100 likes | 221 Views
On Tuesday, a series of critical patches were released addressing 23 CVEs, including significant vulnerabilities in Windows Remote Desktop, Internet Explorer, and Lync. Key updates include MS12-036 for Remote Desktop's remote code execution, MS12-037 for a cumulative security update in Internet Explorer, and updates for .NET Framework and Lync. Additionally, Adobe issued hotfixes for ColdFusion and Flash Player, while security alerts on mobile malware and various breaches underscore the evolving threat landscape. Stay informed on the latest patches to protect your systems.
E N D
Patch Tuesday • 7 Patches – 3 Critical – 23 CVEs • Affected – RDP, IE, Lync, Windows • Other updates, MSRT, Defender Definitions, Junk Mail Filter • MS12-036 Remote Desktop, Remote Code Execution • MS12-037 Cumulative Security Update for Internet Explorer • MS12-038 .NET Framework, Remote Code Execution • MS12-039 Lync, Remote Code Execution • MS12-040 Microsoft Dynamics AX Enterprise Portal, Remote Code Execution • MS12-041 Windows Kernel-Mode Drivers, Elevation of Privilege • MS12-042 Windows Kernel, Elevation of Privilege
Holes / Patches • Oracle, due out 17 July • Adobe • APSB12-14 Hotfix for ColdFusion 9.01 and older • APSB12-15 Adobe Flash Player • Apple, • FlashBack Removal Update • Leopard Security Update 2012-003 • QuickTime 7.7.2 • iTunes 10.6.3 • Java Update • Cisco • ASA 5500 information disclousure • Small Business Devices XSS / Meeting Place Login XSS • IOS XR DoS
Hacking • mobile maleware genome project • MS out of band path certs/flame • flame and stuxnet link? • Kaspersky confirms • mysql auth bypass
Corp • disa to pilot DoD mobile network • unclass and class nets • Nytimes claims stuxnet was us based • Linkedin iOS app siphons data • Linkedin password breach • google to notify dnschanger victims • apple filters word jailbreak
Papers • secure aws • http://www.infosecwriters.com/texts.php?op=display&id=662 • max benefit from pentest • http://www.infosecwriters.com/texts.php?op=display&id=661 • fbibitcoin • http://www.wired.com/images_blogs/threatlevel/2012/05/Bitcoin-FBI.pdf • Common vuln reporting framework • http://www.icasi.org/cvrf-1.1 • bitcoin • http://news.hitb.org/content/bitcoins-worth-87000-plundered-brazen-server-breach • Robots • https://www.sans.org/reading_room/whitepapers/awareness/robotstxt_33955 • dangerous http methods • https://www.sans.org/reading_room/whitepapers/testing/penetration-testing-web-application-dangerous-http-methods_33945 • risk assessment for social media • https://www.sans.org/reading_room/whitepapers/privacy/risk-assessment-social-media_33940 • NIST Cloud Guidance • http://csrc.nist.gov/publications/PubsSPs.html#800-146 • http://www.nist.gov/manuscript-publication-search.cfm?pub_id=911075ios5 security[1] http://images.apple.com/ipad/business/docs/iOS_Security_May12.pdf[2] http://www.nsa.gov/ia/mitigation_guidance/security_configuration_guides/operating_systems.shtmlbiomed deviceshttp://www.secure-medicine.org/icd-study/icd-study.pdfcovert channels on social nethttps://www.sans.org/reading_room/whitepapers/engineering/covert-channels-social-networks_33960imperva anonymoushttp://www.imperva.com/docs/HII_The_Anatomy_of_an_Anonymous_Attack.pdf
Papers • risk assessment for social media • https://www.sans.org/reading_room/whitepapers/privacy/risk-assessment-social-media_33940 • NIST Cloud Guidance • http://csrc.nist.gov/publications/PubsSPs.html#800-146 • http://www.nist.gov/manuscript-publication-search.cfm?pub_id=911075 • ios5 security • http://images.apple.com/ipad/business/docs/iOS_Security_May12.pdf • http://www.nsa.gov/ia/mitigation_guidance/security_configuration_guides/operating_systems.shtml • biomed devices • http://www.secure-medicine.org/icd-study/icd-study.pdf • covert channels on social net • https://www.sans.org/reading_room/whitepapers/engineering/covert-channels-social-networks_33960 • imperva on anonymous • http://www.imperva.com/docs/HII_The_Anatomy_of_an_Anonymous_Attack.pdf
tools elcomsofthttp://www.dfinews.com/article/elcomsoft-provides-forensic-access-icloud-backupsevidence finderhttp://www.dfinews.com/article/jad-software-releases-ief-54emet v3https://blogs.technet.com/b/srd/archive/2012/05/15/introducing-emet-v3.aspx?Redirected=trueSEThttp://www.social-engineer.org/framework/Computer_Based_Social_Engineering_Tools:_Social_Engineer_Toolkit_%28SET%29truecrackhttps://code.google.com/p/truecrack/ passfaulthttp://passfault.com/
CON Events DefCon 20 https://www.defcon.org/
All images scavenged without permission All images scavenged without permission