TWiki Security Alert CVE-2014-7236: Remote Perl code execution with query...
This is an advisory for TWiki administrators: The debugenableplugins request parameter allows arbitrary Perl code execution.TWiki ( http://twiki.org ) is an Open Source Enterprise Wiki and Web...
View ArticleTWiki Security Alert CVE-2014-7237: Apache configuration file upload on TWiki...
This is an advisory for TWiki administrators: Attaching a specially named file allows remote upload of an Apache configuration file. This applies to native TWiki installations on Windows, the TWiki-VM...
View Article[ FORENSICS WALK-THROUGH: DFIRCON EAST SMARTPHONE FORENSICS CHALLENGE ]
Today I was asked by a good friend of mine on whether there could be 2 answer(s) to the last question in DFIRCON EAST Smartphone Forensics Challenge.Being the curious cat, i downloaded the Challenge...
View ArticleThe Rovnix reincarnation
Back in June 2014, we discovered a new malware campaign that was using a new DGA. This sparked our interest.After unpacking, some of the samples that we retrieved contained an interesting debug string...
View ArticleEvolution of the Nuclear Exploit Kit
Exploit kits remain an efficient mechanism for cyber criminals to distribute malware. Such kits include exploits for multiple vulnerabilities within a single malicious webpage. Criminals can check...
View ArticleDemocracy in Hong Kong Under Attack
Over the last few months, Volexity has been tracking a particularly remarkable advanced persistent threat (APT) operation involving strategic web compromises of websites in Hong Kong and Japan. In both...
View ArticleImperva Web Application Attack Report (WAAR) #5
Today, we are proud to release the 5th installment of our annual Web Application Attack Report.For those of you new to this report, Imperva’s Web Application Attack Report (WAAR) is a thorough analysis...
View ArticleEnhancements to Dyre Banking Trojan
The Dyre banking Trojan made its first debut in June 2014, targeting large financial institutions across the globe. In September, PhishLabs’ R.A.I.D (Research, Analysis, and Intelligence Division)...
View ArticleBlind & Time Based SQL Injection in Yahoo Contributors Network
The Yahoo Contributors Network allows writers, photographers, and videographers to share their knowledge and passion (…) and earn money by pushing your unique perspectives…” From the looks of the...
View ArticleCSNC-2014-004 neuroML - Multiple Vulnerabilities
############################################################### COMPASS SECURITY ADVISORY#...
View ArticleWordPress Websites Continue to Get Hacked via MailPoet Plugin Vulnerability
The popular Mailpoet(wysija-newsletters) WordPress plugin had a serious file upload vulnerability a few months back, allowing an attacker to upload files to the vulnerable site.This issue was disclosed...
View ArticleSAP Security Note 1908531 - XXE in BusinessObjects Explorer
######################################################################### COMPASS SECURITY ADVISORY#...
View ArticleThe Snappening – 200,000 Snapchat accounts hacked
4 chan has struck again. First there was the celebrity nude leak scandal Fappening, and now there is the Snappening. For a brief history, on August 31, 2014, a collection private and nude pictures of...
View ArticleSAP Security Note 1908647 - Cross Site Flashing in BusinessObjects Explorer
######################################################################### COMPASS SECURITY ADVISORY#...
View ArticleAutomated configuration analysis for Mozilla's TLS guidelines
Last week, we updated Mozilla's Server Side TLS guidelines to add a third recommended configurations. Each configuration maps to a target compatibility levelmore...
View ArticleSAP Security Note 1908562 - Port scanning in BusinessObjects Explorer
######################################################################### COMPASS SECURITY ADVISORY#...
View ArticleRustock.B Live Debugging - SwishDbgExt, SysecLabs script.
Here we are, part two! I thought rather than doing a live debugging of runtime2 as I discussed in my last rootkit debugging post, I'd debug a different rootkit. I chose Rustock.B (PE386) as it's a...
View ArticleTelefonica O2 Connection Manager 3.4 Local Privilege Escalation
Telefonica O2 Connection Manager 3.4 Local Privilege Escalation VulnerabilityVendor: Telefonica S.A.Product web page: http://www.telefonica.com | http://www.o2.co.ukAffected version: 3.4.R1...
View ArticleTelefonica O2 Connection Manager 8.7 Service Trusted Path Privilege Escalation
Telefonica O2 Connection Manager 8.7 Service Trusted Path Privilege EscalationVendor: Telefonica S.A.Product web page: http://www.telefonica.com | http://www.o2.co.ukAffected version: 8.7.6.792Summary:...
View ArticlePaper: A Decentralized Public Key Infrastructure with Identity Retention
Public key infrastructures (PKIs) enable users to look up and verify one another’s publickeys based on identities. Current approaches to PKIs are vulnerable because they do not offersufficiently strong...
View Article