Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.


February, 2013


Remote Code Execution Vulnerability in Java

Disclosed February 28, 2013    Fully Patched
Vendors: Oracle
Vulnerability Severity: High
Exploit Impact: Remote Code Execution
Exploit Availability:

Instagram at RSA and Win!

Posted February 26, 2013    Sarah Lieber

The RSA Expo Hall is opening up in just a few hours and it’s going to be packed full of security practitioners, vendors, security solutions and giveaways! With so much going on, we want YOU, our readers who are attending RSA to share your best photos at the show. Please Tweet and Instagram photos you’ve taken during…

, , , ,

February VEF Participant Wins a Kindle Fire

Posted February 25, 2013    Qui Cao

As you all know, every month we host our Vulnerability Expert Forum (VEF) webinar. This is a time where our experts share valuable insight regarding new vulnerabilities that are discovered and the actions that need to be taken as a result. It’s a quick way to get up to speed on current potential risks to your organization…

The words Cyber Attack revealed in computer machine code through a magnifying glass

Mandiant APT1 report, some unanswered questions.

Posted February 21, 2013    Marc Maiffret

For the last several years there has been an increasing number of accusations being made against China and its military as being behind the systematic targeting of organizations throughout the world in a sophisticated hacking campaign to steal data and access to further China’s economic, military and social agendas. These accusations come from a mass…

, , , ,

PowerBroker for Windows Rule Creation with Retina CS

Posted February 20, 2013    Morey Haber

For any enterprise solution, manually creating rules can be a daunting task and repetitive exercise. This problem is even more complex when working with solutions that potentially touch every application within your environment. Consider the complexity of identifying every application that requires escalated privileges for a least privilege project. How can you identity every user application…

, , , ,
Patch Tuesday MS15-078

February 2013 Patch Tuesday: Hide Your Servers, Hide Your Clients

Posted February 12, 2013    BeyondTrust Research Team

It’s that time again, folks. This month’s Patch Tuesday brings us an assortment of client side vulnerabilities, from vulnerabilities affecting Internet Explorer to Exchange to TCP/IP, and much more. A total of 57 vulnerabilities are addressed across a spread of 12 bulletins, five of which are rated critical. There are quite a few client side…


Unspecified Remote Code Execution Vulnerability in Adobe Reader

Disclosed February 12, 2013    Fully Patched
Vendors: Adobe
Vulnerability Severity: High
Exploit Impact: Remote Code Execution
Exploit Availability:

D-Link DSL-2740B login.cgi Bypass Vulnerability

Disclosed February 10, 2013    Fully Patched
Vendors: D-Link
Vulnerability Severity: Low
Exploit Impact: Security Bypass
Exploit Availability: Publicly Available

BeyondTrust Retina CS Earns Perfect 5 Star Rating by SC Magazine

Posted February 4, 2013    Sarah Lieber

We are happy to announce that for the 5th year in a row, SC Magazine has given a glowing review of Retina CS Threat Management Console with 5 stars across all its judging categories. SC Magazine tests all products in the most logical way: they vulnerability or pen tested them directly. Their “…results were excellent and…

, , , , , , ,