Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @certcc
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @certcc
-
VU#338824 Microsoft Internet Explorer is being actively exploited in the wild using a new unpatched vulnerability in the Scripting Engine. Disable access to JScript.dll as a workaround.https://www.kb.cert.org/vuls/id/338824/
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
If you use "Disable all macros without notification" in Microsoft Office for Mac, you may be in for an unpleasant surprise. XLM macros in SYLK (.SLK) content will run without any prompting. This allows for arbitrary code execution without any clicks. https://www.kb.cert.org/vuls/id/125336/ https://twitter.com/wdormann/status/1189934161357889544 …
1:25Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Any device that has a software stack associated with it may become unsafe when it has outlived its support life span. It's Time to Retire Your Unsupported Things https://insights.sei.cmu.edu/cert/2019/10/its-time-to-retire-your-unsupported-things.html …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
CERT/CC proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
CERT/CC proslijedio/la je Tweet
If you run vBulletin forum software I would urgently take it offline until there’s a patch. There’s a ‘zero day’ exploit actively being used in the wild for widespread exploitation.
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
It's important to note that these updates are NOT currently being deployed via Windows Update or Microsoft Update. Despite being actively exploited in the wild, manual actions must be taken to receive the fixes.https://twitter.com/msftsecresponse/status/1176181336131784705 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
CERT/CC proslijedio/la je Tweet
We have recently completed a number significant revisions to the CERT® Guide to Coordinated Vulnerability Disclosure. Here's a post describing some of the changes we've made. https://insights.sei.cmu.edu/cert/2019/09/update-on-the-cert-guide-to-coordinated-vulnerability-disclosure.html …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Exim has released fixes for CVE-2019-15846, an issue where a local or remote attacker can execute programs with root privileges. This affects versions up to and including 4.92.1. The patches were released today in version 4.92.2 and can be found at https://ftp.exim.org/pub/exim/exim4/
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
CERT/CC proslijedio/la je Tweet
I've written a blog post to elaborate on the concept of VHD and VHDX files being dangerous: https://insights.sei.cmu.edu/cert/2019/09/the-dangers-of-vhd-and-vhdx-files.html …pic.twitter.com/sDHl6UPM9O
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
CERT/CC proslijedio/la je Tweet
I can confirm that this works as-is on a fully patched (May 2019) Windows 10 x86 system. A file that is formerly under full control by only SYSTEM and TrustedInstaller is now under full control by a limited Windows user. Works quickly, and 100% of the time in my testing.pic.twitter.com/5C73UzRqQk
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
CERT/CC proslijedio/la je Tweet
Very important security update for Windows
CVE-2018-0708 allows remote, unauthenticated code execution is RDP (Remote Desktop). A very bad thing you should patch against. Around 3 million RDP endpoints are directly exposed to internet. https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0708 …pic.twitter.com/u2V3uyoyVs
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
A user with the ability to run code (php, cgi, etc.) in the context of Apache can escalate privileges to root. CVE-2019-0211 Apply updates to get the fix. https://cfreal.github.io/carpe-diem-cve-2019-0211-apache-local-root.html … https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2019-0211 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
And just to be clear, this new Exchange vulnerability is CVE-2019-0686. If you have read any guidance that this new exchange vulnerability is CVE-2018-8581, or have taken actions assuming that the mitigations for CVE-2018-8581 will protect you, you may get an unpleasant surprise.
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
We've published a vulnerability note on the Exchange-mailbox-to-Domain-Admin privilege escalation vulnerability:https://www.kb.cert.org/vuls/id/465632/
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
An attacker with just the credentials of a single lowly Exchange mailbox user can gain Domain Admin privileges by using a simple tool.
@wdormann has confirmed on a default Exchange 2013 installation. It's very important to apply mitigations outlined here: https://dirkjanm.io/abusing-exchange-one-api-call-away-from-domain-admin/ …https://twitter.com/wdormann/status/1089566069747040256 …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Microsoft has released an out-of-band update for a JScript scripting engine vulnerability that is being exploited in the wild:https://www.kb.cert.org/vuls/id/573168/
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
At least until this issue is addressed, disable SIP Inspection in affected devices.https://twitter.com/Dinosn/status/1057855631410057216 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
We have updated https://www.kb.cert.org/vuls/id/906424 with detection rules using Microsoft Sysmon, courtesy of
@GossiTheDog. We also have provided experimental exploit mitigations, courtesy of@karsten_nilsen.Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Microsoft Windows task scheduler contains a local privilege escalation vulnerability in the ALPC interface https://www.kb.cert.org/vuls/id/906424 Affects all supported versions of Windows, and there is no fix available. Detection options using Sysmon are available herehttps://doublepulsar.com/task-scheduler-alpc-exploit-high-level-analysis-ff08cda6ad4f …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
CERT/CC proslijedio/la je Tweet
Thoughts on what it means now that EMET is past its EOL date: https://insights.sei.cmu.edu/cert/2018/08/life-beyond-microsoft-emet.html … TL;DR: - Windows 10 *finally* has EMET-like functionality and can now SAFELY import EMET profiles - "On by default" is NOT "Use default (on)" in WDEG - Keep using EMET if you're not on Win10pic.twitter.com/WYRR0PfFiH
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.