BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Filter:
pbps-full-list-pbps-manages-incl-systems-and-accounts

Top 10 Reasons You Need Privileged Account Management Now

Posted July 29, 2013    Paul Harper

Don’t under estimate the complexity organizations face with managing and sharing access to privileged accounts. BeyondTrust has a wide variety of solutions that address the various challenges of privileged accounts.  Here are 10 key reasons our customers need and value the PowerBroker Password Safe solution: 1. EVERYONE has trouble managing privileged passwords – While some…

Categories:
Privileged Account Management
Tags:
, , , , , ,
microsoft

Internet Explorer 9/10 Recycler::ProcessMark Information Disclosure

Disclosed July 29, 2013    Zeroday : 507 days
Vendors: Microsoft
Vulnerability Severity: Medium
Exploit Impact: Information Disclosure
Exploit Availability: Publicly Available
Categories:
Zeroday Tracker
asus

ASUS RT-AC66U Router Buffer Overflow

Disclosed July 26, 2013    Zeroday : 510 days
Vendors: ASUS
Vulnerability Severity: High
Exploit Impact: Remote Code Execution
Exploit Availability: Publicly Available
Categories:
Zeroday Tracker
videolan

VLC Media Player libmodplug Buffer Overflow

Disclosed July 24, 2013    Fully Patched
Vendors: VideoLAN
Vulnerability Severity: High
Exploit Impact: Remote Code Execution
Exploit Availability:
Categories:
Zeroday Tracker
certified-partner

New OPSWAT Certifications for BeyondTrust!

Posted July 23, 2013    Mike Yaffe

I know most of you out there think marketing is blinky pens, trade shows, and people who for the most part don’t know the first thing about the products they represent. I’d like to put those stereotypes to bed right now, as here at BeyondTrust we have NEVER had blinky pens…..we have flashing balls ;-)….

Categories:
Vulnerability Management
Tags:
, , , ,
foscam

FOSCAM IP-Cameras Improper Access Restrictions

Disclosed July 23, 2013    Zeroday : 513 days
Vendors: FOSCAM
Vulnerability Severity: Medium
Exploit Impact: Elevation of Privilege
Exploit Availability: Publicly Available
Categories:
Zeroday Tracker
cisco

Cisco IOS GET VPN Encryption Policy Bypass

Disclosed July 19, 2013    Zeroday : 517 days
Vendors: Cisco
Vulnerability Severity: Medium
Exploit Impact: Security Bypass
Exploit Availability: No Exploit Available
Categories:
Zeroday Tracker
oracle

Java Reflection API Remote Code Execution Vulnerability

Disclosed July 18, 2013    Fully Patched
Vendors: Oracle
Vulnerability Severity: High
Exploit Impact: Remote Code Execution
Exploit Availability:
Categories:
Zeroday Tracker

Controlling User Accounts and Regulatory Compliance

Posted July 15, 2013    Morey Haber

PCI DSS Requirement 8 requires that organizations must be able to identify and log all user and administrative access to information systems and applications containing credit card and personally identifiable information. In addition, environments must also have a unique ID for every individual that will have computer access to these systems.  This simple requirement can…

Categories:
Vulnerability Management
Tags:
, , , , , , , , , , , ,

July VEF Participant Wins a Kindle Fire

Posted July 15, 2013    Qui Cao

As you all know, every month we host our Vulnerability Expert Forum (VEF) webinar. This is a time where our experts share valuable insight regarding new vulnerabilities that are discovered and the actions that need to be taken as a result. It’s a quick way to get up to speed on current potential risks to your organization…

Categories:
Vulnerability Management