Blog Posts Tagged with "Patching"

4085079c6fe0be2fd371ddbac0c3e7db

SysAdmin Basics: Why Account Management Is Critical

July 31, 2011 Added by:Jamie Adams

Many SysAdmins are distracted by the urge to patch to address vulnerabilities they aren't susceptible to, or to configure their systems with nifty tricks they found or “how-to” website. This urge is rooted in their belief they are a warrior combating the forces of evil in a cyber war...

Comments  (0)

B451da363bb08b9a81ceadbadb5133ef

TeamSHATTER Analysis Of The July 2011 Oracle CPU

July 31, 2011 Added by:Alexander Rothacker

With ‘unbreakable’ timeliness, Oracle released their 27th Critical Patch Update. They shipped 78 security fixes over all their product families. Sixteen of the fixes are specific to the Oracle Database, but a total of 30 fixes have an impact on database confidentiality, integrity or availability...

Comments  (0)

A6f6ba95b73de19f947cf4eceecb2bed

Patching WordPress Username Disclosure

June 05, 2011 Added by:Ryan Dewhurst

According to OSVDB 55713 this vulnerability was reported to WordPress by Core Security Technologies in June 2009. At the time of writing, the latest version of WordPress is 3.1.3 and is still vulnerable to this vulnerability. Here is how to patch the vulnerability yourself...

Comments  (2)

69dafe8b58066478aea48f3d0f384820

Adobe Issues Updates for Flash Zero Day Vulnerability

April 18, 2011 Added by:Headlines

Adobe has issued an update to counter the latest Flash player zero-day flaw which is similar to a vulnerability patched last month that was suspected of playing a critical role in the network breach of security vendor RSA, a division of EMC...

Comments  (0)

B451da363bb08b9a81ceadbadb5133ef

Database Security Discussion Lacking at RSA Conference

March 01, 2011 Added by:Alexander Rothacker

Why don’t organizations protect the database? It seems incredibly obvious, but it’s clearly not happening as often as it should be. Hopefully next year’s RSA Conference provides more education on database security – after all, that’s where sensitive information spends 99% of its lifecycle...

Comments  (0)

7d55c20d433dd60022642d3ab77b8efb

ERP System Attacks and the BlackHat DC Conference

February 14, 2011 Added by:Alexander Polyakov

During the BlackHat DC conference, DSecRG experts talked about attacks on corporate business-applications which can be used by cybercriminals for espionage, sabotage and fraudulent actions. Despite the fact, companies like SAP and Oracle regularly release security updates that are subject to attacks...

Comments  (0)

E313765e3bec84b2852c1c758f7244b6

Several New DB2 and PostgresSQL Exploits in the Wild

February 07, 2011 Added by:Brent Huston

If you are running these applications as a part of your core business processes, now might be a good time to check with the vendor support sites, download the available updates and get them into your maintenance windows as a critical update...

Comments  (0)

E973b16363b3de77b360563237df7e32

Hacking Virtual Machines Part 3 - Unpatched Hyper-V

November 28, 2010 Added by:Bozidar Spirovski

Virtualization is considered to be the new renaissance in computing. Suddenly, all those over sized servers are put to great use by putting multiple Guest OS's on them. But running IT services in a virtualized environment brings a whole host of new opportunities for hackers...

Comments  (0)

E973b16363b3de77b360563237df7e32

Hacking Virtual Machines Part 2 - Virtualization Environments

November 21, 2010 Added by:Bozidar Spirovski

Virtualization is considered to be the new renaissance in computing. Suddenly, all those over sized servers are put to great use by putting multiple Guest OS's on them. But running IT services in a virtualized environment brings a whole host of new opportunities for hackers...

Comments  (1)

E313765e3bec84b2852c1c758f7244b6

Using ProFTPd for Core Processing Anywhere?

November 11, 2010 Added by:Brent Huston

If so, you might want to pay attention to this announcement of a critical remote vulnerability in the daemon. A patch is now available and should be applied quickly if you have core processes using this application. You can read the entire alert here...

Comments  (0)

E973b16363b3de77b360563237df7e32

Microsoft Patch Disclosure Summary - October 2010

October 25, 2010 Added by:Bozidar Spirovski

Remote Code Execution vulnerabilities, Elevation of Privilege vulnerabilities, Information Disclosure vulnerability, Denial of Service condition, Information Tampering scenario...

Comments  (0)

Page « < 1 - 2 - 3 > »