Articles In Security

By Nancy Rand, Posted in Security

October 11, SecurityWeek – (International) Malware abuses Windows Troubleshooting Platform for distribution. Proofpoint security researchers discovered a malicious backdoor, dubbed “LatentBot” was abusing the Microsoft Windows Troubleshooting Platform (WTP) feature to trick users into executing the malicious payload, which was being distributed via email attachments with a lure document that once opened, launches a digitally signed DIAGCAB file containing PowerShell commands that download... read more.

  • October 12, 2016

By Nancy Rand, Posted in Security

October 7, SecurityWeek – (International) VMware patches directory traversal flaw in Horizon View. VMware released versions 7.0.1, 6.2.3, and 5.3.7 of its Horizon View products for Microsoft Windows after a security researcher, dubbed “Bruk0ut” discovered the products were plagued with a flaw that could allow a remote attacker to carry out a directory traversal attack on the Horizon View Connection Server to access sensitive information. Source October 7, SecurityWeek – (Internation... read more.

  • October 11, 2016

By Nancy Rand, Posted in Security

October 6, SecurityWeek – (International) Mac malware can abuse legitimate apps to spy on users. A security researcher from Synack discovered that Apple Mac operating system (OS) X malware can monitor an infected system for legitimate user-initiated video sessions on applications such as FaceTime, Skype, and Google Hangouts, and piggyback on those legitimate sessions to record video and spy on users without their knowledge or authorization. Source October 5, Softpedia – (International) New back... read more.

  • October 07, 2016

By Nancy Rand, Posted in Security

October 4, SecurityWeek – (International) EMC patches critical flaws in VMAX storage products. Dell EMC released patches resolving six vulnerabilities in versions 8.0.x – 8.2.x of its VMAX Unisphere Web-based management console and vApp Manager configuration and support tool for VMware deployments after researchers from Digital Defense, Inc. (DDI) discovered a critical vulnerability that can be exploited to add new admin users and compromise the virtual appliance, as well as a flaw that can be e... read more.

  • October 05, 2016

By Nancy Rand, Posted in Security

October 3, SecurityWeek – (International) Over 400 vulnerabilities reported to ICS-CERT in 2015. The Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) released its vulnerability coordination report for the fiscal year 2015, which revealed ICS-CERT published 197 advisories covering a total of 427 vulnerabilities during 2015, while only 245 issues were covered in 2014. The report also revealed that 43 percent of the vulnerabilities were rated as high severity, and the energy sector was... read more.

  • October 05, 2016

By Nancy Rand, Posted in Security

September 30, SecurityWeek – (International) Tofsee malware distribution switched from exploit kit to spam. Security researchers from Cisco Talos reported that attackers stopped distributing the Tofsee ransomware via the RIG exploit kit (EK), and began leveraging spam email campaigns to deliver the malware downloaders, which instruct victims to download and open the ZIP archive attached to the message that contains an obfuscated JavaScript file with a WScript downloader, which runs an executable from... read more.

  • October 03, 2016

By Nancy Rand, Posted in Security

September 29, SecurityWeek – (International) Syrian Electronic Army member pleads guilty to hacking, extortion. A member of the Syrian Electronic Army (SEA) hacker group pleaded guilty to Federal charges for his role in an extortion scheme where he and another SEA member breached the systems of various organizations in the U.S. and other countries and threatened to damage their computers and data unless a ransom was paid. The FBI is searching for two other suspects involved in the extortion scheme. So... read more.

  • September 30, 2016

By Nancy Rand, Posted in Security

September 28, SecurityWeek – (International) High severity DoS flaw patched in BIND. The Internet Systems Consortium released updates for the Domain Name System (DNS) software BIND addressing two vulnerabilities, including a high severity denial-of-service (DoS) flaw affecting all servers that can receive request packets from any source, which can be exploited using maliciously crafted DNS request packets. The updates also resolved a medium severity DoS flaw that can cause a targeted server to termina... read more.

  • September 29, 2016

By Nancy Rand, Posted in Security

September 27, SecurityWeek – (International) Russian cyberspies use “Komplex” trojan to target OS X systems. Palo Alto Networks discovered an Apple Mac operating system (OS) X trojan, dubbed Komplex establishes contact with its command and control (C&C) server after infecting a device in order to collect system information, and allows an attacker to execute arbitrary commands and download files to the affected machine. The researchers stated Komplex has reportedly been used by a Russia... read more.

  • September 28, 2016

By Nancy Rand, Posted in Security

September 23, SecurityWeek – (International) Locky ransomware fuels surge in .RAR JavaScript attachments. Trend Micro security researchers reported the Locky ransomware was responsible for an increase in certain methods of malware delivery after finding that during the first half of 2016, 58 percent of ransomware threats were delivered via email attachments including JavaScript, VBScript, and Microsoft Office files with macros. The researchers also reported that the malicious emails used to deliver th... read more.

  • September 28, 2016