Mitigating Risk and High-Risk Vulnerabilities in Unsupported Operating Systems: BlueKeep Edition

How many times has a vendor released a critical cybersecurity patch for an operating system that is in “end of life” (EOL), or the lifecycle period where the vendor no longer issues patches for bug fixes, operational improvements and cybers… Continue reading Mitigating Risk and High-Risk Vulnerabilities in Unsupported Operating Systems: BlueKeep Edition

Attackers Still Finding Plenty of Systems Vulnerable to Bluekeep

Despite the Microsoft-issued patch for BlueKeep, attackers are still exploiting the infamous vulnerability, underlining a problem with the way patches are applied in organizations and by individual users. The SANS Institute observed exploitation of Blu… Continue reading Attackers Still Finding Plenty of Systems Vulnerable to Bluekeep

BlueKeep: What you Need to Know

What is BlueKeep? BlueKeep is the name that has been given to a security vulnerability that was discovered earlier this year in some versions of Microsoft Windows’ implementation of the Remote Desktop Protocol (RDP). The vulnerability was describ… Continue reading BlueKeep: What you Need to Know

Facebook Data Leaks, Smart Speaker Laser Attack, BlueKeep in the Wild

You’re listening to the Shared Security Podcast, exploring the trust you put in people, apps, and technology…with your host, Tom Eston. In episode 94 for November 11th 2019: Facebook’s Group API data leak and 7,000 pages of leaked Fac… Continue reading Facebook Data Leaks, Smart Speaker Laser Attack, BlueKeep in the Wild

BlueKeep Panic as RCE RDP Exploit Floods the Net

RDP, Microsoft’s Remote Desktop Protocol, is now coming under attack from hackers trying to spread cryptomining malware.
The post BlueKeep Panic as RCE RDP Exploit Floods the Net appeared first on Security Boulevard.
Continue reading BlueKeep Panic as RCE RDP Exploit Floods the Net

BlueKeep is back. For now, attackers are just using it for cryptomining

For months, cybersecurity analysts have sounded the alarm about a serious vulnerability in old Microsoft operating systems that, if exploited, could infect computers around the world. The hacking has finally begun, and so far, it’s gone off with a whimper, not a bang. Over the weekend, a security researcher who maintains “honeypots,” or simulated environments to trap malicious activity, reported a spike in attacks exploiting the Remote Desktop Protocol vulnerability, known as BlueKeep. But rather than anything “wormable” that can spread from machine to machine, this appears to be a case of opportunists scanning the internet to infect computers for monetary gain. Researchers had warned that BlueKeep could enable outsiders to execute remote code on a compromised machine. Kevin Beaumont, the researcher who gave BlueKeep its name, reported that nearly all of his honeypots had been hit by attackers exploiting the vulnerability. Hackers appear to be using the exploit to try to install […]

The post BlueKeep is back. For now, attackers are just using it for cryptomining appeared first on CyberScoop.

Continue reading BlueKeep is back. For now, attackers are just using it for cryptomining

After months of worry, BlueKeep vulnerability is now being exploited in mass-hacking campaign

The BlueKeep vulnerability, discovered by the UK’s NCSC, is being exploited at scale in an attempt to install a cryptocurrency minder on unpatched Windows PCs.
Continue reading After months of worry, BlueKeep vulnerability is now being exploited in mass-hacking campaign