Original release date: January 14, 2020
Summary
New vulnerabilities are continually emerging, but the best defense against attackers exploiting patched vulnerabilities is simple: keep software up to date. Timely patching is one of the most efficient and cost-effective steps an organization can...
Original release date: January 10, 2020
Summary
Unpatched Pulse Secure VPN servers continue to be an attractive target for malicious actors. Affected organizations that have not applied the software patch to fix a remote code execution (RCE) vulnerability, known as CVE-2019-11510, can become...
Today Microsoft released a set of fixes for Remote Desktop Services that include two critical Remote Code Execution (RCE) vulnerabilities, CVE-2019-1181 and CVE-2019-1182. Like the previously-fixed ‘BlueKeep’ vulnerability (CVE-2019-0708), these two vulnerabilities are also ‘wormable’, meaning...
Hi all, in this post we will be exploring malicious PDF files and how the bad guys leverage them to infect computer systems.
I'm sure a lot of people are familiar with receiving a strange email often times seemingly from a known person containing an attachment. You open it and miraculously...
Original release date: June 17, 2019
Summary
The Cybersecurity and Infrastructure Security Agency (CISA) is issuing this Activity Alert to provide information on a vulnerability, known as “BlueKeep,” that exists in the following Microsoft Windows Operating Systems (OSs), including both 32- and...
bluekeep
cisa
cve-2019-0708
cybersecurity
end-of-life
exploitation
malware
microsoft
mitigation
network authentication
operating systems
patch management
patches
rdp
remote access
security
tcp port
user rights
vulnerability
windows
Original release date: April 16, 2018
Systems Affected
Generic Routing Encapsulation (GRE) Enabled Devices
Cisco Smart Install (SMI) Enabled Devices
Simple Network Management Protocol (SNMP) Enabled Network Devices
Overview
This joint Technical Alert (TA) is the result of analytic efforts...
Total Meltdown?
Is my system vulnerable?
Only Windows 7 x64 systems patched with the 2018-01 or 2018-02 patches are vulnerable. If your system isn't patched since December 2017 or if it's patched with the 2018-03 2018-03-29 patches or later it will be secure.
Reference and further...
New vulnerabilities have recently been discovered with modern cpu's:
It would seem Intel are more prone to attack than AMD:
Meltdown and Spectre
Microsoft have released patches which will be available via Windows update. If like me yours hasn't arrived then download the standalone...
amd
cloud
cpu
data theft
desktop
exploitation
hardware
intel
laptop
meltdown
patches
privacy
security
spectre
update
vulnerabilities
windows 10
windows 7
windows 8.1
Original release date: June 12, 2017 | Last revised: July 27, 2017
Systems Affected
Industrial Control Systems
Overview
The National Cybersecurity and Communications Integration Center (NCCIC) is aware of public reports from ESET and Dragos outlining a new, highly capable Industrial...
Original release date: May 12, 2017 | Last revised: May 19, 2017
Systems Affected
Microsoft Windows operating systems
Overview
According to numerous open-source reports, a widespread ransomware campaign is affecting various organizations with reports of tens of thousands of infections in...
Revision Note: V1.0 (June 13, 2017): Advisory published
Summary: Microsoft is announcing the availability of additional guidance for critical security updates, that are at heightened risk of exploitation due to past and threatened nation-state attacks and disclosures. Some of the releases are...
just wanting to run this past you guys … this post is straight from our good friends at bleepingcomputer.com … and the issue is in regards to the inherent vulnerabilities with current ssd-drives.
i don't have much to say, since i do not own an ssd-drive …...
approach
bleeping computer
cybersecurity
data corruption
exploitation
file advisory
hardware
information security
pdf
personal environment
privacy
research
security
ssd drives
storage devices
technical
technical aspects
user data
virus scan
vulnerabilities
Severity Rating: Important
Revision Note: V1.0 (March 14, 2017): Bulletin published.
Summary: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow an Information Disclosure if Windows DirectShow opens specially crafted media content that is hosted on...
4010318
attack
bulletin
directshow
exploitation
information disclosure
malicious website
march 2017
media content
microsoft
patch
revision note
security
security bulletin
severity rating
system compromise
update
version 1.0
vulnerability
windows
Severity Rating: Important
Revision Note: V1.0 (December 13, 2016): Bulletin published.
Summary: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow Information Disclosure when the Windows Common Log File System (CLFS) driver improperly handles...
Severity Rating: Critical
Revision Note: V1.0 (December 13, 2016): Bulletin published
Summary: This security update resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file...
arbitrary code
critical
cybersecurity
december 2016
exploitation
information security
malware prevention
microsoft office
ms16-148
patch
remote code execution
revision note
security update
software update
system admin
technical bulletin
user impact
user rights
vulnerability
Severity Rating: Important
Revision Note: V1.0 (October 11, 2016): Bulletin published.
Summary: This security update resolves a vulnerability in Microsoft Office. An Office RTF remote code execution vulnerability exists in Microsoft Office software when the Office software fails to properly...