{"id":6905,"date":"2022-05-20T09:28:56","date_gmt":"2022-05-20T08:28:56","guid":{"rendered":"https:\/\/pstqb.pt\/?p=6905"},"modified":"2022-09-05T14:20:04","modified_gmt":"2022-09-05T13:20:04","slug":"responsaveis-de-cyberseguranca-ordenam-correcao-de-bugs-explorados-por-hackers","status":"publish","type":"post","link":"https:\/\/pstqb.pt\/en\/responsaveis-de-cyberseguranca-ordenam-correcao-de-bugs-explorados-por-hackers\/","title":{"rendered":"Cybersecurity Chiefs Order Bugs Exploited by Hackers Fixed"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"6905\" class=\"elementor elementor-6905\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6e368fa elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"6e368fa\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8b4cf3a\" data-id=\"8b4cf3a\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b122b8c elementor-widget elementor-widget-text-editor\" data-id=\"b122b8c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div><p>The cybersecurity authorities of the United States of America ordered last week that all federal agencies correct flaws in <em>software<\/em> exploited by <em>hackers<\/em>. They are believed to be linked to foreign governments.<\/p><\/div><div><p>\"These vulnerabilities pose an unacceptable risk to federal network security,\" said Jen Easterly, director of the U.S. Cybersecurity and Infrastructure Security Agency (CISA), in a statement. CISA's \"emergency directive\" gives agencies five days to update the <em>software<\/em> This does not apply to Pentagon computer networks, which are not under CISA jurisdiction. This does not apply to Pentagon computer networks, which are not under CISA's jurisdiction.<br \/><br \/>The vulnerabilities in question lie in a type of <em>software<\/em> made by VMware, whose products are widely used in the US government. On April 6, the California-based technology giant issued a fix for the flaws in <em>software<\/em> that would allow <em>hackers<\/em> not only remotely access files, but also install themselves on the network itself. Two days after the patch was released, the <em>hackers<\/em> discovered an alternative way to hack into computers using the vulnerabilities, according to CISA. This event forced VMWare to release updates of <em>software<\/em> to address these newly discovered vulnerabilities, which CISA ordered the agencies to address.<br \/>The agency did not identify the <em>hackers<\/em> or which systems they have served as.<\/p><p><span style=\"font-size: 16px;\">As a rule, CISA officials use their emergency authority to compel agencies to address serious shortcomings in their systems. <em>software<\/em> when spies or criminals can attack your security. In the last 3 years, this agency has already made use of its resources <\/span><span style=\"font-size: 16px;\">10 times, including in response to the call <a href=\"https:\/\/edition.cnn.com\/2021\/10\/06\/politics\/russian-solarwinds-hackers-active\/index.html\">\"campaign of <em>hackers<\/em>\" SolarWinds<\/a>which is believed to have been carried out by Russian agents. This <\/span><span style=\"font-size: 16px;\">ended up going unnoticed by US authorities for a long time, resulting in a security breach of at least nine federal agencies, including those dealing with national security, such as the departments of Homeland Security and Justice.<br \/><br \/><\/span><\/p><\/div><div style=\"font-size: 15px; font-style: normal; font-weight: 500;\"><span style=\"font-size: 15px;\">The original article\u00a0<\/span><span style=\"font-size: 15px;\">via <em>CNN International<\/em><i>\u00a0<\/i><\/span><span style=\"font-size: 15px;\">can be read at:<br \/><\/span><a href=\"https:\/\/edition.cnn.com\/2022\/05\/18\/politics\/software-bug-warning-vmware\/index.html\">https:\/\/edition.cnn.com\/2022\/05\/18\/politics\/software-bug-warning-vmware\/index.html<\/a><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>US cybersecurity authorities last week ordered all federal agencies to fix software flaws exploited by hackers. These are believed to be linked to foreign governments. \"These vulnerabilities pose an unacceptable risk to the security of the federal network,\" said Jen Easterly, director of the US Cybersecurity and Infrastructure Security Agency (CISA), in a statement. CISA's \"emergency directive\" gives agencies five days to update the vulnerable software, or as a last resort, remove it entirely from their networks. It does not apply to Pentagon computer networks, which are not under CISA's jurisdiction. The vulnerabilities in question are found in a type of software made by VMware, whose products are widely used in the US government. On April 6, the California-based technology giant issued a fix for the software flaws that would allow hackers not only to access files remotely, but also to install themselves on the network itself. Two days after the patch was released, hackers discovered an alternative way of breaking into computers using the vulnerabilities, according to CISA. This event forced VMWare to release software updates to plug these newly discovered vulnerabilities, which CISA ordered the agencies to address. The agency has not identified the hackers or which systems they served as. As a rule, CISA officials use their emergency authority to force agencies to address serious software flaws when spies or criminals might attack their security. In the last three years, the agency has used its resources 10 times, including in response to the so-called SolarWinds hacking campaign, believed to have been carried out by Russian agents. This ultimately went unnoticed by US authorities for a long time, resulting in a security breach of at least nine federal agencies, including those dealing with national security, such as the departments of Homeland Security and Justice. The original article via CNN International can be read at: https:\/\/edition.cnn.com\/2022\/05\/18\/politics\/software-bug-warning-vmware\/index.html<\/p>","protected":false},"author":2,"featured_media":6921,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[31],"tags":[],"class_list":["post-6905","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-destaque"],"_links":{"self":[{"href":"https:\/\/pstqb.pt\/en\/wp-json\/wp\/v2\/posts\/6905","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pstqb.pt\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/pstqb.pt\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/pstqb.pt\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/pstqb.pt\/en\/wp-json\/wp\/v2\/comments?post=6905"}],"version-history":[{"count":0,"href":"https:\/\/pstqb.pt\/en\/wp-json\/wp\/v2\/posts\/6905\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pstqb.pt\/en\/wp-json\/wp\/v2\/media\/6921"}],"wp:attachment":[{"href":"https:\/\/pstqb.pt\/en\/wp-json\/wp\/v2\/media?parent=6905"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pstqb.pt\/en\/wp-json\/wp\/v2\/categories?post=6905"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/pstqb.pt\/en\/wp-json\/wp\/v2\/tags?post=6905"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}