HackDig : Dig high-quality web security articles for hackers

Patch Tuesday: Fixes for ‘Wormable’ Windows DNS Server RCE, SharePoint Flaws

There has been a common vulnerabilities and exposures (CVE) fixing trend in 2020 Patch Tuesdays. For instance, Microsoft has patched roughly more than 100 vulnerabilities per month in recent bulletins. Similarly, the July update issues 123 patches, including fixes in RemoteFX vGPU, Microsoft Office, Microsoft Windows, OneDrive, and Jet Database Engine. The p
Publish At:2020-07-15 02:56 | Read:42 | Comments:0 | Tags:Exploits Vulnerabilities Microsoft Office SharePoint Windows

‘Wormable’ Flaw Leads July Microsoft Patches

Microsoft today released updates to plug a whopping 123 security holes in Windows and related software, including fixes for a critical, “wormable” flaw in Windows Server versions that Microsoft says is likely to be exploited soon. While this particular weakness mainly affects enterprises, July’s care package from Redmond has a little someth
Publish At:2020-07-14 19:37 | Read:92 | Comments:0 | Tags:Time to Patch .NET Framework CVE-2020-1350 CVE-2020-1410 CVE

[SANS ISC] Microsoft Apps Diverted from Their Main Use

I published the following diary on isc.sans.edu: “Microsoft Apps Diverted from Their Main Use“: This week, the CERT.eu organized its yearly conference in Brussels. Across many interesting presentations, one of them covered what they called the “cat’n’mouse” game that Blue and Red teams are playing continuously. When the Blue team h
Publish At:2019-11-12 03:20 | Read:825 | Comments:0 | Tags:SANS Internet Storm Center Security Microsoft Office SANS IS

CVE-2017-0199: Crooks exploit PowerPoint Slide Show files to deliver malware

According to Trend Micro, cyber criminals abuse the CVE-2017-0199 vulnerability to deliver malware via PowerPoint Slide Show. In April Microsoft fixed the CVE-2017-0199  vulnerability in Office after threat actors had been exploiting it in the wild. Hackers leveraged weaponized Rich Text File (RTF) documents exploiting a flaw in Office’s Object Linking and E
Publish At:2017-08-15 12:50 | Read:2947 | Comments:0 | Tags:Breaking News Cyber Crime Hacking Malware CVE-2017-0199 malw

Microsoft Office Malware Captured in a Micro-VM on an Unpatched Computer

The Bromium Labs team was able to get their hands on some live malware exploiting the Microsoft office vulnerability. First and foremost, on an unpatched workstation Bromium did its job by hardware isolating the Microsoft Word document into a protected virtual machine so that the host workstation was never infected. Secondly, it shows the amazing analytics
Publish At:2017-04-18 02:05 | Read:6180 | Comments:0 | Tags:Breaking News Threats anti-virus command control EDR Events

Microsoft Patch Tuesday – March 2016

Patch Tuesday for March 2016 has arrived. Today, Microsoft has released their monthly set of security bulletins designed to address security vulnerabilities within their products. This month’s release contains 13 bulletins addressing 44 vulnerabilities. Five bulletins are rated critical and address vulnerabilities in Edge, Graphic Fonts, Internet Explorer, W
Publish At:2016-03-09 08:15 | Read:3397 | Comments:0 | Tags:Threat Research internet explorer Microsoft office patch tue

It’s 2016, so why is the world still falling for Office macro malware?

In the late 1990s, Microsoft Office macros were a favorite vehicle for surreptitiously installing malware on the computers of unsuspecting targets. Microsoft eventually disabled the automated scripts by default, a setting that forced attackers to look for new infection methods. Remotely exploiting security bugs in Internet Explorer, Adobe Flash, and other wi
Publish At:2016-03-04 18:40 | Read:5502 | Comments:0 | Tags:Risk Assessment Technology Lab Excel exploits macros malware

Lookout commits to growth in Europe with new Netherlands office & partnerships

We’re pleased to announce the opening of Lookout’s Netherlands office, the company’s second in EMEA, serving as a hub for Lookout’s Northern Europe development. The team is already having great success in the region, as led by Lookout EMEA’s Dutch native and former President of Intel EMEA, Gert-Jan Schenk. With a focus on building out business and securing
Publish At:2016-02-10 04:55 | Read:6935 | Comments:0 | Tags:Lookout News Careers Netherlands office partners

Microsoft fixes critical vulnerabilities affecting Windows and Office

Microsoft has released the month’s Microsoft Patch Tuesday that has fixed 33 vulnerabilities, most of them critical and affecting Internet Explorer. Here we are to discuss the last month’s Microsoft Patch Tuesday that this month fixed for 33 vulnerabilities, most of them affecting Internet Explorer. The experts wa
Publish At:2015-10-15 10:15 | Read:3932 | Comments:0 | Tags:Breaking News Security Internet Explorer Microsoft Microsoft

Spam campaign relies on macros embedded in empty Word documents

Experts at Bitdefender have discovered a spam campaign that tricks antispam filters by relying on macros in Empty Word Documents. Security experts at BitDefender observed a new tactic adopted by spammers that rely on emails with an empty Word document in the attachment to bypass anti-spam filters. The social engineering strate
Publish At:2015-01-29 05:45 | Read:5122 | Comments:0 | Tags:Cyber Crime Malware Security BitDefender Cybercrime macro Mi

From the Labs: VBA is definitely not dead - in fact, it's undergoing a resurgence

Earlier this year, Principal Researcher at SophosLabs, Gabor Szappanos (Szappi) published an excellent paper, "VBA is not dead", on the re-emergence of Visual Basic code in malicious documents.In his paper, Szappi discusses the sudden surge in VBA samples as well as the change from a traditional document infecting payload to other malicious means - namely, e
Publish At:2014-09-17 12:20 | Read:6012 | Comments:0 | Tags:Featured Malware Security threats SophosLabs Windows Exploit

Obfuscated malicious office documents adopted by cybercriminals around the world

After going out of fashion for a number of years, malicious macros inside Office files have recently experienced a revival. And why not, especially if they are a lot cheaper than exploits and capable of doing the same job? Yes, that's right, cybercriminals are busily recycling this old technique, introducing new obfuscation forms to make it more effective. L
Publish At:2014-08-10 13:33 | Read:6506 | Comments:0 | Tags:Blog Research Banker Base64 Email Excel Macro Microsoft Word


Share high-quality web security related articles with you:)