FreshRSS

πŸ”’
❌ About FreshRSS
There are new available articles, click to refresh the page.
Today β€” November 23rd 2017Your RSS feeds

'Data is the new oil': F-Secure man on cartels, disinformation and IoT

An unlikely trio? Not according to Mikko Hypponen

Questions about cyber influence continue to cloud last year's US presidential elections and recently similar allegations have been levelled against the Brexit vote.…

  • November 23rd 2017 at 15:53

Vuln: Jenkins Favorite Plugin CVE-2017-1000244 Cross Site Request Forgery Vulnerability

Jenkins Favorite Plugin CVE-2017-1000244 Cross Site Request Forgery Vulnerability
  • November 23rd 2017 at 00:00

Vuln: HP Integrated Lights-Out and Moonshot RCA Unspecified Information Disclosure Vulnerability

HP Integrated Lights-Out and Moonshot RCA Unspecified Information Disclosure Vulnerability
  • November 23rd 2017 at 00:00

Vuln: GNU Binutils 'readelf.c' Heap Buffer Overflow Vulnerability

GNU Binutils 'readelf.c' Heap Buffer Overflow Vulnerability
  • November 23rd 2017 at 00:00

Vuln: Jenkins Git Client Plugin CVE-2017-1000242 Insecure Temporary File Creation Vulnerability

Jenkins Git Client Plugin CVE-2017-1000242 Insecure Temporary File Creation Vulnerability
  • November 23rd 2017 at 00:00

Vuln: Joomla! 'com_tag' Component CVE-2017-15946 SQL Injection Vulnerability

Joomla! 'com_tag' Component CVE-2017-15946 SQL Injection Vulnerability
  • November 23rd 2017 at 00:00

Vuln: IBM OpenPages GRC Platform CVE-2017-1300 Cross Site Request Forgery Vulnerability

IBM OpenPages GRC Platform CVE-2017-1300 Cross Site Request Forgery Vulnerability
  • November 23rd 2017 at 00:00

Vuln: HP Matrix Operating Environment HPESBMU03795 Multiple Remote Security Vulnerabilities

HP Matrix Operating Environment HPESBMU03795 Multiple Remote Security Vulnerabilities
  • November 23rd 2017 at 00:00

Vuln: Google Android Local Privilege Escalation Vulnerability

Google Android Local Privilege Escalation Vulnerability
  • November 23rd 2017 at 00:00

To fix Intel's firmware fiasco, wait for Christmas Eve or 2018

And cross your fingers: 'TBD' is the scheduled date for hundreds of PC fixes

The world's top PC-makers have started to ship fixes for the multiple flaws in Intel's CPUs, but plenty won't land until 2018.…

  • November 23rd 2017 at 07:02

Proactive Malicious Domain Search, (Thu, Nov 23rd)

In a previous diary[1], I presented a dashboard that I’m using to keep track of the DNS traffic on my networks. Tracking malicious domains is useful but what if you could, in a certain way, β€œpredict” the upcoming domains that will be used to host phishing pages? Being a step ahead of the attackers is always good, right? Thanks to the CertStream[2] service (provided by Cali Dog Security), you have access to a real-time certificate transparency log update stream. Briefly, Certificate Transparency[3] helps to protect against threats that make use of bad certificates.Β 
  • November 23rd 2017 at 07:39

Vuln: PHPMailer 'code_generator.php' Cross Site Scripting Vulnerability

PHPMailer 'code_generator.php' Cross Site Scripting Vulnerability
  • November 23rd 2017 at 00:00

Vuln: TYPO3 Formhandler Extension Cross Site Scripting Vulnerability

TYPO3 Formhandler Extension Cross Site Scripting Vulnerability
  • November 23rd 2017 at 00:00

Vuln: TYPO3 Recommend Page Extension Cross Site Scripting Vulnerability

TYPO3 Recommend Page Extension Cross Site Scripting Vulnerability
  • November 23rd 2017 at 00:00

Samba needs two patches, unless you're happy for SMB servers to dance for evildoers

Big Linux distros have pushed their fixes, but let's not assume everything auto-patches, OK?

It’s time to patch Samba again - or turn off SAMBA 1, which is never as easy as it sounds.…

  • November 23rd 2017 at 06:01

Devs working to stop Go math error bugging crypto software

Programming language makes some fuzzy big numbers

Consider this an item for the watch-list, rather than a reason to hit the panic button: a math error in the Go language could potentially affect cryptographic libraries.…

  • November 23rd 2017 at 03:42

Bugtraq: [SECURITY] [DSA 4046-1] libspring-ldap-java security update

[SECURITY] [DSA 4046-1] libspring-ldap-java security update
  • November 23rd 2017 at 04:00

Vuln: Apache Tomcat CVE-2017-5664 Security Bypass Vulnerability

Apache Tomcat CVE-2017-5664 Security Bypass Vulnerability
  • November 23rd 2017 at 00:00
Yesterday β€” November 22nd 2017Your RSS feeds

Security+: Basic Forensic Procedures

By Fakhar Imam

Introduction Forensics is the acquisition, analysis, and protection of digital evidence from the scene of the crime to present the facts in the courtroom. To make the evidence admissible in court proceedings, the forensic specialist must verify that the β€œchain of custody” was not broken and that the evidence was gathered and preserved properly. Moreover, […]

The post Security+: Basic Forensic Procedures appeared first on InfoSec Resources.


Security+: Basic Forensic Procedures was first posted on November 22, 2017 at 4:47 pm.
Β©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com

Security+: Wireless Network Security Issues

By Fakhar Imam

Introduction Today, wireless networking is widely used in both home and corporate networks. However, managing wireless networks and their security for reliable access is a herculean task. As a matter of fact, wireless networking involves various security issues that hamper the provision of reliable services to the users. The underlying wireless network techniques involve various […]

The post Security+: Wireless Network Security Issues appeared first on InfoSec Resources.


Security+: Wireless Network Security Issues was first posted on November 22, 2017 at 4:33 pm.
Β©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com

Best Practices for Web Browser Security

By Yassine Aboukir

Web browsers are a commonly used software application to access web resources and pages using the Internet. A browser can also be used to access information provided by web servers in private networks or files in file systems. The most popular web browsers so far are Firefox, Google Chrome, Microsoft Edge (preceded by Internet Explorer) […]

The post Best Practices for Web Browser Security appeared first on InfoSec Resources.


Best Practices for Web Browser Security was first posted on November 22, 2017 at 2:55 pm.
Β©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com

Startup Security Weekly #63 - In the Books

By paul@securityweekly.com

Darren Mar-Elia of Semperis joins us. In the news, deciding with speed and conviction, learning from unicorns, starting your social enterprise, and updates from ThreatQuotient, Symantec, Optiv, and more on this episode of Startup Security Weekly!Full Show Notes: https://wiki.securityweekly.com/SSWEpisode63

Visit https://www.securityweekly.com/ssw for all the latest episodes!

β†’Visit our website: https://www.securityweekly.com

β†’Follow us on Twitter: https://www.twitter.com/securityweekly

β†’Like us on Facebook: https://www.facebook.com/secweekly

πŸ’Ύ

  • November 22nd 2017 at 19:27

The Ecosystem of Women in Cybersecurity – A Key to our Future!

By Edna Conway
Digitization is driving each of us across all industries to make dramatic changes to how we approach customers, products, services, and the always-on, real-time information rich marketplace. Β This digital economy is gender agnostic. And, it is highly dependent on a connected global ecosystem. The message is clearβ€”no one person, enterprise, industry, government or region can […]

HP to Patch Bug Impacting 50 Enterprise Printer Models

By Tom Spring
HP said dozens of enterprise-class printer models will receive a patch for an arbitrary code execution vulnerability sometime this week.

Insider threats within the cloud

By Frank Siemons

Contrary to common perception, time and time again reports show that the most significant security threats to an organization are the so-called Insider Threats. Research estimates hold these threats responsible for at least 40% , but potentially all the way up to 75% or more, of all data breaches. News coverage is relatively limited because […]

The post Insider threats within the cloud appeared first on InfoSec Resources.


Insider threats within the cloud was first posted on November 22, 2017 at 12:21 pm.
Β©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com

Top 5 Smartest Malware Programs

By Daniel Dimov

1. Introduction The growing threat of malware is one of the biggest Cyber Security threats of today. Malware is a term that encompasses a plethora of covert, intrusive software. This includes items such as viruses, worms, Trojans horses, and ransomware. The impact of these rapidly spreading malicious programs ranges from regular everyday annoyances (e.g., pop-up […]

The post Top 5 Smartest Malware Programs appeared first on InfoSec Resources.


Top 5 Smartest Malware Programs was first posted on November 22, 2017 at 12:15 pm.
Β©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com

bugtraq () securityfocus com

Posted by Securify B.V. via Fulldisclosure on Nov 22

------------------------------------------------------------------------
Clickjacking vulnerability in CSRF error page pfSense
------------------------------------------------------------------------
Yorick Koster, November 2017

------------------------------------------------------------------------
Abstract
------------------------------------------------------------------------
pfSense is a free and open source firewall and router. It was...
  • November 22nd 2017 at 17:38

Clickjacking vulnerability in CSRF error page pfSense

Posted by Securify B.V. via Fulldisclosure on Nov 22

------------------------------------------------------------------------
Clickjacking vulnerability in CSRF error page pfSense
------------------------------------------------------------------------
Yorick Koster, November 2017

------------------------------------------------------------------------
Abstract
------------------------------------------------------------------------
pfSense is a free and open source firewall and router. It was...
  • November 22nd 2017 at 17:38

Hacking Humans: The Evolving Paradigm with Virtual Reality

Virtual reality (VR) systems are evolving from high-end gaming and military applications to being used in day-to-day business operations and daily life. Cyber security professionals must begin now to prepare proactive threat analysis and incident handling plans that cover information systems and users. Previous compromises illustrate the devastating effects malware can have on the confidentiality, integrity, and availability of information systems. These disastrous consequences may be transferred directly to the user given his or her perception of events. Even in the early stages, VR represents a new paradigm within the information age. Today, users view information systems through a monitor that acts as a window into a virtual environment. Within VR, a user may become completely immersed while absorbing information from all five senses. VR represents a dichotomy that adds a potential human component to an information system compromise. This research project examines offensive tactics, techniques, and procedures, then exploits and extrapolates them to a compromised VR system and the user to illustrate the hazards associated with VR.
  • November 22nd 2017 at 00:00

Vuln: oVirt Engine CVE-2017-15113 Debug Logging Information Disclosure Vulnerability

oVirt Engine CVE-2017-15113 Debug Logging Information Disclosure Vulnerability
  • November 22nd 2017 at 00:00

Vuln: Cisco Web Security Appliance CVE-2017-12303 Remote Security Bypass Vulnerability

Cisco Web Security Appliance CVE-2017-12303 Remote Security Bypass Vulnerability
  • November 22nd 2017 at 00:00

Permissionless data slurping: Why Google's latest bombshell matters

Are you in control?

Comment According to an old Chinese proverb: "When a wise man points at the Moon, an idiot looks at his finger." Google may have been hoping that you were examining a finger, not reading a Quartz story yesterday, which reveals how Android phones send location data to Google without you even knowing it.…

  • November 22nd 2017 at 16:09

'Vapor Wake' Explosive-Sniffing Dogs Help Protect the Thanksgiving Day Parade

By Lily Hay Newman
This year, a team of Labrador retrievers trained to sniff out body-worn explosives will help lock down NYC's Macy's Thanksgiving Day Parade.

[dos] WebKit - 'WebCore::InputType::element' Use-After-Free

WebKit - 'WebCore::InputType::element' Use-After-Free
  • November 22nd 2017 at 00:00

[dos] WebKit - 'WebCore::TreeScope::documentScope' Use-After-Free

WebKit - 'WebCore::TreeScope::documentScope' Use-After-Free
  • November 22nd 2017 at 00:00

[dos] WebKit - 'WebCore::AXObjectCache::performDeferredCacheUpdate' Use-After-Free

WebKit - 'WebCore::AXObjectCache::performDeferredCacheUpdate' Use-After-Free
  • November 22nd 2017 at 00:00

[dos] WebKit - 'WebCore::PositionIterator::decrement' Use-After-Free

WebKit - 'WebCore::PositionIterator::decrement' Use-After-Free
  • November 22nd 2017 at 00:00

[dos] WebKit - 'WebCore::SimpleLineLayout::RunResolver::runForPoint' Out-of-Bounds Read

WebKit - 'WebCore::SimpleLineLayout::RunResolver::runForPoint' Out-of-Bounds Read
  • November 22nd 2017 at 00:00

[dos] WebKit - 'WebCore::RenderText::localCaretRect' Out-of-Bounds Read

WebKit - 'WebCore::RenderText::localCaretRect' Out-of-Bounds Read
  • November 22nd 2017 at 00:00

[dos] WebKit - 'WebCore::SVGPatternElement::collectPatternAttributes' Out-of-Bounds Read

WebKit - 'WebCore::SVGPatternElement::collectPatternAttributes' Out-of-Bounds Read
  • November 22nd 2017 at 00:00

[dos] WebKit - 'WebCore::Style::TreeResolver::styleForElement' Use-After-Free

WebKit - 'WebCore::Style::TreeResolver::styleForElement' Use-After-Free
  • November 22nd 2017 at 00:00

[dos] WebKit - 'WebCore::DocumentLoader::frameLoader' Use-After-Free

WebKit - 'WebCore::DocumentLoader::frameLoader' Use-After-Free
  • November 22nd 2017 at 00:00

[dos] WebKit - 'WebCore::RenderObject::previousSibling' Use-After-Free

WebKit - 'WebCore::RenderObject::previousSibling' Use-After-Free
  • November 22nd 2017 at 00:00

[dos] WebKit - 'WebCore::FormSubmission::create' Use-After-Free

WebKit - 'WebCore::FormSubmission::create' Use-After-Free
  • November 22nd 2017 at 00:00

WebKit WebCore::AXObjectCache::performDeferredCacheUpdate Use-After-Free

There is a use-after-free security vulnerability in WebCore::AXObjectCache::performDeferredCacheUpdate in WebKit.
  • November 22nd 2017 at 15:50

Kernel Live Patch Security Notice LSN-0032-1

Anthony Perard discovered that the Xen virtual block driver did not properly initialize some data structures before passing them to user space. A local attacker in a guest VM could use this to expose sensitive information from the host OS or other guest VMs. Bo Zhang discovered that the netlink wireless configuration interface in the Linux kernel did not properly validate attributes when handling certain requests. A local attacker with the CAP_NET_ADMIN could use this to cause a denial of service (system crash). It was discovered that the nested KVM implementation in the Linux kernel in some situations did not properly prevent second level guests from reading and writing the hardware CR8 register. A local attacker in a guest could use this to cause a denial of service (system crash). Otto Ebeling discovered that the memory manager in the Linux kernel did not properly check the effective UID in some situations. A local attacker could use this to expose sensitive information.
  • November 22nd 2017 at 15:32

Ubuntu Security Notice USN-3489-2

Ubuntu Security Notice 3489-2 - USN-3489-1 fixed a vulnerability in Berkeley DB. This update provides the corresponding update for Ubuntu 12.04 ESM. It was discovered that Berkeley DB incorrectly handled certain configuration files. An attacker could possibly use this issue to read sensitive information. Various other issues were also addressed.
  • November 22nd 2017 at 15:30

Ubuntu Security Notice USN-3489-1

Ubuntu Security Notice 3489-1 - It was discovered that Berkeley DB incorrectly handled certain configuration files. An attacker could possibly use this issue to read sensitive information.
  • November 22nd 2017 at 15:30

Ubuntu Security Notice USN-3485-3

Ubuntu Security Notice 3485-3 - It was discovered that a race condition existed in the ALSA subsystem of the Linux kernel when creating and deleting a port via ioctl. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. Eric Biggers discovered that the key management subsystem in the Linux kernel did not properly restrict adding a key that already exists but is uninstantiated. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. Various other issues were also addressed.
  • November 22nd 2017 at 15:29

Ubuntu Security Notice USN-3488-1

Ubuntu Security Notice 3488-1 - It was discovered that the KVM subsystem in the Linux kernel did not properly keep track of nested levels in guest page tables. A local attacker in a guest VM could use this to cause a denial of service or possibly execute arbitrary code in the host OS.
  • November 22nd 2017 at 15:29

Ubuntu Security Notice USN-3487-1

Ubuntu Security Notice 3487-1 - It was discovered that the KVM subsystem in the Linux kernel did not properly keep track of nested levels in guest page tables. A local attacker in a guest VM could use this to cause a denial of service or possibly execute arbitrary code in the host OS. It was discovered that on the PowerPC architecture, the kernel did not properly sanitize the signal stack when handling sigreturn. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. Various other issues were also addressed.
  • November 22nd 2017 at 15:29

Debian Security Advisory 4045-1

Debian Linux Security Advisory 4045-1 - Several vulnerabilities have been found in VLC, the VideoLAN project's media player. Processing malformed media files could lead to denial of service and potentially the execution of arbitrary code.
  • November 22nd 2017 at 15:29

Debian Security Advisory 4044-1

Debian Linux Security Advisory 4044-1 - A vulnerability has been discovered in swauth, an authentication system for Swift, a distributed virtual object store used in Openstack.
  • November 22nd 2017 at 15:29

Ubuntu Security Notice USN-3484-3

Ubuntu Security Notice 3484-3 - It was discovered that the KVM subsystem in the Linux kernel did not properly keep track of nested levels in guest page tables. A local attacker in a guest VM could use this to cause a denial of service or possibly execute arbitrary code in the host OS.
  • November 22nd 2017 at 15:29

HP Security Bulletin HPESBHF03798 1

HP Security Bulletin HPESBHF03798 1 - A vulnerability in HPE certain Gen10 Servers, DL20 Gen9, ML30 Gen9 and certain Apollo servers with Intel Server Platform Service (SPS) v4.0 are vulnerable to local Denial of Service and execution of arbitrary code. **Note:** Intel has identified security vulnerabilities which could potentially place impacted platforms at risk. An issue impacts Intel Server Platform Service (SPS) v4.0 used in certain HPE servers. The SPS/ME firmware used in Intels architecture can be compromised with physical access such that non-authenticated code may be executed in the SPS environment outside of the visibility of the user and operating system administrator. Intel has released new revisions of the Intel Server Platform Service (SPS) firmware to address this vulnerability. Revision 1 of this advisory.
  • November 22nd 2017 at 15:27

You're such a goober, Uber: UK regulators blast hushed breach

MP: Funny, you managed to contact customers when TfL put your licence on hold…

Brit regulators, security agencies and MPs have slammed Uber for covering up the massive data breach of 57 million customer and driver records.…

  • November 22nd 2017 at 15:15

Oracle Outside In 8.5.3.0 Denial Of Service

Secunia Research has discovered a vulnerability in Oracle Outside In, which can be exploited by malicious people to cause a DoS (Denial of Service). The vulnerability is caused due to an error within the vstif6.dll, which can be exploited to cause an out-of-bounds write memory access. The vulnerability is confirmed in version 8.5.3.
  • November 21st 2017 at 23:23
❌