Understanding printer vulnerabilities (CVE-2016-3238)

Understanding printer vulnerabilities (CVE-2016-3238)

Vectra discovers critical Microsoft Windows vulnerability that allows printer watering hole attacks to spread malware

The vulnerability stems from a Windows process that allows users to quickly search for, add, and use printers at home, in the office and over the Internet. Armed with system-level controls, the malware can then spread laterally from one machine across an entire network.

Related Resources

How Cognito is ideal for replacing IDS

IDS relies on signatures to stop known threats from getting into networks. But they are blind to unknown threats. Cyberattackers know this and can change a few bits of code in known malware to create an unknown threat.

Download the French Version

How to detect malicious covert communications

Covert communications are key enablers of cyberattacks, enabling cybercriminals to remotely manage and control targeted attacks while staying hidden. Attackers use covert communications for its ability to evade signatures and reputation lists.

Check out the cool infographic