Month: January 2019

ComputerWorldIndependent

Microsoft Patch Alert: January patches include a reprisal of KB 4023057 and a swarm of lesser bugs

Credit to Author: Woody Leonhard| Date: Wed, 30 Jan 2019 09:12:00 -0800

In general, the January patches look relatively benign, but for some folks in some situations they can bite. Hard.

On the surface we’ve seen the usual Patch Tuesday Cumulative Updates and secondary Cumulative Updates for all versions of Windows 10. Microsoft calls the secondary Cumulative Updates “optional” because you only get them if you click “Check for updates.”

Windows 7 and 8.1 got their usual Monthly Rollups, but there’s a problem. Specifically, this month’s Win7 Monthly Rollup has a couple of bugs that are only fixed if you install the preview of February’s Monthly Rollup. Which makes no sense at all, but that’s Microsoft. There’s another Win7 Monthly Rollup bug that’s fixed by installing a different “silver bullet” patch.

To read this article in full, please click here

Read More
MalwareBytesSecurity

Analyzing a new stealer written in Golang

Credit to Author: hasherezade| Date: Wed, 30 Jan 2019 17:00:00 +0000

We captured a new information-stealing malware written in Golang (Go). Read up on our analysis of its functionality, as well as the tools researchers can use to unpack malware written in this relatively new programming language.

Categories:

Tags:

(Read more…)

The post Analyzing a new stealer written in Golang appeared first on Malwarebytes Labs.

Read More
MicrosoftSecurity

Step 4. Set conditional access policies: top 10 actions to secure your environment

Credit to Author: Debbie Seres| Date: Wed, 30 Jan 2019 17:00:12 +0000

The Top 10 actions to secure your environment series outlines fundamental steps you can take with your investment in Microsoft 365 security solutions. In Step 4. Set conditional access policies, youll learn how to control access to your apps and corporate resources using conditional access policies, and how these policies can block legacy authentication methods and control access to SaaS apps.

The post Step 4. Set conditional access policies: top 10 actions to secure your environment appeared first on Microsoft Secure.

Read More
SecurityTrendMicro

How Machine Learning can Expose and Illustrate Network Threats

Credit to Author: Trend Micro| Date: Wed, 30 Jan 2019 14:34:21 +0000

Although machine learning algorithms have been around for years, additional use cases are being discovered and applied all the time, particularly when it comes to network and data security. As years have passed, the skills and sophisticated approaches being utilized by hackers have risen in severity and frequency, and white hats as well as enterprise…

The post How Machine Learning can Expose and Illustrate Network Threats appeared first on .

Read More
ComputerWorldIndependent

It's a hack!

Credit to Author: Sharky| Date: Wed, 30 Jan 2019 03:00:00 -0800

It’s a few years after Y2K, and this pilot fish has overall responsibility for all things related to his company’s website.

“Like most corporations, our company had a policy that computers and laptops were to be used only for company business, along with policies governing the appropriate use of the internet in the work environment,” fish says.

“After arriving at work one morning, I opened my email to find a frantic message from our CEO to me and our internet security manager, stating that our website had been hacked.”

The big boss knows this is the case because there are spammy images and text on the home page, among other issues. Not surprisingly, the CEO is adamant that this must be resolved ASAP.

To read this article in full, please click here

Read More