Month: August 2017

FortinetSecurity

FortiManager 5.6: Centralized Control for Today’s Networks

Credit to Author: Justin Lei| Date: Tue, 15 Aug 2017 14:38:00 +0000

The Fortinet Security Fabric now allows organizations to deploy security tools across their entire distributed network, including deep into the data center and core and out to remote devices and the cloud, and then tie them together through a common, management strategy. FortiManager 5.6 provides a single pane of glass management dashboard to present consolidated monitors and controls across a wide range of network and endpoint security products, as well as critical network devices, through an intuitive and customizable dashboard.

Read More
SecurityTrendMicro

Trend Micro Identified as a Representative Vendor for its Protection Capabilities For Cloud Workloads

Credit to Author: William “Bill” Malik| Date: Mon, 14 Aug 2017 12:00:21 +0000

Cloud security is critical, because hackers have set their sights on the virtual realm.We are proud to be included in this year’s Gartner Market Guide for Cloud Workload Protection Platforms report, which recognizes 24 security leaders in Cloud Workload Protection solutions. Trend Micro was identified with 16 out of 21 capabilities listed by Gartner. Trend Micro delivers unique server workload protection capabilities and support for a broad range…

Read More
FortinetSecurity

A Quick Look at a New KONNI RAT Variant

Credit to Author: Jasper Manuel| Date: Tue, 15 Aug 2017 14:35:00 +0000

      KONNI is a remote access Trojan (RAT) that was first reported in May of 2017, but is believed to have been in use for over 3 years. As Part of our daily threat monitoring, FortiGuard Labs came across a new variant of the KONNI RAT and decided to take a deeper look. KONNI is known to be distributed via campaigns that are believed to be targeting North Korea. This new variant isn’t different from previous variants, as it is dropped by a DOC file containing text that was drawn from a CNN article entitled 12 things…

Read More
ComputerWorldIndependent

Where we stand with this month’s Windows and Office security patches

Credit to Author: Woody Leonhard| Date: Tue, 15 Aug 2017 07:18:00 -0700

One week after Patch Tuesday, and would-be Windows Updaters are facing a handful of bugs. Some will find them minor annoyances. Others … not so much. Here are the known bugs, and where we stand in the struggle to resolve the problems.

Worthy of note: Microsoft is now acknowledging many bugs that in the past would’ve gone without comment. There’s hope.

Here are the known, significant buggy security patches:

  • Windows 10 Anniversary Update, version 1607 – Cumulative update KB 4034658 wipes out Update History, unhides hidden updates, and effectively disconnects some updated computers from WSUS. Microsoft has acknowledged all three of those bugs in the KB 4034658 article with the usual “Microsoft is investigating this issue and will provide an update as soon as possible.”
  • The first undocumented buggy driver this month for the Surface Pro 4, “Surface – System – 7/21/2017 12:00:00 AM – 1.0.65.1,” was released on August 1. It was replaced by a second driver “Surface – System – 7/31/2007 12:00:00 AM – 1.0.75.1” on August 4. The second one was documented. But then we saw four more undocumented Surface Pro 4 drivers — “Intel driver update for Intel(r) Dynamic Platform and Thermal Framework Generic Participant,” “Power Participant,” Processor Participant” and “Manager” — all released on Saturday, August 12. Sometime late on August 14, Microsoft posted information about two of the drivers.
  • Both the Windows 7 August Monthly rollup KB 4034664 and the manually installed security-only patch KB 4034679 are causing problems with two-screen systems: The second screen starts showing gibberish with many applications, including Office. The problem has been widely reported — even replicated with a Proof of Concept program — but Microsoft hasn’t yet acknowledged it.
  • The only bug reported by Microsoft in its August Windows 7 security patches is an old bug, continuing from July, in which a buggy LDAP plugs up TCP dynamic ports. That bug hasn’t been fixed.
  • The Windows 8.1 Monthly rollup listing mentions a known bug: NPS authentication may break, and wireless clients may fail to connect. The solution is to manually set a registry entry on the server.

Dozens of patches were made to Office earlier this month but, so far, I’m not aware of any bugs.

To read this article in full or to leave a comment, please click here

Read More