Author Archives: CIRT Team



CIRT Team

in News Clipping

Intel Fixes Critical Bugs in Management Engine, Its Secret CPU-On-Chip [source:bleepingcomputer]

Intel published a security advisory last night detailing eight vulnerabilities that impact core CPU technologies such as the Intel Management Engine (ME), Intel Server Platform Services (SPS), and Intel Trusted Execution Engine (TXE). The vulnerabilities are severe enough to allow attackers to install rootkits on vulnerable PCs, retrieve data processed inside CPUs, and cause PC crashes —which should be the least of someone’s worries. One...

Read More

0
22 Nov 2017
in Security Advisories & Alerts

Windows ASLR Vulnerability !!

Description:  Windows 8 and later fail to properly randomize every application if system-wide mandatory ASLR is enabled via EMET or Windows Defender Exploit Guard. Microsoft Windows 8 introduced a change in how system-wide mandatory ASLR is implemented. This change requires system-wide bottom-up ASLR to be enabled for mandatory ASLR to receive entropy. Tools that enable system-wide ASLR without also setting bottom-up ASLR will fail to...

Read More

0
21 Nov 2017
in News Clipping

What Is Vulnerability Management? [source: tripwire]

Enterprise networks regularly see change in their devices, software installations and file content. These modifications can create risk for the organization. Fortunately, companies can mitigate this risk by implementing foundational security controls. For example, enterprises can monitor their important files for change using file integrity monitoring (FIM). This security measure enables IT security teams to determine when files change, how they change, who changed them, and what can...

Read More

0
21 Nov 2017
in News Clipping

Poor security habits are the ideal recipe for a breach [source: helpnetsecurity]

A Preempt survey of more than 200 employees (management level or above) from enterprise companies of 1000 or more people, found that businesses are left exposed by employees who have more access to sensitive resources than they should and who follow poor security habits. Have you ever “bent the rules” or found a security workaround in order to get something done at work? Results from...

Read More

0
21 Nov 2017
in News Clipping

Experts observed a new wave of malware attacks targeting WordPress sites [source: securityaffairs]

Experts from the firm Sucuri observed a new wave of wp-vcd malware attacks that is targeting WordPress sites leveraging flaws in outdated plugins and themes A new malware campaign is threatening WordPress installs, the malicious code tracked as wp-vcd hides in legitimate WordPress files and is used by attackers to add a secret admin user and gain full control over infected websites. The malware was first spotted in...

Read More

0
21 Nov 2017
in News Clipping

Risk Assessment in Information Security [source: infosecurity-magazine]

Risk assessment is a systematic method of analyzing risk. It started in the nuclear and aeronautical industries, and has now spread to many other industries including the finance, transportation, power system, public health, shipping and fishing industries. Risk assessment tries to answer three questions: What can go wrong? How likely is it? How serious are the consequences? Risk assessment has different roles in different industries....

Read More

0
21 Nov 2017
in News Clipping

Android Bug Lets Attackers Record Audio & Screen Activity [source: bleepingcomputer]

Android smartphones running Lolipop, Marshmallow, and Nougat, are vulnerable to an attack that exploits the MediaProjection service to capture the user’s screen and record system audio Based on the market share of these distributions, around 77.5% of all Android devices are affected by this vulnerability. Vulnerability resides in Android MediaProjection service To blame is MediaProjection, an Android service that is capable of capturing screen contents...

Read More

0
21 Nov 2017
in News Clipping

Google: There are 1.9 billion usernames and passwords on the black market [source: v3.co.uk]

Research by Google and the University of California has found that there are more than 1.9 billion usernames and passwords available on the black market, many of which can be used to access Google accounts. According to the study, cybercriminals are gaining access to people’s passwords and flogging them on the dark web at a profit. The researchers used Google’s proprietary data to see whether or not...

Read More

0
19 Nov 2017
in News Clipping

Latest Intelligence for October 2017 [source: symantec]

Some of the key takeaways from October’s Latest Intelligence, and the threat landscape in general, include research on the most likely infection vectors, malicious security tools, and a scam targeting tax professionals. Malware The email malware rate declined last month for the first time since March. However, at one in 355 emails, the rate is higher now than it was the last time it declined, due...

Read More

0
19 Nov 2017
Page 96 of 134« First...102030...9495969798...110120130...Last »