Security

MalwareBytesSecurity

Torify and analyze traffic for your VM

Credit to Author: Jérôme Boursier| Date: Thu, 09 Mar 2017 18:00:58 +0000

Several solutions to isolate and analyze a VM network traffic for malware analysis purpose exist. Whonix, Tor and Virtual makes this process painless and efficient.

Categories:

Tags:

(Read more…)

The post Torify and analyze traffic for your VM appeared first on Malwarebytes Labs.

Read More
ComputerWorldIndependent

Assange: CIA had lost control of its cyberweapon documents

Credit to Author: Grant Gross| Date: Thu, 09 Mar 2017 08:53:00 -0800

Information about purported CIA cyberattacks was “passed around” among members of the U.S. intelligence community and contractors before it was published by WikiLeaks this week, Julian Assange says.

The CIA “lost control of its entire cyberweapons arsenal,” the WikiLeaks editor-in-chief said during a press conference Thursday. “This is a historic act of devastating incompetence, to have created such an arsenal and stored all in one place and not secured it.”

Assange declined to name the source who gave the information to WikiLeaks, but he seemed to suggest the 8,700-plus documents, purportedly from an isolated CIA server, came from an insider source.

To read this article in full or to leave a comment, please click here

Read More
ComputerWorldIndependent

Hackers exploit Apache Struts vulnerability to compromise corporate web servers

Credit to Author: Lucian Constantin| Date: Thu, 09 Mar 2017 04:19:00 -0800

Attackers are widely exploiting a recently patched vulnerability in Apache Struts that allows them to remotely execute malicious code on web servers.

Apache Struts is an open-source web development framework for Java web applications. It’s widely used to build corporate websites in sectors including education, government, financial services, retail and media.

On Monday, the Apache Struts developers fixed a high-impact vulnerability in the framework’s Jakarta Multipart parser. Hours later, an exploit for the flaw appeared on Chinese-language websites, which was almost immediately followed by real-world attacks, according to researchers from Cisco Systems.

To read this article in full or to leave a comment, please click here

Read More