ATENTIONβΌ New - CVE-2017-18274
π Read
via "National Vulnerability Database".
While iterating through the models contained in a fixed-size array in the actData structure, which also stores an incorrect number of models that is greater than the size of the array, a buffer overflow occurs in Snapdragon Automobile, Snapdragon Mobile, Snapdragon Wear in MDM9206, MDM9607, MDM9650, SD 210/SD 212/SD 205, SD 425, SD 430, SD 450, SD 617, SD 625, SD 650/52, SD 820, SD 820A, SD 835π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2017-18173
π Read
via "National Vulnerability Database".
In case of using an invalid android verified boot signature with very large length, an integer underflow occurs in Snapdragon Mobile in SD 425, SD 427, SD 430, SD 435, SD 450, SD 625, SD 810, SD 820, SD 835, SDM630, SDM636, SDM660, Snapdragon_High_Med_2016.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2017-18157
π Read
via "National Vulnerability Database".
A Use After Free Condition can occur in Thermal Engine in Snapdragon Automobile, Snapdragon Mobile, Snapdragon Wear in MDM9206, MDM9607, MDM9650, MSM8909W, MSM8996AU, SD 210/SD 212/SD 205, SD 425, SD 450, SD 615/16/SD 415, SD 625, SD 650/52, SD 820, SD 820A, SD 835, SD 845, SDX20.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2017-18156
π Read
via "National Vulnerability Database".
While processing camera buffers in camera driver, a use after free condition can occur in Snapdragon Automobile, Snapdragon Mobile, Snapdragon Wear in MDM9206, MDM9607, MDM9650, MSM8996AU, SD 210/SD 212/SD 205, SD 625, SD 820, SD 820A, SD 835, SDX20.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2017-18131
π Read
via "National Vulnerability Database".
In QTEE, an incorrect fuse value can be blown in Snapdragon Automobile, Snapdragon Mobile, Snapdragon Wear in version MDM9206, MDM9607, MSM8996AU, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 450, SD 615/16/SD 415, SD 625, SD 820, SD 820A, SD 835, SD 845, SDM429, SDM439, SDM630, SDM632, SDM636, SDM660, Snapdragon_High_Med_2016.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2017-15841
π Read
via "National Vulnerability Database".
When HOST sends a Special command ID packet, Controller triggers a RAM Dump and FW reset in Snapdragon Mobile in version SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 450, SD 615/16/SD 415, SD 625, SD 650/52, SD 820, SD 835, Snapdragon_High_Med_2016.π Read
via "National Vulnerability Database".
β Weekly review β the hot 25 stories of last week β
π Read
via "Naked Security".
From malware-stuffed piracy apps to the Docker breach, get yourself up to date with everything we wrote last week - it's roundup time.π Read
via "Naked Security".
Naked Security
Weekly review β the hot 25 stories of last week
From malware-stuffed piracy apps to the Docker breach, get yourself up to date with everything we wrote last week β itβs roundup time.
β Blockchain project settles cross-border payment β
π Read
via "Naked Security".
Singaporeβs central bank sent a payment to Canada using blockchain technology last week, in a clear signal that the technology has value.π Read
via "Naked Security".
Naked Security
Blockchain project settles cross-border payment
Singaporeβs central bank sent a payment to Canada using blockchain technology last week, in a clear signal that the technology has value.
β Dark web marketplace Wall Street Market busted by international police β
π Read
via "Naked Security".
It went down in flames, with a rogue admin blackmailing vendors and buyers and leaking login credentials and the IP address.π Read
via "Naked Security".
Naked Security
Dark web marketplace Wall Street Market busted by international police
It went down in flames, with a rogue admin blackmailing vendors and buyers and leaking login credentials and the IP address.
β Firefox add-ons with obfuscated code will be banned by Mozilla β
π Read
via "Naked Security".
The updated Add-on Policy aims to rid Firefox of third-party malicious code that hides what it's really up to.π Read
via "Naked Security".
Naked Security
Firefox add-ons with obfuscated code will be banned by Mozilla
The updated Add-on Policy aims to rid Firefox of third-party malicious code that hides what itβs really up to.
π΄ Russian Nation-State Group Employs Custom Backdoor for Microsoft Exchange Server π΄
π Read
via "Dark Reading: ".
Turla hacking team abuses a legitimate feature of the Exchange server in order to hide out and access all of the target organization's messages.π Read
via "Dark Reading: ".
Darkreading
Russian Nation-State Group Employs Custom Backdoor for Microsoft Exchange Server
Turla hacking team abuses a legitimate feature of the Exchange server in order to hide out and access all of the target organization's messages.
π΄ Better Behavior, Better Biometrics? π΄
π Read
via "Dark Reading: ".
Behavioral biometrics is a building block to be used in conjunction with other security measures, but it shows promise.π Read
via "Dark Reading: ".
Darkreading
Better Behavior, Better Biometrics?
Behavioral biometrics is a building block to be used in conjunction with other security measures, but it shows promise.
β MegaCortex ransomware distracts victims with Matrix film references β
π Read
via "Naked Security".
One moment, the defendersβ network looked secure but the next, as if out of nowhere, the ransom note pops up.π Read
via "Naked Security".
Naked Security
MegaCortex ransomware distracts victims with Matrix film references
One moment, the defendersβ network looked secure but the next, as if out of nowhere, the ransom note pops up.
β Ukrainian Charged With Launching 100 Million Malicious Ads β
π Read
via "Threatpost".
Oleksii Petrovich Ivanov has been extradited in the U.S. after allegedly launching malvertising campaigns that caused victims to view malicious ads on more than 100 million occasions.π Read
via "Threatpost".
Threat Post
Ukrainian Charged With Launching 100 Million Malicious Ads
Oleksii Petrovich Ivanov has been extradited in the U.S. after allegedly launching malvertising campaigns that caused victims to view malicious ads on more than 100 million occasions.
π 90% of data breaches in US occur in New York and California π
π Read
via "Security on TechRepublic".
Half a billion records have been exposed in total, with over 86 breaches affecting the two states since January, according to Risk Based Security.π Read
via "Security on TechRepublic".
TechRepublic
90% of data breaches in US occur in New York and California
Half a billion records have been exposed in total, with over 86 breaches affecting the two states since January, according to Risk Based Security.
β Chinese Spies Stole NSA Cyberweapons Long Before Shadow Brokers Leak β
π Read
via "Threatpost".
Forensic analysis shows a Chinese APT using Equation Group hacking tools at least a year before Shadow Brokers dumped its cache in April 2017.π Read
via "Threatpost".
Threat Post
Chinese Spies Stole NSA Cyberweapons Long Before Shadow Brokers Leak
Forensic analysis shows a Chinese APT using Equation Group hacking tools at least a year before Shadow Brokers dumped its cache in April 2017.
π΄ The Big E-Crime Pivot π΄
π Read
via "Dark Reading: ".
Criminals have begun to recognize that enterprise ransomware offers tremendous financial advantage over the more traditional tactics of wire fraud and account takeover.π Read
via "Dark Reading: ".
Darkreading
The Big E-Crime Pivot
Criminals have begun to recognize that enterprise ransomware offers tremendous financial advantage over the more traditional tactics of wire fraud and account takeover.
π Trade Secret Theft Victim Wins $845 Million π
π Read
via "Subscriber Blog RSS Feed ".
While very little money will change hands, the sum is believed to be one of the largest judgments for the theft of trade secrets in U.S. history.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Trade Secret Theft Victim Wins $845 Million
While very little money will change hands, the sum is believed to be one of the largest judgments for the theft of trade secrets in U.S. history.
π΄ The Dark Web is Smaller Than You Think π΄
π Read
via "Dark Reading: ".
The number of live, accessible .onion sites amounts to less than 0.005% of surface web domains, researchers report.π Read
via "Dark Reading: ".
Darkreading
The Dark Web Is Smaller Than You Think
The number of live, accessible .onion sites amounts to less than 0.005% of surface web domains, researchers report.
π΄ US States with the Worst Consumer Cyber-Hygiene π΄
π Read
via "Dark Reading: ".
Ranking based on consumers' cybersecurity practices - or lack thereof.π Read
via "Dark Reading: ".
Dark Reading
US States with the Worst Consumer Cyber-Hygiene
Ranking based on consumers' cybersecurity practices - or lack thereof.
π΄ How a Chinese Nation-State Group Reversed-Engineered NSA Attack Tools π΄
π Read
via "Dark Reading: ".
New Symantec research shows how the Buckeye group captured an exploit and backdoor used by the National Security Agency and deployed them on other victims.π Read
via "Dark Reading: ".
Darkreading
How a Chinese Nation-State Group Reverse-Engineered NSA Attack Tools
New Symantec research shows how the Buckeye group captured an exploit and backdoor used by the National Security Agency and deployed them on other victims.