<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: RDP - Really Do Patch Today! in Tech Talk</title>
    <link>https://community.isc2.org/t5/Tech-Talk/RDP-Really-Do-Patch-Today/m-p/22843#M1328</link>
    <description>&lt;P&gt;UPDATE:&amp;nbsp;&lt;/P&gt;&lt;P&gt;Traffic from Tor exit nodes is indicating that threat actors have started their Internet recon to discover and tabulate &lt;A href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0708" target="_blank" rel="noopener"&gt;CVE-2019-0708&lt;/A&gt; (Bluekeep) vulnerable hosts (lots of scnning stats in this blog post &lt;A href="https://blog.erratasec.com/2019/05/almost-one-million-vulnerable-to.html#.XO1EPIhKiUk" target="_blank" rel="noopener"&gt;here&lt;/A&gt;). On the positive side, we are seeing lots IDS signature development (&lt;A href="https://snort.org/advisories/talos-rules-2019-05-20" target="_blank" rel="noopener"&gt;SNORT&lt;/A&gt;, &lt;A href="https://github.com/nccgroup/Cyber-Defence/blob/master/Signatures/suricata/2019_05_rdp_cve_2019_0708.txt" target="_blank" rel="noopener"&gt;Suricata&lt;/A&gt;) and a Bluescanner (&lt;A href="https://github.com/zerosum0x0/CVE-2019-0708" target="_blank" rel="noopener"&gt;GitHub&lt;/A&gt;) that can be used to assess exposure.&lt;/P&gt;</description>
    <pubDate>Tue, 28 May 2019 14:25:38 GMT</pubDate>
    <dc:creator>AppDefects</dc:creator>
    <dc:date>2019-05-28T14:25:38Z</dc:date>
    <item>
      <title>RDP - Really Do Patch Today!</title>
      <link>https://community.isc2.org/t5/Tech-Talk/RDP-Really-Do-Patch-Today/m-p/22724#M1322</link>
      <description>&lt;P&gt;Here's the latest on the Microsoft RDP vulnerability (CVE-2019-0708). McAfee published a great technical analysis on the software defect in the protocol - complete with sequence diagrams!&amp;nbsp;&lt;A href="https://securingtomorrow.mcafee.com/other-blogs/mcafee-labs/rdp-stands-for-really-do-patch-understanding-the-wormable-rdp-vulnerability-cve-2019-0708/" target="_blank"&gt;https://securingtomorrow.mcafee.com/other-blogs/mcafee-labs/rdp-stands-for-really-do-patch-understanding-the-wormable-rdp-vulnerability-cve-2019-0708/&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 09 Oct 2023 09:12:44 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/RDP-Really-Do-Patch-Today/m-p/22724#M1322</guid>
      <dc:creator>AppDefects</dc:creator>
      <dc:date>2023-10-09T09:12:44Z</dc:date>
    </item>
    <item>
      <title>Re: RDP - Really Do Patch Today!</title>
      <link>https://community.isc2.org/t5/Tech-Talk/RDP-Really-Do-Patch-Today/m-p/22843#M1328</link>
      <description>&lt;P&gt;UPDATE:&amp;nbsp;&lt;/P&gt;&lt;P&gt;Traffic from Tor exit nodes is indicating that threat actors have started their Internet recon to discover and tabulate &lt;A href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0708" target="_blank" rel="noopener"&gt;CVE-2019-0708&lt;/A&gt; (Bluekeep) vulnerable hosts (lots of scnning stats in this blog post &lt;A href="https://blog.erratasec.com/2019/05/almost-one-million-vulnerable-to.html#.XO1EPIhKiUk" target="_blank" rel="noopener"&gt;here&lt;/A&gt;). On the positive side, we are seeing lots IDS signature development (&lt;A href="https://snort.org/advisories/talos-rules-2019-05-20" target="_blank" rel="noopener"&gt;SNORT&lt;/A&gt;, &lt;A href="https://github.com/nccgroup/Cyber-Defence/blob/master/Signatures/suricata/2019_05_rdp_cve_2019_0708.txt" target="_blank" rel="noopener"&gt;Suricata&lt;/A&gt;) and a Bluescanner (&lt;A href="https://github.com/zerosum0x0/CVE-2019-0708" target="_blank" rel="noopener"&gt;GitHub&lt;/A&gt;) that can be used to assess exposure.&lt;/P&gt;</description>
      <pubDate>Tue, 28 May 2019 14:25:38 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/RDP-Really-Do-Patch-Today/m-p/22843#M1328</guid>
      <dc:creator>AppDefects</dc:creator>
      <dc:date>2019-05-28T14:25:38Z</dc:date>
    </item>
    <item>
      <title>Re: RDP - Really Do Patch Today!</title>
      <link>https://community.isc2.org/t5/Tech-Talk/RDP-Really-Do-Patch-Today/m-p/23269#M1360</link>
      <description>&lt;P&gt;I think that RDP also means Ransomware Download Program.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Paul&lt;/P&gt;</description>
      <pubDate>Wed, 05 Jun 2019 18:38:58 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/RDP-Really-Do-Patch-Today/m-p/23269#M1360</guid>
      <dc:creator>Radioteacher</dc:creator>
      <dc:date>2019-06-05T18:38:58Z</dc:date>
    </item>
  </channel>
</rss>

