Month: May 2019

QuickHealSecurity

CVE-2019-11815: Experts discovered a privilege escalation vulnerability in the Linux Kernel

Credit to Author: Ganesh Lakariya| Date: Mon, 27 May 2019 07:02:35 +0000

Red Hat engineers and experts discovered a memory corruption vulnerability in Linux kernel, which is basically a flaw while implementation of RDS (Remote desktop Protocol) over TCP. This flaw has affected Red Hat, Ubuntu, Debian and SUSE and security advisories have been issued for all. This flaw could enable an…

Read More
MicrosoftSecurity

Uncovering Linux based cyberattack using Azure Security Center

Credit to Author: Todd VanderArk| Date: Thu, 23 May 2019 18:30:46 +0000

As detection capabilities advance, attackers are using new and stealthier techniques to stay undetected and persist with their motives. Azure Security Center, Microsoft’s cloud-based cyber solution helps customers safeguard their cloud workloads as well as protect them from these threats.

The post Uncovering Linux based cyberattack using Azure Security Center appeared first on Microsoft Security.

Read More
MicrosoftSecurity

UK launches cyberstrategy with long-term relevance

Credit to Author: Todd VanderArk| Date: Thu, 23 May 2019 16:00:13 +0000

Read a review of the “National Cyber Security Strategy: 2016-2021,” the most frequently referenced document in cybersecurity discussions. Learn three ways that the security strategy can expand and thrive and why it’s important to revisit it to help secure your digital transformation.

The post UK launches cyberstrategy with long-term relevance appeared first on Microsoft Security.

Read More
MicrosoftSecurity

New browser extensions for integrating Microsoft’s hardware-based isolation

Credit to Author: Eric Avena| Date: Thu, 23 May 2019 15:50:07 +0000

The hardware-based isolation technology on Windows 10 that allows Microsoft Edge to isolate browser-based attacks is now available as a browser extension for Google Chrome and Mozilla Firefox. We introduced the container technology in 2017. Since then, we have been evolving the technology and engaging with customers to understand how hardware-based isolation can best help…

The post New browser extensions for integrating Microsoft’s hardware-based isolation appeared first on Microsoft Security.

Read More