From The Blog
-
Bring on the Ransomware Beta Test as Royal Begins Seems to be testing a New Encryptor called BlackSuit
Written by Sean KalinichThe fine folks at the Royal ransomware group have begun testing a new flavor of encryptor that is being called BlackSuit (The hat was already…Written on Thursday, 08 June 2023 16:03 in News Read 398 times Read more...
-
Google and Microsoft Share a Zero Day as both Chrome and Edge get Patch Now Guidance.
Written by Sean KalinichGoogle has pushed out a new patch for Chrome to deal with a zero-day vulnerability tracked as CVE-2023-3079. In the patch release Google is clear…Written on Thursday, 08 June 2023 15:12 in News Read 353 times Read more...
-
Barracuda Email Security Gateway Appliances that were Exploited due to Zero-Day Must Be Replaced, not Patched
Written by Sean KalinichAfter the disclosure of a serious Zero-Day that allowed an unauthenticated user to basically own the device. Barracuda is now saying that remediation action for…Written on Thursday, 08 June 2023 12:33 in News Read 220 times Read more...
-
Minecraft Mods stuffed with Malware Used to Target Windows and Linux
Written by Sean KalinichAs we hear more about Supply Chain attacks and the need for Software Build of Materials we are now hearing of an attack on the…Written on Wednesday, 07 June 2023 15:24 in News Read 303 times Read more...
-
Sextortionists Get a Boost from AI and Publicly Available Images
Written by Sean KalinichAs if the internet needed something else bad floating around it seems that groups that engage in extortion schemes involving the threat of releasing images…Written on Wednesday, 07 June 2023 14:24 in News Read 218 times Read more...
-
New PowerShell Malware Dubbed PowerDrop used to Target US Aerospace Industry
Written by Sean KalinichIt is Wednesday, so it is about time to talk about a new strain of malware. In this case one that leverages Microsoft’s PowerShell to…Written on Wednesday, 07 June 2023 13:31 in News Read 203 times Read more...
-
More Ransomware as a Service Fun as Cyclops Gang Now Offers Value Add Information Stealer
Written by Sean KalinichAnyone that does not think that cybercrime is now a bug business has been living under a rock. The news related to different cybercrime-as-a-service groups,…Written on Tuesday, 06 June 2023 15:08 in News Read 469 times Read more...
-
Why SBOM is in the News and Why it is Important
Written by Sean KalinichSince Executive Order 14028 came out on May 12th from the Biden Administration there has been a lot of talk about what it means and…Written on Tuesday, 06 June 2023 11:43 in Security Talk Read 114 times Read more...
-
Attackers Drop Card Stealing Scripts into Legitimate eCommerce Sites
Written by Sean KalinichSo, there you are, you have found the one thing in all the internet that will make your object drive life complete. You put the…Written on Monday, 05 June 2023 15:10 in News Read 857 times Read more...
Recent Comments
- Sean, this is a fantastic review of a beautiful game. I do agree with you… Written by Jacob 2023-05-19 14:17:50 Jedi Survivor – The Quick, Dirty, and Limited Spoilers Review
- Great post. Very interesting read but is the reality we are currently facing. Written by JP 2023-05-03 02:33:53 The Dangers of AI; I Think I Have Seen this Movie Before
- I was wondering if you have tested the microphone audio frequency for the Asus HS-1000W? Written by Maciej 2020-12-18 14:09:33 Asus HS-1000W wireless headset impresses us in the lab
- Thanks for review. I appreciate hearing from a real pro as opposed to the blogger… Written by Keith 2019-06-18 04:22:36 The Red Hydrogen One, Possibly One of the Most “misunderstood” Phones Out
- Have yet to see the real impact but in the consumer segment, ryzen series are… Written by sushant 2018-12-23 10:12:12 AMD’s 11-year journey to relevance gets an epic finish.
Most Read
- Microsoft Fail - Start Button Back in Windows 8.1 But No Start Menu Written on Thursday, 30 May 2013 15:33 in News Be the first to comment! Read 115118 times Read more...
- We take a look at the NETGEAR ProSafe WNDAP360 Dual-Band Wireless Access Point Written on Saturday, 07 April 2012 00:17 in Pro Storage and Networking Be the first to comment! Read 84233 times Read more...
- Synology DS1512+ Five-Bay NAS Performance Review Written on Tuesday, 12 June 2012 20:31 in Pro Storage and Networking Be the first to comment! Read 78431 times Read more...
- Gigabyte G1.Sniper M3 Design And Feature Review Written on Sunday, 19 August 2012 22:35 in Enthusiast Motherboards Be the first to comment! Read 77790 times Read more...
- The Asus P8Z77-M Pro Brings Exceptional Performance and Value to the Lab Written on Monday, 23 April 2012 13:02 in Consumer Motherboards Be the first to comment! Read 67371 times Read more...
Displaying items by tag: Hacking
Is Facebook's new TOR Policy a way to track Anonymity?
When you hear people talking about anonymity on the internet it most people will think privacy. When companies hear anonymity on the internet they think piracy, crime, hacking and lost revenue. This is probably the biggest disconnect in the internet age, companies want to monetize your personal information. This is big money and (as we have said more than once) is a commodity that they have been trying to legalize for more than a decade.
Cisco updates IronPort to fix a bug in a protocol that should not be used anyway...
If you are in the information security field then the latest “news” that Cisco fixed a flaw in a protocol that should not be used will probably give you a chuckle. I am talking about Telnet which is not exactly what you would call a secure means of communicating with any device. In most cases Telnet is one of those options that you turn off right out of the box. Still it is nice to know that Cisco is patching it.
Shellshock used to spread botnet through SMTP
There appear to be developments in the way that Shellshock is used to push malware around. According to new information the Bash Bug is now being used to send malware out through the use of compromised SMTP gateways. The clever attackers are trying to use altered headers (from, to, subject) to force the SMTP gateway to pull down additional code that contains the Shellshock attack.
New Sandworm 0-Day and Possible SSL V3.0 Flaw is a Great Way For a Sysadmin to Start the Day
When you are a sysadmin there is nothing like waking up to not one, but two troubling bits of news. The first one centers on a new and fun Zero-Day vulnerability that affects just about every version of windows that Microsoft still supports. Dubbed Sandworm by iSight, the security firm that discovered it this bug exploits yet another flawed internal mechanism in Microsoft’s OS.
New Mac Botnet Uses Reddit To Hand out C&C Server IPs
The Mac world had an unsettling wakeup call today as it found out what most people have known for years: Macs are no more secure than any other PC. This wakeup call is not the first of its kind and it is certainly not going to be the last, we just wonder if anyone will actually listen or if Apple PR will continue to claim Macs cannot get malware.
JP Morgan Chase Breach Affects 76 Millionn Accounts
242 Million. This is the number of people that have been affected by the corporate culture of short cuts and fiduciary excuses on security. We have talked at length about the lack of proper security planning in the last 12 months, upgrades and even programing that exist in the corporate world and even with pretty strict regulations on how businesses are required to conduct their operations we are still hearing about breach after breach.
Most Developers Do Not Understand Basic Application Security
A new report from security research firm, Aspect Security confirms what we have been saying for years: developers simply do not know how to secure their applications. In a recent study where a group of developers were asked questions on security Aspect found that about 80% of them did not know how to protect sensitive data. This is something that we have found in our experience in dealing with vendors and other application developers.
The Home Depot Ignored Security Warnings as Far Back as 2008
Almost two weeks ago we wrote an editorial about how security issues are more about the corporate culture than just weak passwords. In it we described a problem that exists in far too many companies where executives and/or vendors are the ones that are setting the security policies instead of the IT or IT security teams. This situation can be exceptionally frustrating when you are trying to keep the “bad guys” out, but not everyone really believes that this is how things work. Now, after New York Times article describing how the Home Depot ignored their own security staff, people might be forced to finally get the bigger picture.
Security concerns are about more than just weak passwords and malware.
Since the beginning of 2014 the IT world has been rocked by more than a few major breaches. The number of credit cards and user information now up for sale is staggering. So how have these attacks managed to get in and make off with so much data so quickly? Of course there are the usual suspects in these cases, weak passwords and users downloading malware on their systems that allow a potential attacker into their system.
Apple's iCloud Easy to Crack with Existing Tools
Two days ago we reported on the iCloud controversy which involved an attack on Apple’s Cloud based Find My iPhone application. This attack (which appears to have been a dictionary attack) resulted in the release of nude images of a number of celebrities posted on the internet for all to see. Apple immediately jumped to the defensive and released a statement saying they were not “hacked” and it is not their fault. Now on the surface this is true as there was not a full breach of their security, but it is about as wrong as you can get.