Marc Maiffret

Type: Person
Name: Marc Maiffret
First reported Aug 13 2014 - Updated Aug 14 2014 - 1 reports

Giant Internet Explorer Patch in August Patch Tuesday

Microsoft fixed 37 vulnerabilities in Internet Explorer and in supported versions of Windows as part of its August Patch Tuesday release.There were nine security bulletins for August, of which two were rated as critical, according to Microsoft's advisory. ... [Published PC Magazine - Aug 13 2014]
First reported Aug 13 2014 - Updated Aug 13 2014 - 1 reports

10 major security threats revealed at Black Hat 2014

Hacker Threat Research Plays Role In Shaping Security MarketThreat research presented at Black Hat 2014 and smaller, regional conferences plays a small but significant role in influencing how security vendors shape their product portfolio and feature ... [Published Computer Reseller News Australia - Aug 13 2014]
First reported Aug 06 2014 - Updated Aug 06 2014 - 1 reports

Billions of Internet accounts harvested in largest cyber crime hacking yet

A relatively young Russian cyber crime ring now has illegally harvested the largest known cache of Internet identities . The collection includes 1.2 billion (yes- billion) username and password combinations and more than 500 million email addresses according ... [Published Examiner.com - Aug 06 2014]
First reported Aug 06 2014 - Updated Aug 06 2014 - 1 reports

Russian cyberthieves steal 1.2B passwords

Security researchers say a Russian crime ring has pulled off the largest known theft of confidential Internet information, including 1.2 billion user name and password combinations and more than 500 million e-mail addresses.The cybergang injected malicious ... [Published HispanicBusiness.com - Aug 06 2014]
First reported Jul 17 2014 - Updated Jul 18 2014 - 1 reports

Police surround house after video-game 'smack talk'

A video game grudge become really dangerous, really fast, for one Surprise family when an opponent in an online video game apparently made a call which led to police surrounding the house.It's called "swatting" and it goes like this: One of the other ... [Published AZCentral.com - Jul 17 2014]
First reported Jun 02 2014 - Updated Jun 02 2014 - 1 reports

Cybersecurity Expert Richard A. Clarke and LA County District Attorney...

Business Executives and IT Professionals Attend Cybercrime Summit in Record Numbers Nearly 800 of the country’s leading cybercrime experts, information security professionals, company CEOs and other C-suite business executives recently attended the 6th ... [Published PRWeb - Jun 02 2014]
First reported Apr 29 2014 - Updated Apr 30 2014 - 2 reports

Where’s the next Heartbleed Bug lurking?

The Heartbleed bug was discovered earlier this month in a piece of software called OpenSSL that is widely used to establish a secure connection between Web browsers and servers by managing the cryptographic keys involved. OpenSSL is an “open source” project, ... [Published ECN - Apr 30 2014]
First reported Apr 29 2014 - Updated Apr 29 2014 - 3 reports

Understanding Vulnerability Management

"If you're not doing the right things on managing vulnerabilities, it doesn't really matter what other kinds of sophisticated things you do - that's the baseline for security," says BeyondTrust's Marc Maiffret. ... [Published CareersInfoSecurity.com - Apr 29 2014]
First reported Apr 12 2014 - Updated Apr 12 2014 - 1 reports

NSA denies report that it used Heartbleed bug to capture information

The National Security Agency on Friday strongly denied a news report that said the government failed to warn the public about the notorious Heartbleed software flaw -- allegedly because the NSA wanted to continue using it to gather intelligence.The story, ... [Published San Jose Mercury News - Apr 12 2014]
First reported Apr 04 2014 - Updated Apr 04 2014 - 1 reports

BeyondTrust Chief Technology Officer Marc Maiffret to Speak at ISSA-LA...

Security research pioneer, cybersecurity visionary and winner of numerous product awards, Marc Maiffret, discovered the first Microsoft computer worm, “CodeRed” and was named one of People Magazine’s “30 People Under 30” Marc Maiffret, Chief Technology ... [Published PRWeb - Apr 04 2014]
First reported Mar 26 2014 - Updated Mar 26 2014 - 1 reports

Re: On Phillippe Courtot's RSAC Keynote

Posted by Marc Maiffret on Mar 26 Attackers and exploitation tools are false negative heavy. Not allexploits have the same reliability as to not produce false negatives.This could be as simple as an IT person using a default Metasploitexploit which simply ... [Published Daily Dave - Mar 26 2014]
First reported Mar 23 2014 - Updated Mar 23 2014 - 2 reports

NSP Microcast – RSAC2014 – BeyondTrust

I had a chance to sit down with  BeyondTrust  CTO, Marc Maiffret.  I’ve had conversations with Marc before, but I haven’t seen him since he has been at BeyondTrust, so I took this time to find out what they do and how it would be used by the average ... [Published Network Security Blog - Mar 23 2014]

Quotes

The cross-site scripting flaw in SQL Server patch can be exploited "to take any action a user could take on a site on behalf of the targeted user" Maiffret said...
...that's ever been discovered,” said Marc Maiffret, the chief technical officer at BeyondTrust, a Pheonix, Arizona-based computer security company. "there's always lots of changes when the dust settles, it takes months to know how important a breach was" he said

More Content

All (19) | News (13) | Reports (0) | Blogs (6) | Audio/Video (0) | Fact Sheets (0) | Press Releases (0)
sort by: Date | Relevance
Giant Internet Explorer Patch in August Patch T... [Published PC Magazine - Aug 13 2014]
10 major security threats revealed at Black Hat... [Published Computer Reseller News Australia - Aug 13 2014]
Billions of Internet accounts harvested in larg... [Published Examiner.com - Aug 06 2014]
Russian cyberthieves steal 1.2B passwords [Published HispanicBusiness.com - Aug 06 2014]
Police surround house after video-game 'smack t... [Published AZCentral.com - Jul 17 2014]
Cybersecurity Expert Richard A. Clarke and LA C... [Published PRWeb - Jun 02 2014]
Where’s the next Heartbleed Bug lurking? [Published ECN - Apr 30 2014]
Where’s the Next Heartbleed Bug Lurking? [Published Technology Review - Apr 29 2014]
Understanding Vulnerability Management [Published CareersInfoSecurity.com - Apr 29 2014]
Understanding Vulnerability Management [Published HealthcareInfoSecurity.com - Apr 29 2014]
Understanding Vulnerability Management [Published GovInfoSecurity.com - Apr 29 2014]
NSA denies report that it used Heartbleed bug t... [Published San Jose Mercury News - Apr 12 2014]
Last Call for XP, Office 2003 Updates: April Pa... [Published threatpost - The First Stop for Security News - Apr 08 2014]
BeyondTrust Chief Technology Officer Marc Maiff... [Published PRWeb - Apr 04 2014]
Re: On Phillippe Courtot's RSAC Keynote [Published Daily Dave - Mar 26 2014]
NSP Microcast – RSAC2014 – BeyondTrust [Published Network Security Blog - Mar 23 2014]
NSP Microcast – RSAC2014 – BeyondTrust [Published Security Bloggers Network - Mar 23 2014]
Microsoft Closes Critical IE Security Vulnerabi... [Published SecurityWeek RSS Feed - Mar 11 2014]
Microsoft Patches Critical Internet Explorer, W... [Published SecurityWeek RSS Feed - Feb 11 2014]
1
In Focus
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Content Volume
Document Volume
Network
Network

Blogs

sort by: Date | Relevance
Last Call for XP, Office 2003 Updates: April Pa... [Published threatpost - The First Stop for Security News - Apr 08 2014]
As expected , Microsoft issued its final epitaph for Windows XP today, pushing out four security bulletins for 11 vulnerabilities, including the last updates for the oft-maligned, thirteen-year-old operating system.  Despite it being XP’s last gasp ...
Re: On Phillippe Courtot's RSAC Keynote [Published Daily Dave - Mar 26 2014]
Posted by Marc Maiffret on Mar 26 Attackers and exploitation tools are false negative heavy. Not allexploits have the same reliability as to not produce false negatives.This could be as simple as an IT person using a default Metasploitexploit which simply ...
NSP Microcast – RSAC2014 – BeyondTrust [Published Network Security Blog - Mar 23 2014]
I had a chance to sit down with  BeyondTrust  CTO, Marc Maiffret.  I’ve had conversations with Marc before, but I haven’t seen him since he has been at BeyondTrust, so I took this time to find out what they do and how it would be used by the average ...
NSP Microcast – RSAC2014 – BeyondTrust [Published Security Bloggers Network - Mar 23 2014]
I had a chance to sit down with BeyondTrust CTO, Marc Maiffret.  I’ve had conversations with Marc before, but I haven’t seen him since he has been at BeyondTrust, so I took this time to find out what they do and how it would be used by the average enterprise.  ...
Microsoft Closes Critical IE Security Vulnerabi... [Published SecurityWeek RSS Feed - Mar 11 2014]
The bad news - attackers have continued to leverage a highly-publicized Internet Explorer vulnerability. The good news is however that vulnerability now has a patch. Inside the five security bulletins Microsoft released today for Patch Tuesday is ...
1 2
Contact Us
Sales
Support


Freebase CC-BY Some image thumbnails are sourced from Freebase, licensed under CC-BY

Copyright (C) 2014 Silobreaker Ltd. All rights reserved.
The selection and placement of stories and images on any Silobreaker page are determined automatically by a computer program.
The time or date displayed reflects when an article was added to or updated in Silobreaker.