Security News

September 26, 2016

IP Spoofing

About 27% of networks still allow IP spoofing.

September 25, 2016

Introducing MailSniper: A Tool For Searching Every User’s Email for Sensitive Data

MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, insider intel, network architecture information, etc.). It can be used as a non-administrative user to search their own email, or by an Exchange administrator to search the mailboxes of every user in a domain.

MailSniper is available for download here: https://github.com/dafthack/MailSniper

September 23, 2016

Luckystrike: An Evil Office Document Generator

Luckystrike is a PowerShell based generator of malicious .xls documents (soon to be .doc). All your payloads are saved into a database for easy retrieval & embedding into a new or existing document. Luckystrike provides you several infection methods designed to get your payloads to execute without tripping AV. See the “Installation” section below for instructions on getting started.

March 1, 2016

The Drown Attack

DROWN is a serious vulnerability that affects HTTPS and other services that rely on SSL and TLS, some of the essential cryptographic protocols for Internet security. These protocols allow everyone on the Internet to browse the web, use email, shop online, and send instant messages without third-parties being able to read the communication.

January 6, 2016

Vulnerability in Blackphone Puts Devices at Risk for Takeover

The Blackphone is generally considered the most secure smartphone available today. Unfortunately, no matter how secure a system is designed to be, it remains vulnerable to security flaws.

December 29, 2015

AVG: “Web TuneUP” extension multiple critical vulnerabilities

When installing AVG, Web TuneUP automatically gets installed which is vulnerable to XSS (Cross site scripting) and is estimated to affect about 9 million users.

December 19, 2015

CVE-2015-7755: Juniper ScreenOS Authentication Backdoor

On December 18th, 2015 Juniper issued an advisory indicating that they had discovered unauthorized code in the ScreenOS software that powers their Netscreen firewalls. This advisory covered two distinct issues; a backdoor in the VPN implementation that allows a passive eavesdropper to decrypt traffic and a second backdoor that allows an attacker to bypass authentication in the SSH and Telnet daemons. Shortly after Juniper posted the advisory, an employee of Fox-IT stated that they were able to identify the backdoor password in six hours. A quick Shodan search identified approximately 26,000 internet-facing Netscreen devices with SSH open. Given the severity of this issue, we decided to investigate.

December 16, 2015

Critical 0-day Remote Command Execution Vulnerability in Joomla

The Joomla security team have just released a new version of Joomla to patch a critical remote command execution vulnerability that affects all versions from 1.5 to 3.4.

This is a serious vulnerability that can be easily exploited and is already in the wild. If you are using Joomla, you have to update it right now.

November 24, 2015

Additional Self-Signed Certs, Private Keys Found on Dell Machines

eDellroot is not the only self-signed trusted root certificate on Dell computers.  Researchers at Duo Security found two more on a Dell Inspiron 14-inch laptop purchased by Darren Kemp, one of its researchers who is based in Calgary, Canada, including one cert related to eDellroot that also ships with a corresponding private key, and a Atheros Authenticode certificate and private key used to sign Bluetooth drivers.

Backdoor In A Backdoor Identified in 600,000 Arris Modems

Thousands of cable modems manufactured by the Georgia-based telecom Arris suffer from a series of issues: XSS and CSRF vulnerabilities, hard-coded passwords, and what a researcher is calling a backdoor in a backdoor.

November 19, 2015

Nmap 7 Released

The Nmap Project is pleased to announce the immediate, free availability of the Nmap Security Scanner version 7.00 from https://nmap.org/. It is the product of three and a half years of work, nearly 3200 code commits, and more than a dozen point releases since the big Nmap 6 release in May 2012. Nmap turned 18 years old in September this year and celebrates its birthday with 171 new NSE scripts, expanded IPv6 support, world-class SSL/TLS analysis, and more user-requested features than ever.

Do you know what you are sharing with Google?

There was a time when Google was simply a search engine. Albeit one that we always knew collected a lot of data to make search results — and ads — more relevant. However, over the years, the Google properties have grown to include things like Android, Gmail, Google+ (anyone?), YouTube, Docs, Drive and many, many more.

Have you ever stopped to think what things and pieces of personal data that you are sharing with Google, and in some cases, anyone with the ability to Google it?

To read more, the link above is the full blog post from Jeffrey Esposito of Kaspersky Labs.

Chipotle Serves Up Chips, Guac & HR Email

The restaurant chain Chipotle Mexican Grill seems pretty good at churning out huge numbers of huge burritos, but the company may need to revisit some basic corporate cybersecurity concepts. For starters, Chipotle’s human resources department has been replying to new job applicants using the domain “chipotlehr.com” — a Web site name that the company has never owned or controlled.

To read more, the link above is the full blog post from Brian Krebs.

Leave a comment