• Home
  • Resources
    • Cybersecurity Policy Chart
    • CSIAC Reports
    • Webinars
    • Podcasts
    • Cybersecurity Digest
    • Standards & Reference Docs
    • Journals
    • Certifications
    • Acronym DB
    • Cybersecurity Related Websites
  • Services
    • Free Technical Inquiry
    • CAT Program
    • Subject Matter Experts
    • Store
    • Training
    • Contact
  • Community
    • Upcoming Events
    • Cybersecurity
    • Modeling & Simulation
    • Knowledge Management
    • Software Engineering
    • Cyber COI
  • About
    • About the CSIAC
    • The CSIAC Team
    • DTIC’s IAC Program
    • DTIC’s R&E Gateway
    • Inquiries & CAT’s
    • FAQ’s
    • DTIC STI Program
  • Cart
  • Skip to primary navigation
  • Skip to content
  • Skip to primary sidebar
  • Skip to footer
Login / Register

CSIAC

Cyber Security and Information Systems Information Analysis Center

header-right

Main navigation

  • Resources
    • Cybersecurity Policy Chart
    • CSIAC Reports
    • Webinars
    • Podcasts
    • Cybersecurity Digest
    • Standards & Reference Docs
    • Journals
    • Certifications
    • Acronym DB
    • Topic Tags
    • Cybersecurity Websites
  • Services
    • Free Technical Inquiry
    • CAT Program
    • Subject Matter Experts
    • Store
    • Training
    • Contact
  • Community
    • Upcoming Events
    • Cybersecurity
    • Modeling & Simulation
    • Knowledge Management
    • Software Engineering
    • Cyber COI
  • About
    • About the CSIAC
    • The CSIAC Team
    • DTIC’s IAC Program
    • DTIC’s R&E Gateway
    • Inquiries & CAT’s
    • FAQ’s
    • DTIC STI Program
  • Cart
  • Cybersecurity
  • Modeling & Simulation
  • Knowledge Management
  • Software Engineering
  • Cyber COI
/ Microsoft

Topic: Microsoft

Digest Article

Microsoft Word Vuln Went Unnoticed for 17 Years: Report

Posted: 11/28/2017 | Leave a Comment

Researchers at Embedi, a firm specializing in security for embedded devices, today released a report on a 17-year-old remote code execution vulnerability in Microsoft Office, which was patched today. They claim it has not been patched and Microsoft did not know it existed. Read More

Digest Article

Exclusive: Microsoft Responded Quietly After Detecting Secret Database Hack in 2013

Posted: 10/31/2017 | Leave a Comment

The database contained descriptions of critical and unfixed vulnerabilities in some of the most widely used software in the world, including the Windows operating system. Spies for governments around the globe and other hackers covet such information because it shows them how to create tools for electronic break-ins. The Microsoft flaws were fixed likely Read More

Digest Article

No Macros? No Problem for New Malware Attack

Posted: 10/31/2017 | Leave a Comment

Macro-based Microsoft Office malware is a go-to tactic for aspiring cybercriminals because it's reliable and effective. Since macros remain an integral part of Word documents, many companies don't disable them by default, and users often open .doc attachments. But with enterprise IT on the war path for signs of any macro malware attack, criminals are Read More

Digest Article

Microsoft Patches Windows Zero-day Being Used to Spread FinSpy Spyware

Posted: 09/19/2017 | Leave a Comment

Microsoft has unleashed its September Patch Tuesday bug fix bonanza, patching 82 flaws in total. Among the 82 fixes, 26 of which have been rated 'critical', includes a patch for an actively exploited zero-day vulnerability tied to Microsoft's .NET framework. Read More

Digest Article

Critical Flaws Found in Windows NTLM Security Protocol – Patch Now

Posted: 07/25/2017 | Leave a Comment

As part of this month's Patch Tuesday, Microsoft has released security patches for a serious privilege escalation vulnerability which affect all versions of its Windows operating system for enterprises released since 2007. Read More

Digest Article

Has ‘Fireball’ Malware Infected 250 Million Computers? Microsoft Disputes Shocking Claim

Posted: 06/27/2017 | Leave a Comment

Microsoft sparked a curious squabble over malware discovery and infection rates. At the start of the month security firm Check Point reported on a browser hijacker and malware downloader called Fireball. The firm claimed that it had recently discovered the Chinese malware and that it had infected some 250 million systems. Read More

Digest Article

The Need for Urgent Collective Action to Keep People Safe Online: Lessons From Last Week’s Cyberattack

Posted: 05/30/2017 | Leave a Comment

We should take from this recent attack a renewed determination for more urgent collective action. We need the tech sector, customers, and governments to work together to protect against cybersecurity attacks. More action is needed, and it’s needed now. In this sense, the WannaCrypt attack is a wake-up call for all of us. We recognize our responsibility to Read More

Air Force Research Laboratory (AFRL) Army Research Laboratory (ARL) Artificial Intelligence (AI) Better Buying Power (BBP) Biometric Cloud Computing Critical Infrastructure Protection (CIP) Cryptography Cyber Crime Cyber Legislation Cybersecurity Cybersecurity Training Cyber Warfare Data Breach Data Security Defense Technical Information Center (DTIC) Did You Know? DISA DoD Acquisition Lifecycle Encryption Hacking Insider Threat Internet of Things (IoT) Intrusion Detection IT Security Machine Learning Malware Mobile Security Modeling & Simulation National Institute of Standards and Technology [NIST] Network Security Open Source Software Operational Technology (OT) Password Security Phishing Protecting Controlled Unclassified Information (CUI) Quantum Computing Ransomware Risk Management Framework (RMF) Secure Software Software Assurance Software Engineering Vulnerability Wargaming Workplace Security

sidebar

Blog Sidebar

Featured Content

CSIAC Journal - Serious Games to Enhance Defense Capabilities

CSIAC Journal Cover Volume 5 Number 4

This 2017 special edition of the CSIAC Journal focuses on wargames and the many uses of Modeling and Simulation (M&S) that support decision making needed at the various levels of combat.

Read the Journal

CSIAC Report - Defense Acquisition University Secure Systems Design Course Experiment

CSIAC developed a course experiment with the Defense Acquisition University (DAU) Cybersecurity Enterprise Team. The goal of this exercise was to study the techniques & strategies used to provide cybersecurity-based training, in an effort to educate the entire acquisition workforce on cybersecurity best practices & techniques.

Read the Report

CSIAC Journal - Design and Development Process for Assured Software

CSIAC Journal Cover Volume 5 Number 2

This is Volume 1 of 2 special edition issues on Software Assurance. This edition explores different aspects of developing, deploying and training on how to build assured software.

Read the Journal

CSIAC Journal - Tools & Testing Techniques for Assured Software

CSIAC Journal Cover Volume 5 Number 3

This is Volume 2 of 2 special edition issues on Software Assurance. This edition explores different aspects of software assurance competencies that can be used to improve software assurance functions and how to develop/deploy assured software throughout the lifecycle acquisition process.

Read the Journal

Recent Video Podcasts

  • Systems Engineering Challenges for Integrating Software Assurance into Defense Systems Throughout the System Acquisition Lifecycle Series: CSIAC Webinars
  • CS Digest Roundtable #2: Meltdown/Spectre, NIST Framework, GDPR Policy, and Romanian Hackers Series: The CSIAC Podcast
  • CS Digest Roundtable #1: Emotet Trojan, Cryptojacking, and User Data Exposure Series: The CSIAC Podcast
  • Cybersecurity of DoD Critical Infrastructure Series: CSIAC Webinars
  • Challenges to Critical Infrastructure Series: Cyber Awareness Videos
View all Podcasts

Resource Topic Tags

Critical Infrastructure Protection (CIP) Data Security Internet of Things (IoT) Ransomware Cybersecurity Network Security Insider Threat Mobile Security Quantum Computing Cyber Warfare Cloud Computing Workplace Security Artificial Intelligence (AI) Phishing Cyber Legislation Protecting Controlled Unclassified Information (CUI) Risk Management Framework (RMF) Modeling & Simulation Software Assurance Software Engineering Password Security IT Security Encryption Hacking Malware National Institute of Standards and Technology [NIST] DoD Acquisition Lifecycle DISA Air Force Research Laboratory (AFRL) Intrusion Detection

Upcoming Events

Thu 26

MODSIM World 2018

April 24 - April 26
Norfolk VA
United States
May 01

SANS Automotive Cybersecurity Summit

May 1 - May 8
Chicago IL
United States
Organizer: SANS
May 14

Northsec

May 14 - May 20
Old Montreal Quebec
Canada
Jun 11

Transport Security and Safety Expo – TSSX 2018

June 11 - June 12
Washington DC
United States
Jun 25

AIAA Modeling and Simulation Technologies Conference

June 25 - June 29
Alanta GA
United States
View all Events

Recently Active Members

Profile picture of matthewpicerno
Profile picture of jhughes
Profile picture of lloydpinnock
Profile picture of majdacivic27
Profile picture of jonlancelot
Profile picture of nmaida
Profile picture of jf1776
Profile picture of majordavehan817
Profile picture of tdan
Profile picture of jreade
Profile picture of cspencer25a
Profile picture of dsebayan
Profile picture of jverick
Profile picture of davidt
Profile picture of harrisog
Profile picture of paulweinrich
Profile picture of mvansteenburg
Profile picture of rsrobinson77

Footer

CSIAC Products & Services

  • Free Technical Inquiry
  • Core Analysis Tasks (CATs)
  • Resources
  • Events Calendar
  • Frequently Asked Questions
  • Product Feedback Form
  • CSIAC Store

About CSIAC

The CSIAC is a DoD-sponsored Center of Excellence in the fields of Cybersecurity, Software Engineering, Modeling & Simulation, and Knowledge Management & Information Sharing.Learn More

Contact Us

Phone:800-214-7921
Email:info@csiac.org
Address:   266 Genesee St.
Utica, NY 13502
Send us a Message
ASD(R&E) LogoUS Department of Defense LogoDoD IACs LogoDTIC LogoTEMS Logo

Copyright 2018, Quanterion Solutions Incorporated

Sitemap | Privacy Policy | Terms of Use | Accessibility Information