Independent

IndependentKrebs

Bomb Threat, Sextortion Spammers Abused Weakness at GoDaddy.com

Credit to Author: BrianKrebs| Date: Wed, 23 Jan 2019 02:44:28 +0000

Two of the most disruptive and widely-received spam email campaigns over the past few months — including an ongoing sextortion email scam and a bomb threat hoax that shut down dozens of schools, businesses and government buildings late last year — were made possible thanks to an authentication weakness at GoDaddy.com, the world’s largest domain name registrar, KrebsOnSecurity has learned. Perhaps more worryingly, experts warn this same weakness that let spammers hijack domains registered through GoDaddy also affects a great many other major Internet service providers, and is actively being abused to launch phishing and malware attacks which leverage dormant Web site names currently owned and controlled by some of the world’s most trusted corporate names and brands.

Read More
IndependentSecuriteam

SSD Advisory – Teco SG2 and TP3 Vulnerabililites

Credit to Author: SSD / Noam Rathaus| Date: Mon, 04 Jul 2016 12:58:21 +0000

Vulnerabilities Description Multiple vulnerabilities have been found in Teco’s SG2 and TP3 product, these vulnerabilities allows attackers that are able to supply the products with a specially crafted file to cause it to execute arbitrary code. TECO TP3 PC-LINK tpc file parsing Stack Buffer Overflow Code Execution TECO uses their own propriety file format known … Continue reading SSD Advisory – Teco SG2 and TP3 Vulnerabililites

Read More
IndependentSecuriteam

Using Machine Learning To Detect Anomalies

Credit to Author: dmitryc| Date: Mon, 21 Dec 2015 22:07:07 +0000

I’m going to start blogging more about detection of protocol/app anomalies, detection of lateral movement and/or data exfiltration, and more. For many years I have been watching users and applications furrow their way across networks and I’m gonna start data-dumping that info here 🙂 But…first…I manage a web server for a friend. It occurred to … Continue reading Using Machine Learning To Detect Anomalies

Read More
IndependentSecuriteam

Play some D!

Credit to Author: dmitryc| Date: Tue, 04 Aug 2015 14:33:59 +0000

Hi there. Long-time-no-blog 🙂 If you haven’t already, go read this: https://t.co/d2hwhmzzuz Note: this blog applies to Corporate networks. If you’re a coffee shop or a college, you’re on your own 🙂 I’ve been a network defender for many years. I currently work for a software company that builds network software which helps companies gain … Continue reading Play some D!

Read More
IndependentSecuriteam

OpenSSL ACCF Vulnerability (CVE-2015-1793)

Credit to Author: SSD / Noam Rathaus| Date: Thu, 09 Jul 2015 14:12:03 +0000

A new vulnerability has been recently patched in OpenSSL: During certificate verification, OpenSSL (starting from version 1.0.1n and 1.0.2b) will attempt to find an alternative certificate chain if the first attempt to build such a chain fails. An error in the implementation of this logic can mean that an attacker could cause certain checks on … Continue reading OpenSSL ACCF Vulnerability (CVE-2015-1793)

Read More
IndependentSecuriteam

REVIEW – “The Florentine Deception”, Carey Nachenberg

Credit to Author: p1| Date: Wed, 10 Jun 2015 16:22:25 +0000

BKFLODEC.RVW   20150609 “The Florentine Deception”, Carey Nachenberg, 2015, 978-1-5040-0924-9, U$13.49/C$18.91 %A   Carey Nachenberg http://florentinedeception.com %C   345 Hudson Street, New York, NY   10014 %D   2015 %G   978-1-5040-0924-9 150400924X %I   Open Road Distribution %O   U$13.49/C$18.91 www.openroadmedia.com %O  http://www.amazon.com/exec/obidos/ASIN/150400924X/robsladesinterne http://www.amazon.co.uk/exec/obidos/ASIN/150400924X/robsladesinte-21 %O   http://www.amazon.ca/exec/obidos/ASIN/150400924X/robsladesin03-20 %O   Audience n+ Tech 3 Writing 2 (see revfaq.htm for explanation) %P   321 p. %T   “The … Continue reading REVIEW – “The Florentine Deception”, Carey Nachenberg

Read More
IndependentSecuriteam

REVIEW: “Security for Service Oriented Architectures”, Walter Williams

Credit to Author: p1| Date: Sun, 10 May 2015 23:13:31 +0000

BKSECSOA.RVW 20150130 “Security for Service Oriented Architectures”, Walter Williams, 2014, 978-1466584020, U$61.97 %A Walter Williams walt.williams@gmail.com %C #300 – 6000 Broken Sound Parkway NW, Boca Raton, FL 33487-2742 %D 2014 %G 978-1466584020 1466584025 %I CRC Press %O U$61.97 800-272-7737 http://www.bh.com/bh/ %O http://www.amazon.com/exec/obidos/ASIN/1466584025/robsladesinterne http://www.amazon.co.uk/exec/obidos/ASIN/1466584025/robsladesinte-21 %O http://www.amazon.ca/exec/obidos/ASIN/1466584025/robsladesin03-20 %O Audience i+ Tech 2 Writing 2 (see revfaq.htm for … Continue reading REVIEW: “Security for Service Oriented Architectures”, Walter Williams

Read More