A technical intelligence report on the Pobelka botnet operation
This technical report describes the Pobelka botnet and puts it in the context of global malware operations. Fox-IT’s InTELL unit provides reports like this on a continuous basis to customers in the...
View ArticleCridex + Fareit Infection Analysis - "dozakialko.ru:8080" A Credential...
The BackgroundYesterday we found infection of spam which lead us to some url like below:?12h00p://www.piastraollare.com/upload.htmh00p://kompot.designcon.tmweb.ru/upload.htmWe went down to analysis,...
View ArticleAtheme IRC Services 7.0.5 DoS
#!/usr/bin/python3#################################################################################### #### _ _ .__...
View ArticleMicrosoft Security Essentials Fails AV-Test Again
For the second time in a row Microsoft’s free antivirus solution – Microsoft Security Essentials (MSE) – has failed to earn certification from AV-Test, the independent German testing lab. The program...
View ArticleNew slicker Shylock Trojan hooks into Skype
The Shylock banking Trojan has been revamped with extra features that allow the malware to spread using the chat function of Skype, the popular Voice over IP application.Shylock can now roam the Skype...
View ArticleFAKEM RAT- Malware Disguised as Windows® Messenger and Yahoo!® Messenger
The perpetrators of targeted attacks aim to maintain persistent presence in atarget network in order to extract sensitive data when needed. To maintainpersistent presence, attackers seek to blend in...
View ArticleBlue Coat Appliances Used by Governments to Monitor, Censor Web Traffic
After the discovery that Syria used Blue Coat Systems technology to censor and monitor dissidents, a group of researchers find 61 government networks using the same systems.A group of researchers urged...
View ArticleNovell NCP Pre-Auth Remote Stack-Based Buffer Overflow. (CVE-2012-0432) Exploit
In the interest of full-disclosure, here is a remote exploit for thevulnerability found by David Klein:DemonstrationNovell NCP Pre-Auth Remote Stack Buffer OverflowConnecting to host...
View ArticleLinksys WRT54GL Firmware 4.30.15 build 2 Multiple Vulnerabilities
evice Name: Linksys WRT54GL v1.1Vendor: Linksys/Cisco============ Vulnerable Firmware Releases: ============Firmware Version: 4.30.15 build 2, 01/20/2011============ Device Description: ============The...
View ArticleSpiralling Scale of Mobile Phone Theft Puts Consumers & Businesses at Risk of...
Equifax warns about the risks of keeping personal and business data on mobile devices, as Met Police report over 300 phones stolen in London every dayMobiles, smartphones and tablet devices have become...
View ArticleCJIS Security Policies Satisfied With GoldKey Flash Tokens
Marysville Police Department Receives FBI Approval for its CJIS Compliance Strategy Using GoldKey TokensIndependence, MO (PRWEB) January 17, 2013Users of the FBI Criminal Justice Information System...
View ArticleMantisBT before 1.2.13 match_type XSS vulnerability
Jakub Galczyk discovered[1][2] a cross site scripting (XSS)vulnerability in MantisBT 1.2.12 and earlier versions that allows amalicious person to trick the browser of a target user into...
View ArticlePwn2Own 2013 Competition
OverviewHP’s DVLabs Zero Day Initiative (ZDI) is expanding the focus of its annual Pwn2Own competition beyond vulnerabilities in the web browser this year. Over the last several years, we have seen...
View ArticleZscaler Uncovers Security Vulnerabilities in ESPN ScoreCenter Mobile App
Security Risks Present in ESPN ScoreCenter Highlight More Widespread Security Problems With Mobile AppsSAN JOSE, Calif.--(BUSINESS WIRE)--Zscaler®, the leading provider of Security Cloud services for...
View ArticleA Real Random VirtualAlloc
n this post i will discuss one disadvantage of using the "VirtualAlloc" function to allocate memory and also suggest a trick to play around this disadvantage.If you ever used the "VirtualAlloc"...
View Articlednsmasq: Incomplete fix for the CVE-2012-3411 issue
The CVE-2012-3411 identifier has been originally assigned to thefollowing issue:When dnsmasq is used in conjunctions with certain configurations of libvirtd, network packets from prohibited networks...
View ArticleThreat Outbreak Alert: Fake Bank of America Secure Message Notification...
DescriptionCisco Security Intelligence Operations has detected significant activity related to spam e-mail messages that claim to a secure message from Bank of America for the recipient. The text in...
View ArticleThreat Outbreak Alert: Fake Confidential Message Notification E-mail Messages
DescriptionCisco Security Intelligence Operations has detected significant activity related to spam e-mail messages that claim to a confidential message for the recipient. The text in the e-mail...
View Articlenew scripts/modules/exploits added to Nmap, OpenVAS, Metasploit, and Nessus...
This report describes any new scripts/modules/exploits added to Nmap,OpenVAS, Metasploit, and Nessus since yesterday.== OpenVAS plugins (21) ==r15192...
View Article