BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Filter:
patch-tuesday

January 2015 Patch Tuesday

Posted January 14, 2015    BeyondTrust Research Team

Starting off the new year, Microsoft directs its focus more toward user rights and access. For the majority of bulletins, an attacker would need some form of authentication prior to elevating their privileges. Aside from these, the most notable vulnerability lies within an old friend named Telnet, which even the newer versions of windows are…

Categories:
General, Network Security, Security Research, Vulnerability Management
Tags:
,

Your Data Security Strategy Starts with Deploying a Least Privilege Model (part 1 of 2)

Posted January 12, 2015    Scott Lang

Before we start, let’s agree on three fundamental principles of protecting data: 1. Data is the most valuable asset your organization has (besides the folks who work for you anyway) 2. Data is like water – it will find the path of least resistance out of its current location 3. Based on its value and…

Categories:
Privileged Account Management
Tags:
, ,
jeremy-moskowitz

Active Directory Recycle Bin: What is it, and how can I use it?

Posted January 5, 2015    Jeremy Moskowitz

Remember the Windows 95 Recycle Bin? It was a big leap forward to recovering “deleted” files. Well, it turns out that Active Directory has it’s own Recycle Bin for users, groups and computers, and it’s called… wait for it.. the Active Directory Recycle Bin. Here’s the good news about the Active Directory Recycle bin: *…

Categories:
Privileged Account Management
Tags:
, , , ,
gwindows_logo

Git’s Case-Insensitive Discrepancies: Exploiting GitHub For Windows And Microsoft Visual Studio (still affected)

Posted December 23, 2014    BeyondTrust Research Team

A vulnerability within Git has been recently announced concerning the case-insensitive nature of the Windows file system. This vulnerability is unique in that fact that an attacker does have the ability to execute arbitrary code, however conventional exploitation methods, such as memory corruption, is not required. This article explores two ways to execute arbitrary, attacker…

Categories:
Network Security, Security Research
Tags:
, , , ,
Dark Reading

2014: The Year of Privilege Vulnerabilities

Posted December 18, 2014    Chris Burd

Of the 30 critical-rated Microsoft Security Bulletins this year, 24 involved vulnerabilities where the age-old best practice of “least privilege” could limit the impact of malware and raise the bar of difficulty for attackers.

Categories:
General, Privileged Account Management, Security Research, Vulnerability Management
Tags:
, , , , ,
dave-shackleford-headshot

Looking back on information security in 2014

Posted December 16, 2014    Dave Shackleford

Dave Shackleford is a SANS Instructor and founder of Voodoo Security. Join Dave for a closer look at the year in security, and learn what you can do to prepare for 2015, with this upcoming webinar. 2014 has been one heck of an insane year for information security professionals. To start with, we’ve been forced…

Categories:
Network Security, Vulnerability Management
Tags:
, ,
patch-tuesday

December 2014 Patch Tuesday

Posted December 9, 2014    BeyondTrust Research Team

This month marks the final Patch Tuesday of 2014. Most of what is being patched this month includes Internet Explorer, Exchange, Office, etc… and continues a trend of the greatest hits collection of commonly attacked Microsoft software. Probably the one thing that broke the mold this month is that for once there is not some…

Categories:
General, Network Security, Privileged Account Management, Security Research, Vulnerability Management
Tags:
,
Chained to the phone

“I’d love to come, but I’m on-call”: Privilege management can relieve holiday help desk headaches

Posted December 3, 2014    Jason Silva

Part of working in IT means you put in your time “on-call.” Companies either don’t realize there is a better way to allow users to maintain administrative access to endpoints, or they remove admin rights from users but don’t account for the resulting operational inefficiencies.

Categories:
Privileged Account Management
Tags:
, , , , , , ,
3_why_interseting2

CVE-2014-1824 – A New Windows Fuzzing Target

Posted November 25, 2014    BeyondTrust Research Team

As time progresses, due to constant fuzzing and auditing many common Microsoft products are becoming reasonably hard targets to fuzz and find interesting crashes.  There are two solutions to this: write a better fuzzer (http://lcamtuf.coredump.cx/afl/) or pick a less audited target. In a search for less audited attack surface, we are brought to MS14-038, Vulnerability…

Categories:
Network Security, Security Research
Tags:
, ,
ovum-research

New Analyst SWOT Assessment Identifies Key Strengths of PowerBroker

Posted November 24, 2014    Scott Lang

Following on the heels of the Gartner PAM market guide and Frost & Sullivan review of Password Safe comes a new analyst review of our BeyondInsight and PowerBroker platforms, a SWOT assessment of BeyondTrust written by Ovum. Ovum’s honest and thorough review of BeyondTrust indicates that we are delivering, “…an integrated, one-stop approach to PAM….

Categories:
Privileged Account Management
Tags:
, , ,