Talos is publishing a glimpse into the most prevalent threats we’ve observed between Aug. 9 and Aug. 16. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavioural characteristics, indicators of compromise, and discussing how our customers are automatically protected from these threats.
The Rapid7 Open Data set is a collection of Open Source Intelligence data feeds collected via their project SONAR research. This provide forward and reverse DNS records, similar to PassiveTotal or OpenDNS, HTTP and HTTPS GET responses, SSL Certificate data, UDP and TCP scans and other data.
These can be used to bolster any threat intelligence offering.
For further details see James’ site.
Anton seems to be quiet at the moment, but you can catch up with his exploits on his blog and via twitter. He also publishes various code experiments and exploits on his github pages, with a particularly useful looking fuzzing repo which you could use in OWASP ZAP, BURP Suite or similar.
Double entendres abound with the KNOB (key negotiation of Bluetooth) attack against the basic rate/enhanced data rate (BR/EDR, or Bluetooth Classic) configuration, which could result in information disclosure and/or escalation of privileges.
It looks like a busy few days ahead for Threat and Vulnerability managers as Microsoft release over 90 fixes to security bugs including patches for 4 new blue-keep-esque wormable RDP flaws.
These vulnerabilities are rated critical and wormable, and only apply to Windows 7 sp1, Windows Server 2008 R2 SP1, Windows Server 2012, Windows 8.1, Windows Server 2012 and all Windows 10 versions and Windows Server versions after that.
In addition, HTTP/2 has just taken a bashing, with the discovery of 8 denial of service vulnerabilities which affect implementations on Apache, IIS and NGINX.
A Google security researcher has just disclosed details of a 20-year-old unpatched high-severity vulnerability affecting all versions of Microsoft Windows, back from Windows XP to the latest Windows 10. The vulnerability, which could allow a low privileged application to read and write data to a higher privileged application, resides in the way MSCTF clients and server communicate with each other.
Talos is publishing a glimpse into the most prevalent threats we’ve observed between Aug. 2 and Aug. 9. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavioural characteristics, indicators of compromise, and discussing how our customers are automatically protected from these threats.
If you own a device, or a hardware component, manufactured by ASUS, Toshiba, Intel, NVIDIA, Huawei, or other 15 other vendors listed below, you’re probably screwed. A team of security researchers has discovered high-risk security vulnerabilities in more than 40 drivers from at least 20 different vendors that could allow attackers to gain most privileged permission on the system and hide malware
Nmap is a free and open source utility for network discovery and security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime.
Researchers have uncovered some potentially serious SQLite vulnerabilities and they have demonstrated their findings by hacking an iPhone and a command and control (C&C) server used by malware. read more…