HackDig : Dig high-quality web security articles for hacker

Nigerian phishing: Industrial companies under attack

In late 2016, the Kaspersky Lab Industrial Control Systems Cyber Emergency Response Team (Kaspersky Lab ICS CERT) reported on phishing attacks that were primarily targeting industrial companies from the metallurgy, electric power, construction, engineering and other sectors. As further research demonstrated, this was just part of a bigger story that began mu
Publish At:2017-06-15 13:30 | Read:190 | Comments:0 | Tags:Featured Research industrial software Nigerian Scam Phishing

Microsoft Patches Windows XP Again As Part of June Patch Tuesday

Last month, in reaction to the WannaCry outbreak that affected Windows users all over the world, Microsoft released a patch for Windows XP—an operating system it had stopped supporting in 2014. As part of the June Patch Tuesday cycle, Microsoft has decided to issue patches for XP and other older platforms that have reached End of Support (EOS) status. They c
Publish At:2017-06-15 02:55 | Read:157 | Comments:0 | Tags:Exploits Vulnerabilities Patch Tuesday June 2017

Addressing Security Gaps in the Energy Industry

Every industry has its own unique challenges related to information security. Financial services organizations bear the burden of preventing fraud. Manufacturing businesses have to protect their intellectual property and ensure that manufacturing processes remain resilient to attack. Meanwhile, health care organizations must keep sensitive personal informat
Publish At:2017-06-14 01:00 | Read:169 | Comments:0 | Tags:Energy & Utility Energy and Utilities Energy Industry Indust

June’s Android Security Bulletin Address Critical Vulnerabilities in Media Framework and Qualcomm Components

Google recently released their June security bulletin for Android, which addresses critical vulnerabilities found in Media framework, as well as various critical vulnerabilities that are based on Qualcomm components. As with previous Android security updates, this month’s bulletin is available via over-the-air updates for native Android devices or via servic
Publish At:2017-06-08 23:35 | Read:231 | Comments:0 | Tags:Mobile Vulnerabilities android Qualcomm

Victim Machine has joined #general: Using Third-Party APIs as C&C Infrastructure

Imagine a well-experienced security analyst at a major company going through his normal routine of checking logs at the end of the workday. A quick look at the company’s security solution logs reveal nothing too peculiar or alarming — except for one thing: a higher than normal amount of traffic to the office’s newly introduced third-party chat platform. He d
Publish At:2017-06-06 16:20 | Read:178 | Comments:0 | Tags:Exploits Vulnerabilities API Chat Program API Discord Slack

MS-17-010: EternalBlue’s Large Non-Paged Pool Overflow in SRV Driver

The EternalBlue exploit took the spotlight last May as it became the tie that bound the spate of malware attacks these past few weeks—the pervasive WannaCry, the fileless ransomware UIWIX, the Server Message Block (SMB) worm EternalRocks, and the cryptocurrency mining malware Adylkuzz. EternalBlue (patched by Microsoft via MS17-010) is a security flaw relate
Publish At:2017-06-02 13:20 | Read:226 | Comments:0 | Tags:Exploits Vulnerabilities EternalBlue MS17-010 Server Message

Relying on Data to Mitigate the Risk of WordPress Website Hijacking

One of the most common methods cybercriminals use to deliver phishing and malware to unsuspecting users is compromising legitimate websites, such as those hosted on WordPress, to house their own malicious content for free. The URLs of compromised sites used for phishing attacks reach users through spam emails, allowing security professionals to keep track of
Publish At:2017-05-30 22:30 | Read:270 | Comments:0 | Tags:Fraud Protection Risk Management Software & App Vulnerabilit

Android Security Bulletin Tackles Additional Critical Mediaserver Issues

Google released their security bulletin for May, which once again tackles Critical vulnerabilities in Android’s Mediaserver component, a prevailing theme for the past few bulletins. Google Pixel and Nexus users can get over-the-air (OTA) updates for their devices, while service providers and manufacturers of Android OEM devices will be responsible for distri
Publish At:2017-05-19 17:35 | Read:307 | Comments:0 | Tags:Mobile Vulnerabilities

Will Astrum Fill the Vacuum in the Exploit Kit Landscape?

The decline of exploit kit activity—particularly from well-known exploit kits like Magnitude, Nuclear, Neutrino, and Rig during the latter half of 2016—doesn’t mean exploit kits are throwing in the towel just yet. This is the case with Astrum (also known as Stegano), an old and seemingly reticent exploit kit we observed to have been updated multiple times as
Publish At:2017-05-18 23:10 | Read:295 | Comments:0 | Tags:Exploits Vulnerabilities Astrum diffie-hellman exploit kit e

After WannaCry, UIWIX Ransomware and Monero-Mining Malware Follow Suit

WannaCry ransomware’s outbreak during the weekend was mitigated by having its kill switch domain registered. It was only a matter of time, however, for other cybercriminals to follow suit. Case in point: the emergence of UIWIX ransomware (detected by Trend Micro as RANSOM_UIWIX.A) and one notable Trojan our sensors detected. UIWIX is not WannaCry Contrary to
Publish At:2017-05-17 10:20 | Read:466 | Comments:0 | Tags:Exploits Malware Ransomware Vulnerabilities Adylkuzz gh0st r

Apache Struts 2: A Zero-Day Quick Draw

Co-authored by Michelle Alvarez. During an outbreak of zero-day attacks, IBM X-Force needs to work fast to assess the threat to inform customers and others of the risk and offer steps to mitigate or resolve the issue. Once the dust settles, though, we like to circle back, review what happened and identify any notable trends. The attacks launched against the
Publish At:2017-05-16 08:25 | Read:474 | Comments:0 | Tags:Advanced Threats Software & App Vulnerabilities Threat Intel

Microsoft Addresses Zero-Day Vulnerability Ahead of Patch Tuesday

Due to its highly critical nature, a zero-day vulnerability (CVE-2017-0290) that exploits Microsoft Malware Protection Engine (MsMpEng) was addressed by the company in an out-of-band security update just before May’s patch Tuesday. Discovered and disclosed to Microsoft by Google Project Zero’s Natalie Silvanovich and Tavis Ormandy, this vulnerability a
Publish At:2017-05-13 14:15 | Read:242 | Comments:0 | Tags:Exploits Vulnerabilities Patch Tuesday Vulnerability

Taming the Open Source Beast With an Effective Application Security Testing Program

Cute Attacks With Acute Impact on Your Application Security Testing Effectiveness Here we go again: Another attack with a cute name is about to make the news. More dangerous than a Ghost, a POODLE, a FREAK, a Heartbleed, a Shellshock or the other 6,000-plus attacks that show up each year, we know at least two things about it:   It will probably attack
Publish At:2017-05-05 01:55 | Read:288 | Comments:0 | Tags:Application Security Cloud Security DevOps Open Source Stati

The Apache Struts 2 Vulnerability and the Importance of Patch Management

Apache Struts is a free, open source framework for creating Java web applications. It’s widely used to build corporate websites in sectors including education, government, financial services, retail and media. In early March 2017, Apache released a patch for the Struts 2 framework. The patch fixes an easy-to-exploit vulnerability that allows attacker
Publish At:2017-04-25 12:20 | Read:464 | Comments:0 | Tags:Application Security Endpoint Apache Incident Response (IR)

April Android Security Bulletin Addresses Critical H.264 and H.265 Decoder Vulnerabilities

In April’s Android Security Bulletin, we discovered and privately disclosed seven vulnerabilities—three of which were rated as Critical, one as High, and another three as Moderate. As with the previous bulletins, Google urges owners of devices that are directly updated by Google to apply the over-the-air (OTA) update released to address these vulnerabilities
Publish At:2017-04-21 23:50 | Read:332 | Comments:0 | Tags:Mobile Vulnerabilities


Share high-quality web security related articles with you:)


Tag Cloud