Paper: The Rotten Tomato Campaign
Malware authors are not shy about borrowing ideas. One of the most typical cases is theTomato Garden case,where several different groups used the same zero-day Microsoft Wordexploit.more...
View ArticleSmuggler - An interactive 802.11 wireless shell without the need for...
I’ve always been fascinated by wireless communications. The ability to launch seemingly invisible packets of information up into the air without even the need to consider aerodynamics itself seems like...
View ArticleBE2 Custom Plugins, Router Abuse, and Target Profiles
New observations on BlackEnergy2 APT activitymore here...........http://securelist.com/blog/research/67353/be2-custom-plugins-router-abuse-and-target-profiles/
View Articlenogotofail
Nogotofail is a network security testing tool designed to help developers and security researchers spot and fix weak TLS/SSL connections and sensitive cleartext traffic on devices and applications in a...
View ArticleCVE-2014-1635 BELKIN N750 BUFFER OVERFLOW
A remote unauthenticated attacker may execute commands as root by sending an unauthenticated crafted POST request to the httpd that serves authentication on the guest login network.more...
View ArticleKL-001-2014-004 : VMWare vmx86.sys Arbitrary Kernel Read
Title: VMWare vmx86.sys Arbitrary Kernel ReadAdvisory ID: KL-001-2014-004Publication Date: 2014.11.04Publication URL: https://www.korelogic.com/Resources/Advisories/KL-001-2014-004.txt1. Vulnerability...
View ArticlePaper: Harvesting High Value Foreign Currency Transactions from EMV...
In this paper we present an attack, which allows fraudulenttransactions to be collected from EMV contactless credit and debitcards without the knowledge of the cardholder. The attackexploits a...
View ArticleWireLurker: A New Era in OS X and iOS Malware
Today we published a new research paper on WireLurker, a family of malware targeting both Mac OS and iOS systems for the past six months. We believe that this malware family heralds a new era in...
View ArticleWhat You Need to Know About WireLurker
Mobile Security company Palo Alto Networks has released a new white paper titled WireLurker: A New Era in iOS and OS X Malware. I’ve gone through their findings, and also managed to get a hold of the...
View ArticleRoot Cause Analysis of CVE-2014-1772 – An Internet Explorer Use After Free...
We see many kinds of vulnerabilities on a regular basis. These range from user-after-free (UAF) vulnerabilities, to type confusion, to buffer overflows, to cross-site scripting (XSS) attacks. It’s...
View ArticleMalicious iFrame Injector Found in Adobe Flash File (.SWF)
Finding malware in Adobe Flash files (.swf) is nothing new, but it usually affects personal computers, not servers. Typically, a hidden iFrame is used to drop a binary browser exploit with .SWF files,...
View Article“CVE-2014-8517″ vulnerability: Remote command execution in FreeBSD
[CVE-2014-8517] – a dangerous vulnerability in FTP-client, which allows the attacker to use a utility ftp.exe interactively and execute arbitrary commands on the victim’s computer.The vulnerability is...
View ArticleSEC Consult SA-20141106-0 :: XXE & XSS & Arbitrary File Write vulnerabilities...
SEC Consult Vulnerability Lab Security Advisory < 20141106-0 >======================================================================= title: XXE & XSS & Arbitrary File Write...
View ArticleFROM 0-DAY TO EXPLOIT – BUFFER OVERFLOW IN BELKIN N750 (CVE-2014-1635)
A vulnerability in the guest network web interface of the Belkin N750 DB Wi-Fi Dual-Band N+ Gigabit Router with firmware F9K1103_WW_1.10.16m, allows an unauthenticated remote attacker to gain root...
View ArticleUsing SystemTap to determine the exploitability of unbound memory overflows
Hello, my name is Nikos Naziridis and I am a security researcher at CENSUS. In this post, I will present how SystemTap and kernel instrumentation in general, could be used to aid the process of...
View ArticleCryptolocker variant Torrentlocker making new victims in NL
Since past weekend, the Netherlands were hit with another spam run spreading the Cryptolocker variant known as Torrentlocker. Torrentlocker presents itself to victims as Cryptolocker in all cases,...
View ArticleInsecure management of login credentials in PicsArt Photo Studio for Android...
Fundación Dr. Manuel Sadosky - Programa STIC Advisory http://www.fundacionsadosky.org.arInsecure management of login credentials in PicsArt Photo Studio forAndroid1. *Advisory Information*Title:...
View Article“Rootpipe” Vulnerability
A new critical vulnerability titled “Rootpipe” affecting the Mac OS X operating system has been discovered courtesy of Swedish security researcher and consultant Emil Kvarnhammar (@emilkvarnhammar).The...
View ArticleWordpress bulletproof-security
Vulnerability title: Wordpress bulletproof-security <=.51 multiplevulnerabilitiesAuthor: Pietro OlivaCVE: CVE-2014-7958, CVE-2014-7959, CVE-2014-8749Vendor: AITproProduct:...
View ArticleThe proof is in the cookie
During the past few weeks, we have a heard a lot about malvertising, this technique of delivering malware through booby-trapped adverts.more...
View Article