• img February 15, 2018

A five-year analysis of reported Windows vulnerabilities

Based on analysis of all disclosed Microsoft vulnerabilities in 2017, a new Avecto report shows a significant rise in the number of reported vulnerabilities. Last year, 685 vulnerabilities were found versus 325 vulnerabilities that were found in 2013. The removal of admin rights could mitigate 80% of all critical Microsoft vulnerabilities reported in 2017. Nearly […]

Read More
  • img February 15, 2018

Cryptomining malware continues to drain enterprise CPU power

Cryptomining malware continues to impact organizations globally as 23% were affected by the Coinhive variant during January 2018, according to Check Point’s latest Global Threat Impact Index. Researchers discovered three different variants of cryptomining malware in its Top 10 most prevalent ranking, with Coinhive ranking first, impacting more than one-in-five organizations. Coinhive performs online mining […]

Read More
  • img February 14, 2018

Dell EMC Patches Critical Flaws in VMAX Enterprise Storage Systems

Attacks include a hard-coded password vulnerability that could give attackers unauthorized access to systems.   This post was originally published on https://threatpost.com/feed/. https://blacklakesecurity.com/dell-emc-patches-critical-flaws-in-vmax-enterprise-storage-systems/

Read More
  • img February 14, 2018

Microsoft boosts Windows Analytics to help squash Meltdown and Spectre bugs

A day after Microsoft announced it will be adding Windows Defender ATP down-level support for older OSes comes the news that its Windows Analytics service is getting new capabilities aimed at helping businesses tackle Meltdown and Spectre vulnerabilities on machines in their fleet. What is Windows Analytics? Windows Analytics is a free telemetry analysis tool […]

Read More
  • img February 14, 2018

Researchers Find New Twists In ‘Olympic Destroyer’ Malware

Researchers now believe attackers may have had prior access to networks and that malware was more sophisticated than originally believed.   This post was originally published on https://threatpost.com/feed/. https://blacklakesecurity.com/researchers-find-new-twists-in-olympic-destroyer-malware/

Read More