Vulnerability Spotlight: Total Commander FileInfo Plugin Denial of Service

By Talos Group Talos is releasing an advisory for multiple vulnerabilities that have been found within the Total Commander FileInfo Plugin. These vulnerabilities are local denial of service flaws and have been assigned CVE-2015-2869. In accordance with our Vendor Vulnerability Reporting and Disclosure policy, these vulnerabilities have been disclosed to the plugin author(s) and CERT. This post serves as a summary of the advisory. Credit for these discoveries belongs to Marcin Noga of Talos. TALOS-2015-024/CVE-2015-2869 An attacker who controls the content of a COFF Archive Library []

Source:: Cisco Security Notice

Top 5 Success Factors for Cybersecurity Management Programs

By Stuart Broderick Several years ago, an employee at an organization I worked for was terminated from his job, effective immediately. While being escorted from the facility this user picked up “his” backup media and started to leave the building. Fortunately, the security guards thought this was a little suspicious and escorted the user to the data center to ask whether this was permitted. They learned it wasn’t permitted and the user challenged the company’s right to confiscate of “his backup media”. In []

Source:: Cisco Security Notice

Top 5 Success Factors for Cybersecurity Management Programs

By Stuart Broderick Several years ago, an employee at an organization I worked for was terminated from his job, effective immediately. While being escorted from the facility this user picked up “his” backup media and started to leave the building. Fortunately, the security guards thought this was a little suspicious and escorted the user to the data center to ask whether this was permitted. They learned it wasn’t permitted and the user challenged the company’s right to confiscate of “his backup media”. In []

Source:: Cisco Security Notice

Agieren statt reagieren mit azeti SONARPLEX

Die Lösung zur Überwachung Ihrer Infrastruktur: azeti SONARPLEX Monitoring von Oberberg-Online. Bewährt im 24/7 Einsatz seit über 10 Jahren.

SONARPLEX beinhaltet zahlreiche Möglichkeiten, um ein professionelles Monitoring in IT-Umgebungen abzubilden. Ein auf Templates basiertes Arbeiten erleichtert dem Anwender die Konfiguration und ist ein Garant für einfache Bedienbarkeit. Mit dem SONARMANAGER lassen sich 1-n Standorte managen und überwachen. Somit können viele verteilte Niederlassungen zentral überwacht werden. Jede lokal installierte Appliance überwacht dabei autonom einen Standort und liefert ihre Ergebnisse an die Zentrale. Haben Sie viele verteilte Standorte, technische Infrastrukturen, Niederlassungen oder sind ein Systemhaus und wollen Ihren Kunden managed services anbieten? Dann ist azeti‘s Technologie ideal, um die Effizienz Ihres Unternehmens zu steigern. Gern beraten wir Sie in einem persönlichen Gespräch, um unsere Produkte und Solutions vorzustellen und Ihnen ein maßgeschneidertes Angebot zu unterbreiten. Neben den klassischen Ethernet basierten Überwachungsumgebungen in der IT, wie zum Beispiel Server, Router, Switches etc., bietet azetis SONARPLEX Technologie ebenfalls die Möglichkeit, technische Parameter aus dem Bereich des Managements von Gebäuden und Objekten zu überwachen. So können mehrere Abteilungen auf ein und dieselbe Monitoringlösung zugreifen. Der SONARMANAGER lässt eine Mandantenfähigkeit zu. Die Anwendungen im Internet der Dinge sind so mannigfaltig wie unsere Kunden selbst. Der Einsatz von MODBUS in der E-Technik, drahtlosen Sensoren oder Bluetooth 4.0 ermöglicht es zum Beispiel Temperatur, Luftfeuchtigkeit, Türkontakte, Keypads, Kameras, Batteriestatus oder Füllstände von Tanks zu monitoren. azeti’s SONARPLEX Technologie ist als Appliance, einer Kombination aus Hard- und Software, erhältlich. Dadurch wird die weitere Anschaffung von Equipment überflüssig. Der Aufwand für Unternehmen sich eine azeti Monitoringlösung anzuschaffen, ist damit überschaubar und planbar. SONARPLEX arbeitet wie ein autarkes System und erhöht ihre Unternehmens-sicherheit. azeti Networks bietet hierfür verschiedene Hardware Plattformen sowie eine virtuelle azeti Appliance.

Steigen Sie mit Oberberg-Online ein in professionelles IT-Monitoring.

Unser Kennenlern-Bundle enthält:
– azeti SONARPLEX 1900 oder NG (je nach Ihrer gewünschten Anwendung)
– GSM-Modem
– Temperatursensor
– Luftfeuchtigkeitssensor
Was Sie mit der azeti SONARPLEX sonst noch überwachen und schützen können, zeigen wir Ihnen gerne auch live.

Erste Informationen können Sie hier herunterladen:

azeti NG Schaubild

– azeti Sonarplex Broschüre

Sprechen Sie mit uns unter 02261 9155050 oder vertrieb@oberberg.net

 

AMP Threat Grid Integrated with Email Security

By Joe Malenfant We recently announced the release of AsyncOS 9.5 for Cisco Email Security that included the integration of AMP Threat Grid. Now if Threat Grid could talk it would sound a lot like Ron Burgundy and say “I’m not sure if you know this, but I’m kind of a big deal.” Email is consistently one of the top two threat vectors for malware because so many people out there still open an attachment that looks harmless from someone they don’t know. We all []

Source:: Cisco Security Notice

AMP Threat Grid Integrated with Email Security

By Joe Malenfant We recently announced the release of AsyncOS 9.5 for Cisco Email Security that included the integration of AMP Threat Grid. Now if Threat Grid could talk it would sound a lot like Ron Burgundy and say “I’m not sure if you know this, but I’m kind of a big deal.” Email is consistently one of the top two threat vectors for malware because so many people out there still open an attachment that looks harmless from someone they don’t know. We all []

Source:: Cisco Security Notice

Fortinet Brings Advanced Protection of High-Performance Internal Segmentation Firewalls to Mid-Market and Enterprise Organizations

Fortinet Brings Advanced Protection of High-Performance Internal Segmentation Firewalls to Mid-Market and Enterprise Organizations

Source:: Fortinet

Fortinet Brings Advanced Protection of High-Performance Internal Segmentation Firewalls to Mid-Market and Enterprise Organizations

Fortinet Brings Advanced Protection of High-Performance Internal Segmentation Firewalls to Mid-Market and Enterprise Organizations

Source:: Fortinet

Microsoft Patch Tuesday – July 2015

By Talos Group Today, Microsoft has released their monthly set of security bulletins designed to address security vulnerabilities within their products. This month’s release sees a total of 14 bulletins being released which address 57 CVEs. Four of the bulletins are listed as Critical and address vulnerabilities in Windows Server Hyper-V, VBScript Scripting Engine, Remote Desktop Protocol (RDP) and Internet Explorer. The remaining ten bulletins are marked as Important and address vulnerabilities in SQL Server, Windows DCOM RPC, NETLOGON, Windows Graphic Component, Windows []

Source:: Cisco Security Notice

Microsoft Patch Tuesday – July 2015

By Talos Group Today, Microsoft has released their monthly set of security bulletins designed to address security vulnerabilities within their products. This month’s release sees a total of 14 bulletins being released which address 57 CVEs. Four of the bulletins are listed as Critical and address vulnerabilities in Windows Server Hyper-V, VBScript Scripting Engine, Remote Desktop Protocol (RDP) and Internet Explorer. The remaining ten bulletins are marked as Important and address vulnerabilities in SQL Server, Windows DCOM RPC, NETLOGON, Windows Graphic Component, Windows []

Source:: Cisco Security Notice