-
Great example of high quality
#cryptoapi providers leading the way on market structure mechanics and insight discovery https://twitter.com/thetokenanalyst/status/1223283580106936320 … -
See how
#ZENworks2020 can protect against threats such as the#Windows#CryptoAPI Spoofing Vulnerability in our new#Endpoint Management blog: http://ms.spr.ly/6014TZTqq#SecurityandRiskpic.twitter.com/DHmeRwZJ4t
-
It's now February, has your org installed all January 2020 Patch Tuesday patches to mitigate the
#Windows#CryptoAPI Spoofing Vulnerability yet? If not, see how#ZENworks 2020#endpoint solutions can help: http://ms.spr.ly/6013TZTST#SecurityandRiskpic.twitter.com/m7ZYAmt4Kx
-
#PatchTuesday: (CVE-2020-0601) Read#Fortinet's latest blog for info on a recent vulnerability dubbed#CurveBall or#ChainOfFools that affects Windows 10, Windows 2016, and the 2019 version of crypt32.dll that implements Windows'#CryptoAPI: https://ftnt.net/60141gHI6#FortiResearchpic.twitter.com/x83B9xNjXC
-
A client test is now available for CVE-2020-0601, the Microsoft Windows
#CryptoAPI spoofing vulnerability, aka#CurveBall, at https://clienttest.ssllabs.com . More athttps://blog.qualys.com/laws-of-vulnerabilities/2020/01/14/microsoft-windows-cryptoapi-spoofing-vulnerability-cve-2020-0601-how-to-detect-and-remediate … -
#ZENworks 2020 is uniquely positioned to help you mitigate critical vulnerabilities like the#Windows#CryptoAPI Spoofing Vulnerability. Get more info in our new#Endpoint Management blog: http://ms.spr.ly/6014Tkqup#SecurityandRisk pic.twitter.com/2gUDREPLkf
-
En
@Hacklab_Co 2020 - Primera reunión hablamos de#cryptoapi#curveball, les comparto los slides presentados en la sesión https://www.slideshare.net/ciberseguridad/hacklab-2020-primera-reunin … via@SlideShare -
See
@jac0byterebel brilliant blogpost on@Microsoft having patched a vulnerability in their own Windows#CryptoAPI that allows an attacker to use a spoofed#code signing certificate to sign their very own malicious executables and run them on your system! https://vindler.de/blog/2020/01/on-CVE-2020-0601.html …pic.twitter.com/DDOBwUnxID
-
A lot has been written about CVE-2020-0601 and POCs, the question that you should be asking is does your security solution protect your business? We do, regardless of your Windows version.
#curveball#cryptoAPI pic.twitter.com/w7cd6snOr2 -
I wrote a diary containing research I've done regarding
#cryptoapi#ecc#cve-2020-0601 vulnerability.@johullrich also put up a test web page at https://curveballtest.com/ And we managed to circumvent Chrome too (Google fixed that today, patch!). Read at https://isc.sans.edu/diary//25720 -
In light of Windows
#CryptoAPI vulnerability, see how you can use Salt to quickly discover vulnerable assets, and patch them in minutes: http://bit.ly/38ccDQ4#SecOpspic.twitter.com/xUxQFvecDN
-
Are you vulnerable to "
#Curveball" (CVE-2020-0601) or not? use https://curveballtest.com to test.#microsoft#cryptoapi . Please let us know if you are running into problems. pic.twitter.com/0xnd3dYvri
-
Nice idea by
@DidierStevens If you want to do the same thing in PowerShell, here's a short script that will generate the event in Windows Event Log, Application - great for blue teams to test detection: https://pastebin.com/yusYHYHL@sans_isc#cryptoapi#microsoft#BlueTeam https://twitter.com/johullrich/status/1217538002513211392 …pic.twitter.com/5A5AAbKpEL
-
Great work by
@DidierStevens to help you test your systems for CVE-2020-0601 (#microsoft#cryptoapi ) https://blog.didierstevens.com/2020/01/15/using-cveeventwrite-from-vba-cve-2020-0601/ … -
Need to brief your boss about the Microsoft CryptoAPI flaw? We got some PPTs for you to use: https://isc.sans.edu/presentations/TalkingToYourBossAboutCryptoAPI.pptx …
#cryptoapi#crypt32.dll#cve-2020-0601#microsoftpic.twitter.com/jD1GXdtzAQ
-
A serious
#security#vulnerability has been found in#Windows 10 and Server 2016. Make sure your security patches are up-to-date.#Microsoft#NSA#CryptoAPI#cybersecurityhttps://www.wired.com/story/nsa-windows-10-vulnerability-disclosure/ … -
If you are running Windows 10, UPDATE NOW. (Report here via
@zackwhittaker : https://hubs.ly/H0mzWFX0 ) Severe Windows#CryptoAPI spoofing vulnerability (CVE-2020-0601) discovered by the#NSA. -
WARNING: Install Latest Windows 10 Updates Immediately! Microsoft today released patches for a severe Windows
#CryptoAPI spoofing vulnerability (CVE-2020-0601) that was discovered by the National Security Agency (NSA). Read more: https://thehackernews.com/2020/01/warning-quickly-patch-new-critical.html …#PatchTuesday#infosecpic.twitter.com/jW9j0AYe1c
Prikaži ovu nit -
my quick take on CVE-2020-0601 (
#CryptoAPI flaw): Yes, it will affect endpoint protection. But below it in the list is something that looks BlueKeep'ish that I think people should fix quickly too (CVE-2020-0609/0610).#cve20200601#crypt32dll#codeblue
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.
New Research
Should you be worried about the increasing centralization of mining pools that control ~50% of the total
Read the full piece by