BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Media RoundUp | Patch Tuesday June 2012

Posted June 14, 2012    Sarah Lieber

The June 2012 installment of Patch Tuesday was easily one of the most active of the year so far, in terms industry commentary and predictions, driven by the more than two-dozen security vulnerabilities across several of Microsoft’s products. As I’m sure many of you are still catching up on the news, for your convenience I’ve included some of the more insightful coverage from this month’s Patch Tuesday below.

I also encourage you to join us on a monthly basis for our Vulnerability Expert Forum (VEF) where we discuss in detail, that month’s Patch Tuesday and cover other relevant news and events surrounding the security landscape.

You can sign up for July’s VEF here.

PC Magazine | Patch Tuesday: Microsoft Updates IE, RDP, Certificate Tool
By: Fahmida Y. Rashid

“While any RDP vulnerability rated as “exploit code likely” by Microsoft should be taken very seriously, there is still more of a chance that the average IT environment will continue to be hit by drive-by client application style exploits,” said Marc Maiffret, CTO at BeyondTrust.

Read Entire Article

ComputerWorld | Microsoft scrambles as it patches 26 bugs, warns users of active attacks
By: Gregg Keizer

Another expert, Marc Maiffret, chief technology officer at BeyondTrust, chided Microsoft for the constant patching of the same bug.

“Here we are seven months after the original Duqu fix for TrueType font parsing and this same code reuse bug has reared its ugly head [again],” said Maiffret in an email.

Read Entire Article


ZDNet | Patch Tuesday: Microsoft raises alert for dangerous IE, Windows flaws

By: Ryan Naraine

According to Marc Maiffret, CTO at BeyondTrust, the Internet Explorer and RDP issues present the “more immediate

“Given the value of Remote Code Execution on RDP there will surely be a lot of folks trying to weaponize that vulnerability. Only time will tell if people are successful with this RDP flaw where they were not with the one in March,” Maiffret added.

Windows users and administrators will also want to treat the MS12-038 bulletin with the highest possible priority.

Read Entire Article


eWeek | Microsoft Patch Tuesday Release Fixes Flaws in Internet Explorer, Windows

By: Brian Prince

The MS12-037 bulletin, which contains 13 security fixes for Internet Explorer, is being regarded by Microsoft and some security researchers as one of the most important to deploy immediately. One of the vulnerabilities it fixes, CVE-2012-1875, is already being used in limited attacks in the wild. The bulletin also fixes CVE-2012-1876, which was used by VUPEN Security during the PWN2OWN contest held early this year at CanSecWest.

“This is probably one of the most severe bulletins because exploit code is likely to be created for one or more of these vulnerabilities, which leads to the potential for drive-by malware attacks across all versions of Internet Explorer,” said Marc Maiffret, CTO at BeyondTrust. “This, in our opinion, is one of the more important sets of patches to roll out as soon as possible.”

Read Entire Article

 

 

Tags:
, , , ,

Leave a Reply

Additional articles

webinar_chalk

Webinar March 4th: Recreating the Carbanak Breach & Techniques for Mitigating Similar Attacks

Posted March 3, 2015    Lindsay Marsh

Join BeyondTrust Research and Development team for an in-depth live webinar that will explore the attack vectors used in the Carbanak Bank Breach and share successful mitigation techniques needed to prevent this type of attack.

Tags:
, ,
VMware Hardening Guidelines-img3

How to Audit VMware ESX and ESXi Servers Against the VMware Hardening Guidelines with Retina CS

Posted February 27, 2015    BeyondTrust Research Team

Retina CS Enterprise Vulnerability Management has included advanced VMware auditing capabilities for some time, including virtual machine discovery and scanning through a cloud connection, plus the ability to scan ESX and ESXi hosts using SSH. However, in response to recent security concerns associated with SSH, VMware has disabled SSH by default in its more recent…

Tags:
, , , ,
dave-shackleford-headshot

Privileged Passwords: The Bane of Security Professionals Everywhere

Posted February 19, 2015    Dave Shackleford

Passwords have been with us since ancient times. Known as “watchwords”, ancient Roman military guards would pass a wooden tablet with a daily secret word engraved from one shift to the next, with each guard position marking the tablet to indicate it had been received. The military has been using passwords, counter-passwords, and even sound…

Tags:
, , ,