Wednesday, May 29, 2019

Windows RDP flaw 'BlueKeep' gets PoC exploits

Security Digest
Information security news and advice from TechTarget's network | May 29, 2019
TechTarget
FEATURED STORY
'BlueKeep' Windows Remote Desktop flaw gets PoC exploits
by Michael Heller, Senior Reporter
Multiple researchers created proof-of-concept exploits, including remote code execution attacks, targeting the recently patched Windows Remote Desktop flaw called BlueKeep. (SearchSecurity.com)
Advertisement
NEWS
 
Microsoft bets on ElectionGuard SDK to fortify election security
Ahead of the 2020 elections, Microsoft unveiled ElectionGuard, an open source SDK designed to provide end-to-end verification of electronic voting machine results. (SearchSecurity.com)
 
CrowdStrike, NSS Labs settle legal disputes over product testing
CrowdStrike and NSS Labs have ended their legal dispute with a confidential settlement agreement, which resolves all lawsuits including NSS Labs' antitrust suit against the vendor. (SearchSecurity.com)
 
Risk & Repeat: Cisco vulnerabilities raise backdoor concerns
In this week's Risk & Repeat podcast, editors discuss recent Cisco vulnerabilities and whether it's fair to call them backdoors. (SearchSecurity.com)
 
Cylance CSO: Let's name and shame failed security controls
Malcolm Harkins, the chief security and trust officer at BlackBerry Cylance, says security controls that don't live up to their billing should take more blame for data breaches. (SearchSecurity.com)
 
G Suite passwords insecurely stored in two separate incidents
Google disclosed two separate incidents in which G Suite passwords were stored insecurely, and in one of those incidents, the passwords were stored improperly for 14 years. (SearchCloudSecurity.com)
 
Barracuda Advanced Bot Protection safeguards web applications
Cloud-hosted platform Advanced Bot Protection defends against automated threats using AI. It is available as both a web application firewall (WAF) and WAF as a service. (SearchSecurity.com)
EXPERT ADVICE
 
Women in cybersecurity work to grow voice in US lawmaking

To encourage more input from women in cybersecurity in the legislative process, the Executive Women's Forum went to Washington to discuss key issues with Congress. 

(SearchSecurity.com)

 
10 ways to prevent computer security threats from insiders
Whether via the spread of malware, spyware or viruses, insiders can do as much damage as outside attackers. Here's how to prevent computer security threats from insiders. (SearchSecurity.com)
 
Using virtual appliances for offload is a key encryption strategy
Using a virtual appliance to process traffic is a key encryption strategy enterprises can use to improve throughput. The results are striking. (SearchSecurity.com)
 
How to find an MSP to protect you from outsourcing IT risks
Check out what questions to ask MSPs to make sure they have the right security systems in place to protect your organization against outsourcing IT risks. (SearchSecurity.com)
 
IT pros stress importance of security awareness training
End-user naiveté can lead to costly data breaches, underscoring the critical importance of security awareness training. Learn how phishing simulation tools can help. (SearchSecurity.com)
 
Compliance rules usher in new era for personal data privacy policy
With the rollout of data privacy regulations, individual data rights and the right to be forgotten are forcing organizations to re-examine how they handle customer information. (SearchCompliance.com)
 
How do buffer overflow attacks work?
Buffer overflow attacks are simple exploits that can give an attacker control over a program or process. Learn how these attacks work and how to make sure they don't happen to you. (SearchSecurity.com)
 
Buyer's Handbook: How to select and implement a next-gen firewall
In this Buyer's Handbook, examine how to deploy next-generation firewalls (NGFW) in the workplace. (SearchSecurity.com)
About This E-Newsletter
This e-newsletter is published by the TechTarget network. To unsubscribe from Security Digest, click here. Please note, this will not affect any other subscriptions you have signed up for.

TechTarget Security Media Group, 275 Grove Street, Newton, MA 02466. Contact: webmaster@techtarget.com

Copyright 2019 TechTarget. All rights reserved.
TechTarget

No comments: