FreshRSS

πŸ”’
❌ About FreshRSS
There are new available articles, click to refresh the page.
Today β€” July 22nd 2017Your RSS feeds

Ethereum Thefts Cost Investors Millions

By Brian Barrett
Ethereum thefts, an Ashley Madison settlement, another leaky Amazon S3 bucket, and more of this week's top security news.

Antivirus for Android Has Terrible Track Record

By Lily Hay Newman
A new study shows that 94 percent of Android antivirus failed to stop a comprehensive set of malware attacks.

Letting Cyberattack Victims Hack Back Is a Very Unwise Idea

By Greg Nojeim
Opinion: Retaliating against hacks is the wrong way to prevent them.

Pauls Security Weekly 523 - Hack My NAS

By paul@securityweekly.com

Almog Ohayon of Javelin Networks pits Javelin ADProtect against Microsoft ATA, Sven Morgenroth of Netsparker bypasses corporate firewalls, and we discuss the latest security news!


Full Show Notes: https://wiki.securityweekly.com/Episode523


Visit https://www.securityweekly.com for all the latest episodes!

πŸ’Ύ

  • July 22nd 2017 at 09:00

Hydra Network Logon Cracker 8.6

THC-Hydra is a high quality parallelized login hacker for Samba, Smbnt, Cisco AAA, FTP, POP3, IMAP, Telnet, HTTP Auth, LDAP, NNTP, MySQL, VNC, ICQ, Socks5, PCNFS, Cisco and more. Includes SSL support, parallel scans, and is part of Nessus.
  • July 22nd 2017 at 01:54

Gentoo Linux Security Advisory 201707-15

Gentoo Linux Security Advisory 201707-15 - Multiple vulnerabilities have been found in Adobe Flash Player, the worst of which allows remote attackers to execute arbitrary code. Versions less than 26.0.0.137 are affected.
  • July 21st 2017 at 23:44

Oracle Integration Gateway Directory Traversal

Oracle Integration Gateway (PSIGW) suffers from a directory traversal vulnerability.
  • July 21st 2017 at 23:02

Oracle Integration Gateway File Upload

Oracle Integration Gateway (PSIGW) suffers from a file upload vulnerability.
  • July 21st 2017 at 22:22

Apple Security Advisory 2017-07-19-7

Apple Security Advisory 2017-07-19-7 - iCloud for Windows 6.2.2 is now available and addresses information disclosure, code execution, and various other vulnerabilities.
  • July 21st 2017 at 05:55

Apple Security Advisory 2017-07-19-6

Apple Security Advisory 2017-07-19-6 - iTunes 12.6.2 is now available and addresses code execution, information disclosure, and various other vulnerabilities.
  • July 21st 2017 at 04:44

Ubuntu Security Notice USN-3360-2

Ubuntu Security Notice 3360-2 - USN-3360-1 fixed vulnerabilities in the Linux kernel for Ubuntu 14.04 LTS. This update provides the corresponding updates for the Linux Hardware Enablement kernel from Ubuntu 14.04 LTS for Ubuntu 12.04 ESM. It was discovered that the Linux kernel did not properly initialize a Wake- on-Lan data structure. A local attacker could use this to expose sensitive information. Various other issues were also addressed.
  • July 21st 2017 at 04:44

Apple Security Advisory 2017-07-19-5

Apple Security Advisory 2017-07-19-5 - Safari 10.1.2 is now available and addresses spoofing, cross origin, and various other vulnerabilities.
  • July 21st 2017 at 03:33

Apple Security Advisory 2017-07-19-4

Apple Security Advisory 2017-07-19-4 - tvOS 10.2.2 is now available and addresses code execution, memory corruption, and various other vulnerabilities.
  • July 20th 2017 at 23:44

Apple Security Advisory 2017-07-19-2

Apple Security Advisory 2017-07-19-2 - macOS 10.12.6 is now available and addresses code execution, memory corruption, and various other vulnerabilities.
  • July 20th 2017 at 18:32

Apple Security Advisory 2017-07-19-1

Apple Security Advisory 2017-07-19-1 - iOS 10.3.3 is now available and addresses code execution, memory corruption, and various other vulnerabilities.
  • July 20th 2017 at 17:32

Apple Security Advisory 2017-07-19-3

Apple Security Advisory 2017-07-19-3 - watchOS 3.2.2 is now available and addresses buffer overflow, memory corruption, and various other vulnerabilities.
  • July 20th 2017 at 15:22

Black Hat is coming and with it a good reason to update your "Broadcom-based" devices, (Fri, Jul 21st)

Black Hat US 2017 is debuting and with it a potential concern to most of us. It turns out that one of the conference presentations, entitledBROADPWN: REMOTELY COMPROMISING ANDROID AND IOS VIA A BUG IN BROADCOMS WI-FI CHIPSETS[1],will detail how Broadcom BCM43xx Wi-Fi chipsets can be exploited to achieve full code execution on the compromised device without user interaction.

An attacker within range may be able to execute arbitrary code on the Wi-Fi chip, says Apple about this vulnerability (CVE-20179417) in its latest security bulletin [2]. Google published the patch to fix the vulnerability on Android early this month [3].

Besides Apple, those chipsets are present on most smartphone devices like HTC, LG, Nexus and most Samsumg models as well. Make sure to have this vulnerability fixed in all your devices??especially if you are planning to be in Las Vegas next week.

References
[1]https://www.blackhat.com/us-17/briefings.html#broadpwn-remotely-compromising-android-and-ios-via-a-bug-in-broadcoms-wi-fi-chipsets
[2]https://support.apple.com/pt-br/HT207923
[3]https://source.android.com/security/bulletin/2017-07-01

--
Renato Marinho
Morphus Labs| LinkedIn|Twitter

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
  • July 22nd 2017 at 00:19

Offensive Intrusion Analysis: Uncovering Insiders with Threat Hunting and Active Defense

Today's adversaries are advanced and more capable than ever before. Passive defensive tactics are no longer viable for pursuing these attackers. To compound the issue, the existence of an insider threat creates a challenging problem for the passive defender. One of the largest breaches of classified information was carried out by an insider. Months after the incident had occurred, the Department of Defense (DoD) only began to realize the implications of the leak. The damage did not solely rest with the United States. A cascade of consequences was felt in many parts of the world, resulting from this breach. Techniques like Threat Hunting, attempt to diminish this problem by combating advanced threats with people, also known as Threat Hunters. Although Threat Hunting is proving to be invaluable for many organizations there remains a chasm between detection and disclosure. Offensive Countermeasure tools such as the Web Bug Server and Molehunt can be leveraged as a means to proactively hunt insider threats. To keep up with the continually evolving human adversary, defenders must employ these offensive tactics to annoy and attribute their adversaries.
  • July 21st 2017 at 00:00
Yesterday β€” July 21st 2017Your RSS feeds

Malicious .iso Attachments, (Fri, Jul 21st)

We width:1067px" />

Didier Stevens
Microsoft MVP Consumer Security
blog.DidierStevens.com DidierStevensLabs.com

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
  • July 21st 2017 at 22:23

A GAO Sting Scored $1.2 Million in Weapons From an Unsuspecting Department of Defense

By Eli Hager
A federal sting reveals lax oversight in the Defense Department’s gear giveaway program.

Ubuntu Security Notice USN-3361-1

Ubuntu Security Notice 3361-1 - USN-3358-1 fixed vulnerabilities in the Linux kernel for Ubuntu 17.04. This update provides the corresponding updates for the Linux Hardware Enablement kernel from Ubuntu 17.04 for Ubuntu 16.04 LTS. Please note that this update changes the Linux HWE kernel to the 4.10 based kernel from Ubuntu 17.04, superseding the 4.8 based HWE kernel from Ubuntu 16.10. Ben Harris discovered that the Linux kernel would strip extended privilege attributes of files when performing a failed unprivileged system call. A local attacker could use this to cause a denial of service. Various other issues were also addressed.
  • July 21st 2017 at 19:50

Ubuntu Security Notice USN-3360-1

Ubuntu Security Notice 3360-1 - It was discovered that the Linux kernel did not properly initialize a Wake- on-Lan data structure. A local attacker could use this to expose sensitive information. It was discovered that the Linux kernel did not properly restrict access to /proc/iomem. A local attacker could use this to expose sensitive information. It was discovered that a use-after-free vulnerability existed in the performance events and counters subsystem of the Linux kernel for ARM64. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. Various other issues were also addressed.
  • July 21st 2017 at 19:49

Ubuntu Security Notice USN-3359-1

Ubuntu Security Notice 3359-1 - It was discovered that the Linux kernel did not properly initialize a Wake- on-Lan data structure. A local attacker could use this to expose sensitive information. Dmitry Vyukov, Andrey Konovalov, Florian Westphal, and Eric Dumazet discovered that the netfiler subsystem in the Linux kernel mishandled IPv6 packet reassembly. A local user could use this to cause a denial of service or possibly execute arbitrary code. Various other issues were also addressed.
  • July 20th 2017 at 23:05

HP Security Bulletin HPESBHF03766 1

HP Security Bulletin HPESBHF03766 1 - Potential security vulnerabilities with NTP have been addressed for HPE network products including Comware 5 used in certain ConvergedSystem 700 solutions. The vulnerabilities could be remotely exploited resulting in Denial of Service (DoS) or unauthorized modification, or locally exploited resulting in Denial of Service (DoS). Revision 1 of this advisory.
  • July 20th 2017 at 22:22

Ubuntu Security Notice USN-3358-1

Ubuntu Security Notice 3358-1 - It was discovered that the Linux kernel did not properly initialize a Wake- on-Lan data structure. A local attacker could use this to expose sensitive information. Alexander Potapenko discovered a race condition in the Advanced Linux Sound Architecture subsystem in the Linux kernel. A local attacker could use this to expose sensitive information. Various other issues were also addressed.
  • July 20th 2017 at 20:23

Red Hat Security Advisory 2017-1793-01

Red Hat Security Advisory 2017-1793-01 - Graphite2 is a project within SIL's Non-Roman Script Initiative and Language Software Development groups to provide rendering capabilities for complex non-Roman writing systems. Graphite can be used to create "smart fonts" capable of displaying writing systems with various complex behaviors. With respect to the Text Encoding Model, Graphite handles the "Rendering" aspect of writing system implementation. The following packages have been upgraded to a newer upstream version: graphite2. Multiple security issues have been addressed.
  • July 20th 2017 at 20:22

Red Hat Security Advisory 2017-1789-01

Red Hat Security Advisory 2017-1789-01 - The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit. Security Fix: It was discovered that the DCG implementation in the RMI component of OpenJDK failed to correctly handle references. A remote attacker could possibly use this flaw to execute arbitrary code with the privileges of RMI registry or a Java RMI application. Multiple flaws were discovered in the RMI, JAXP, ImageIO, Libraries, AWT, Hotspot, and Security components in OpenJDK. An untrusted Java application or applet could use these flaws to completely bypass Java sandbox restrictions.
  • July 20th 2017 at 10:14

Ubuntu Security Notice USN-3357-1

Ubuntu Security Notice 3357-1 - Multiple security issues were discovered in MySQL and this update includes new upstream MySQL versions to fix these issues. MySQL has been updated to 5.5.57 in Ubuntu 14.04 LTS. Ubuntu 16.04 LTS and Ubuntu 17.04 have been updated to MySQL 5.7.19. In addition to security fixes, the updated packages contain bug fixes, new features, and possibly incompatible changes. Various other issues were also addressed.
  • July 20th 2017 at 10:13

Red Hat Security Advisory 2017-1790-01

Red Hat Security Advisory 2017-1790-01 - Oracle Java SE version 8 includes the Oracle Java Runtime Environment and the Oracle Java Software Development Kit. This update upgrades Oracle Java SE 8 to version 8 Update 141. Security Fix: This update fixes multiple vulnerabilities in the Oracle Java Runtime Environment and the Oracle Java Software Development Kit.
  • July 20th 2017 at 10:12

Red Hat Security Advisory 2017-1791-01

Red Hat Security Advisory 2017-1791-01 - Oracle Java SE version 7 includes the Oracle Java Runtime Environment and the Oracle Java Software Development Kit. This update upgrades Oracle Java SE 7 to version 7 Update 151. Security Fix: This update fixes multiple vulnerabilities in the Oracle Java Runtime Environment and the Oracle Java Software Development Kit.
  • July 20th 2017 at 10:11

Red Hat Security Advisory 2017-1792-01

Red Hat Security Advisory 2017-1792-01 - Oracle Java SE version 6 includes the Oracle Java Runtime Environment and the Oracle Java Software Development Kit. This update upgrades Oracle Java SE 6 to version 6 Update 161. Security Fix: This update fixes multiple vulnerabilities in the Oracle Java Runtime Environment and the Oracle Java Software Development Kit.
  • July 20th 2017 at 10:10

Red Hat Security Advisory 2017-1787-01

Red Hat Security Advisory 2017-1787-01 - collectd is a small C-language daemon, which reads various system metrics periodically and updates RRD files. Because the daemon does not start up each time it updates files, it has a low system footprint. The following packages have been upgraded to a later upstream version: collectd. Security Fix: collectd contains an infinite loop due to how the parse_packet() and parse_part_sign_sha256() functions interact. If an instance of collectd is configured with "SecurityLevel None" and empty "AuthFile" options, an attacker can send crafted UDP packets that trigger the infinite loop, causing a denial of service.
  • July 19th 2017 at 23:28

Ubuntu Security Notice USN-3356-2

Ubuntu Security Notice 3356-2 - USN-3356-1 fix a vulnerability in Expat. This update provides the corresponding update for Ubuntu 12.04 ESM. A It was discovered that Expat incorrectly handled certain external A entities. A remote attacker could possibly use this issue to cause A Expat to hang, resulting in a denial of service. Various other issues were also addressed.
  • July 19th 2017 at 23:27

Ubuntu Security Notice USN-3356-1

Ubuntu Security Notice 3356-1 - It was discovered that Expat incorrectly handled certain external entities. A remote attacker could possibly use this issue to cause Expat to hang, resulting in a denial of service.
  • July 19th 2017 at 23:26

Ubuntu Security Notice USN-3355-1

Ubuntu Security Notice 3355-1 - Frediano Ziglio discovered that Spice incorrectly handled certain invalid monitor configurations. A remote attacker could use this issue to cause Spice to crash, resulting in a denial of service, or possibly execute arbitrary code.
  • July 19th 2017 at 23:25

Ubuntu Security Notice USN-3212-3

Ubuntu Security Notice 3212-3 - USN-3212-1 and USN-3212-2 fixed a vulnerability in LibTIFF. This update provides a subset of corresponding update for Ubuntu 12.04 ESM. A It was discovered that LibTIFF incorrectly handled certain malformed A images. If a user or automated system were tricked into opening a A specially crafted image, a remote attacker could crash the A application, leading to a denial of service, or possibly execute A arbitrary code with user privileges. Various other issues were also addressed.
  • July 19th 2017 at 23:24

Ubuntu Security Notice USN-3307-2

Ubuntu Security Notice 3307-2 - USN-3307-1 fixed a vulnerability in OpenLDAP. This update provides the corresponding update for ubuntu 12.04 ESM. A Karsten Heymann discovered that OpenLDAP incorrectly handled certain A search requests. A remote attacker could use this issue to cause slapd A to crash, resulting in a denial of service. Various other issues were also addressed.
  • July 19th 2017 at 23:23

Value Chain Security: Mid-Year 2017 Perspective

By Edna Conway
Value Chain Security is increasingly top of mind across industry and government. Β The word is out – the value chain must be addressed to ensure viable security. Β Whether the discussion is framed as third party risk, cybersecurity or critical infrastructure, Cisco is at the forefront of addressing security holistically across the end-to-end ICT lifecycle. Right […]

Automating Cloud Security to Mitigate Risk

As cloud computing services evolve, the cloud opens up entirely new ways for potential attacks. This paper explores the potential security challenges enterprises face as they migrate to any kind of cloud setup and offers guidance to ensure a smooth migration to new solutions.
  • July 20th 2017 at 00:00

Threat Round-up for July 14 – July 21

By Talos Group
Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between July 14 and July 21. As with previous round-ups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavior characteristics, indicators of compromise, and how our customers are automatically […]

Vulnerability Spotlight: Multiple Vulnerabilities in CorelDRAW X8

By Talos Group
Today, Talos is disclosing several vulnerabilities that have been identified in CorelDRAW X8. CorelDRAW X8 is graphics suite used for manipulating raster and vector images and is a common alternative to Adobe Creative Cloud. Several of the vulnerabilities being disclosed today specifically affect PHOTO-PAINT X8, a raster graphics editor. Talos has responsibly disclosed this vulnerability […]

Vulnerabilities in ProcessMaker, WebFOCUS, and OpenFire Identified and Patched

By Talos Group
Today, Talos is disclosing several vulnerabilities that have been identified by Portcullis in various software products. All four vulnerabilities have been responsibly disclosed to each respective developer in order ensure they are addressed. In order better protect our customers, Talos has also developed Snort rules that detect attempts to exploit these vulnerabilities. Vulnerability Details TALOS-2017-0313 […]

Motivation Mystery Behind WannaCry, ExPetr

By Michael Mimoso
A shift in APT tactics is emerging as characterized by the destructive ExPetr attacks hidden in ransomware, and WannaCry, which also failed to turn a profit.

Cisco AMP for Endpoints Included in Gartner’s β€œThe Evolving Effectiveness of Endpoint Protection Solutions” 2017 Assessment

By John Dominguez
Endpoint security comes in many different shapes and sizes: β€œEndpoint Protection Platforms (EPP)” β€œAntivirus (AV)” β€œEndpoint Detection and Response (EDR)” β€œNext-Generation Endpoint Solutions” The list goes on. Faced with so many different options, it can be tricky to know which type of endpoint security tool is right for your organization. What does EPP do that […]

Offensive Intrusion Analysis: Uncovering Insiders with Threat Hunting and Active Defense

Today's adversaries are advanced and more capable than ever before. Passive defensive tactics are no longer viable for pursuing these attackers. To compound the issue, the existence of an insider threat creates a challenging problem for the passive defender. One of the largest breaches of classified information was carried out by an insider. Months after the incident had occurred, the Department of Defense (DoD) only began to realize the implications of the leak. The damage did not solely rest with the United States. A cascade of consequences was felt in many parts of the world, resulting from this breach. Techniques like Threat Hunting, attempt to diminish this problem by combating advanced threats with people, also known as Threat Hunters. Although Threat Hunting is proving to be invaluable for many organizations there remains a chasm between detection and disclosure. Offensive Countermeasure tools such as the Web Bug Server and Molehunt can be leveraged as a means to proactively hunt insider threats. To keep up with the continually evolving human adversary, defenders must employ these offensive tactics to annoy and attribute their adversaries.
  • July 21st 2017 at 00:00

Vuln: Mozilla Firefox CVE-2017-5472 Use After Free Denial of Service Vulnerability

Mozilla Firefox CVE-2017-5472 Use After Free Denial of Service Vulnerability
  • July 21st 2017 at 00:00

Vuln: Mozilla Firefox CVE-2017-5470 Multiple Unspecified Memory Corruption Vulnerabilities

Mozilla Firefox CVE-2017-5470 Multiple Unspecified Memory Corruption Vulnerabilities
  • July 21st 2017 at 00:00
❌