You think Apache Log4j Security Vulnerabilities is bad look at Mimikatz Malware

Mimikatz Malware

Attacks everything basically once there it will run additional tools to encrypt and do a search find for all machines to encrypt

The susceptible world is Windows of course.

Keep yourself up to date with Bitdefender (An update process has been completed successfully. (Product version: 7.4.1.111. Engines version: 7.90522 (10841006) This may sound like an add to promote Bitdefender but nobody needs Ransomeware.

Use there Gravity Zone basic with the Add-on of ATS/Sandboxing. Lock down in the policy also with no additional costs. This is a tech dashboard

I am having Bitdefender look at this and possibly develop a unencrypted key for the Ransomeware

Roy Miehe | MspPortal Partners Inc. | Ceo/President

Bitdefender / – Distributor

“Where Service and Technical Skills Count”

Disclosure MspPortal Partners only sells and works with MSP’s and Resellers.

Security Advisory: Bitdefender Response to Critical Zero-Day Apache Log4j2 Vulnerability 12-11-2021

As normal Bitdefender is on top of this:

Link for Article

On December 9, 2021, Apache disclosed CVE-2021-44228, a remote code execution vulnerability – assigned with a severity of 10 (the highest possible risk score) – affecting Apache Log4j2, a Java-based logging framework widely used in commercial and open-source software products. The vulnerability affects versions 2.0 through 2.14.1; version 2.15.0 is not vulnerable.  

Bitdefender is already seeing and monitoring several malicious actors running active exploitation campaigns. 

The CVE-2021-44228 vulnerability has been assigned the highest possible risk score (CVSS 10) due to its exploitation impact (ability to remotely execute code on targeted hosts). Likely, this vulnerability will linger in computing infrastructures for an extensive period of time due to the widespread use of the Log4j2 logging framework. It is important to note this vulnerability is easy to exploit and applications using the affected Log4j2 versions are subject to an extensive attack surface. Immediate action is advisable.

Double check you other Vendors and RMM systems or remote Control programs

Roy Miehe | MspPortal Partners Inc. | Ceo/President

Bitdefender /MSP  – Distributor

“Where Service and Technical Skills Count”

Bitdefender Endpoint Security for Mac 7.2.6.200021 and 7.4.8.200006 Release Notes – Fast Ring

Hello everyone,

Bitdefender has today released on fast ring the following versions of Endpoint Security for Mac:
• Version 7.2.6.200021 – enables migration to 7.4.8.200006.
• Version 7.4.8.200006 – brings new features, improvements and bug fixes. It requires 7.2.6.200021.
The release notes are available here (English only) (https://www.bitdefender.com/business/support/en/77209-78218-macos-agent.html).

Should you have any questions or suggestions regarding the GravityZone technical documentation, please contact us (gravityzone-docs@bitdefender.com).

Thank you,
Roy Miehe | MspPortal Partners Inc. | Ceo/President
Bitdefender /MSP – Distributor
“Where Service and Technical Skills Count”

Per Bitdefender “Managed services provider hosts the most in endpoint security”

MspPortal Partners simplifies and strengthens security in the cloud:

MspPortal Partners is a managed services provider (MSP) for internet service providers, resellers, value added
resellers and other MSPs. The company delivers comprehensive endpoint security, secure email, and networking in an OEM
arrangement with major manufacturers, hosted in a multitenant cloud environment.

An MSP takes on considerable responsibility by hosting critical business services for its
clients. That responsibility is multiplied when you’re the MSP for hundreds of other service
providers. Such a responsibility requires absolute confidence and trust in the solutions you
provide. Just ask MspPortal Partners.
This innovative MSP supports hundreds of MSPs, ISPs and resellers with everything they
need to offer their customers robust business solutions, such as endpoint security. MspPortal
Partners’ success is built on providing delivery and support services of the highest quality to
its clients.

Bitdefender Cloud Security for MSPs enables MspPortal Partners to deliver comprehensive
endpoint security services, including built-in firewall protection with intrusion detection,
content filtering and advanced antimalware and antivirus capabilities. The solution also gives
MspPortal Partners a multitenant dashboard for granular client specific policy management,
extensive reporting, and easy deployment of endpoint protection to multiple clients.

MspPortal Partners’ reputation for delivering reliable, economical, easy-to-manage endpoint
security has helped the company attract more than 76 new resellers in six months. And by
reselling Bitdefender Cloud Security for MSPs, these service provider customers also have
increased their revenue streams 33-40 percent. Not surprisingly, customer loyalty to MspPortal
Partners is also strong.

MspPortal Assisted a reseller to Deployed security to 52,000
endpoints in three days at 26 different school sites

Bitdefender-Business-CaseStudy-Msp-Portal-Partners

CyberSecurity & Infrastructure Security Agency Catalog

CyberSecurity & Infrastructure Security Agency
Known Exploited Vulnerabilities Catalog
Great place to start if you are curious if you need to do an update. Lot of Apple and Google and of course Microsoft updates.
Even Solarwinds now called N-able name change..go figure lastest 11-17-2021
Known Exploited Vulnerabilities Catalog
Site URL

Roy Miehe | MspPortal Partners Inc. | Ceo/President

Bitdefender /MSP Aggregator – Distributor

“Where Service and Technical Skills Count”

Update to Bitdefender email alerts 9-29-2021

Bitdefender still struggling with email alerts follow up on
Yesterday when I reported to you
I reported the case early this morning 9-28-2021 with no response yet (Case ID 00610932). Probably do to the fact that Intuit bought mail chimp (mail broadcast)..As of today 9-29-2021 there is still no resolution. Should probably switch to smtp2go I made that suggestion to them

Solution just to make sure you are protected run 3 reports and set them up daily till Bitdefender can fix the mail issue
Report 1 Malware Status Report
Report 2 HyperDetect Activity Report
Report 1 Executive Summary Report

Bitdefender struggling with email alerts

I reported the case early this morning with no response yet (Case ID 00610932). Probably do to the fact that Intuit bought mail chimp (mail broadcast)

Make sure you review the dashboard alert section important. Send an email for update to (goldsupport@bitdefender.com) if you have questions

Roy Miehe | MspPortal Partners Inc. | Ceo/President Bitdefender /Distributor “Where Service and Technical Skills Count”

New Phishing Attack on Microsoft O365

August 26, 2021
New Phishing Attack on Microsoft O365 Users Leverages Open Redirects to Avoid Detection
Widespread credential phishing campaign abuses open redirector links
Microsoft 365 Defender Threat Intelligence Team Link Article

MspPortal Partners along with Barracuda does have  a solution
Read what Essentials complete will provide for you Includes ESS, Message Archiver and O365 Backup
One Drive, Exchange, Sharepoint,Teams (PDF)

MspPortal Partners will be offering to all partners a Bitdefender Gravity Zone Policy review and update

MspPortal Partners

Will be offering to all partners a Bitdefender Gravity Zone Policy review and update

Free of charge

This will only be offered to MspPortal Partners for a limited time through the middle of October 2021 on Tuesdays and Thursdays from 8 am to 11:30 am MST/NO DST

If you are not one of the 425 partners you are more than welcome to change out your existing Distributor/Partner

Existing partners and new partners are welcome go to the website www.mspportalpartners.net and fill out the contact form

MspPortal Partners specializes in Bitdefender Gravity Zone Malware protection

Roy Miehe | MspPortal Partners Inc. | Ceo/President

Bitdefender / Distributor

“Where Service and Technical Skills Count”

Microsoft Windows Zero-Day Under Attack

Dark Reading Staff 9-8-2021

Microsoft has issued an advisory containing mitigations and workarounds for a remote code execution flaw in Windows it says is being exploited in targeted attacks.

CVE-2021-40444 exists in MSHTML, the proprietary browser engine built into Windows that allows the operating system to read and display HTML files. MSHTML, also known as Trident, was mainly used by Internet Explorer but is also used by Microsoft Office, Broadcom notes in its advisory on the vulnerability. It allows developers to add Web browsing into their applications.

Microsoft reports the targeted attacks it has observed use specially crafted Office documents. In explaining how an attack would work, it says an adversary could create a malicious ActiveX control to be used by an Office document that hosts the MSHTML browser-rendering engine. An attacker would have to convince a victim to open the file. Officials note victims with fewer user privileges on the system could be less affected than those with administrative user rights.

The company credits four external researchers with finding the vulnerability: Dhanesh Kizhakkinan, Genwei Jiang, and Bryce Abdo of Mandiant, and Haifei Li of EXPMON, in addition to Rick Cole with the Microsoft Security Threat Intelligence Center (MSTIC).

Read the full advisory for more details.