Microsoft fixes 55 vulnerabilities, 3 exploited by Russian cyberspies

Email not displaying correctly? View it in your browser.

CSO

CSO Salted Hash

May 10, 2017
Featured Image

New IoT malware targets 100,000 IP cameras via known flaw

Over 100,000 internet-connected cameras may be falling prey to a new IoT malware that’s spreading through recently disclosed vulnerabilities in the products. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Microsoft fixes 55 vulnerabilities, 3 exploited by Russian cyberspies
57% off J5 Tactical V1-Pro Ultra Bright 3 Mode Flashlight - Deal Alert
FCC hit with DDoS attacks after John Oliver takes on net neutrality
Top DRaaS companies to watch
Industrial robots are security weak link
Microsoft fixes remote hacking flaw in Windows Malware Protection Engine
Vendors approve of NIST password draft

Webcast: CA Technologies

Live Event: 3rd Annual DevOps Virtual Summit

Today's business leaders are transforming software delivery and building significant competitive advantage by successfully leveraging agile and DevOps methodologies in concert. Having spent countless hours recasting culture, advancing innovation and engaging greater levels of automation, related best practices now exist to be shared and further refined by all. Expanding DevOps adoption from pockets of early adoption across the entire software delivery lifecycle is the challenge that most organizations now face. Join us live March 7th for this virtual summit and get the real-world expertise and hands-on guidance available only from the industry's leading practitioners and DevOps evangelists. Read More

Thumbnail Image

Microsoft fixes 55 vulnerabilities, 3 exploited by Russian cyberspies

Microsoft released security patches Tuesday for 55 vulnerabilities across the company's products, including three flaws that have already been exploited in targeted attacks by cyberespionage groups. Read More

Thumbnail Image
DealPost

57% off J5 Tactical V1-Pro Ultra Bright 3 Mode Flashlight - Deal Alert

This flashlight is tough as nails and produces an intense beam of light up to 600 feet. Runs for hours on a single AA battery. Currently discounted 57% on Amazon. Read More

Thumbnail Image

FCC hit with DDoS attacks after John Oliver takes on net neutrality

The FCC's website slowed to a crawl after comic and political commentator John Oliver urged viewers to flood the agency with comments in support of net neutrality, in what appeared to be a repeat of a 2014 incident. But the cause may have been more sinister than people expressing their support for net neutrality rules. Read More

Thumbnail Image

Top DRaaS companies to watch

Forrester Research recently released its report naming Sungard AS, Bluelock, IBM, and iland as the top disaster recovery-as-a-service companies. See its reasoning why. Read More

Thumbnail Image

Industrial robots are security weak link

Industrial robots used in factories and warehouses that are connected to the internet are not secure, leaving companies open to cyberattacks and costly damages, a study finds. Read More

Thumbnail Image

Microsoft fixes remote hacking flaw in Windows Malware Protection Engine

Microsoft released an update for the malware scanning engine bundled with most of its Windows security products to fix a highly critical vulnerability that could allow attackers to hack computers. Read More

Thumbnail Image

Vendors approve of NIST password draft

The draft guidelines revise password security recommendations and altering many of the standards and best practices security professionals use when forming policies for their companies. Read More

eBook: Silver Peak Systems Inc

2017 Trends: SD-WAN Advances Towards Mainstream Adoption

As SD-WAN adoption continues to gain ground and go mainstream in 2017, the majority of initial enterprise deployments will be hybrid, leveraging both MPLS and a complement of broadband connectivity. Many enterprises already have some level of broadband connectivity to branch and remote locations, but these links often remain idle or are relegated to backup or disaster recovery (DR). Read More

Top 5 Stories

1. Making sense of cybersecurity qualifications
2. Third parties leave your network open to attacks
3. Job seekers beware of recruiters
4. Recent Google Docs Phishing attack is a win for Blue Teams
5. What's the key to surviving as a cyber-security start-up?

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Salted Hash as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.