Archives

Apple emergency update fixes new zero-day used to hack iPhones

By Sergiu Gatlan October 4, 2023 02:19 PM
Apple released emergency security updates to patch a new zero-day security flaw exploited in attacks targeting iPhone and iPad users.

“Apple is aware of a report that this issue may have been actively exploited against versions of iOS before iOS 16.6,” the company said in an advisory issued on Wednesday.

The zero-day (CVE-2023-42824) is caused by a weakness discovered in the XNU kernel that enables local attackers to escalate privileges on unpatched iPhones and iPads.

While Apple said it addressed the security issue in iOS 17.0.3 and iPadOS 17.0.3 with improved checks, it has yet to reveal who found and reported the flaw.

The list of impacted devices is quite extensive, and it includes:

iPhone XS and later
iPad Pro 12.9-inch 2nd generation and later, iPad Pro 10.5-inch, iPad Pro 11-inch 1st generation and later, iPad Air 3rd generation and later, iPad 6th generation and later, and iPad mini 5th generation and later

Apple also addressed a zero-day tracked as CVE-2023-5217 and caused by a heap buffer overflow weakness in the VP8 encoding of the open-source libvpx video codec library, which could allow arbitrary code execution following successful exploitation.

The libvpx bug was previously patched by Google in the Chrome web browser and by Microsoft in its Edge, Teams, and Skype products.

CVE-2023-5217 was discovered by security researcher Clément Lecigne who is part of Google’s Threat Analysis Group (TAG), a team of security experts known for often finding zero-days abused in government-backed targeted spyware attacks targeting high-risk individuals.
17 zero-days exploited in attacks fixed this year

CVE-2023-42824 is the 17th zero-day vulnerability exploited in attacks that Apple has fixed since the start of the year.

Apple also recently patched three other zero-day bugs (CVE-2023-41991, CVE-2023-41992, and CVE-2023-41993) reported by Citizen Lab and Google TAG researchers and exploited in spyware attacks to install Cytrox’s Predator spyware.

Citizen Lab disclosed two other zero-days (CVE-2023-41061 and CVE-2023-41064)—fixed by Apple last month—abused as part of a zero-click exploit chain (dubbed BLASTPASS) to infect fully patched iPhones with NSO Group’s Pegasus spyware.

Since January 2023, Apple has addressed a total of 17 zero-days exploited to target iPhones and Macs, including:

two zero-days (CVE-2023-37450 and CVE-2023-38606) in July
three zero-days (CVE-2023-32434, CVE-2023-32435, and CVE-2023-32439) in June
three more zero-days (CVE-2023-32409, CVE-2023-28204, and CVE-2023-32373) in May
two zero-days (CVE-2023-28206 and CVE-2023-28205) in April
and another WebKit zero-day (CVE-2023-23529) in February

Today’s iOS 17.0.3 release also addresses a known issue causing iPhones running iOS 17.0.2 and lower to overheat.

“This update provides important bug fixes, security updates, and addresses an issue that may cause iPhone to run warmer than expected,” Apple said.

Roy Miehe | MspPortal Partners Inc. | Ceo/President
Security Software Distributor: Bitdefender , Barracuda, Axcient
“Where Service and Technical Skills Count”

New Site Status Page (https://cloudstatus.mspportalpartners.net)

I do support UAW folks need fair wages read below

Without employee’s these would go broke. Companies have forgotten fair compensation rules

Amazon Prime Video to include ads in 2024 — unless users pay $2.99 a month to get rid of them
Are you serious they already get paid from advertisers, now they want us to pay them also..personally if it went to the employees and drivers I would have no problem paying the fee

Costco exec says membership fee increase question of ‘when, not if’
I know what I pay annually and the membership is not cheap..again I have no issue in paying more if it was given to the employees equally
Working at Costco isn’t typically considered a sustainable career, but the company has better wages and benefits than some of its competitors. According to ZipRecruiter, the average hourly pay for a Costco employee in the U.S. is $20.52 per hour, or $42,688 per year, which is about the same as a teacher’s.

What is the point of a CC lock if the bank does not include card lock won’t affect autopsy transactions; Way to many industries make it nearly impossible to shut down auto pays example from the 90’s was Symantec and McAfee
.
We are all customers of the banks they make 2-3% on every transaction. contact your bank and ask to have the auto lock apply to all transactions. This is a big bone of contention with me

Which Issuers Offer a Credit Card Lock?
Most major credit card issuers offer credit card locks or freezes. They include:

American Express. American Express allows for a seven-day card freeze.

Capital One. You can instantly lock your credit card on Capital One’s app. The card can still accept returns, credits and dispute adjustments during the lock, and some payments are exempted.

Chase. The company allows customers to block new purchases, cash advances and balance transfers made with the physical card or card number. Digital wallet purchases are still allowed, and the card lock won’t affect autopay transactions, credits or fees. If someone tries to make a purchase on a blocked card, Chase will notify the cardholder by email. BIG UNDERWRITER OF CREDIT CARDS, SOUTHWEST, AMAZON. big offender

Citi. The lock/unlock feature on the Citi Mobile App allows cardholders to block new, nonrecurring charges.

Roy Miehe | MspPortal Partners Inc. | Ceo/President
Security Software Distributor: Bitdefender , Barracuda, Axcient
“Where Service and Technical Skills Count”

New ZeroFont phishing tricks Outlook into showing fake AV-scans

By Bill Toulas September 26, 2023 05:32 PM

OUTLOOK

Hackers are utilizing a new trick of using zero-point fonts in emails to make malicious emails appear as safely scanned by security tools in Microsoft Outlook.

Although the ZeroFont phishing technique has been used in the past, this is the first time it has been documented as used in this way.

In a new report by ISC Sans analyst Jan Kopriva, the researcher warns that this trick could make a massive difference in the effectiveness of phishing operations, and users should be aware of its existence and use in the wild.

ZeroFont attacks
The ZeroFont attack method, first documented by Avanan in 2018, is a phishing technique that exploits flaws in how AI and natural language processing (NLP) systems in email security platforms analyze text.

It involves inserting hidden words or characters in emails by setting the font size to zero, rendering the text invisible to human targets, yet keeping it readable by NLP algorithms.

This attack aims to evade security filters by inserting invisible benign terms that mix with suspicious visible content, skewing AI’s interpretation of the content and the result of security checks.

In its 2018 report, Avanan warned that ZeroFont bypassed Microsoft’s Office 365 Advanced Threat Protection (ATP) even when the emails contained known malicious keywords.

Hiding bogus antivirus scans
In a new phishing email seen by Kopriva, a threat actor uses the ZeroFont attack to manipulate message previews on widely used email clients such as Microsoft Outlook.

Specifically, the email in question displayed a different message in Outlook’s email list than in the preview pane.

As you can see below, the email listing pane reads “Scanned and secured by Isc®Advanced Threat protection (APT): 9/22/2023T6:42 AM,” whereas the beginning of the email in the preview/reading pane displays “Job Offer | Employment Opportunity.”
This discrepancy is achieved by leveraging ZeroFont to hide the bogus security scan message at the start of the phishing email, so while it’s not visible to the recipient, Outlook still grabs it and displays it as a preview on the email listing pane.

The goal is to instill a false sense of legitimacy and security in the recipient.

By presenting a deceptive security scan message, the likelihood of the target opening the message and engaging with its content rises.

It is possible that Outlook isn’t the only email client that grabs the first portion of an email to preview a message without checking if its font size is valid, so vigilance is advised for users of other software, too.

Article (https://www.bleepingcomputer.com/news/security/new-zerofont-phishing-tricks-outlook-into-showing-fake-av-scans/)

Roy Miehe | MspPortal Partners Inc. | Ceo/President
Security Software Distributor: Bitdefender , Barracuda, Axcient
“Where Service and Technical Skills Count”

Apple emergency updates fix 3 new zero-days exploited in attacks

By Sergiu Gatlan September 21, 2023 01:57 PM
Apple released emergency security updates to patch three new zero-day vulnerabilities exploited in attacks targeting iPhone and Mac users, for a total of 16 zero-days fixed this year.

Two bugs were found in the WebKit browser engine (CVE-2023-41993) and the Security framework (CVE-2023-41991), enabling attackers to bypass signature validation using malicious apps or gain arbitrary code execution via maliciously crafted webpages.

The third one was found in the Kernel Framework, which provides APIs and support for kernel extensions and kernel-resident device drivers. Local attackers can exploit this flaw (CVE-2023-41992) to escalate privileges.

Apple fixed the three zero-day bugs in macOS 12.7/13.6, iOS 16.7/17.0.1, iPadOS 16.7/17.0.1, and watchOS 9.6.3/10.0.1 by addressing a certificate validation issue and through improved checks.

“Apple is aware of a report that this issue may have been actively exploited against versions of iOS before iOS 16.7,” the company revealed in security advisories describing the security flaws.

The list of impacted devices encompasses older and newer device models, and it includes:

iPhone 8 and later
iPad mini 5th generation and later
Macs running macOS Monterey and newer
Apple Watch Series 4 and later
All three zero-days were found and reported by Bill Marczak of the Citizen Lab at The University of Toronto’s Munk School and Maddie Stone of Google’s Threat Analysis Group.

While Apple has yet to provide additional details regarding the flaws’ exploitation in the wild, Citizen Lab and Google Threat Analysis Group security researchers have often disclosed zero-day bugs abused in targeted spyware attacks targeting high-risk individuals, including journalists, opposition politicians, and dissidents.

Article (https://www.bleepingcomputer.com/news/apple/apple-emergency-updates-fix-3-new-zero-days-exploited-in-attacks/)

Roy Miehe | MspPortal Partners Inc. | Ceo/President
Security Software Distributor: Bitdefender , Barracuda, Axcient
“Where Service and Technical Skills Count”

DO YOU REALLY WANT TO BUY THE NEW I15 PHONE THAT IS WAY OVERPRICED? Folks it is only a phone be real save the money

New T-Mobile hack allegedly exposes 90GB of data

Updated on: 22 September 2023 by Vilius Petkauskas Deputy Editor
Article
(https://cybernews.com/news/tmobile-data-breach-new-hack/)

T-Mobile, the global telecoms giant, could be facing a third data breach in less than 12 months. Cybercriminals say they’ve exposed employee credentials, customer info, and other sensitive data.
T-Mobile, the Deutsche Telekom-owned brand with operating subsidiaries in the US, Poland, and other countries, could be heading for a rocky end to the year, with a third major data breach on its hands.
Threat actors posted a database on a cybercriminal forum, which they claim contains information stolen in April 2023. The post says the stolen data includes employee credentials, partial Social Security numbers (SSNs), email addresses, customer data, T-Mobile’s sales and analytics data, and other information.

The post advertising the leak is called “T-Mobile, Connectivity Source”. Connectivity Source is one of T-Mobile’s authorized retailers serving customers T-Mobile branded stores.

According to the Cybernews research team, the sample data that attackers posted appears legitimate. So far, there’s no confirmed information about what data the leaked dataset contains. However, the team said that attackers posted a massive amount of data, 90 GB in total.

Cybernews has reached out to T-Mobile for confirmation, however, we did not receive a reply before publishing this article.

According to malware researchers vx-underground, who claim to have insider knowledge about the breach, the data was stolen shortly after T-Mobile‘s second hack of this year, which occurred in March, 2023.

Also in March, the company disclosed a cyberattack in which attackers may have accessed T-Mobile account PINs, SSNs, full names, and other data. In January 2023, T-Mobile USA suffered a breach involving the accounts of 37 million of its cell phone users.

The company has suffered numerous data breaches in the past as well. In August 2021, T-Mobile reported a data breach after an online forum said that the personal data of more than 100 million of the company’s users was leaked.

Bleeping Computers Comments:
By Sergiu Gatlan
September 20, 2023 05:11 PM 2

T-Mobile app glitch let users see other people’s account info

T-Mobile says a cyberattack did not cause this incident, and its systems were not breached.

Also, despite the significant wave of customers reporting that they’ve been affected by this issue, T-Mobile says the incident had limited impact, only affecting less than 100 individuals.

“There was no cyberattack or breach at T-Mobile,” a spokesperson told BleepingComputer when asked for more details.

“This was a temporary system glitch related to a planned overnight technology update involving limited account information for fewer than 100 customers, which was quickly resolved.”
Nine data breaches since 2018
In May, T-Mobile disclosed the second data breach since the start of 2023 after hundreds of customers had their personal information exposed between late February and March after attackers hacked into the carrier’s systems.

In January, the mobile carrier revealed another data breach after the sensitive info of 37 million customers was stolen using one of its Application Programming Interfaces (APIs).

Since 2018, T-Mobile has been hit by seven other data breaches:

In August 2018, attackers accessed the data of around 3% of all T-Mobile customers.
In 2019, T-Mobile exposed the account info of an undisclosed number of prepaid customers.
In March 2020, T-Mobile employees were affected by a breach exposing their personal and financial information.
In December 2020, threat actors accessed customer proprietary network info (phone numbers, call records).
In February 2021, an internal T-Mobile app was accessed by unknown attackers without authorization.
In August 2021, hackers brute-forced their way through T-Mobile’s network following a breach of one of its testing environments.
In April 2022, the notorious Lapsus$ extortion gang breached T-Mobile’s network using stolen credentials.

Article (https://www.bleepingcomputer.com/news/security/t-mobile-app-glitch-let-users-see-other-peoples-account-info/)

Roy Miehe | MspPortal Partners Inc. | Ceo/President
Security Software Distributor: Bitdefender , Barracuda, Axcient
“Where Service and Technical Skills Count”

LockBit Is Using RMMs to Spread Its Ransomware

The LockBit group is using native IT management software to live off the land, planting and then spreading itself before deploying its ransomware

Nate Nelson Contributing Writer, Dark Reading

The LockBit ransomware group is taking advantage of remote monitoring and management (RMM) software to spread its foothold in targeted networks.

Three recent attacks described in a report published Sept. 18 by Canada-based eSentire follow a similar trajectory: a LockBit affiliate either took advantage of exposed RMM instances, or brought their own RMM to the party, living off the land (LotL) in order to cement its footing in victim networks. Two of these cases affected manufacturers, and one struck a managed service provider (MSP), enabling the group to further compromise some of its downstream customers.

“There’s a general trend towards living off the land, where they’re just avoiding malware. Period. Even for initial access,” explains Keegan Keplinger, senior threat intelligence researcher with eSentire’s Threat Response Unit. “They want to get valid credentials, and use those legitimate credentials to get in.”

How LockBit Uses RMMs
In June, the Cybersecurity & Infrastructure Security Agency (CISA) published a cybersecurity advisory about LockBit, and for good reason. Arguably no cybercriminal outfit — in the ransomware-as-a-service game or otherwise — has been as prolific in 2023, with attacks seemingly targeting just about every possible sector, and every type of device, often yielding big money payouts.

The advisory details the group’s favored tactics, techniques, and procedures (TTPs), including its penchant for taking advantage of RMMs.

In a February 2022 attack against a home decor manufacturer, for example, eSentire’s threat researchers discovered a LockBit affiliate with admin access in an unprotected machine, attempting to establish persistence and spread to other computers via the RMM AnyDesk.

“Especially in the last year, threat actors have been pivoting to not using malware,” Keplinger explains, referring to how hackers establish persistence, and spread between and inside of networks. “Malware is often detected by antivirus, and if not, advanced endpoint technology. So anytime you can use either software that’s already in the environment, or software that could be conceivably legitimate, some people may not even recognize that as malicious right away.”

LockBit was counting on this in a June attack against a storage materials manufacturer, which counted itself a customer of the RMM ConnectWise. In this case, the researchers speculated that the threat actor was not able to steal credentials necessary to log into the company’s ConnectWise environment. So, instead, it installed its own, second instance of ConnectWise in the network.

“It’s pretty brilliant, because they said: ‘We already know ConnectWise is in this particular target organization. So, we’ll bring our own and nobody will really notice there’s another instance.'”

The Extent of the LockBit Threat
Organizations that enjoy the benefits of RMMs, without applying proper security controls to prevent their abuse, may expose not only themselves but also partners and customers, as LockBit’s MSP breach this February demonstrates.

The MSP in question had left its ConnectWise login panel exposed to the open Internet. The justification, the researchers speculated, was to make it easier for its customers’ IT administrators to access the service. But with brute force, or simply by purchasing them from the Dark Web, the attackers gained the necessary credentials to break through. Within five minutes of the intrusion, LockBit began dropping its ransomware binaries on multiple endpoints.

“They pretty much can go in unfettered when they get into those tools, and they get admin credentials,” Keplinger laments. Indeed, before it was stopped, the group had used the RMM’s remote access capabilities to reach customers in manufacturing, business services, hospitality, and transportation.

Companies can harden themselves against this kind of abuse by applying multi-factor authentication and strict access controls to these powerful tools. And, Keplinger adds, “endpoint monitoring is probably the biggest differentiator that’s stopping and preventing these attacks.”

“They’re very successful,” he warns of LockBit, for those not yet convinced. “Very pervasive, and very destructive.”

Article (https://www.darkreading.com/threat-intelligence/lockbit-using-rmms-spread-ransomware?_mc=NL_DR_EDT_DR_weekly_20230921&cid=NL_DR_EDT_DR_weekly_20230921&sp_aid=118309&elq_cid=34964379&sp_eh=949bacdba1e2c4851acc11df0ff47140b1c6468716621bc723fe5fe498198bd9&sp_eh=949bacdba1e2c4851acc11df0ff47140b1c6468716621bc723fe5fe498198bd9&utm_source=eloqua&utm_medium=email&utm_campaign=DR_NL_Dark%20Reading%20Weekly_09.21.23&sp_cid=49896&utm_content=DR_NL_Dark%20Reading%20Weekly_09.21.23)

Roy Miehe | MspPortal Partners Inc. | Ceo/President

Security Software Distributor: Bitdefender , Barracuda, Axcient

“Where Service and Technical Skills Count”

Microsoft leaks 38TB of private data via unsecured Azure storage

By Sergiu Gatlan September 18, 2023 11:18 AM
The Microsoft AI research division accidentally leaked dozens of terabytes of sensitive data starting in July 2020 while contributing open-source AI learning models to a public GitHub repository.

Almost three years later, this was discovered by cloud security firm Wiz whose security researchers found that a Microsoft employee inadvertently shared the URL for a misconfigured Azure Blob storage bucket containing the leaked information.

Microsoft linked the data exposure to using an excessively permissive Shared Access Signature (SAS) token, which allowed full control over the shared files. This Azure feature enables data sharing in a manner described by Wiz researchers as challenging to monitor and revoke.

When used correctly, Shared Access Signature (SAS) tokens offer a secure means of granting delegated access to resources within your storage account.

This includes precise control over the client’s data access, specifying the resources they can interact with, defining their permissions concerning these resources, and determining the duration of the SAS token’s validity.

“Due to a lack of monitoring and governance, SAS tokens pose a security risk, and their usage should be as limited as possible. These tokens are very hard to track, as Microsoft does not provide a centralized way to manage them within the Azure portal,” Wiz warned today.

“In addition, these tokens can be configured to last effectively forever, with no upper limit on their expiry time. Therefore, using Account SAS tokens for external sharing is unsafe and should be avoided.”

38TB of private data exposed via Azure storage bucket

The Wiz Research Team found that besides the open-source models, the internal storage account also inadvertently allowed access to 38TB worth of additional private data.

The exposed data included backups of personal information belonging to Microsoft employees, including passwords for Microsoft services, secret keys, and an archive of over 30,000 internal Microsoft Teams messages originating from 359 Microsoft employees.

In an advisory on Monday by the Microsoft Security Response Center (MSRC) team, Microsoft said that no customer data was exposed, and no other internal services faced jeopardy due to this incident.

Wiz reported the incident to MSRC on June 22nd, 2023, which revoked the SAS token to block all external access to the Azure storage account, mitigating the issue on June 24th, 2023.

“AI unlocks huge potential for tech companies. However, as data scientists and engineers race to bring new AI solutions to production, the massive amounts of data they handle require additional security checks and safeguards,” Wiz CTO & Cofounder Ami Luttwak told BleepingComputer.

“This emerging technology requires large sets of data to train on. With many development teams needing to manipulate massive amounts of data, share it with their peers or collaborate on public open-source projects, cases like Microsoft’s are increasingly hard to monitor and avoid.”

BleepingComputer also reported one year ago that, in September 2022, threat intelligence firm SOCRadar spotted another misconfigured Azure Blob Storage bucket belonging to Microsoft, containing sensitive data stored in files dated from 2017 to August 2022 and linked to over 65,000 entities from 111 countries.

SOCRadar also created a data leak search portal named BlueBleed that enables companies to find out if their sensitive data was exposed online.

Microsoft later added that it believed SOCRadar “greatly exaggerated the scope of this issue” and “the numbers.”

ARTICLE (https://www.bleepingcomputer.com/news/microsoft/microsoft-leaks-38tb-of-private-data-via-unsecured-azure-storage/)

Roy Miehe | MspPortal Partners Inc. | Ceo/President

Security Software Distributor: Bitdefender , Barracuda, Axcient

“Where Service and Technical Skills Count”

Facebook Messenger phishing attack pumps out 100K+ weekly messages

Updated on: 12 September 2023
Vilius Petkauskas Deputy Editor

Millions of Facebook business accounts worldwide are being targeted with phishing messages, with a success rate of close to one in 70 victims infected, researchers say.

Attackers have been abusing Facebook’s Messenger platform to peddle millions of targeted phishing messages. According to cybersecurity firm Guardio, cybercrooks target highly rated marketplace sellers and, sometimes, large corporations with fake business inquiries.

For example, the fake message will start with a simple “hello” from a fake account. From the victim’s perspective, that’s just another potential customer.

The attackers’ message proceeds to inquire whether a product is still available. The only way to know which ‘product’ the fake client is talking about is to download a file.

This way, criminals try coaxing victims into downloading an RAR or ZIP archive containing a downloader for a Python-based infostealer. Attackers bypass automated scanners by encoding the content.

Legitimate business accounts are a lucrative target for threat actors. Stolen credentials can be quickly sold on forums for criminals who use them to peddle fake ads, malware, and scams.

Guardio researchers claim that while the attack method here is far from novel, the scale of the campaign is worrying. In only 30 days, attackers managed to target a staggering 7% of all Facebook business accounts, with one out of 250 victims downloading the malicious file.

The overall success rate for the campaign appears even higher, with Guardio claiming one in 70 targets have been infected in what it described as a staggering “success rate” for the criminal undertaking.

The precise reason for the discrepancy between these two sets of figures was not made clear by researchers.

“The threat actors hold an army of bots and fake Facebook accounts as well as a listing of millions of business accounts, pages, and managers – sending over 100k phishing messages a week to Facebook users around the world,” researchers claim.

By following the breadcrumbs left by the perpetrators, Guardio’s team deduced that the threat actors likely come from Vietnam: some of the commands are in Vietnamese and there are signs of the Coc Coc browser, popular in the South-east Asian nation.

Telegram/Discord API tokens left by attacker bots led researchers to a Telegram account named “MrTonyName,” which they believe to be one of those behind the attack.

To all techs suggestion keep Facebook off all lan networks, if marketing need it keep them in the DMZ zone

Roy Miehe | MspPortal Partners Inc. | Ceo/President
Security Software Distributor: Bitdefender , Barracuda, Axcient
“Where Service and Technical Skills Count”

GravityZone Control Center Update for September (Read Important Changes)

September 2023 (Version 6.43.0-1)
Early Access
YARA detection rules

YARA rules are queries you can use to scan endpoints for patterns of malicious behavior. Use the YARA detection rules feature to generate custom alerts and security incidents based on the results of these scans.

This feature is available for Windows and Linux endpoints with the following BEST versions:

Windows: 7.9.5.318 or newer

Linux: 7.0.3.2248 or newer

To create YARA rules, go to Incidents > Custom detection rules, click the Add rule button, and then click YARA. Follow the on-screen instructions.

After you create a YARA detection rule, you cannot convert it into another type of detection rule.

From the Custom detection rules grid, you can enable or disable YARA detection rules, or start on-demand scans by clicking the 151926_1.png vertical ellipsis button and then selecting the Scan option.

Clicking a YARA detection rule from the Custom detection rules grid brings up the YARA details panel. From this panel, you can switch to the Search and Incidents sections to view the alerts and incidents generated by the rule.
Unified Incidents

The Parameter filter is now available in the Incidents section. It contains a series of criteria you can use to further filter your grid results and create highly customized smart views.
Improvements
EDR

The Incidents > Custom Rules section has been divided into two sections: Custom detection rules and Custom exclusion rules.

The grids and rule configuration pages have a new design.
Rule settings now include targets. You can now decide whether to apply the rule to the entire company or to specific groups by endpoint tags.

Clicking a grid entry brings up the details panel of the rule. It contains information about the rule, options for navigating rules and for editing the current rule. For custom detection rules, you can use the View alerts and View incidents buttons to switch to the Search and Incidents sections.

In the Incidents > Search section, you can now look up both custom detection rules and custom exclusion rules by using the other.rule_id field in your search query. You can still use the other.exclusion_id field to identify existing alerts for the next 90 days, after which the field will be deprecated.

The Custom detection rules and the Custom exclusion rules sections are now available to Partners even if they do not have an active EDR license on their account.

Partners can now control rules for their managed companies and can use the Company filter in the grid to view the rules created for each company. Customers can also view the rules Partners have applied on their company.

When switching to a new Partner, all custom rules created by the former Partner are disabled. The new Partner will not be able to view the rules applied by the former Partner.

GravityZone platform

Companies switching from a trial license to a monthly subscription will automatically have the Email redaction setting disabled.

New BEST for Linux installation packages are now available for systems with ARM architecture (AArch64).

Minor UI changes to the Add company and Edit company windows, including a different order for the Add-ons displayed in the Licensing tab.

Roy Miehe | MspPortal Partners Inc. | Ceo/President

Security Software Distributor: Bitdefender , Barracuda, Axcient

“Where Service and Technical Skills Count”