BeyondTrust

Security In Context

Bringing you news and commentary on solutions and strategies for protecting your critical IT infrastructure.

Posts Tagged ‘Zero-Day’

Microsoft Word Zeroday – Set to expire?

Researchers at Google have notified Microsoft of a new Word zeroday vulnerability. This attack is currently being leveraged in the wild to target systems running Microsoft Word 2010. The attack can be successful simply by a user opening a maliciously crafted RTF file within Microsoft Word. The full extent of the breaches caused by this…

Post by BeyondTrust Research Team March 25, 2014
Tags:
, , , ,
BeyondTrust is the expert source of VMware Security LEARN MORE
LOLZ

Land of the Rising IE 0day

A new Internet Explorer zeroday has surfaced that affects every supported version of Internet Explorer. It has been observed in the wild in targeted attacks in Japan. Current attacks are focusing on exploiting Internet Explorer 8 and 9 on Windows XP and 7 machines. This is a use-after-free vulnerability in mshtml.dll, which is a DLL…

Post by BeyondTrust Research Team September 17, 2013
Tags:
,
patch-tuesday

EMET 4.0: Adding a Layer to the Security Onion

With the release of the EMET 4.0 beta back in April, it’s no surprise that there has been a lot of buzz lately around Microsoft’s Enhanced Mitigation Experience Toolkit (EMET). Now, after some delay, the beta testing is over and the brand new, and very shiny, EMET v4 has been released. The latest version of…

Post by BeyondTrust Research Team June 19, 2013
Tags:
, ,
trojanhorse

Vendor-Disclosed Zero Days and Targeted Trojans

Here at BeyondTrust, we are constantly keeping an eye on the underground parts of the internet, monitoring for things like zero day vulnerabilities and how malware authors are exploiting vulnerabilities in the wild. As such, we wanted to keep you apprised of a vulnerability that was addressed within VMware ESXi 5.0. A patch was released…

Post by BeyondTrust Research Team April 3, 2013
Tags:
, , , , , , ,
MandiantAPT1report

Mandiant APT1 report, some unanswered questions.

For the last several years there has been an increasing number of accusations being made against China and its military as being behind the systematic targeting of organizations throughout the world in a sophisticated hacking campaign to steal data and access to further China’s economic, military and social agendas. These accusations come from a mass…

Post by Marc Maiffret February 21, 2013
Tags:
, , , ,
java7

Java Zero Day Exploit – Java 7 Not the Answer

A new Java zero-day vulnerability has been seen exploiting hundreds of thousands of machines. This 0day has already been incorporated into Cool Exploit Kit and Blackhole, in addition to Nuclear Pack and Redkit. This vulnerability affects Java 7 versions up to and including the current version of Java, 7u10. It should be noted that while…

Post by BeyondTrust Research Team January 10, 2013
Tags:
, , , , , ,
ieflaw

Another (sigh) IE Zero-Day

Unfortunately, the security industry was not going to escape 2012 without seeing yet another zero-day vulnerability in Microsoft’s Internet Explorer. It has been discovered that a targeted attack, leveraging a zero-day in IE, has been posed against the Council on Foreign Relations Portal. The technical origin of the flaw is as follows: the vulnerability occurs…

Post by BeyondTrust Research Team December 30, 2012
Tags:
, , , , , ,
Java-Logo

Java Pwns Everyone…Again.

Java has a nasty habit of getting you owned. This latest 0day is no exception to the long-lived trend of reliable Java-based exploitation. Here’s what you need to know: The current exploitation method being employed in the wild right now leverages two zero day flaws in Java. The first flaw leverages an implementation issue (logic bug) within ClassFinder.findClass(), which is only present in Java 7.

Post by BeyondTrust Research Team August 30, 2012
Tags:
, , , , , , , ,
MR

More Than Just Patch Management for Remediation

I have been combing though some vulnerability reports and the vast majority of remediation strategies revolve around applying a patch. Simple in concept; install this patch, and the vulnerability is mitigated. The difficulty arises when you have vast quantities of the patch to deploy, are unsure whether the security update breaks any other function or…

Post by Morey Haber December 9, 2010
Tags:
, , , , , , ,

The Value of a Zero-Day Vulnerability Assessment Scanner

Let’s assume your business is near perfect. You have a proven and reliable vulnerability management lifecycle in place and identification of vulnerabilities and patch remediation happens like clockwork. Finding lingering threats or missing patches is a rarity and even your endpoint protection solution never fails catching the latest malware. Like I said, a near perfect…

Post by Morey Haber October 26, 2010
Tags:
, , , , , ,