HackDig : Dig high-quality web security articles

Enticing Clicks With Spam

Among the key findings from the upcoming IBM X-Force Threat Intelligence Index for 2017, available March 29, is the ongoing use of spam as an entry vector for attackers. While targeted attacks make headlines, the prevalence of spam traffic means that a variety of attackers are still finding success in this scattershot method to gain access to protected data.
Publish At:2017-03-13 17:00 | Read:6752 | Comments:0 | Tags:Threat Intelligence Vulns / Threats IBM X-Force Report IBM X

Android Vulnerabilities: Attacking Nexus 6 and 6P Custom Boot Modes

Co-authored by Michael Goberman. In recent months, the X-Force Application Security Research Team has discovered several previously undisclosed Android vulnerabilities. The November 2016 and January 2017 Android Security Bulletins included patches to one high-severity vulnerability, CVE-2016-8467, in Nexus 6 and 6P. Our new paper, “Attacking Nexus 6 &a
Publish At:2017-01-05 22:25 | Read:7049 | Comments:0 | Tags:Advanced Threats Mobile Security Software & App Vulnerabilit

Exposing AV-Disabling Drivers Just in Time for Lunch

The IBM X-Force Security Research team detected malicious AV-disabling drivers while investigating new remote overlay malware attacking banks in Brazil. The AV-disabling drivers are part of a financial malware designed to empty infected victims’ bank accounts. What a way to start my morning. Decoding AV-Disabling Drivers It’s 9:00 a.m. and I̵
Publish At:2017-01-04 09:35 | Read:6600 | Comments:0 | Tags:Banking & Financial Services Malware Threat Intelligence Vul

Rising Attack Rates and Massive Breaches Plague Government Organizations

A government’s core role is to protect and enhance the lives of its citizens. It must deliver services to create and sustain a robust and efficient public infrastructure, ensure public safety, foster sustainable economic growth and build stronger communities. Those tasks bring many challenges, but the overriding requirement of security is common to the
Publish At:2016-12-07 14:40 | Read:5938 | Comments:0 | Tags:Government and Federal Vulns / Threats X-Force Research Fede

Don’t Blink! TrickBot Now Targets 10 German Savings Banks

IBM X-Force researchers following the development of the TrickBot Trojan noted that the malware is rapidly adding new targets and attack capabilities and has now officially advanced into Germany. The most recent additions to TrickBot’s configurations target 10 savings banks in the European country. At this time, TrickBot is configured to use serverside
Publish At:2016-12-01 11:20 | Read:7683 | Comments:0 | Tags:Banking & Financial Services Fraud Protection Threat Intelli

Mirai Evolving: New Attack Reveals Use of Port 7547

When the source code for the Mirai botnet was made public in late September, a top concern was that bad actors might modify the code to increase the number of Internet of Things (IoT) devices they can compromise. It seems these fears have been realized. A few weeks ago, Reverse Engineering Blog disclosed a vulnerability in the Eir D1000 modem that could enab
Publish At:2016-12-01 11:20 | Read:6613 | Comments:0 | Tags:Threat Intelligence Vulns / Threats Advanced Threats Botnet

Hello, You’ve Been Compromised: Upward Attack Trend Targeting VoIP Protocol SIP

VoIP Attacks by the Numbers There are numerous protocols used in voice-over-IP (VoIP) communications. According to IBM Managed Security Services (MSS) data, the most targeted VoIP protocol is Session Initiation Protocol (SIP), which accounted for over 51 percent of the security event activity analyzed in the last 12 months. SIP is one of the most commonly
Publish At:2016-11-30 16:55 | Read:6278 | Comments:0 | Tags:Threat Intelligence Vulns / Threats X-Force Research Cisco I

Ninety-Five Percent of Webshell Attacks Written in PHP

There’s nothing inherently malicious about a webshell, which is a script that can be uploaded to a web server to enable remote administration of the machine. In the hands of an attacker, however, they are a serious cyberthreat. Advanced persistent threat (APT) groups often use webshells to breach organizations. Webshell Attacks Surging Earlier this yea
Publish At:2016-11-19 23:00 | Read:7702 | Comments:0 | Tags:Vulns / Threats Advanced Persistent Threat (APT) IBM Managed

Blind SQL Injection: The Last Handkerchief Up the Attacker’s Sleeve

For as long as SQL injection has been around, it is still not old news — at least for attackers. Attackers will take whatever path they can to reach an exploit The simpler the path, the better. However, sometimes they need to use a little more elbow grease. That’s where blind SQL injection comes in. If an attacker were a magician, this attack would be
Publish At:2016-01-19 16:25 | Read:5939 | Comments:0 | Tags:Vulns / Threats Cybercriminals IBM Managed Security Services

Konnichiwa, Rovnix! Aggressive Malware Hits Japanese Banks

IBM X-Force researchers have discovered that the cybercrime gang operating the Rovnix Trojan has launched an aggressive new infection campaign in Japan. Rovnix is the latest advanced malware to set its sights on Japan. Before it came the Shifu Trojan, which initiated attacks in Japan in August 2015. The gang that operates Rovnix is known to focus on European
Publish At:2016-01-08 09:10 | Read:5447 | Comments:0 | Tags:IBM X-Force Threat Intelligence Vulns / Threats Advanced Thr

Infographic: The Top Four Cybercrime Trends Are…

Would you seek medical treatment from someone who’s never actually practiced medicine, only studied it? What about take your car to a mechanic who’s never performed a repair? Probably not. You’d most likely feel comfortable only obtaining services from a professional who’s had practical experience in his or her trade. So why would you
Publish At:2015-11-18 21:35 | Read:4432 | Comments:0 | Tags:Advanced Threats Vulns / Threats Cybercrime IBM Emergency Re

Maximizing Effectiveness of Your Application Security Testing Program With Cognitive Intelligent Finding Analytics

Co-authored by Steve Teilhet We’ve all been there — that magical time when you have finally automated your application security testing tools to run nightly and are receiving testing results. You breathe a big sigh of relief. Then, when you return to your office the following day, your relief turns to horror as you are inundated with tens or hundreds o
Publish At:2015-10-27 09:15 | Read:4319 | Comments:0 | Tags:Application Security Risk Management Vulns / Threats Applica

High-Impact Security Flaws and Why They’re Still Being Overlooked

Can you honestly say you understand your existing security posture? Many people, especially those in management, are quick to proclaim that no flaws exist; all is secure in their world because their auditors have said they’re compliant with whatever regulations or they passed their most recent spot check. But the reality of data breaches is telling us
Publish At:2015-09-24 22:25 | Read:4826 | Comments:0 | Tags:CISO Vulns / Threats Chief Information Security Officer (CIS

Forecasting a Breach Is Like Finding a Needle in a Haystack — Not That Tough

2015 Breach Statistics This year has seen plenty of breaches, and it’s not even over yet. Numerous reports show that the number of breaches in 2015 has rivaled 2014, but not many of them are making the evening news — other than the recent hack of Ashley Madison — because breaches are sadly becoming commonplace. According to Experian’s “Data
Publish At:2015-09-16 20:50 | Read:5381 | Comments:0 | Tags:IBM X-Force Security Intelligence & Analytics Threat Intelli

Don’t Click on That! Practical User Education for Ransomware and Other Malware

Open up any news feed on the security industry and you’ll read stories on attacks that started with the end user of the affected company. Whether it’s phishing schemes, social engineering or drive-by downloads, there’s no shortage of ways for attackers to compromise the least patchable resource in a company: its employees. When I first read
Publish At:2015-09-14 16:00 | Read:4397 | Comments:0 | Tags:IBM X-Force Vulns / Threats Endpoint Protection Malware Rans

Tag Cloud