BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Filter:
keyboard

You still need to start with the security best practices

Posted October 14, 2014    Tony Bradley

This blog post is republished with the permission of Techspective.net. See the original post here. – By: Tony Bradley, Editor-in-Chief, TechSpective.net A new cyber espionage threat dubbed “Sandworm” was revealed today. It exploits a zero day flaw that exists in all supported versions of the Windows operating system, and has apparently been active since 2009. That was FIVE years ago….

Categories:
Vulnerability Management
Tags:
, , , , , ,
patch-tuesday

October 2014 Patch Tuesday

Posted October 14, 2014    BeyondTrust Research Team

This October Microsoft has released eight security bulletins that cover a variety of Windows technologies from client-application attacks that would be useful in drive-by web attacks to privilege escalation vulnerabilities useful as second stage payloads to elevate from a standard user to having increased Administrator privileges. We recommend patching MS14-056 (Internet Explorer) first and then…

Categories:
Security Research, Vulnerability Management
Tags:
, , ,
Bugzilla Logo

Bugzilla ‘realname’ Parameter Account Creation Vulnerability

Posted October 8, 2014    BeyondTrust Research Team

Bugzilla, a very popular web-based bug-tracking system, has recently announced that multiple vulnerabilities have been discovered (http://www.bugzilla.org/security/4.0.14/). Perhaps the most interesting of these vulnerabilities, discovered by Netanel Rubin of Check Point Software Technologies, is one in which an attacker can automatically be added to certain groups that they were not intended to be a part…

Categories:
Security Research, Vulnerability Management
Tags:

Application Control without the Headaches: The PowerBroker for Windows Difference

Posted October 7, 2014    Morey Haber

Application control solutions reduce IT risk by regulating which programs can be launched on desktops, servers and other assets. For instance, application control can help to prevent malware infections and minimize subsequent damage if a malware infection occurs. IT and security leaders have several technology alternatives to consider when seeking to implement application control in their…

Categories:
Privileged Account Management
Tags:
, , , ,
shellshock-beyondinsight

Keeping Track of Shellshock Vulnerabilities with Retina CS and BeyondInsight

Posted October 2, 2014    Jerome Diggs

Worried about BASH Shellshock? Retina CS Enterprise Vulnerability Management can scan your environment to identify applications affected by Shellshock. BeyondTrust has generated several Retina vulnerability audits to help our customers identify the various permutations of applications affected by Shellshock. The BeyondInsight Analytics and Reporting engine, included with Retina CS, makes it simple to view and…

Categories:
Network Security, Privileged Account Management, Vulnerability Management
Tags:
, , , ,

PowerBroker for Unix & Linux helps prevent Shellshock

Posted September 25, 2014    Paul Harper

Like many other people who tinker with UNIX and Linux on a regular basis, BASH has always been my shell of choice.  Dating back to the early days moving from Windows to a non-Windows platform, mapping the keys correctly to allow easy navigation and control helped ensure an explosion of use for the shell. Unfortunately,…

Categories:
General, Network Security, Privileged Account Management, Security Research, Vulnerability Management
Tags:

Bash “Shellshock” Vulnerability – Retina Updates

Posted September 24, 2014    BeyondTrust Research Team

A major vulnerability was recently discovered within bash which allows arbitrary command execution via specially crafted environment variables. This is possible due to the fact that bash supports the assignment of shell functions to shell variables. When bash parses environment shell functions, it continues parsing even after the closing brace of the function definition. If…

Categories:
Network Security, Privileged Account Management, Security Research, Vulnerability Management
pbps-blog3

7 Reasons Customers Switch to Password Safe for Privileged Password Management

Posted September 24, 2014    Chris Burd

It’s clear that privileged password management tools are essential for keeping mission-critical data, servers and assets safe and secure. However, as I discussed in my previous post, there are several pitfalls to look out for when deploying a privileged password management solution. At this point, you may be wondering how BeyondTrust stacks up. With that,…

Categories:
Privileged Account Management
Tags:
, , , , , ,
retina-cs-mobile

One Half of All Android Users Are Vulnerable to Lastest Attack

Posted September 24, 2014    Morey Haber

On September 1st, a new bug was quietly leaked that has far reaching ramifications for all Android users. The bug is in the open source Android Browser that is a part of the webkit, Android Open Source Platform (AOSP). The vulnerability allows malicious sites to inject JavaScript into other sites. The result is the ability…

Categories:
Vulnerability Management
Tags:
, , , , ,
red-thumbprint

Why big data breaches won’t always be so easy

Posted September 19, 2014    Byron Acohido

This blog post is republished with the permission of ThirdCertainty. See the original post here. – By: Byron Acohido, Editor-In-Chief, ThirdCertainty Some day, perhaps fairly soon, it will be much more difficult for data thieves to pull off capers like the headline-grabbing hacks of Home Depot and Target. That’s not a pipe dream. It’s the projected outcome…

Categories:
Network Security
Tags:
, , , , ,