id
int64 1
14.4k
| text
stringlengths 3
5.01k
| entities
list | relations
list | Comments
list |
---|---|---|---|---|
713 | Please mark, I'm not a robot! | [] | [] | [] |
714 | By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. | [] | [] | [] |
715 | This post is also available in: 日本語 (Japanese) On Aug. 25, 2021, Atlassian released a security advisory for an injection vulnerability in Confluence Server and Data Center, CVE-2021-26084. | [
{
"id": 46281,
"label": "vulnerability",
"start_offset": 179,
"end_offset": 193
},
{
"id": 46282,
"label": "SOFTWARE",
"start_offset": 144,
"end_offset": 177
},
{
"id": 46279,
"label": "identity",
"start_offset": 71,
"end_offset": 80
},
{
"id": 46280,
"label": "TIME",
"start_offset": 56,
"end_offset": 69
}
] | [
{
"id": 178,
"from_id": 46282,
"to_id": 46281,
"type": "has"
}
] | [] |
716 | If the vulnerability is exploited, threat actors could bypass authentication and run arbitrary code on unpatched systems. | [
{
"id": 46283,
"label": "attack-pattern",
"start_offset": 55,
"end_offset": 76
},
{
"id": 46284,
"label": "attack-pattern",
"start_offset": 81,
"end_offset": 99
}
] | [] | [] |
717 | Since the release of this advisory, mass scanning activity has started to occur, seeking unpatched systems, and in-the-wild exploitation has begun. | [] | [] | [] |
718 | Unit 42 recommends customers upgrade to the latest release of Confluence Server and Data Center. | [
{
"id": 46285,
"label": "identity",
"start_offset": 0,
"end_offset": 7
},
{
"id": 46286,
"label": "SOFTWARE",
"start_offset": 62,
"end_offset": 95
}
] | [] | [] |
719 | The Atlassian products vulnerable to CVE-2021-26084 are those using the following versions of Confluence Server and Data Center: Confluence Cloud customers are not affected by this vulnerability. | [
{
"id": 46287,
"label": "identity",
"start_offset": 5,
"end_offset": 14
},
{
"id": 46288,
"label": "vulnerability",
"start_offset": 38,
"end_offset": 52
},
{
"id": 46290,
"label": "SOFTWARE",
"start_offset": 131,
"end_offset": 147
},
{
"id": 46289,
"label": "SOFTWARE",
"start_offset": 95,
"end_offset": 128
}
] | [
{
"id": 180,
"from_id": 46289,
"to_id": 46288,
"type": "has"
}
] | [] |
720 | We recommend that customers update Atlassian Confluence Server and Data Center to the latest version, 7.13.0 (TLS). | [
{
"id": 44838,
"label": "SOFTWARE",
"start_offset": 36,
"end_offset": 79
}
] | [] | [] |
721 | You can find the newest release on Atlassian’s download center. | [
{
"id": 46291,
"label": "identity",
"start_offset": 35,
"end_offset": 44
}
] | [] | [] |
722 | If you cannot install the latest upgrade, see the Mitigation section on the Atlassian security advisory for information on how to mitigate this vulnerability by running a script for the operating system your Confluence server is hosted on. Palo Alto Networks provides protection against the exploitation of this vulnerability: Palo Alto Networks will update this Threat Brief with new information and recommendations as they become available. | [
{
"id": 46292,
"label": "identity",
"start_offset": 77,
"end_offset": 86
},
{
"id": 46293,
"label": "SOFTWARE",
"start_offset": 209,
"end_offset": 219
},
{
"id": 46294,
"label": "identity",
"start_offset": 242,
"end_offset": 260
},
{
"id": 46295,
"label": "identity",
"start_offset": 330,
"end_offset": 348
}
] | [] | [] |
723 | writeups/Confluence-RCE.md at main · httpvoid/writeups Confluence Server Download Archives Confluence Security Advisory - 2021-08-25 | Confluence Data Center and Server 7.13 | [
{
"id": 46296,
"label": "TIME",
"start_offset": 125,
"end_offset": 135
},
{
"id": 46297,
"label": "SOFTWARE",
"start_offset": 138,
"end_offset": 177
},
{
"id": 44839,
"label": "FILEPATH",
"start_offset": 1,
"end_offset": 27
},
{
"id": 44841,
"label": "SOFTWARE",
"start_offset": 57,
"end_offset": 74
},
{
"id": 44842,
"label": "SOFTWARE",
"start_offset": 94,
"end_offset": 104
}
] | [] | [] |
724 | Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address! | [] | [] | [] |
725 | Please mark, I'm not a robot! By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. | [] | [] | [] |
726 | This post is also available in: 日本語 (Japanese) On Sept. 14, 2021, Microsoft’s Security Response Center (MSRC) released security patches detailing the findings of four critical vulnerabilities affecting the Microsoft Azure package Open Management Infrastructure (OMI). | [
{
"id": 46298,
"label": "TIME",
"start_offset": 56,
"end_offset": 70
},
{
"id": 44843,
"label": "identity",
"start_offset": 72,
"end_offset": 115
},
{
"id": 44844,
"label": "SOFTWARE",
"start_offset": 212,
"end_offset": 272
}
] | [] | [] |
727 | The open-source OMI package is designed to provide a portable infrastructure backbone for web-based management tools, such as diagnostic monitoring, log analytic services and automation functionality within UNIX and Linux systems. | [
{
"id": 46299,
"label": "SOFTWARE",
"start_offset": 207,
"end_offset": 211
},
{
"id": 46301,
"label": "SOFTWARE",
"start_offset": 16,
"end_offset": 27
},
{
"id": 46300,
"label": "SOFTWARE",
"start_offset": 216,
"end_offset": 221
}
] | [] | [] |
728 | OMI is used by Microsoft Azure to manage UNIX packages within Azure virtual machines (VMs), containers and serverless cloud instances. | [
{
"id": 46302,
"label": "SOFTWARE",
"start_offset": 0,
"end_offset": 3
},
{
"id": 46305,
"label": "SOFTWARE",
"start_offset": 62,
"end_offset": 90
},
{
"id": 46303,
"label": "SOFTWARE",
"start_offset": 15,
"end_offset": 30
},
{
"id": 46304,
"label": "SOFTWARE",
"start_offset": 41,
"end_offset": 45
}
] | [] | [] |
729 | According to Microsoft’s security release notes, any system created, or which has updated its OMI package, after Aug. 11, 2021, should automatically be patched. | [
{
"id": 44845,
"label": "TIME",
"start_offset": 113,
"end_offset": 126
},
{
"id": 44846,
"label": "identity",
"start_offset": 13,
"end_offset": 23
}
] | [] | [] |
730 | The four critical vulnerabilities discovered by security researchers from Wiz include one unauthenticated remote code execution (RCE) and three privilege escalation vulnerabilities. Dubbed OMIGOD, the four vulnerabilities were found to directly affect Azure cloud instances using the following Azure services: Prisma Cloud Compute Defender agents can detect whether any Azure system is vulnerable to any of the four CVEs. | [
{
"id": 46306,
"label": "attack-pattern",
"start_offset": 91,
"end_offset": 135
},
{
"id": 46311,
"label": "SOFTWARE",
"start_offset": 313,
"end_offset": 342
},
{
"id": 46307,
"label": "attack-pattern",
"start_offset": 145,
"end_offset": 165
},
{
"id": 46309,
"label": "SOFTWARE",
"start_offset": 254,
"end_offset": 265
},
{
"id": 46310,
"label": "SOFTWARE",
"start_offset": 296,
"end_offset": 310
},
{
"id": 46313,
"label": "SOFTWARE",
"start_offset": 373,
"end_offset": 378
},
{
"id": 46308,
"label": "vulnerability",
"start_offset": 191,
"end_offset": 197
}
] | [] | [] |
731 | Additionally, Prisma Cloud users can also build a custom vulnerability detection rule to identify if any system is running an OMI package with a version previous to 1.6.8.1. | [
{
"id": 46314,
"label": "SOFTWARE",
"start_offset": 14,
"end_offset": 26
},
{
"id": 46315,
"label": "SOFTWARE",
"start_offset": 126,
"end_offset": 129
}
] | [] | [] |
732 | To build a custom vulnerability detection rule, open Prisma Cloud and navigate to the following page: name,type,package,minVersionInclusive,maxVersionInclusive,md5 OMIGOD,package,omi,*,1.6.8.0, Palo Alto Networks Azure-based VM- and CN-Series Firewall instances do not use the OMI package and are not vulnerable to the OMI critical vulnerabilities. | [
{
"id": 46318,
"label": "identity",
"start_offset": 197,
"end_offset": 215
},
{
"id": 46319,
"label": "SOFTWARE",
"start_offset": 216,
"end_offset": 221
},
{
"id": 46321,
"label": "SOFTWARE",
"start_offset": 322,
"end_offset": 325
},
{
"id": 46317,
"label": "vulnerability",
"start_offset": 166,
"end_offset": 172
},
{
"id": 46316,
"label": "SOFTWARE",
"start_offset": 54,
"end_offset": 66
},
{
"id": 46320,
"label": "SOFTWARE",
"start_offset": 280,
"end_offset": 283
}
] | [] | [] |
733 | Prisma Cloud will create an alert for any system which maintains an OMI package vulnerable to the OMI critical vulnerabilities. | [
{
"id": 46322,
"label": "SOFTWARE",
"start_offset": 1,
"end_offset": 13
},
{
"id": 46324,
"label": "SOFTWARE",
"start_offset": 99,
"end_offset": 102
},
{
"id": 46323,
"label": "SOFTWARE",
"start_offset": 69,
"end_offset": 73
}
] | [] | [] |
734 | Should a system be identified as vulnerable, the following steps should be taken for that Azure Cloud Instance: | [
{
"id": 46325,
"label": "SOFTWARE",
"start_offset": 90,
"end_offset": 101
}
] | [] | [] |
735 | On Sept. 14, 2021, security researchers from Wiz released a report detailing the findings of four critical vulnerabilities affecting the Microsoft Azure package OMI. | [
{
"id": 46326,
"label": "identity",
"start_offset": 45,
"end_offset": 48
},
{
"id": 44849,
"label": "TIME",
"start_offset": 3,
"end_offset": 17
},
{
"id": 44851,
"label": "SOFTWARE",
"start_offset": 137,
"end_offset": 164
}
] | [] | [] |
736 | Dubbed OMIGOD, the four vulnerabilities were found to directly affect Azure Cloud Instances. | [
{
"id": 46327,
"label": "vulnerability",
"start_offset": 7,
"end_offset": 13
},
{
"id": 46328,
"label": "SOFTWARE",
"start_offset": 70,
"end_offset": 81
}
] | [
{
"id": 181,
"from_id": 46328,
"to_id": 46327,
"type": "has"
}
] | [] |
737 | Palo Alto Networks Azure-based VM and CN Series Firewall instances do not use the OMI package and are not vulnerable to the OMI critical vulnerabilities. | [
{
"id": 46331,
"label": "SOFTWARE",
"start_offset": 82,
"end_offset": 85
},
{
"id": 46330,
"label": "SOFTWARE",
"start_offset": 19,
"end_offset": 24
},
{
"id": 46329,
"label": "identity",
"start_offset": 0,
"end_offset": 18
},
{
"id": 46332,
"label": "SOFTWARE",
"start_offset": 124,
"end_offset": 127
}
] | [] | [] |
738 | Customers of Prisma Cloud have the ability to create alerts to detect vulnerabilities. | [
{
"id": 44852,
"label": "SOFTWARE",
"start_offset": 13,
"end_offset": 25
}
] | [] | [] |
739 | Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address! | [] | [] | [] |
740 | Please mark, I'm not a robot! By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. | [] | [] | [] |
741 | Use-after-free bugs have affected Internet Explorer for years. | [
{
"id": 46333,
"label": "SOFTWARE",
"start_offset": 34,
"end_offset": 51
}
] | [] | [] |
742 | In the past year alone, Microsoft patched 122 IE vulnerabilities, the majority of which were use-after-free bugs. | [
{
"id": 46334,
"label": "identity",
"start_offset": 24,
"end_offset": 33
}
] | [] | [] |
743 | This year Microsoft has already patched 126 IE vulnerabilities to date. | [
{
"id": 46335,
"label": "identity",
"start_offset": 10,
"end_offset": 19
}
] | [] | [] |
744 | Of those vulnerabilities, 4 were actively being exploited in the wild. | [] | [] | [] |
745 | These 4 exploits (CVE-2014-1815, CVE-2014-1776, CVE-2014-0322, CVE-2014-0324) were all based on use-after-free bugs. | [
{
"id": 46336,
"label": "vulnerability",
"start_offset": 18,
"end_offset": 31
},
{
"id": 46337,
"label": "vulnerability",
"start_offset": 33,
"end_offset": 46
},
{
"id": 46339,
"label": "vulnerability",
"start_offset": 63,
"end_offset": 76
},
{
"id": 46338,
"label": "vulnerability",
"start_offset": 48,
"end_offset": 61
}
] | [] | [] |
746 | To deal with the increasing number of use-after-free bugs and associated exploits, Microsoft introduced a series of new control mechanisms in the most recent Internet Explorer patches. | [
{
"id": 46340,
"label": "identity",
"start_offset": 84,
"end_offset": 93
},
{
"id": 46341,
"label": "SOFTWARE",
"start_offset": 159,
"end_offset": 176
}
] | [] | [] |
747 | In June, Microsoft introduced a new isolated heap mechanism to solve the usage issue of use-after-free exploitation. | [
{
"id": 44853,
"label": "identity",
"start_offset": 9,
"end_offset": 18
},
{
"id": 44854,
"label": "attack-pattern",
"start_offset": 88,
"end_offset": 115
}
] | [] | [] |
748 | They followed that up In July by implementing a deferred free method to solve the freeing issue of use-after-free bugs. | [
{
"id": 46342,
"label": "TIME",
"start_offset": 25,
"end_offset": 29
},
{
"id": 46343,
"label": "attack-pattern",
"start_offset": 99,
"end_offset": 113
}
] | [] | [] |
749 | The main concept of an isolated heap is simple. | [] | [] | [] |
750 | It allocates a dedicated heap for select critical objects to use that is separate from other heaps that a user can directly access. | [] | [] | [] |
751 | The heap block will not be occupied by user-controlled data after the critical objects are freed. | [] | [] | [] |
752 | This mechanism prevents precise control of the data of a freed object from further exploitation. | [] | [] | [] |
753 | Figure 1. _g_hIsolatedHeap handle used for isolated heap | [] | [] | [] |
754 | The isolated heap was applied to many but not all internal objects, leaving some still vulnerable. | [] | [] | [] |
755 | To address this, Microsoft introduced another protection method of deferred free named ProtectedFree. | [
{
"id": 46344,
"label": "identity",
"start_offset": 17,
"end_offset": 26
}
] | [] | [] |
756 | They encapsulate this method and apply it to almost every object in mshtml.dll. | [
{
"id": 44855,
"label": "FILEPATH",
"start_offset": 68,
"end_offset": 78
}
] | [] | [] |
757 | In IE9, for example, it has been applied to every object through MemoryProtection::HeapFree as shown in figure 2. | [
{
"id": 46345,
"label": "SOFTWARE",
"start_offset": 3,
"end_offset": 6
}
] | [] | [] |
758 | Figure 2. | [] | [] | [] |
759 | References of MemoryProtection::HeapFree | [] | [] | [] |
760 | The main idea of this protection mechanism is to delay the freeing action so that the intruder is unable to determine when they can occupy the freed object using controlled data. | [] | [] | [] |
761 | In this new patch, every time Internet Explorer tries to free an object, it is not freed immediately. | [
{
"id": 46346,
"label": "SOFTWARE",
"start_offset": 30,
"end_offset": 47
}
] | [] | [] |
762 | Instead, the block to be freed is marked and filled with 0x00 data and added to a pool. | [] | [] | [] |
763 | When the size of the pool hits a predefined threshold, which is currently 100k (0x186A0 as highlighted in figure 3), it performs the real freeing operation (ReclaimUnmarkedBlocks). Figure 3. | [] | [] | [] |
764 | C++ style pseudo code of ProtectedFree function | [] | [] | [] |
765 | Microsoft stores the to-be-freed blocks in a structure called st_ProtecFreeManageHeap. | [
{
"id": 44856,
"label": "identity",
"start_offset": 0,
"end_offset": 9
}
] | [] | [] |
766 | This structure is created in the function MemoryProtection::CMemoryProtector::ProtectCurrentThread and is used to manage deferred free heap blocks. | [] | [] | [] |
767 | Figure 4 shows an example of the structure in memory. | [] | [] | [] |
768 | Figure 4. st_ProtecFreeManageHeap Figure 5 provides an alternate view of the structure in a C style code block. | [] | [] | [] |
769 | Figure 5. C style code of st_ProtecFreeManageHeap | [] | [] | [] |
770 | If we were able to make the size of the current heap block in this structure larger than the threshold of 0x186A0 bytes and trigger CMemoryProtector::ProtectedFree, it is still possible to force a true freeing action and occupy the freed object with other data as we show in the following piece of javascript code in figure 6. Figure 6. Javascript proof of concept to force freeing When creating the anchor element, the debug logs are shown in figure 7. | [
{
"id": 46347,
"label": "SOFTWARE",
"start_offset": 340,
"end_offset": 350
}
] | [] | [] |
771 | The address of the anchor element is 0x0c3b3f98. | [] | [] | [] |
772 | Figure 7: | [] | [] | [] |
773 | Before free We then manually decrease the reference number, so the CMemoryProtector::ProtectedFree function will fill the block with 0’s, but the object is still not freed. | [] | [] | [] |
774 | Figure 8: decrease the reference number, not yet freed | [] | [] | [] |
775 | Finally we make the size of the CMemoryProtector::ProtectedFree management structure larger than 0x186a0 forcing the freeing operation. | [] | [] | [] |
776 | Figure 9: field “TotalMemorySize” of st_ProtecFreeManageHeap is greater than threshold | [] | [] | [] |
777 | The anchor element is now actually freed as shown in figure 10. | [] | [] | [] |
778 | Figure 10: object is in the free list now | [] | [] | [] |
779 | From a researchers' point of view, deferred free created a few problems, one of the major ones being that the page heap feature may not work correctly. | [] | [] | [] |
780 | Page heap is a useful feature for debugging. | [] | [] | [] |
781 | When page heap is turned on, the system allows only one object in one memory page. | [] | [] | [] |
782 | Once this object is freed the whole page is marked as invalid. | [] | [] | [] |
783 | So the next time IE tries to access a freed object an invalid address exception would be raised. | [
{
"id": 46348,
"label": "SOFTWARE",
"start_offset": 17,
"end_offset": 20
}
] | [] | [] |
784 | This mechanism is extremely helpful when researchers are trying to find use-after-free bugs. | [] | [] | [] |
785 | With the introduction of the deferred free patch the object is no longer truly freed, so the page still exists. | [] | [] | [] |
786 | In this situation the researcher is no longer able to determine whether a use-after-free behavior has occurred because no exception would be thrown out. | [] | [] | [] |
787 | To reduce the impact of the deferred free patch, a research may consider patching the mshtml.dll in memory. | [
{
"id": 46349,
"label": "FILEPATH",
"start_offset": 86,
"end_offset": 96
}
] | [] | [] |
788 | For example, you can call MemoryProtection::CMemoryProtector::UnprotectProcess before you perform any fuzzing tasks. | [
{
"id": 46350,
"label": "attack-pattern",
"start_offset": 102,
"end_offset": 109
}
] | [] | [] |
789 | The recent patches and introduction of isolated heap and deferred free are strong signs that Microsoft plans to address the fundamentals of use-after-free exploitation in a preventative manner rather than to passively patch the vulnerabilities as they are discovered. | [
{
"id": 44857,
"label": "identity",
"start_offset": 94,
"end_offset": 103
},
{
"id": 44858,
"label": "attack-pattern",
"start_offset": 141,
"end_offset": 168
}
] | [] | [] |
790 | From the results of our research, applications of such methods can effectively stop unpatched use-after-free attacks. | [
{
"id": 46351,
"label": "attack-pattern",
"start_offset": 94,
"end_offset": 116
}
] | [] | [] |
791 | It can also make the exploitations of heap overflows or type confusion bugs significantly more difficult. | [
{
"id": 46353,
"label": "attack-pattern",
"start_offset": 21,
"end_offset": 52
}
] | [] | [] |
792 | But this is not the end. | [] | [] | [] |
793 | For the foreseeable future, Microsoft may introduce more defensive mechanisms against use-after-free bugs or even heap fengshui to reduce the risk of being exploited. | [
{
"id": 46354,
"label": "identity",
"start_offset": 29,
"end_offset": 38
}
] | [] | [] |
794 | Could it be game over for use-after-free exploitation, or it is just the beginning of another cat and mouse game? | [] | [] | [] |
795 | Time will tell. | [] | [] | [] |
796 | Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address! | [] | [] | [] |
797 | Please mark, I'm not a robot! | [] | [] | [] |
798 | By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. | [] | [] | [] |
799 | Today we’re releasing a new Unit 42 white paper titled “Credential-Based Attacks: Exposing the Ecosystem and Motives Behind Credential Phishing, Theft and Abuse.” | [
{
"id": 2601,
"label": "identity",
"start_offset": 28,
"end_offset": 35
},
{
"id": 2604,
"label": "attack-pattern",
"start_offset": 135,
"end_offset": 143
}
] | [] | [] |
800 | In this paper, we look at the problem of credential theft by exploring how it happens, what attackers do with credentials once they’ve stolen them, and what you can do to help prevent credential-based attacks. | [
{
"id": 46355,
"label": "attack-pattern",
"start_offset": 184,
"end_offset": 208
}
] | [] | [] |
801 | Credentials and authentication have become synonymous, with valid credentials allowing access to sensitive resources. | [] | [] | [] |
802 | Adversaries are increasingly stealing and using credentials as part of their playbooks; impersonating legitimate users to access a company’s most sensitive information, erase data on servers, and reconfigure them so that they can’t boot; and undertake other malicious activities. | [] | [] | [] |
803 | Stolen credentials underpin some of the most critical and damaging attacks out there; both Shamoon 2 and the Sofacy threat actor group, for example, have made detailed use of credential theft. | [
{
"id": 46358,
"label": "attack-pattern",
"start_offset": 175,
"end_offset": 191
},
{
"id": 46356,
"label": "threat-actor",
"start_offset": 109,
"end_offset": 134
},
{
"id": 46357,
"label": "threat-actor",
"start_offset": 91,
"end_offset": 100
}
] | [
{
"id": 182,
"from_id": 46357,
"to_id": 46358,
"type": "uses"
},
{
"id": 183,
"from_id": 46356,
"to_id": 46358,
"type": "uses"
}
] | [] |
804 | Credential theft today can happen in many ways, but the most notable are through credential phishing and the use of malware like keyloggers (both staples of the Sofacy group), as well as password reuse. | [
{
"id": 44859,
"label": "attack-pattern",
"start_offset": 1,
"end_offset": 17
},
{
"id": 44860,
"label": "attack-pattern",
"start_offset": 82,
"end_offset": 101
},
{
"id": 44861,
"label": "attack-pattern",
"start_offset": 130,
"end_offset": 140
},
{
"id": 44862,
"label": "threat-actor",
"start_offset": 162,
"end_offset": 174
},
{
"id": 44863,
"label": "attack-pattern",
"start_offset": 188,
"end_offset": 202
}
] | [
{
"id": 33,
"from_id": 44862,
"to_id": 44863,
"type": "uses"
},
{
"id": 34,
"from_id": 44862,
"to_id": 44861,
"type": "uses"
},
{
"id": 35,
"from_id": 44862,
"to_id": 44860,
"type": "uses"
},
{
"id": 36,
"from_id": 44862,
"to_id": 44859,
"type": "uses"
}
] | [] |
805 | The impact of a successful credential theft is, ultimately, access and authorization. | [
{
"id": 46359,
"label": "attack-pattern",
"start_offset": 27,
"end_offset": 43
}
] | [] | [] |
806 | Attackers will use credential theft for remote access to an organization, to access cloud-based resources (which may have weaker credential protections than network-based resources), or to move laterally within an organization once they’ve gained entry. | [
{
"id": 46360,
"label": "attack-pattern",
"start_offset": 19,
"end_offset": 35
}
] | [] | [] |
807 | The most sophisticated attacks can – and do – blend these actions together, sometimes using multiple stolen credentials to penetrate networks, move laterally within them, elevate privileges, and then access and steal data. Prevention of credential theft is too often overlooked. | [
{
"id": 46361,
"label": "attack-pattern",
"start_offset": 238,
"end_offset": 254
},
{
"id": 44864,
"label": "attack-pattern",
"start_offset": 101,
"end_offset": 119
},
{
"id": 44865,
"label": "attack-pattern",
"start_offset": 143,
"end_offset": 157
},
{
"id": 44866,
"label": "attack-pattern",
"start_offset": 171,
"end_offset": 188
},
{
"id": 44867,
"label": "attack-pattern",
"start_offset": 200,
"end_offset": 221
}
] | [] | [] |
808 | Organizations should continue with user education to help users better spot and not fall for phishing and spam attacks. | [
{
"id": 46362,
"label": "attack-pattern",
"start_offset": 93,
"end_offset": 118
}
] | [] | [] |
809 | You and your employees can also use password managers to make unique, complex passwords for each site not just a goal but a reality. | [] | [] | [] |
810 | Technology is also catching up; recent advances in two-factor/multi-factor authentication (2FA/MFA) and one-time passwords (OTP) represent the best long-term approaches to preventing credential theft. | [
{
"id": 46363,
"label": "attack-pattern",
"start_offset": 183,
"end_offset": 199
}
] | [] | [] |
811 | (Our newest release, PAN-OS 8.0, also includes protections to significantly limit or eliminate password reuse.) | [] | [] | [] |
812 | Get your copy of our white paper here. | [] | [] | [] |