Intel is back in the news with another vulnerability related to their CPU architecture. Two separate academic teams disclosed two new and distinctive exploits that bypass Intel’s Software Guard eXtension, which is the most sensitive region of the company’s processors because it protects encryption keys. The new SGX attacks are known as SGAxe and CrossTalk. Both break into the fortified CPU region using separate side-channel attack. Keep your eyes open for patches that are on their way.
Researches have found that users rarely change their passwords, EVEN WHEN THEY HAVE BEEN BREACHED. Of the users who changed passwords, only a third changed it to a stronger password, but the rest created passwords of weaker or similar strength, usually by reusing character sequences from their previous password, or by using passwords that were similar to other accounts that were stored inside their browser. This creates a risk of secondary breaches of user accounts (often their personal accounts), and for credential stuffing attacks where the attacking system has a list of current passwords as well as common combinations. The simplest defense against credential stuffing attacks is rotating complex passwords at regular intervals.
Email continues to be a risk for business, as new phishing attacks and new malware campaigns out this month use email as the attach vector. Users are also under attack from fake apps on their smartphones. Now tie all of these articles together. The risks are increasing, but the users are not 100% working with you. The answer – at a minimum, implement multi-factor authentication for all critical systems, and for anything externally facing.