Blog
3 Ways to Protect Your Company Against USB Drops
Tue, 08/18/2015
Recently in Arstechnica.com there was an article bringing light to how Windows computers can be exploited when booby-trapped USB fobs are inserted into the machine that then executes malicious code.Microsoft has acknowledged this and released a security bulletin regarding the issue stating, “To exploit the vulnerability, an attacker would have insert a malicious USB device into a target system.”So...
Blog
Vulnerability Assessment vs Vulnerability Management – What is the Difference?
Tue, 03/03/2015
I recently came across a post on LinkedIn, asking about advice related to vulnerability management (VM) and specifically as it relates what elements should be included in the process. I found many participants giving advice which was more assessment related, as opposed to VM related. Seeing this confusion out there, I felt it important to share my views on the differences. So what is the...
Vulnerability Research
Hardened Mac Configuration Tips & Recommendations
Tue, 03/03/2015
Given the popularity of the Mac and the ever increasing number of users, we thought it would be good to share insight that everyone, regardless of what they use their Mac for, should do to protect their system and their data.
This list is not all inclusive; however, it does give most users much more control over the security and privacy of their data.
Under System Preferences >> Security &...
Blog
When Less is More: Make Sure Your Security Mechanisms Aren’t Duplicating Assets!
Mon, 01/26/2015
During some recent research, I came across two issues in a large vulnerability management (VM) vendor’s public community support forum. The first post described a problem in which their tool reported a different number of network endpoint assets from what was seen on “the console.” The second detailed a user experiencing duplicate assets. After some investigation, I determined that both issues...
Vulnerability Research
Has Microsoft Introduced a Hole in your Patching Program?
Wed, 12/03/2014
I was recently putting together material for a recurring vulnerability management meeting with one of our clients. This involves comparing authenticated scanning results from one scanning period to the next in an effort to determine progress in addressing high-risk vulnerabilities; particularly, missing Microsoft, Adobe and Java patches, as vulnerabilities in these products are generally...
Blog
Did the Shellshock Bug Make You Vulnerable to a Breach?
Fri, 09/12/2014
Are you Vulnerable to a breach due to the “Shellshock" bug?The “Shellshock" Bash vulnerability is a serious information security issue . It is a powerful attack affecting businesses of all sizes and industries. Fortra's Vulnerability Management has teams of vulnerability researchers and personal security analysts addressing concerns, mitigating risk and answering commonly asked questions.Q: What...
Blog
The future of banking is electronic but capacity planning remains key
Sun, 06/01/2014
Banks gain competitive advantage with capacity planning in digital age. Capacity management tools are a crucial part of modern enterprise systems – and they are rarely more necessary than in the world of high finance, where uptime and latency really matter.
Blog
Shimming Your Way Past UAC
Tue, 05/27/2014
Using Application Compatibility Fixes To Bypass User Account Control
An often-overlooked method that can be used by an attacker to gain elevated code execution is utilization of a framework that is provided by Microsoft to help legacy applications function on newer versions of Windows. That framework is known as the application compatibility toolkit. Unfortunately, in addition to allowing legacy...
Blog
Symantec Endpoint Protection Manager XXE/SQLi: From Disclosure To PoC
Thu, 03/27/2014
FINDING CVE-2013-5014 AND CVE-2013-5015Sometimes there is nothing more ironic than coming across critical vulnerabilities in the very security software designed to protect systems. In these cases not only does the security software fail to prevent an intrusion; it actually becomes the vector that allows system compromise of an otherwise secure machine. Several antivirus products have had these...
Vulnerability Research
Fun With HP Data Protector EXEC_BAR Remote Command Execution
Tue, 02/25/2014
DEEP DIVE ANALYSIS OF CVE-2013-2347One of the benefits our clients have when using our vulnerability scanner is that many of the vulnerability checks we write are non-authenticated. This means that we do not require credentials to authenticate to hosts over the network in order to check for vulnerabilities. Instead, our team of researchers frequently reverse engineers software to identify unique...
Blog
Making the Best Use of Limited Resources
Wed, 02/05/2014
Capacity planning solutions can help organizations make the best use of limited resources in their IT environments.
Blog
LenovoEMC StorageCenter PX4-300R Unauthorized Remote File Retrieval
Tue, 11/19/2013
DDIVRT-2013-55 LenovoEMC StorageCenter PX4-300R Unauthorized Remote File RetrievalDate Discovered: October 10, 2013Discovery Credit: Evan Sylvester and r@b13$Vulnerability Description: The web server for the LenovoEMC StorageCenter PX4-300R allows unauthenticated remote users to retrieve specific files that are located outside of the web root. Malicious users would need to have direct knowledge of...
Blog
The Backdoor on the Side of Your Server
Tue, 07/02/2013
A note to our readers....The following is a blog post our organization was withholding while privately warning companies about a set of critical IPMI vulnerabilities in their rack mount hardware and the threat they posed to their security posture. Some of the content was covered in a B-Sides San Antonio talk two months ago by one of our researchers.Today the full-scope of this threat was...
Vulnerability Research
DDIVRT-2013-53 Actuate 'ActuateJavaComponent' Multiple Vulnerabilities
Thu, 05/09/2013
Follow us on Twitter! Severity--------High Date Discovered---------------March 19, 2013 Discovered By-------------Digital Defense, Inc. Vulnerability Research TeamCredit: Dennis Lavrinenko, Bobby Lockett, and r@b13$ 1. Actuate 'ActuateJavaComponent' Arbitrary File Retrieval Vulnerability Description-------------------------Actuate 10 contains a vulnerability within the 'ActuateJavaComponent'. This...
Vulnerability Research
DDIVRT-2013-50 EverFocus EPARA264-16X1 Directory Traversal
Fri, 03/15/2013
DDIVRT-2013-50 EverFocus EPARA264-16X1 Directory TraversalFollow us on Twitter! Title-----DDIVRT-2013-50 EverFocus EPARA264-16X1 Directory Traversal Severity--------High Date Discovered---------------January 22, 2013 Discovered By-------------Digital Defense, Inc. Vulnerability Research TeamCredit: r@b13$ Vulnerability Description-------------------------The EverFocus EPARA264-16X1 DVR allows...
Blog
VMware View Connection Server Directory Traversal
Wed, 12/12/2012
DDIVRT-2012-48 VMware View Connection Server Directory Traversal (CVE-2012-5978)Follow us on Twitter!Severity--------HighDate Discovered---------------September 26, 2012Discovered By-------------Digital Defense, Inc. Vulnerability Research TeamCredit: r@b13$Vulnerability Description-------------------------The tunnel-server component of the VMware View Connection Server fails to ensure that each...
Blog
Why Your Business Needs Capacity Management: The Importance of Capacity Management
Fri, 01/28/2011
The modern CIO needs to be ahead of the game – anticipating the business’s needs and being able to meet them as they arise. All too often, however, the IT function is caught on the back foot, reacting to events after they’ve happened.
Pagination
- First page
- Previous page
- …
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36