WikiLeaks releases Marble source code, used by the CIA to hide the source of malware it deployed

BetaNews WikiLeaks releases Marble source code, used by the CIA to hide the source of malware it deployed BetaNews Now we have Marble to look at. A collection of 676 source code files, the Marble cache reveals details of the CIA’s Marble Framework tool, used to hide the true source of CIA malware , and sometimes going as far as appearing to originate from countries …

Source: WikiLeaks releases Marble source code, used by the CIA to hide the source of malware it deployed

Advertisements

Samsung Galaxy S8’s Facial Unlocking Feature Can Be Fooled With A Photo


Samsung launched its new flagship smartphones, the Galaxy S8 and Galaxy S8 Plus, at its Unpacked 2017 event on Wednesday in New York, with both IRIS and Facial Recognition features, making it easier for users to unlock their smartphone and signing into websites.

Source: Samsung Galaxy S8’s Facial Unlocking Feature Can Be Fooled With A Photo

Researchers steal data from shared cache of two cloud VMs


All of a sudden dedicated instances are looking a lot better than multi-tenancy A group of researchers, one from Microsoft, say they can extract information from an Amazon Web Services virtual machine by probing the cache of a CPU it shares with other cloudy VMs.…

Source: Researchers steal data from shared cache of two cloud VMs

People are still the biggest security threat to any organization


Despite an increase in spending and investment in deterrence tactics and detection tools, insider threats continue to cause harm to all types of organizations. A new report suggests that, although funding is increasing, inadequate resources are being allotted to predictive risk analytics — a critical component of mitigating insider threats.

Source: People are still the biggest security threat to any organization

The First Horseman of the Privacy Apocalypse Has Already Arrived: Verizon Announces Plans to Install Spyware on All Its Android Phones


Within days of Congress repealing online privacy protections , Verizon has announced new plans to install software on customers’ devices to track what apps customers have downloaded. With this spyware, Verizon will be able to sell ads to you across the Internet based on things like which bank you use and whether you’ve downloaded a fertility app.

Source: The First Horseman of the Privacy Apocalypse Has Already Arrived: Verizon Announces Plans to Install Spyware on All Its Android Phones

Hillary Clinton, campaign staff targeted by Russian hackers during election: Researcher


Washington Times Hillary Clinton, campaign staff targeted by Russian hackers during election: Researcher Washington Times Russia’s military intelligence agency, GRU, targeted at least 109 Clinton campaign staffers during a month-long hacking spree waged prior to last year’s presidential election, in addition to Mrs.

Source: Hillary Clinton, campaign staff targeted by Russian hackers during election: Researcher

Actively exploited zero-day in IIS 6.0 affects 60,000+ servers


Microsoft Internet Information Services (IIS) 6.0 sports a zero-day vulnerability (CVE-2017-7269) that was exploited in the wild last summer and is likely also being exploited by threat actors at this very moment. It is a buffer overflow flaw in a function in the WebDAV service in IIS 6.0 in Microsoft Windows Server 2003 R2, and can be triggered by attackers sending a overlong IF header in a PROPFIND request.

Source: Actively exploited zero-day in IIS 6.0 affects 60,000+ servers

Nuclear Bot source code leaked online, a new threat will rapidly spread in the wild


The source code for a new banking Trojan dubbed Nuclear Bot was leaked online, experts speculate a rapid diffusion of the threat in the wild. The source code for a new banking Trojan, dubbed Nuclear Bot, is available for sale in the cyber criminal underground .The Nuclear Bot banking Trojan first appeared in the cybercrime forums in early December when it was offered for $2,500.

Source: Nuclear Bot source code leaked online, a new threat will rapidly spread in the wild

New Mirai Variant Used in 54-Hour DDoS Attack Against US College

A new Mirai variant was discovered in the wild, being used to launch a 54-hour DDoS attack against a US college. Although researchers over at Incapsula spotted the attack as it happened, they’re only just reporting on it. It seems that the attack started on February 28 and ran for 54 hours straight,….

Source: New Mirai Variant Used in 54-Hour DDoS Attack Against US College

IIS 6.0 Vulnerability Leads to Code Execution

Microsoft Internet Information Services (IIS) 6.0 is vulnerable to a zero-day Buffer Overflow vulnerability ( CVE-2017-7269 ) due to an improper validation of an ‘IF’ header in a PROPFIND request. A remote attacker could exploit this vulnerability in the IIS WebDAV Component with a crafted request using PROPFIND method.

Source: IIS 6.0 Vulnerability Leads to Code Execution