π΄ Counting for Good: Hardware Counters Un-mask Malware π΄
π Read
via "Dark Reading: ".
Nick Gregory, research scientist at Capsule8, talks about his session with Capsule8 data scientist Harini Kannan, "Uncommon Sense: Detecting Exploits With Novel Hardware Performance Counters and Machine Learning Magic."π Read
via "Dark Reading: ".
Dark Reading
Counting for Good: Hardware Counters Un-mask Malware
Nick Gregory, research scientist at Capsule8, talks about his session with Capsule8 data scientist Harini Kannan, Uncommon Sense: Detecting Exploits With Novel Hardware Performance Counters and Machine Learning Magic.
ATENTIONβΌ New - CVE-2020-13365
π Read
via "National Vulnerability Database".
Certain Zyxel products have a locally accessible binary that allows a non-root user to generate a password for an undocumented user account that can be used for a TELNET session as root. This affects NAS520 V5.21(AASZ.4)C0, V5.21(AASZ.0)C0, V5.11(AASZ.3)C0, and V5.11(AASZ.0)C0; NAS542 V5.11(ABAG.0)C0, V5.20(ABAG.1)C0, and V5.21(ABAG.3)C0; NSA325 v2_V4.81(AALS.0)C0 and V4.81(AAAJ.1)C0; NSA310 4.22(AFK.0)C0 and 4.22(AFK.1)C0; NAS326 V5.21(AAZF.8)C0, V5.11(AAZF.4)C0, V5.11(AAZF.2)C0, and V5.11(AAZF.3)C0; NSA310S V4.75(AALH.2)C0; NSA320S V4.75(AANV.2)C0 and V4.75(AANV.1)C0; NSA221 V4.41(AFM.1)C0; and NAS540 V5.21(AATB.5)C0 and V5.21(AATB.3)C0.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2020-13364
π Read
via "National Vulnerability Database".
A backdoor in certain Zyxel products allows remote TELNET access via a CGI script. This affects NAS520 V5.21(AASZ.4)C0, V5.21(AASZ.0)C0, V5.11(AASZ.3)C0, and V5.11(AASZ.0)C0; NAS542 V5.11(ABAG.0)C0, V5.20(ABAG.1)C0, and V5.21(ABAG.3)C0; NSA325 v2_V4.81(AALS.0)C0 and V4.81(AAAJ.1)C0; NSA310 4.22(AFK.0)C0 and 4.22(AFK.1)C0; NAS326 V5.21(AAZF.8)C0, V5.11(AAZF.4)C0, V5.11(AAZF.2)C0, and V5.11(AAZF.3)C0; NSA310S V4.75(AALH.2)C0; NSA320S V4.75(AANV.2)C0 and V4.75(AANV.1)C0; NSA221 V4.41(AFM.1)C0; and NAS540 V5.21(AATB.5)C0 and V5.21(AATB.3)C0.π Read
via "National Vulnerability Database".
π΄ Platform Security: Intel Pushes to Reduce Supply Chain Attacks π΄
π Read
via "Dark Reading: ".
SPONSORED CONTENT: Attacks on supply chains involve lots of players and companies, not to mention an exponential amount of data for the stealing, notes Intel's Tom Garrison. Notoriously difficult to detect and mitigate, Garrison discusses new approaches to securing an individual company's computing platforms, including Compute Lifecycle Assurance.π Read
via "Dark Reading: ".
Dark Reading
Platform Security: Intel Pushes to Reduce Supply Chain Attacks
SPONSORED CONTENT: Attacks on supply chains involve lots of players and companies, not to mention an exponential amount of data for the stealing, notes Intel's Tom Garrison. Notoriously difficult to detect and mitigate, Garrison discusses new approaches toβ¦
π΄ New Windows Print Spooler Zero-Day Flaws Harken Back to Stuxnet π΄
π Read
via "Dark Reading: ".
Researchers find new flaws in the ubiquitous decades-old printer software in Windows, including one that bypasses a recent Microsoft patch.π Read
via "Dark Reading: ".
Darkreading
New Windows Print Spooler Zero-Day Flaws Harken Back to Stuxnet
Researchers find new flaws in the ubiquitous decades-old printer software in Windows, including one that bypasses a recent Microsoft patch.
π΄ Remotely Hacking Operations Technology Systems π΄
π Read
via "Dark Reading: ".
Marco Balduzzi senior research scientist with Trend Micro, tells us how the often-overlooked ICS protocol gateways contain serious vulnerabilities that allow attackers to hack OT systems remotely.π Read
via "Dark Reading: ".
Dark Reading
Remotely Hacking Operations Technology Systems
Marco Balduzzi senior research scientist with Trend Micro, tells us how the often-overlooked ICS protocol gateways contain serious vulnerabilities that allow attackers to hack OT systems remotely.
π΄ The Long Shadow of Stuxnet: New Microsoft Print Spooler Vulns Revealed π΄
π Read
via "Dark Reading: ".
Researchers Peleg Hader and Tomer Bar of SafeBreach share details of the three vulnerabilities they found in Windows Print Spooler that could allow an attacker to sneak into the network through an old printer service mechanism.π Read
via "Dark Reading: ".
Dark Reading
IoT recent news | Dark Reading
Explore the latest news and expert commentary on IoT, brought to you by the editors of Dark Reading
β Black Hat 2020: Satellite Comms Globally Open to $300 Eavesdropping Hack β
π Read
via "Threatpost".
Attackers can listen in on internet traffic for high-value targets a continent away, like shipping fleets and oil installations, using some basic home-television gear.π Read
via "Threatpost".
Threat Post
Black Hat 2020: Satellite Comms Globally Open to $300 Eavesdropping Hack
Attackers can listen in on internet traffic for high-value targets a continent away, like shipping fleets and oil installations, using some basic home-television gear.
π΄ Broadcom: Staying Safe with WastedLocker Ransomware Variant on the Prowl π΄
π Read
via "Dark Reading: ".
SPONSORED CONTENT: Stealthier and more patient than some predecessors, WastedLocker lingers surreptitiously for as long as it needs to for maximum payoff, says Jon DiMaggio with Broadcom's Symantec division. He explains how Windows servers are at a different risk level than their open-source counterparts, and how WastedLocker identifies "valuable" targets.π Read
via "Dark Reading: ".
Dark Reading
Broadcom: Staying Safe with WastedLocker Ransomware Variant on the Prowl
SPONSORED CONTENT: Stealthier and more patient than some predecessors, WastedLocker lingers surreptitiously for as long as it needs to for maximum payoff, says Jon DiMaggio with Broadcom's Symantec division. He explains how Windows servers are at a differentβ¦
π΄ Using IoT Botnets to Manipulate the Energy Market π΄
π Read
via "Dark Reading: ".
Tohid Shekari, phD candidate at Georgia Tech, talks about the session that he and Georgia Tech professor Raheem Beyah gave about a stealthy and adaptable way to use IoT botnets for financial gain or market downfall.π Read
via "Dark Reading: ".
Dark Reading
Using IoT Botnets to Manipulate the Energy Market
Tohid Shekari, phD candidate at Georgia Tech, talks about the session that he and Georgia Tech professor Raheem Beyah gave about a stealthy and adaptable way to use IoT botnets for financial gain or market downfall.
π΄ Why Satellite Communication Eavesdropping Will Remain A Problem π΄
π Read
via "Dark Reading: ".
Oxford PhD candidate James Pavur shows that SATCOM security has still made no progress since previous Black Hat disclosures, and discusses the physical and economic limitations that slow make it unlikely to improve anytime soon.π Read
via "Dark Reading: ".
Dark Reading
Why Satellite Communication Eavesdropping Will Remain A Problem
Oxford PhD candidate James Pavur shows that SATCOM security has still made no progress since previous Black Hat disclosures, and discusses the physical and economic limitations that slow make it unlikely to improve anytime soon.
π Android phones could spy on users via flaws in Qualcomm chip π
π Read
via "Security on TechRepublic".
Vulnerabilities were found in a Qualcomm Snapdragon chip that could let attackers obtain photos, videos, call recordings, and other data on Android phones, says Check Point Research.π Read
via "Security on TechRepublic".
TechRepublic
Android phones could spy on users via flaws in Qualcomm chip
Vulnerabilities were found in a Qualcomm Snapdragon chip that could let attackers obtain photos, videos, call recordings, and other data on Android phones, says Check Point Research.
ATENTIONβΌ New - CVE-2020-13793
π Read
via "National Vulnerability Database".
Unsafe storage of AD credentials in Ivanti DSM netinst 5.1 due to a static, hard-coded encryption key.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2020-12441
π Read
via "National Vulnerability Database".
Denial-of-Service (DoS) in Ivanti Service Manager HEAT Remote Control 7.4 due to a buffer overflow in the protocol parser of the Γ’β¬˜HEATRemoteServiceΓ’β¬β’ agent. The DoS can be triggered by sending a specially crafted network packet.π Read
via "National Vulnerability Database".
β Canon Admits Ransomware Attack in Employee Note, Report β
π Read
via "Threatpost".
The consumer-electronics giant has suffered partial outages across its U.S. website and internal systems, reportedly thanks to the Maze gang.π Read
via "Threatpost".
Threat Post
UPDATE: Canon Ransomware Attack Results in Leaked Data, Report
The consumer-electronics giant had suffered partial outages across its U.S. website and internal systems reportedly, thanks to the Maze gang.
π΄ OpenText Blends Security, Data Protection for Greater Cyber Resilience π΄
π Read
via "Dark Reading: ".
SPONSORED CONTENT: Infosec professionals are taking advantage of technology hybrids to keep users, data, and their networks more safe, according to Hal Lonas of OpenText's Webroot division. And they're also finding new ways to use artificial intelligence and machine learning to improve security management and reduce risk.π Read
via "Dark Reading: ".
Dark Reading
OpenText Blends Security, Data Protection for Greater Cyber Resilience
SPONSORED CONTENT: Infosec professionals are taking advantage of technology hybrids to keep users, data, and their networks more safe, according to Hal Lonas of OpenText's Webroot division. And they're also finding new ways to use artificial intelligenceβ¦
π΄ Office 365's Vast Attack Surface & All the Ways You Don't Know You're Being Exploited Through It π΄
π Read
via "Dark Reading: ".
Mandiant incident response managers Josh Madeley and Doug Bienstock describe how thoroughly Microsoft 365 (formerly known as Office 365) extends into corporate networks, describe both sophisticated and simple attacks they've detected, and suggest mitigations as businesses rely more heavily on the cloud.π Read
via "Dark Reading: ".
Darkreading
Office 365's Vast Attack Surface & All the Ways You Don't Know You're Being Exploited Through It
Mandiant incident response managers Josh Madeley and Doug Bienstock describe how thoroughly Microsoft 365 (formerly known as Office 365) extends into corporate networks, describe both sophisticated and simple attacks theyβve detected, and suggest mitigationsβ¦
π΄ Information Operations Spotlighted at Black Hat as Election Worries Rise π΄
π Read
via "Dark Reading: ".
From Russia's "best-in-class" efforts at widening social divides in Western democracies to China's blunt attacks on dissidents, information operations are becoming a greater threat, says a Stanford researcher.π Read
via "Dark Reading: ".
Dark Reading
Information Operations Spotlighted at Black Hat as Election Worries Rise
From Russia's best-in-class efforts at widening social divides in Western democracies to China's blunt attacks on dissidents, information operations are becoming a greater threat, says a Stanford researcher.
π΄ Exploiting Google Cloud Platform With Ease π΄
π Read
via "Dark Reading: ".
Security engineer Dylan Ayrey and Cruise senior infrastructure security engineer Allison Donovan describe fundamental weaknesses in GCP identity management that enable privilege escalation and lateral movement.π Read
via "Dark Reading: ".
Dark Reading
Exploiting Google Cloud Platform With Ease
Security engineer Dylan Ayrey and Cruise senior infrastructure security engineer Allison Donovan describe fundamental weaknesses in GCP identity management that enable privilege escalation and lateral movement.
π΄ On 'Invisible Salamanders' and Insecure Messages π΄
π Read
via "Dark Reading: ".
Cornell researcher Paul Grubbs discusses how vulnerabilities found in Facebook Messenger encryption could mean trouble for your secure messages.π Read
via "Dark Reading: ".
Dark Reading
On 'Invisible Salamanders' and Insecure Messages
Cornell researcher Paul Grubbs discusses how vulnerabilities found in Facebook Messenger encryption could mean trouble for your secure messages.
π What Does a Data Breach Cost in 2020? π
π Read
via "Subscriber Blog RSS Feed ".
Ponemon Institute's annual Cost of a Data Breach report tracks how industry data breach costs have changed over time.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
What Does a Data Breach Cost?
Ponemon Institute's annual Cost of a Data Breach report tracks how industry data breach costs have changed over time.