0" width="1" height="1"&gt;</content><author><name>Sophos</name><uri>https://stage-community-sophos-comV11.telligenthosting.net/members/sophos</uri></author><category term="3cx" scheme="https://stage-community-sophos-comv11.telligenthosting.net/b/security-blog/archive/tags/3cx" /></entry><entry><title>Best Practices for Sophos Central Intercept X Endpoint</title><link rel="alternate" type="text/html" href="https://stage-community-sophos-comv11.telligenthosting.net/b/security-blog/posts/best-practices-for-sophos-central-intercept-x-endpoint" /><id>https://stage-community-sophos-comv11.telligenthosting.net/b/security-blog/posts/best-practices-for-sophos-central-intercept-x-endpoint</id><published>2022-02-26T01:51:00Z</published><updated>2022-02-26T01:51:00Z</updated><content type="html">Our latest video on Sophos Techvids outlines best practices for configuring your threat protection policy for Intercept X in Sophos Central.
&lt;a href="https://techvids.sophos.com/watch/QguEJSD2ydngVvS2CZciE4" rel="noopener noreferrer" target="_blank"&gt;&lt;/a&gt;
&lt;a href="/b/community-blog/posts/community-techtips-webinar---intercept-x-threat-protection-policy-best-practices" rel="noopener noreferrer" target="_blank"&gt;Also check out our related Community Techtips episode available on-demand!&lt;/a&gt;

Intercept X is a powerful produc...(&lt;a href="https://stage-community-sophos-comv11.telligenthosting.net/b/security-blog/posts/best-practices-for-sophos-central-intercept-x-endpoint"&gt;read more&lt;/a&gt;)&lt;img src="https://stage-community-sophos-comv11.telligenthosting.net/aggbug?PostID=1138&amp;AppID=51&amp;AppType=Weblog&amp;ContentType=0" width="1" height="1"&gt;</content><author><name>Sophos</name><uri>https://stage-community-sophos-comV11.telligenthosting.net/members/sophos</uri></author></entry><entry><title>Hardening Your Sophos Firewall</title><link rel="alternate" type="text/html" href="https://stage-community-sophos-comv11.telligenthosting.net/b/security-blog/posts/hardening-the-sophos-firewall" /><id>https://stage-community-sophos-comv11.telligenthosting.net/b/security-blog/posts/hardening-the-sophos-firewall</id><published>2022-02-25T19:40:00Z</published><updated>2022-02-25T19:40:00Z</updated><content type="html">Here are some recommendations to harden the overall security of your Sophos Firewall.


Table of Contents

&lt;a href="#mcetoc_1fspe1rcs3"&gt;Keep Your Firmware Updated and Hotfixes Enabled&lt;/a&gt;
&lt;a href="#mcetoc_1fspe1na12"&gt;Limit Firewall Device Access&lt;/a&gt;
&lt;a href="#mcetoc_1fspe3l414"&gt;Lock Down Remote Access to Other Network Systems&lt;/a&gt;
&lt;a href="#mcetoc_1fspe4e6c5"&gt;Use Multi-Factor ...&lt;/a&gt;(&lt;a href="https://stage-community-sophos-comv11.telligenthosting.net/b/security-blog/posts/hardening-the-sophos-firewall"&gt;read more&lt;/a&gt;)&lt;img src="https://stage-community-sophos-comv11.telligenthosting.net/aggbug?PostID=1137&amp;AppID=51&amp;AppType=Weblog&amp;ContentType=0" width="1" height="1"&gt;</content><author><name>Sophos</name><uri>https://stage-community-sophos-comV11.telligenthosting.net/members/sophos</uri></author></entry><entry><title>Advisory: FORCEDENTRY Attack (CVE-2021-30860)</title><link rel="alternate" type="text/html" href="https://stage-community-sophos-comv11.telligenthosting.net/b/security-blog/posts/advisory-forcedentry-attack-cve-2021-30860" /><id>https://stage-community-sophos-comv11.telligenthosting.net/b/security-blog/posts/advisory-forcedentry-attack-cve-2021-30860</id><published>2021-09-15T17:15:00Z</published><updated>2021-09-15T17:15:00Z</updated><content type="html">Overview
Canadian privacy and cybersecurity activist group The Citizen Lab has &lt;a href="https://citizenlab.ca/2021/09/forcedentry-nso-group-imessage-zero-click-exploit-captured-in-the-wild/" rel="noopener noreferrer" target="_blank"&gt;announced a zero-day security hole&lt;/a&gt; in Apple&amp;rsquo;s iPhone, iPad and Macintosh operating systems. The attack is widely being&amp;nbsp;described by the nickname FORCEDENTRY. If...(&lt;a href="https://stage-community-sophos-comv11.telligenthosting.net/b/security-blog/posts/advisory-forcedentry-attack-cve-2021-30860"&gt;read more&lt;/a&gt;)&lt;img src="https://stage-community-sophos-comv11.telligenthosting.net/aggbug?PostID=1016&amp;AppID=51&amp;AppType=Weblog&amp;ContentType=0" width="1" height="1"&gt;</content><author><name>Sophos</name><uri>https://stage-community-sophos-comV11.telligenthosting.net/members/sophos</uri></author></entry><entry><title>Advisory: Confluence Server Webwork OGNL injection (CVE-2021-26084)</title><link rel="alternate" type="text/html" href="https://stage-community-sophos-comv11.telligenthosting.net/b/security-blog/posts/cve202126084" /><id>https://stage-community-sophos-comv11.telligenthosting.net/b/security-blog/posts/cve202126084</id><published>2021-09-05T21:44:00Z</published><updated>2021-09-05T21:44:00Z</updated><content type="html">Last updated 2021-09-10 UTC 11:55
&amp;nbsp;
On August 25, 2021, Atlassian released a &lt;a href="https://confluence.atlassian.com/doc/confluence-security-advisory-2021-08-25-1077906215.html"&gt;security advisory&lt;/a&gt; detailing a vulnerability in their on-premises Confluence Server and Confluence Data Center products.
The advisory contained instructions to immediate...(&lt;a href="https://stage-community-sophos-comv11.telligenthosting.net/b/security-blog/posts/cve202126084"&gt;read more&lt;/a&gt;)&lt;img src="https://stage-community-sophos-comv11.telligenthosting.net/aggbug?PostID=1008&amp;AppID=51&amp;AppType=Weblog&amp;ContentType=0" width="1" height="1"&gt;</content><author><name>Sophos</name><uri>https://stage-community-sophos-comV11.telligenthosting.net/members/sophos</uri></author></entry><entry><title>Information regarding ProxyShell</title><link rel="alternate" type="text/html" href="https://stage-community-sophos-comv11.telligenthosting.net/b/security-blog/posts/proxyshell" /><id>https://stage-community-sophos-comv11.telligenthosting.net/b/security-blog/posts/proxyshell</id><published>2021-08-25T20:34:00Z</published><updated>2021-08-25T20:34:00Z</updated><content type="html">Last updated 2021-08-31 UTC 09:30
On August 21, 2021, the US Cybersecurity and Infrastructure Security Agency (CISA) issued an &lt;a href="https://us-cert.cisa.gov/ncas/current-activity/2021/08/21/urgent-protect-against-active-exploitation-proxyshell"&gt;alert&lt;/a&gt;&amp;nbsp;to warn of active exploitation of ProxyShell vulnerabilities&amp;nbsp;&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-34473"&gt;CVE-2021-34473&lt;/a&gt;, &lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-34523"&gt;CVE-2021-34523&lt;/a&gt;, and &lt;a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31207"&gt;CVE-2021-3...&lt;/a&gt;(&lt;a href="https://stage-community-sophos-comv11.telligenthosting.net/b/security-blog/posts/proxyshell"&gt;read more&lt;/a&gt;)&lt;img src="https://stage-community-sophos-comv11.telligenthosting.net/aggbug?PostID=1001&amp;AppID=51&amp;AppType=Weblog&amp;ContentType=0" width="1" height="1"&gt;</content><author><name>Sophos</name><uri>https://stage-community-sophos-comV11.telligenthosting.net/members/sophos</uri></author><category term="ProxyShell" scheme="https://stage-community-sophos-comv11.telligenthosting.net/b/security-blog/archive/tags/ProxyShell" /></entry><entry><title>PetitPotam Attack</title><link rel="alternate" type="text/html" href="https://stage-community-sophos-comv11.telligenthosting.net/b/security-blog/posts/petitpotam-attack" /><id>https://stage-community-sophos-comv11.telligenthosting.net/b/security-blog/posts/petitpotam-attack</id><published>2021-07-28T15:11:00Z</published><updated>2021-07-28T15:11:00Z</updated><content type="html">&amp;nbsp;A new NTLM relay attack called PetitPotam has been discovered that allows threat actors to take over a domain controller, with proof of concept code published.&amp;nbsp;
Many organizations utilize Microsoft Active Directory Certificate Services, wh...(&lt;a href="https://stage-community-sophos-comv11.telligenthosting.net/b/security-blog/posts/petitpotam-attack"&gt;read more&lt;/a&gt;)&lt;img src="https://stage-community-sophos-comv11.telligenthosting.net/aggbug?PostID=978&amp;AppID=51&amp;AppType=Weblog&amp;ContentType=0" width="1" height="1"&gt;</content><author><name>Sophos</name><uri>https://stage-community-sophos-comV11.telligenthosting.net/members/sophos</uri></author></entry><entry><title>Kaseya VSA Supply-Chain Ransomware Attack</title><link rel="alternate" type="text/html" href="https://stage-community-sophos-comv11.telligenthosting.net/b/security-blog/posts/active-ransomware-attack-on-kaseya-customers" /><id>https://stage-community-sophos-comv11.telligenthosting.net/b/security-blog/posts/active-ransomware-attack-on-kaseya-customers</id><published>2021-07-02T03:34:00Z</published><updated>2021-07-02T03:34:00Z</updated><content type="html">First updated 2021-07-02, 19:50 UTC
Last updated 2021-07-06, 04:10 UTC
Sophos is aware of a supply chain attack that uses Kaseya to deploy a variant of the REvil ransomware into a victim&amp;rsquo;s environment.The attack is geographically dispersed. Org...(&lt;a href="https://stage-community-sophos-comv11.telligenthosting.net/b/security-blog/posts/active-ransomware-attack-on-kaseya-customers"&gt;read more&lt;/a&gt;)&lt;img src="https://stage-community-sophos-comv11.telligenthosting.net/aggbug?PostID=949&amp;AppID=51&amp;AppType=Weblog&amp;ContentType=0" width="1" height="1"&gt;</content><author><name>Sophos</name><uri>https://stage-community-sophos-comV11.telligenthosting.net/members/sophos</uri></author></entry><entry><title>Advisory: PrintNightmare (CVE-2021-34527), the zero-day hole in Windows</title><link rel="alternate" type="text/html" href="https://stage-community-sophos-comv11.telligenthosting.net/b/security-blog/posts/advisory-printnightmare-the-zero-day-hole-in-windows" /><id>https://stage-community-sophos-comv11.telligenthosting.net/b/security-blog/posts/advisory-printnightmare-the-zero-day-hole-in-windows</id><published>2021-06-30T20:40:00Z</published><updated>2021-06-30T20:40:00Z</updated><content type="html">Overview
Researchers from the cybersecurity company Sangfor, have documented an as-yet-undisclosed Windows Print Spooler Remote Code Execution bug, widely being described by the nickname PrintNightmare. If exploited, this vulnerability could provide ...(&lt;a href="https://stage-community-sophos-comv11.telligenthosting.net/b/security-blog/posts/advisory-printnightmare-the-zero-day-hole-in-windows"&gt;read more&lt;/a&gt;)&lt;img src="https://stage-community-sophos-comv11.telligenthosting.net/aggbug?PostID=946&amp;AppID=51&amp;AppType=Weblog&amp;ContentType=0" width="1" height="1"&gt;</content><author><name>Sophos</name><uri>https://stage-community-sophos-comV11.telligenthosting.net/members/sophos</uri></author></entry><entry><title>Advisory: Multiple Vulnerabilities (AKA FragAttacks) in WiFi Specification</title><link rel="alternate" type="text/html" href="https://stage-community-sophos-comv11.telligenthosting.net/b/security-blog/posts/multiple-vulnerabilities-aka-fragattacks-in-wifi-specification" /><id>https://stage-community-sophos-comv11.telligenthosting.net/b/security-blog/posts/multiple-vulnerabilities-aka-fragattacks-in-wifi-specification</id><published>2021-05-12T08:00:00Z</published><updated>2021-05-12T08:00:00Z</updated><content type="html">
Overview
On May 12, 2021, the researcher&amp;nbsp;Mathy Vanhoef&amp;nbsp;released a security advisory disclosing multiple medium severity CVEs for the 802.11 Wireless Network Specification, which is applicable to a wide variety of WiFi products. These vulne...(&lt;a href="https://stage-community-sophos-comv11.telligenthosting.net/b/security-blog/posts/multiple-vulnerabilities-aka-fragattacks-in-wifi-specification"&gt;read more&lt;/a&gt;)&lt;img src="https://stage-community-sophos-comv11.telligenthosting.net/aggbug?PostID=897&amp;AppID=51&amp;AppType=Weblog&amp;ContentType=0" width="1" height="1"&gt;</content><author><name>mgrimm</name><uri>https://stage-community-sophos-comV11.telligenthosting.net/members/mgrimm</uri></author></entry><entry><title>勧告: Exim の複数の脆弱性 (別名 21Nails)</title><link rel="alternate" type="text/html" href="https://stage-community-sophos-comv11.telligenthosting.net/b/security-blog/posts/exim-21nails" /><id>https://stage-community-sophos-comv11.telligenthosting.net/b/security-blog/posts/exim-21nails</id><published>2021-05-10T04:11:00Z</published><updated>2021-05-10T04:11:00Z</updated><content type="html">To view the&amp;nbsp;English version of this blog, please click&amp;nbsp;&lt;a href="/b/security-blog/posts/advisory-multiple-vulnerabilities-aka-21nails-in-exim"&gt;here&lt;/a&gt;.
概要
2021 年 5 月 4 日、Qualys は、広く使用されているオープンソースのメッセージ転送エージェント (MTA) である Exim メールソフトウェアについて、複数の CVE を公開するセキュリティアドバイザリをリリースしました。これらの脆弱性は、ローカルおよびリモートの攻撃者によって使用される可能性があり、Exim のバージョン 4.94....(&lt;a href="https://stage-community-sophos-comv11.telligenthosting.net/b/security-blog/posts/exim-21nails"&gt;read more&lt;/a&gt;)&lt;img src="https://stage-community-sophos-comv11.telligenthosting.net/aggbug?PostID=892&amp;AppID=51&amp;AppType=Weblog&amp;ContentType=0" width="1" height="1"&gt;</content><author><name>Sophos</name><uri>https://stage-community-sophos-comV11.telligenthosting.net/members/sophos</uri></author></entry><entry><title>Advisory: Resolved LPE in Endpoint for MacOS (CVE-2021-25264)</title><link rel="alternate" type="text/html" href="https://stage-community-sophos-comv11.telligenthosting.net/b/security-blog/posts/resolved-lpe-in-endpoint-for-macos-cve-2021-25264" /><id>https://stage-community-sophos-comv11.telligenthosting.net/b/security-blog/posts/resolved-lpe-in-endpoint-for-macos-cve-2021-25264</id><published>2021-05-07T09:13:00Z</published><updated>2021-05-07T09:13:00Z</updated><content type="html">
Overview
A local privilege escalation vulnerability in Sophos Endpoint products for MacOS was recently discovered and responsibly disclosed to Sophos. It was reported&amp;nbsp;via the Sophos bug bounty program by an external security researcher. The vul...(&lt;a href="https://stage-community-sophos-comv11.telligenthosting.net/b/security-blog/posts/resolved-lpe-in-endpoint-for-macos-cve-2021-25264"&gt;read more&lt;/a&gt;)&lt;img src="https://stage-community-sophos-comv11.telligenthosting.net/aggbug?PostID=890&amp;AppID=51&amp;AppType=Weblog&amp;ContentType=0" width="1" height="1"&gt;</content><author><name>mgrimm</name><uri>https://stage-community-sophos-comV11.telligenthosting.net/members/mgrimm</uri></author></entry><entry><title>Advisory: Multiple Vulnerabilities (AKA 21Nails) in Exim</title><link rel="alternate" type="text/html" href="https://stage-community-sophos-comv11.telligenthosting.net/b/security-blog/posts/advisory-multiple-vulnerabilities-aka-21nails-in-exim" /><id>https://stage-community-sophos-comv11.telligenthosting.net/b/security-blog/posts/advisory-multiple-vulnerabilities-aka-21nails-in-exim</id><published>2021-05-04T21:57:00Z</published><updated>2021-05-04T21:57:00Z</updated><content type="html">To view the Japanese version of this blog, please click &lt;a title="https://community.sophos.com/b/security-blog/posts/exim-21nails" href="/b/security-blog/posts/exim-21nails" rel="noopener noreferrer" target="_blank"&gt;here&lt;/a&gt;.
Overview
On May 4, 2021,&amp;nbsp;Qualys&amp;nbsp;released a security advisory disclosing multiple CVEs for the Exim mailer software, a widely used open-source message transfer agent (MTA).&amp;nbsp;T...(&lt;a href="https://stage-community-sophos-comv11.telligenthosting.net/b/security-blog/posts/advisory-multiple-vulnerabilities-aka-21nails-in-exim"&gt;read more&lt;/a&gt;)&lt;img src="https://stage-community-sophos-comv11.telligenthosting.net/aggbug?PostID=886&amp;AppID=51&amp;AppType=Weblog&amp;ContentType=0" width="1" height="1"&gt;</content><author><name>mgrimm</name><uri>https://stage-community-sophos-comV11.telligenthosting.net/members/mgrimm</uri></author></entry><entry><title>Advisory: Resolved RCE in Sophos Connect Client for Windows (CVE-2021-25265)</title><link rel="alternate" type="text/html" href="https://stage-community-sophos-comv11.telligenthosting.net/b/security-blog/posts/resolved-rce-in-sophos-connect-client-for-windows-cve-2021-25265" /><id>https://stage-community-sophos-comv11.telligenthosting.net/b/security-blog/posts/resolved-rce-in-sophos-connect-client-for-windows-cve-2021-25265</id><published>2021-03-01T10:29:00Z</published><updated>2021-03-01T10:29:00Z</updated><content type="html">Overview
A remote code execution vulnerability in Sophos Connect Client version 2.0 for Windows was recently discovered and responsibly disclosed to Sophos. It was reported&amp;nbsp;via the Sophos bug bounty program by an external security researcher. Th...(&lt;a href="https://stage-community-sophos-comv11.telligenthosting.net/b/security-blog/posts/resolved-rce-in-sophos-connect-client-for-windows-cve-2021-25265"&gt;read more&lt;/a&gt;)&lt;img src="https://stage-community-sophos-comv11.telligenthosting.net/aggbug?PostID=831&amp;AppID=51&amp;AppType=Weblog&amp;ContentType=0" width="1" height="1"&gt;</content><author><name>mgrimm</name><uri>https://stage-community-sophos-comV11.telligenthosting.net/members/mgrimm</uri></author></entry><entry><title>Advisory: Multiple Dnsmasq Vulnerabilities (AKA DNSpooq) in Sophos RED</title><link rel="alternate" type="text/html" href="https://stage-community-sophos-comv11.telligenthosting.net/b/security-blog/posts/advisory-resolved-multiple-dnsmasq-vulnerabilities-aka-dnspooq-in-sophos-red" /><id>https://stage-community-sophos-comv11.telligenthosting.net/b/security-blog/posts/advisory-resolved-multiple-dnsmasq-vulnerabilities-aka-dnspooq-in-sophos-red</id><published>2021-01-19T18:23:00Z</published><updated>2021-01-19T18:23:00Z</updated><content type="html">Overview
Dnsmasq released a security advisory, dated January 19, 2021, disclosing details on multiple CVEs that can be triggered by a remote DNS response. The impacted dnsmasq versions are older than version 2.83. If successfully exploited by a malic...(&lt;a href="https://stage-community-sophos-comv11.telligenthosting.net/b/security-blog/posts/advisory-resolved-multiple-dnsmasq-vulnerabilities-aka-dnspooq-in-sophos-red"&gt;read more&lt;/a&gt;)&lt;img src="https://stage-community-sophos-comv11.telligenthosting.net/aggbug?PostID=802&amp;AppID=51&amp;AppType=Weblog&amp;ContentType=0" width="1" height="1"&gt;</content><author><name>mgrimm</name><uri>https://stage-community-sophos-comV11.telligenthosting.net/members/mgrimm</uri></author></entry></feed>