Temporary micropatch available for zero-day Windows exploit Rocke coinminer disables cloud protection agents CSO Update January 20, 2019 Temporary micropatch available for zero-day Windows exploit A publicly disclosed Windows zero-day vulnerability could allow attackers to take full control of systems once they compromise a low-privilege account. Here's a fix. Read more ▶ Your Must-Read Stories • Rocke coinminer disables cloud protection agents • I can get and crack your password hashes from email • Building your forensic analysis toolset • Why AI-based threat detection hasn't taken over the market … yet • How to enable audit logs in Microsoft Office 365 • New CISO appointments, January 2019 White Paper: GoToMeeting A Buyer's Guide to Software Built for the Future of Work A transformation to a more globally dispersed, flexible and remote workforce is happening–in some companies more rapidly than others. Read more ▶ Rocke coinminer disables cloud protection agents Cryptojacker's new shell script A7 can remove cloud security agents from Alibaba and Tencent to avoid coinminer detection. Read more ▶ FROM OUR BUSINESS PARTNERS Get 3 Years of NordVPN Service for Just $2.99 Per Month - Deal Alert Safeguard yourself against snoops, and access blocked content with this no-log VPN service. NordVPN is just $2.99 per month for 3 years, if you sign up right now. Read more ▶ I can get and crack your password hashes from email Malicious hackers can use a simple trick to get your Windows computer to authenticate to a remote server that captures your password hash — just by sending you an email. Take these steps to test for the vulnerability. Read more ▶ Building your forensic analysis toolset Every security team should have these types of digital forensics tools available. Many are free, and there are enough options to find one that suits your skills and approach. Read more ▶ Why AI-based threat detection hasn't taken over the market … yet Vendors, analysts and buyers differ on why threat detection AI isn't more widely adopted, but they agree that it needs to provide better insight to its inner workings. Read more ▶ How to enable audit logs in Microsoft Office 365 Audit logging of Office 365 mail reads makes forensics investigations of attacks much easier. Here's how to make sure it's enabled. Read more ▶ New CISO appointments, January 2019 Find up-to-date news of CSO, CISO and other senior security executive appointments. Read more ▶ Research/Infographic: GoToMeeting Millennial's and Meetings: The Future of Collaboration Millennials may be new to the modern work environment, but their fresh perspective is raising the bar on productivity. Read more ▶ Email not displaying correctly? View it in your browser You are currently subscribed to CSO Update as tuwanan.mono@blogger.com. Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy Learn more about Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701 Please do not reply to this message. To contact someone directly, send an email to newsletters@idg.com.