Blog

By Nancy Rand, Posted in Security

August 6, Securityweek – (International) GameOver Zeus gang leader engaged in espionage: Researchers. Officials from FBI, Fox-IT, and Crowdstrike released analysis revealing that in addition to using the GameOver Zeus malware to steal about $100 million from banks, the cybercriminal ring used botnets to commit cyberespionage against various countries, including members of the Organization of the Petroleum Exporting Countries (OPEC). Source August 6, Softpedia – (International) Researcher hacks his way in... read more.

  • August 10, 2015

By Nancy Rand, Posted in Security

August 5, Securityweek – (International) Symantec patches critical vulnerabilities in Endpoint Protection. Security researchers from Code White discovered 6 vulnerabilities in Symantec Endpoint Protection (SEP) 12.1, including an authentication bypass, 3 path traversals, a privilege escalation, multiple structured query language (SQL) injections, and a high severity binary planting flaw which could allow an unauthenticated attacker to execute arbitrary commands on the SEP Manager (SEPM) server and on SEP cl... read more.

  • August 06, 2015

By Nancy Rand, Posted in Security

August 4, Securityweek – (International) Chinese VPN used by APT actors relies on hacked servers. Security researchers at RSA analyzed a Chinese virtual private network (VPN) service dubbed “Terracotta” and found that the service has at least 31 hacked Windows server nodes worldwide in hospitality, government organizations, universities, technology services providers, and private firms. Researchers have observed compromised servers running the Ghost Remote Administration Tool (RAT), the Mitozhan trojan, and... read more.

  • August 06, 2015

By Nancy Rand, Posted in Security

August 3, Help Net Security – (International) Fake “Windows 10 Free Upgrade” emails deliver ransomware. Security researchers from Cisco’s Talos Group discovered a ransomware campaign in which attackers purporting to be from Microsoft send victims emails with a fake Windows 10 installer attached that is actually a variant of the CTB-Locker crypto-malware. Source August 3, Softpedia – (International) Chrome extensions can be disabled without user interaction. Security experts from Detectify Labs discovered... read more.

  • August 04, 2015

By Nancy Rand, Posted in Security

July 31, Help Net Security – (International) Cybercriminals are preying on existing vulnerabilities to plan future attacks. An analysis of cyber threats by Solutionary identified several campaigns consisting of over 600,000 events worldwide that targeted the bash vulnerability in the second quarter of 2015, and found that the U.S. was a leading source of command and control traffic and malware threats, among other findings. Source July 30, Securityweek – (International) Stack ranking the SSL vulnerabilit... read more.

  • August 03, 2015

By Nancy Rand, Posted in Security

July 30, The Register – (International) Cisco IOS-XE update time: squash that DoS bug. Cisco released a patch for a vulnerability In its IOS-XE operating system (OS) in which an attacker could cause a denial-of-service (DoS) condition by sending a series of Internet Protocol version 4 (IPv4) or IPv6 fragments designed to trigger an error message. Source July 30, Help Net Security – (International) More than a third of employees would sell company data. Loudhouse released results from a survey on enterpri... read more.

  • July 31, 2015

By Nancy Rand, Posted in Security

July 29, Securityweek – (International) Russian hacker tool uses legitimate Web services to hide attacks: FireEye. Security researchers from FireEye discovered that the APT29 threat group is employing a malicious backdoor dubbed “HAMMERTOSS” that utilizes a multi-stage process involving social media, steganography, and PowerShell to hide malicious activity within legitimate network traffic. Researchers believe that the backdoor is only being deployed against critical targets, possibly as a backup in case ot... read more.

  • July 31, 2015

By Nancy Rand, Posted in Security

July 28, Softpedia – (International) One in 600 Web sites lists its .git folder, exposing sensitive data. A web developer discovered that out of 1.5 million web sites scanned, 2,402 had an inadvertently exposed .git folder, possibly exposing sensitive information. Source July 28, Securityweek – (International) Cybercriminals use Angler exploit kit to target PoS systems. Trend Micro researchers reported that cybercriminals have been utilizing the Angler exploit kit (EK) to deliver a reconnaissance trojan... read more.

  • July 29, 2015

By Nancy Rand, Posted in Security

July 27, Threatpost – (International) Android Stagefright flaws put 950 million devices at risk. Security researchers at Zimperium zLabs reported that about 950 million Android devices are vulnerable to flaws in the operating system’s (OS) Stagefright media engine, in which excessive permissions could allow an attacker to send a Multimedia Messaging Service (MMS) or Google Hangouts message to trigger the vulnerability, granting system access on the affected device. Source July 27, Securityweek – (Interna... read more.

  • July 29, 2015

By Nancy Rand, Posted in Security

July 24, Securityweek – (International) Red Hat patches “libuser” library vulnerabilities. Red Hat patched two vulnerabilities in its “libuser” library, including a race condition flaw that could lead to a denial-of-service (DoS) condition and a bug in the chfn function of the userhelper utility that an attacker could leverage to create a DoS condition and achieve privilege escalation on the system. Source July 24, SC Magazine – (International) Sophos moves to patch Web Security Appliance flaws. A secur... read more.

  • July 27, 2015