3 leaked NSA exploits work on all Windows versions since Windows 2000

Email not displaying correctly? View it in your browser.

CSO

CSO Salted Hash

Feb 06, 2018
Featured Image

Why Spectre and Meltdown became a bleep-worthy debacle

Welcome to episode 17. This week, Steve is joined by senior staff writer J.M. Porup to talk about some recent developments related to Spectre and Meltdown, including patch fixes, future mitigations, and a curious (false) rumor about malware leveraging the disclosed vulnerabilities. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

3 leaked NSA exploits work on all Windows versions since Windows 2000
Get 3 Years of NordVPN Service for Just $2.75 Per Month
6 use cases for blockchain in security
Cloud security configuration errors put data at risk; new tools can help
Review: BluVector enables machines to protect themselves
Review: Mantix4 provides threat hunting as a service

White Paper: ServiceChannel

5 Perils of Outsourcing Your Facilities Management

Whether you currently outsource your facilities program or are considering it, you need to know what this approach really costs - and beyond just the actual dollars. Find out what's at risk from outsourcing your facilities management and the alternatives you should consider in this new eBook. Read More

Thumbnail Image

3 leaked NSA exploits work on all Windows versions since Windows 2000

The EternalSynergy, EternalRomance, and EternalChampion exploits have been reworked to work on all vulnerable Windows versions: Windows 2000 -- Server 2016. Read More

Thumbnail Image
DealPost

Get 3 Years of NordVPN Service for Just $2.75 Per Month

Safeguard yourself against snoops, and access blocked content with this no-log VPN service. NordVPN is just $2.75 per month for 3 years, if you sign up right now. Read More

Thumbnail Image

6 use cases for blockchain in security

Blockchain has the potential to improve encryption and authentication, and that could be good news for IoT security and DDoS protection. Read More

Thumbnail Image
INSIDER

Cloud security configuration errors put data at risk; new tools can help

As more and more companies move to the cloud, misconfigured services are putting data and systems at risk. New management tools can help. Read More

Thumbnail Image
INSIDER

Review: BluVector enables machines to protect themselves

With machine learning that gets smarter and more network-aware over time, BluVector can tip the scales back in favor of defenders. Read More

Thumbnail Image
INSIDER

Review: Mantix4 provides threat hunting as a service

Mantix4 provides robust threat hunting tools for use by clients, but it also takes threat hunting into the software as a service (SaaS) realm, employing a team of experts to hunt on the client's behalf. Read More

White Paper: Riverbed Technology

Best Practices for Successful Digital Experience Management

The digital user experience faces rising expectations from customers, cloud agility demands from business executives, and escalating complexity for IT professionals. The good news is, you can survive this perfect storm. Address these concerns, and ensure positive experiences for business-critical applications, by downloading Best Practices for Successful Digital Experience Management. Read More

CSO Insider

1. 10 old-school security priniciples that (still) rule
2. Top security certifications: Who they're for, what they cost, and which you need
3. 5 top machine learning use cases for security
4. 11 top tools to assess, implement, and maintain GDPR compliance
5. How hackers crack passwords and why you can't stop them

Editor's Picks

1. Spectre and Meltdown explained: What they are, how they work, what's at risk
2. Identity management definition, uses and solutions
3. Understanding the CVE and how it can help secure your company’s network
4. 8 top cyber attack maps and how to use them
5. The cyber kill chain explained: Why it's not always the right approach to cyber attacks
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Salted Hash as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright © 2018 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.