Unpatched Flaw in Adobe Flash is Being Exploited in the Wild

Posted by content on 05 February, 2018 | No Comments.

On February 1, 2018 Secunia Research issued the advisory SA81412, covering a “Extremely Critical”, unpatched vulnerability on Adobe Flash Player 28.x. The advisory was issued on the same day Adobe released the security advisory reporting on the flaw. According to the Secunia Advisory, this vulnerability (CVE-2018-4878) affects version 28.0.0.137 and prior running on Windows, Macintosh...Read More

Beyond Meltdown and Spectre

Posted by content on 15 January, 2018 | No Comments.

To bring some clarity to the Spectre and Meltdown situation, Flexera has compiled, and is making available here (see bottom of page), a rolling list of Secunia Research advisories we have issued related to the three CVE’s (CVE-2017-5754, CVE-2017-5753, CVE-2017-5715) affecting chips from e.g. Intel, AMD, ARM, and now NVidia. It’s important to note that...Read More

Is Patch Management evolving?

Posted by content on 04 December, 2017 | No Comments.

Recently, I was asked the question: “How would you characterize the traditional patch management space compared to how the market is evolving?” This was my answer: Patch management is a discipline that’s not evolving as fast as the markets. The main reason is that, as a rule, discussions about evolving patch management practices don’t get...Read More

Business Impact of a Breach and What You Can Do About It

Posted by content on 28 November, 2017 | No Comments.

Were you impacted by the Yahoo data breach? Regardless if you had one of the 500 million Yahoo email accounts, you were impacted if you were a stockholder, as the sales price to Verizon was reduced by an estimated $350 million. Target had a data breach in 2013 where the credit card and contact information...Read More

KRACK and the WPA2 Implementation Vulnerabilities – What’s up?

Posted by content on 18 October, 2017 | No Comments.

Are you overwhelmed reading the news about the Key Reinstallation AttaCK (KRACK) targeting vulnerabilities on implementations of the WPA2 Wi-Fi encryption scheme? Let’s review some facts to give it perspective: There is no attack at this point – Despite the “market” name, the attack is a proof of concept (POC) demonstrated by researcher Mathy Vanhoef,...Read More

Cyber Security Strategy Puts Focus on Prevention and Economic Opportunity

Posted by content on 13 October, 2017 | No Comments.

When Australian’s Cyber Security Strategy was launched over a year ago, it set out a bold vision for strengthening cyber defences in order to build trust and enable innovation, growth and prosperity. More than one year on, we’re pleased to say that the first annual update has reaffirmed this vision. In particular, it has placed...Read More

Apache Struts2 exploitation: Beyond putting out fires!

Posted by content on 25 September, 2017 | No Comments.

The unfolding of the Equifax breach shows that the attack started around two months after the vulnerability was disclosed – and the patch was made available – by the Apache Foundation. That means the vulnerability could have been eliminated with a patch long before the attack. The case exposes a persistent challenge IT and Dev...Read More

Flexera Completes Acquisition of BDNA

Posted by content on 19 September, 2017 | No Comments.

Flexera is extremely pleased to announce today that we’ve completed the acquisition of BDNA.  We first  announced our intent to acquire BDNA on September, 12 – and the transaction has now closed.  Terms of the agreement are not being disclosed. Another game changer for Flexera, we’ve brought together two leaders with a shared vision of...Read More

Flexera Completes Acquisition of BDNA

Posted by content on 19 September, 2017 | No Comments.

Flexera is extremely pleased to announce today that we’ve completed the acquisition of BDNA. We first announced our intent to acquire BDNA on September, 12 – and the transaction has now closed.  Terms of the agreement are not being disclosed. Another game changer for Flexera, we’ve brought together two leaders with a shared vision of how technology...Read More

The Equifax Breach and the tale “The Emperor’s New Clothes”

Posted by content on 17 September, 2017 | No Comments.

By Marcelo Pereira, Product Marketing Manager The tale H.C. Andersen’s tale “The Emperor’s New Clothes”, published in 1837, tells the story of a vain king, more concerned with his appearance and his clothes than with his kingdom and his subjects. The king is fooled by two weavers who promise him a new set of clothes,...Read More