TippingPoint Threat Intelligence and Zero-Day Coverage – Week of September 4, 2017
Credit to Author: Elisa Lippincott (TippingPoint Global Product Marketing)| Date: Fri, 08 Sep 2017 14:23:58 +0000
Earlier this week, a ‘severe’ vulnerability was discovered in Apache Struts, an open source framework for developing applications in Java. The vulnerability, CVE-2017-9805, affects all versions of Struts since 2008 and all applications using the framework’s REST plugin are vulnerable. Trend Micro has released DVToolkit CSW file CVE-2017-9805.csw for the Apache Struts 2 Vulnerability to…
Responsible disclosure is a critical process in the security community. It’s the way for security researchers and vendors to work together in order to improve system security for users. We see the opposite of this process in the digital underground. Cybercriminals often sell exploits and malicious tools for profit. The ShadowBrokers—infamous for the leak of…
As much as smartphones and applications have evolved over the years, so has mobile malware. We’re seeing an increasing number of threats—from mobile ransomware and auto-clicking adware to dangerous backdoors that can compromise your privacy. And there are also legitimate personal applications that can be taken advantage of and used to target your enterprise. With…
If there’s one thing we know about cybercrimnals it’s that where there’s people and money, they will surely follow. With an estimated 1.4 billion Android devices in use today, it’s not hard to see why they might have your smartphone in their sights. Attacks on Android devices made up 81 percent of mobile attacks last…
During one of my talks for Garter, I asked the audience, “How many of you have ever had anything stolen?” Many hands went up. Then I asked, “How did you know it was stolen?” The answers generally offered, “I looked for it, and it wasn’t there.” Data theft, and in particular identity theft, is different….
VMware featured a number of great announcements at VMworld 2017 including VMware Cloud on AWS. VMware customers can now run new or existing virtualized workloads in the AWS cloud while maintaining their current VMware tools and skill sets. This announcement provides an important shift in the hybrid cloud market for businesses looking to adopt the…
Let’s take a closer look into BEC threats and how hackers have improved this attack method.