Oracle Patches Critical Vulnerabilities in PeopleSoft Applications

Oracle has released out-of-band security patches for a component used by multiple ERP applications from its PeopleSoft suite. The updates fix five vulnerabilities, including two critical ones that can be exploited to access data from or completely comp… Continue reading Oracle Patches Critical Vulnerabilities in PeopleSoft Applications

More Than 120 Malware Detections Triggered on NSA Employee’s Computer

Kaspersky Lab has concluded an internal investigation into an incident that led to the company being accused of using its antivirus program to copy secret files from the personal computer of an NSA employee. The company believes it has identified the incident in its logs, but telemetry data revealed more than 120 malware detections on..

The post More Than 120 Malware Detections Triggered on NSA Employee’s Computer appeared first on Security Boulevard.

Continue reading More Than 120 Malware Detections Triggered on NSA Employee’s Computer

Extremist Groups: Using the Internet to Foment Online Radicalization

Anyone with access to the internet can have their voice heard. And this is exactly the philosophy behind the extremist online radicalization and recruitment efforts of various terrorist organizations, including Hezbollah and ISIS/ISIL (Islamic State of… Continue reading Extremist Groups: Using the Internet to Foment Online Radicalization

Corporate, Consumer Views Diverge on Securing Customer Data

Because companies accept and store sensitive, personally identifiable consumer customer data, they are responsible for safeguarding it against theft by cybercriminals. This should be common sense. Yet, according to a Ponemon Institute study commissioned by Centrify, only about half of the marketing and IT/security professionals polled agree that their companies “have an obligation to take..

The post Corporate, Consumer Views Diverge on Securing Customer Data appeared first on Security Boulevard.

Continue reading Corporate, Consumer Views Diverge on Securing Customer Data

Adobe Releases Critical Security Patches for 9 Products

Adobe Systems has released security patches for nine of its products to fix 86 vulnerabilities, the majority of which are rated as critical and important. In addition to Flash Player, Reader and Acrobat, which are the usual recipients of Adobe’s security patches, the company has updated Photoshop CC, Adobe Connect, Adobe DNG Converter, InDesign, Digital..

The post Adobe Releases Critical Security Patches for 9 Products appeared first on Security Boulevard.

Continue reading Adobe Releases Critical Security Patches for 9 Products

The Top 12 Hybrid Cloud Security Threats

Using a multiple-cloud architecture calls for a hybrid cloud security mindset, which tends to focus less on network security in favor of securing data wherever it may be. RightScale’s “2017 State of the Cloud” survey describes hybrid cloud as the preferred enterprise strategy, with 67 percent of the respondents using it. The interesting trend is that..

The post The Top 12 Hybrid Cloud Security Threats appeared first on Security Boulevard.

Continue reading The Top 12 Hybrid Cloud Security Threats

Quarantine Flaw in Antivirus Products Allows Privilege Escalation

The malware quarantine feature in several antivirus products could have been abused by local attackers to gain administrative privileges on computers. The issue, dubbed AVGater, was discovered by Florian Bogner, a researcher with security firm Kapsch. It exploits a user’s ability to restore suspicious files that antivirus programs have moved to quarantine. Bogner found a..

The post Quarantine Flaw in Antivirus Products Allows Privilege Escalation appeared first on Security Boulevard.

Continue reading Quarantine Flaw in Antivirus Products Allows Privilege Escalation

DoJ’s Irresponsible ‘Responsible’ Encryption

On Oct. 8, 2017, David Patterson, Sr. died on a reservation in New Mexico. Patterson was one of the last surviving World War II “Navajo code talkers” employed by the government because of the unique method of communication which, to the outside world, was undecipherable. Communications of the Navajo, even if intercepted, could not be..

The post DoJ’s Irresponsible ‘Responsible’ Encryption appeared first on Security Boulevard.

Continue reading DoJ’s Irresponsible ‘Responsible’ Encryption

DevOps Connect: DevSecOps Days Coming to RSAC

For the fourth year DevOps.com and now Security Boulevard are proud to be producing DevOps Connect: DevSecOps Days @ RSA Conference. The event will be held Monday, April 16, 2018. RSAC is the world’s largest security conference and so the perfect place to hold what we think of as the best day of DevSecOps. You..

The post DevOps Connect: DevSecOps Days Coming to RSAC appeared first on Security Boulevard.

Continue reading DevOps Connect: DevSecOps Days Coming to RSAC

Fancy Bear Adopts New DDE Attack Against Microsoft Office

Russian cyberespionage group Fancy Bear is using a recently publicized technique that abuses a legitimate Microsoft Office feature to create documents that can install malware. For the past several years the most common method of embedding malicious co… Continue reading Fancy Bear Adopts New DDE Attack Against Microsoft Office