BeyondTrust

Security In Context

Bringing you news and commentary on solutions and strategies for protecting your critical IT infrastructure.

Posts Tagged ‘security in context’

blackholetoolkit1

BlackHole toolkit targets Microsoft XML Core Services flaw

Blackhole is a popular exploit kit used to inject malware onto PCs that visit an exploited site, or are redirected to such a site from another, compromised website.  As hackers get bolder they use these types of toolkits to compromise computer networks.  This allows less sophisticated individuals and organizations to compromise computer networks since these…

Post by Sarah Lieber August 1, 2012
Tags:
, , , , , , , ,
BeyondTrust is the expert source of VMware Security LEARN MORE
retina-insight1-680x316

Exploitability in Context

Every year there are literally tens of thousands of new vulnerabilities discovered across the various software and hardware technologies we rely upon every day. Simple math would seem to dictate an impossible task to manage all of these vulnerabilities and to make the real-world, priority-based decisions on them. Vulnerability management is one thing, but for…

Post by Alejandro DaCosta March 28, 2012
Tags:
, , , , , , ,