securityXspace: a blog about cyber-philosophy.

  • 20,000-bots-strong Sathurbot botnet grows by compromising WordPress sites

    A 20,000-bots-strong botnet is probing WordPress sites, trying to compromise them and spread a backdoor downloader Trojan called Sathurbot as far and as wide as possible. Sathurbot: A versatile threat “Sathurbot can update itself and download and start other executables. Source: 20,000-bots-strong Sathurbot botnet grows by compromising WordPress sites

  • Rash of in-the-wild attacks permanently destroys poorly secured IoT devices

    Enlarge (credit: Guinnog ) Researchers have uncovered a rash of ongoing attacks designed to damage routers and other Internet-connected appliances so badly that they become effectively inoperable. PDoS attack bots (short for “permanent denial-of-service”) scan the Internet for Linux-based routers, bridges, or similar Internet-connected devices that require only factory-default passwords to grant remote administrator access.…

  • Samsung’s Tizen is riddled with security flaws, amateurishly written

    Enlarge (credit: Samsung) Tizen, the open source operating system that Samsung uses on a range of Internet-of-Things devices and positions as a sometime competitor to Android, is chock full of egregious security flaws, according to Israeli researcher Amihai Neiderman. Source: Samsung’s Tizen is riddled with security flaws, amateurishly written

  • South Korean users targeted with a new stealthy malware, the ROKRAT RAT

    Security experts at CISCO Talos have spotted a new insidious remote access tool dubbed ROKRAT that implements sophisticated anti-detection measures. Security experts at CISCO Talos have spotted a new insidious remote access tool dubbed ROKRAT that implements sophisticated anti-detection measures. Source: South Korean users targeted with a new stealthy malware, the ROKRAT RAT

  • Apple patches drive-by Wi-Fi flaw with emergency iOS patch

    Less than a week after Apple pushed out iOS 10.3 comes an iOS emergency patch that all iDevice owners should implement as soon a possible. The security note accompanying iOS 10.3.1 says simply that the fixed problem is a stack buffer overflow vulnerability that was addressed through improved input validation, and that it allows an…

  • Hackers Are Emptying ATMs With a Single Drilled Hole and $15 Worth of Gear

    WIRED Hackers Are Emptying ATMs With a Single Drilled Hole and $15 Worth of Gear WIRED Not so long ago, enterprising thieves who wanted to steal the entire contents of an ATM had to blow it up. Today, a more discreet sort of cash-machine burglar can walk away with an ATM’s stash and leave behind…

  • WikiLeaks releases Marble source code, used by the CIA to hide the source of malware it deployed

    BetaNews WikiLeaks releases Marble source code, used by the CIA to hide the source of malware it deployed BetaNews Now we have Marble to look at. A collection of 676 source code files, the Marble cache reveals details of the CIA’s Marble Framework tool, used to hide the true source of CIA malware , and…

  • Samsung Galaxy S8’s Facial Unlocking Feature Can Be Fooled With A Photo

    Samsung launched its new flagship smartphones, the Galaxy S8 and Galaxy S8 Plus, at its Unpacked 2017 event on Wednesday in New York, with both IRIS and Facial Recognition features, making it easier for users to unlock their smartphone and signing into websites. Source: Samsung Galaxy S8’s Facial Unlocking Feature Can Be Fooled With A…

  • Researchers steal data from shared cache of two cloud VMs

    All of a sudden dedicated instances are looking a lot better than multi-tenancy A group of researchers, one from Microsoft, say they can extract information from an Amazon Web Services virtual machine by probing the cache of a CPU it shares with other cloudy VMs.… Source: Researchers steal data from shared cache of two cloud…

  • People are still the biggest security threat to any organization

    Despite an increase in spending and investment in deterrence tactics and detection tools, insider threats continue to cause harm to all types of organizations. A new report suggests that, although funding is increasing, inadequate resources are being allotted to predictive risk analytics — a critical component of mitigating insider threats. Source: People are still the…