Hi All,
VMware has released a Security Advisory for VMware Tools
VMSA-2023-0013 VMware Tools update addresses Authentication Bypass vulnerability (CVE-2023-20867) You can download the newest version of VMware Tools here: VMware Tools 12.2.5
After loggin in you need to consent to the general Terms to download the VMware Tools
In the downloaded zip File is the ISO File with the VMWare Tools for Windows
I’ve extracted the ISO, Renamed it and uploaded it to the Datastore
Hi All,
In Microsoft Code 1.79, there has been an update that fixes a security issue.
You can find the details here Closed Issue
A information disclosure vulnerability exists in VS Code 1.79.0 and earlier versions on Windows when file system operations are performed on malicious UNC paths. Examples include reading or resolving metadata of such paths. An authorised attacker must send the user a malicious file and convince the user to open it for the vulnerability to occur.
Hi All,
Yesterday, Microsoft has released new Exchange Security Updates. Read more at the Blog Post from the Exchange Team
Released: June 2023 Exchange Server Security Updates In my case that’s Exchange 2016 CU23 Security Update 8
Security Update For Exchange Server 2016 CU23 SU8 (KB5025903) Description of the security update for Microsoft Exchange Server 2016: June 13, 2023 (KB5025903) Installing the Security Update
After the Security Update is installed, it is a good idea to restart the Server.
Hi All,
Lately KeePass was in the Press because of the Security Eploit below.
Simple Security Exploit Allows Retrieval Of KeePass Master Password, Patch Inbound
In short, KeePass 2.53 and earlier loads the master password into memory in plaintext when it is entered via the keyboard. This means all an attacker has to do is get their hands on a memory dump regardless of if that comes from “the process dump, swap file (pagefile.
Hi All,
Just a few Hours ago, the Microsoft Defender for Office 365 Recommended Configuration Analyzer (ORCA) 2.5 was released to the PowerShell Gallery.
PowerShell Gallery ORCA 2.5
Seems like some bugs have been closed ORCA Closed Issues
Check installed Module and what’s available from the PowerShell Gallery
Get-InstalledModule ORCA Find-Module ORCA Uninstall old Module and install the newest one from the PowerShell Gallery
Uninstall-Module ORCA Install-Module ORCA Get-InstalledModule ORCA Check what commands are available in the Module
Hi All,
In 2015 i wanted to know how many SMTP Servers used STARTTLS, SPF, DKIM, DMARC. I’ve programmed a Webspider with PowerShell and collected about 100'000 Domains. Then made another Script that queried those domains and made SMTP Connect to find out if STARTTLS was in the ELHO Response. The Result was a Report of about 100'000 Domains from the .ch Top Level Domain.
The Results from 2015:
About 90% of the Domains used MX About 75% of the SMTP Servers offered STARTTLS About 28% of the Domains with MX had an SPF Record About 1% or less DKIM and DMARC was barely present In 2022 i have extracted the Open Data of Switch DNS Zone Data for the .
Hi All,
In this Blog Article i show you how you can enable Hybrid Cloud Kerberos Trust. So you can use Windows Hello for Business (WHfB) to authenticate with Kerberos to your OnPremise Active Directory Resources.
Overview An Architectual Overview can be found Here Enable passwordless security key sign-in to on-premises resources by using Azure AD
Enable Cloud Kerberos Trust How SSO to on-premises resources works on Azure AD joined devices
Hi All,
Recently my Colleque Tobias Asböck made me aware of the HTTP Security Headers.
You can test the Security Headers with the Online Scan from Scott Helme.
Ouch - that did not look good for my Website hosted on Azure App Service.
So how do i add these Headers?
It’s in the web.config File of the Project right afer the system.web configuration
<system.webServer> <security> <requestFiltering removeServerHeader="true" /> <!-- Removes Server header in IIS10 or later and also in Azure Web Apps --> </security> <httpProtocol> <customHeaders> <clear /> <!
Hi All,
A few days ago, Microsoft has released a new Version of the Microsoft Azure Information Protection labeling client.
Download Microsoft Azure Information Protection 2.16.73.0
Running the Installation with the *.msi File
The Installer removes the old version
and installs the new Version on the Client.
You can find “Azure Information Protection Viewer” in the Startmenu
Here you go. The new Version is installed
Regards
Andres Bohren
Azure Logo
Hi All,
Recently Microsoft has anounced Conditional Access Token Protection Preview.
Token protection (also known as token binding) attempts to reduce attacks using token theft by ensuring a token is usable only from the intended device. When an attacker is able to steal a token, by hijacking or replay, they can impersonate their victim until the token expires or is revoked. Token theft is thought to be a relatively rare event, but the damage from it can be significant.