Category: Uncategorized

  • Reverse RDP Attack Also Enables Guest-to-Host Escape in Microsoft Hyper-V

    The Hacker News: Remember the Reverse RDP Attack? Earlier this year, researchers disclosed clipboard hijacking and path-traversal issues in Microsoft’s Windows built-in RDP client that could allow a malicious RDP server to compromise a client computer, reversely. (You can find details and a video demonstration for this security vulnerability, along with dozens of critical flaws…

  • KDE Linux Desktops Could Get Hacked Without Even Opening Malicious Files

    If you are running a KDE desktop environment on your Linux operating system, you need to be extra careful and avoid downloading any “.desktop” or “.directory” file for a while. A cybersecurity researcher has disclosed an unpatched zero-day vulnerability in the KDE software framework that could allow maliciously crafted .desktop and .directory files to silently…

  • SQLMAP – Automatic SQL Injection Tool 1.3.8

    The latest version of the popular SQL attack automation tool, SQLMAP, has been released. This new release includes the following features: Full support for MySQL, Oracle, PostgreSQL, MS SQL Server, MS Access, IBM DB2, SQLite, Firebird, Sybase, SQP, MaxDB, Informix, HSQLDB and H2; Full support for six SQL injection types: boolean-based blind; time-base blind; error-based;…

  • Microsoft detects Russian state hackers using compromised IoT devices to launch attacks

    Microsoft has detected that Russian government-sponsored hackers are using IoT devices, such as internet-connected printers, to target and launch attacks against computer networks. Source: Microsoft catches Russian state hackers using IoT devices to breach networks

  • New Flaws in Qualcomm Chips Expose Millions of Android Devices to Hacking

    A series of critical vulnerabilities have been discovered in Qualcomm chipsets that could allow hackers to compromise Android devices remotely just by sending malicious packets over-the-air with no user interaction. Reality check: These flaws have been fixed on Android, so make sure your phone is up to date. These vulnerabilities are not being exploited in…

  • SystemBC, a new proxy malware is being distributed via Fallout and RIG EK

    Researchers at Proofpoint discovered SystemBC, a new strain of proxy malware that is being distributed via Fallout and RIG Exploit Kits Source: SystemBC, a new proxy malware is being distributed via Fallout and RIG EK

  • Alfred, Lord Exploit Kit

    Exploit kits come and go, rise and fall, like the ocean currents. In order to be successful they must be up-to-date and utilise the latest and greatest in consumable exploits. Virus Bulletin‘s Adrian Luca recently discovered a brand new exploit kit, which has called the Lord EK. Malwarebytes have be quick on the draw and…

  • Threat Roundup for July 26 to Aug. 2

    Talos: Talos is publishing a glimpse into the most prevalent threats we’ve observed between July 26 and Aug. 2. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavioural characteristics, indicators of compromise, and discussing how our customers are…

  • BlueKeep built into exploitation tool, sparks fear of Wannacry style infection

    This BlueKeep exploit is now progressing very quickly now: A working BlueKeep exploit module is available now, at an “expensive” monthly rate: BlueKeep built into exploitation tool, sparks fear of Wannacry style infection

  • Cyber Kill Chain Reimagined: Industry Veteran Proposes “Cognitive Attack Loop”

    This is a fascinating read which acknowledges that current attacker methodologies have evolved beyond the old smash-and-grab approach to infiltrate and remain. This also highlights how far defenders actually are behind the curve, because attackers have been using these methods for a few years now and we are only just catching up. “The Cyber Kill…