Month: January 2019

MalwareBytesSecurity

A week in security (January 14 – 20)

Credit to Author: Malwarebytes Labs| Date: Mon, 21 Jan 2019 16:48:38 +0000

A roundup of last week’s security news from January 14 to 20, including APT10, Fallout EK, Colllection 1 data, Youtube challenges, hosting malicious sites and a Fortnite security flaw.

Categories:

Tags:

(Read more…)

The post A week in security (January 14 – 20) appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

Has two-factor authentication been defeated? A spotlight on 2FA’s latest challenge

Credit to Author: Malwarebytes Labs| Date: Mon, 21 Jan 2019 16:15:30 +0000

While many tech-savvy folks are familiar with two-factor authentication (2FA), more are unaware that there are several ways around it. A tactic called Modlishka, the English pronunciation for the Polish word for “mantis,” is the latest in this list.

Categories:

Tags:

(Read more…)

The post Has two-factor authentication been defeated? A spotlight on 2FA’s latest challenge appeared first on Malwarebytes Labs.

Read More
IndependentSecuriteam

SSD Advisory – Teco SG2 and TP3 Vulnerabililites

Credit to Author: SSD / Noam Rathaus| Date: Mon, 04 Jul 2016 12:58:21 +0000

Vulnerabilities Description Multiple vulnerabilities have been found in Teco’s SG2 and TP3 product, these vulnerabilities allows attackers that are able to supply the products with a specially crafted file to cause it to execute arbitrary code. TECO TP3 PC-LINK tpc file parsing Stack Buffer Overflow Code Execution TECO uses their own propriety file format known … Continue reading SSD Advisory – Teco SG2 and TP3 Vulnerabililites

Read More
IndependentSecuriteam

Using Machine Learning To Detect Anomalies

Credit to Author: dmitryc| Date: Mon, 21 Dec 2015 22:07:07 +0000

I’m going to start blogging more about detection of protocol/app anomalies, detection of lateral movement and/or data exfiltration, and more. For many years I have been watching users and applications furrow their way across networks and I’m gonna start data-dumping that info here 🙂 But…first…I manage a web server for a friend. It occurred to … Continue reading Using Machine Learning To Detect Anomalies

Read More