Spear Phishing Fileless Attack with CVE-2017-0199

Credit to Author: Bahare Sabouri and He Xu| Date: Tue, 30 May 2017 16:21:54 -0700

Introduction CVE-2017-0199 is a remote code execution vulnerability that exists in the way that Microsoft Office and WordPad parse specially crafted files. An attacker who successfully exploits this vulnerability can take control of an affected system and then install programs, view, change, or delete data, or create new accounts with full user rights. Microsoft issued a patch for this vulnerability April, and most security vendors have published alarms for it. Unfortunately, attacks targeting this vulnerability are still widely being used…

Read more

SSD Advisory – Trend Micro Interscan Web Security Virtual Appliance Multiple Vulnerabilities

Credit to Author: SSD / Maor Schwartz| Date: Thu, 25 May 2017 11:52:44 +0000

Vulnerabilities Summary The following advisory describes three (3) vulnerabilities found in Trend Micro Interscan Web Security Virtual Appliance version 6.5. “The Trend Micro Hybrid Cloud Security solution, powered by XGen security, delivers a blend of cross-generational threat defense techniques that have been optimized to protect physical, virtual, and cloud workloads.” The vulnerabilities found in Trend Micro … Continue reading SSD Advisory – Trend Micro Interscan Web Security Virtual Appliance Multiple Vulnerabilities

Read more

Five unsettling cyberthreats

Credit to Author: William Tsing| Date: Wed, 24 May 2017 18:39:46 +0000

Cyberthreats are typically boring, repetitive, and require a reasonably predictable remediation process. Here are 5 cyberthreats that if you’re not frightened by, you should be.

Categories:

Tags:

(Read more…)

The post Five unsettling cyberthreats appeared first on Malwarebytes Labs.

Read more

The Power of Virtual Cell Wi-Fi

Credit to Author: Kaushik Dash, Harish Gnanasambandam, Vikas Banerjee| Date: Tue, 30 May 2017 09:23:26 -0700

Wireless access has not only revolutionized networks. It has profoundly changed our culture. It has transformed how and where we work, how we interact through social media, and how we stay connected with family and friends. The challenge we are now facing is Wi-Fi saturation. Given the number of connected devices online now, and the predictions for exponential growth over just the next few years, we need to ensure that we are building wireless networks that can accommodate both the volume of connections and connected devices coming, the increase…

Read more

Sophos con Tesla Consulting al Security Summit di Treviso

Credit to Author: Tiziana Carboni| Date: Fri, 26 May 2017 10:07:18 +0000

L’evento sarà l’occasione per approfondire la conoscenza del nuovo approccio sincronizzato alla sicurezza, volto a contrastare efficacemente gli attacchi ransomware Il recente attacco WannaCry ha dimostrato, ancora una volta, come le reti aziendali siano il bersaglio preferenziale dei cyber criminali, che attraverso attacchi ransomware compromettono la produttività aziendale bloccando l’attività di business e mettendo a rischio [&#8230;]<img alt=”” border=”0″ src=”https://pixel.wp.com/b.gif?host=news.sophos.com&#038;blog=834173&#038;post=36838&#038;subd=sophos&#038;ref=&#038;feed=1″ width=”1″ height=”1″ /><img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/dOD0PrRS2rk” height=”1″ width=”1″ alt=””/>

Read more

WannaCry: come è avvenuto l’attacco

Credit to Author: Sophos Italia| Date: Fri, 26 May 2017 05:49:59 +0000

Lo scorso venerdì l’epidemia informatica del ransomware worm WannaCry ha infettato centinaia di migliaia di computers in tutto il globo. Un tipico attacco ransomware inizia con una email phishing con allegati ovvero link fraudolenti, che l’utente è indotto con l’inganno ad aprire. Tuttavia, i SophosLabs hanno stabilito che l’attacco WannaCry non è verosimilmente iniziato in [&#8230;]<img alt=”” border=”0″ src=”https://pixel.wp.com/b.gif?host=news.sophos.com&#038;blog=834173&#038;post=36825&#038;subd=sophos&#038;ref=&#038;feed=1″ width=”1″ height=”1″ /><img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/2Za-kHtbT34″ height=”1″ width=”1″ alt=””/>

Read more

The Jetson’s Cyber Concerns – Future Smart Cities Cybersecurity Checklist

Credit to Author: Jon Clay| Date: Tue, 30 May 2017 12:00:36 +0000

As cities continue to grow smarter, they will also become easier to hack. With millions (if not billions) of dollars going into research for urban domains and the Internet of Things (IoT), there will be more opportunities to utilize technology to define, access and improve smart city services and infrastructure. In these smart cities, information…

Read more

Answering the WannaCry wake-up call

Credit to Author: Selena J. Linde, T. Markus Funk, Todd M. Hinnen and Jonathan G. Hardin| Date: Tue, 30 May 2017 04:35:00 -0700

The widespread WannaCry attack demonstrated the acute vulnerability of computer systems to ransomware attacks. There is no reason to think that larger, more sophisticated attacks aren’t already being planned — the perpetrators of WannaCry reportedly profited handsomely — and companies that have not assessed and addressed the risk posed to their systems by such attacks may remain vulnerable.

Companies can take prophylactic steps to protect their systems against ransomware, focusing on improving data security hygiene, establishing effective governance and raising employees’ awareness of the threat.

To read this article in full or to leave a comment, please click here

Read more