BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Filter:

April, 2013

215px-SOAP_poster

Hackers on a Plane

Posted April 11, 2013    BeyondTrust Research Team

If I were cast in a movie in which the plotline centered on a person on a plane maliciously controlling the entire 550MPH Pringles Can via smartphone, I’d demand the movie be called ‘Hackers on a Plane’, just so people knew what they were getting into when purchasing their matinee ticket. However, this seemingly far-fetched…

Tags:
, , ,
microsoft

MS13-036 (KB2823324) Windows Kernel-Mode NTFS Drivers

Disclosed April 11, 2013    Fully Patched
Vendors: Microsoft
Vulnerability Severity: High
Exploit Impact: Remote Code Execution
Exploit Availability:

April 2013 Patch Tuesday

Posted April 9, 2013    BeyondTrust Research Team

Patch Tuesday is here again, and April’s collection of patches will fix vulnerabilities across various pieces of Microsoft operating systems and software. This includes Internet Explorer, the Remote Desktop Client, SharePoint, the Windows kernel (and some kernel-mode drivers), Active Directory, the Windows Client/Server Run-time Subsystem (CSRSS), Microsoft Antimalware Client, and an HTML sanitization component in…

Tags:
, , ,
img-oracle-logo

BeyondTrust & Oracle, The Perfect Partnership

Posted April 8, 2013    BeyondTrust Product Management

No one will dispute that Oracle is a heavyweight when it comes to the relational database market, but Oracle is far more than a one trick pony.  Oracle has a plethora of enterprise products and hardware solutions that will fit the needs of almost any business.  However the key to success for many of the…

Tags:
, , , , , , , ,
jpeg blog pic

Die Hard – Windows XP Against the World

Posted April 8, 2013    Mike Puterbaugh

Today marks the beginning of a significant year-long event in the worldwide computer industry – a year from today, Microsoft will end support for the Windows XP Operating System. Mainstream support had already ended in 2009  and this new milestone marks the end of security updates on the platform. Are you ready? According to a…

Tags:
, , ,
Closing the Door on Hackers

Closing the Door on Hackers – from the New York Times

Posted April 5, 2013    Marc Maiffret

I recently had the pleasure of contributing an Op-Ed piece to The New York Times. In the article, I talk about some of the aspects of cyber-security that I think are far too-often left out of mainstream media discussions. Specifically, the shared burden that all of us in the technology industry should feel in helping…

Tags:
, , , ,
darkleech

A Brief Overview of Darkleech

Posted April 4, 2013    BeyondTrust Research Team

A piece of malware, Darkleech, has been making the news rounds as of late. This one targets web servers, specifically Apache 2.2.2 and above. Instead of merely compromising a web server and uploading malicious content to be served to unsuspecting victims, Darkleech goes a step further by installing a special module that is loaded by…

Tags:
, , , , ,
bestwebsharing

Groovy Media Player Buffer Overflow

Disclosed April 4, 2013    Zeroday : 546 days
Vendors: BestWebSharing
Vulnerability Severity: High
Exploit Impact: Remote Code Execution
Exploit Availability: Publicly Available
trojanhorse

Vendor-Disclosed Zero Days and Targeted Trojans

Posted April 3, 2013    BeyondTrust Research Team

Here at BeyondTrust, we are constantly keeping an eye on the underground parts of the internet, monitoring for things like zero day vulnerabilities and how malware authors are exploiting vulnerabilities in the wild. As such, we wanted to keep you apprised of a vulnerability that was addressed within VMware ESXi 5.0. A patch was released…

Tags:
, , , , , , ,