From Security Weekly Wiki
Jump to navigation
Jump to search
← Older edit
Newer edit →
Revision as of 19:57, 30 June 2016
4,473 bytes added
19:57, 30 June 2016
== Paul's Stories ==
#[http://www.darknet.org.uk/2016/06/openioc-sharing-threat-intelligence/ OpenIOC – Sharing Threat Intelligence] - Can something like this work?
#[https://www.schneier.com/blog/archives/2016/06/facebook_using_.html Facebook Using Physical Location to Suggest Friends]- Well Duh, ever wonder why when you search for someone FB tends to suggest the correct person? It did this when I added my fellow Little League coaches, its based on location.
#[https://isc.sans.edu%2Fdiary%2FWhat%2Bis%2Byour%2Bmost%2Bunusual%2BUser-Agent%3F%2F21203 "What is your most unusual User-Agent?]
#[https://www.schneier.com/blog/archives/2016/06/interview_with_.html Interview with an NSA Hacker] - TLDR, but I plan too.
#[https://threatpost.com/google-play-hit-with-rash-of-auto-rooting-malware/118938/ Google Play Hit with Rash of Auto-Rooting Malware] - This app, which claims to be a level, jailbreaks your device and installs malicious apps.
#[https://threatpost.com/trains-planes-autos-increasingly-in-cybercriminals-bullseye/118956/ "Planes] - For, you guessed it, Ransomeware.
#[https://threatpost.com/conficker-used-in-new-wave-of-hospital-iot-device-attacks/118985/ Conficker Used in New Wave of Hospital IoT Device Attacks]
#[http://news.hitb.org/content/ransomware-targets-corporate-office-365-users-0-day-campaign Ransomware targets corporate Office 365 users in 0-day campaign] - If you guessed Macros as the attack vector, you guessed right. And yes, Macros are still a thing that people use...
#[http://news.hitb.org/content/hacker-wants-sell-10-million-patient-records-black-market A hacker wants to sell 10 million patient records on the black market] - MS08-067 is profitable...
#[http://www.cnet.com/news/one-picture-can-unlock-all-your-apps/ One Picture Can Unlock All Your Apps] - This sounded really bad, until this: ''Instead of relying on a computer to figure out if the photo is accurate, LogMeOnce sends the photo to you on another device and asks if it's OK. You say yes, and you're in.''
#[http://www.theregister.co.uk/2016/06/28/medjack/ US Hospitals Hacked With Ancient Exploits] - Ah yes, some MS08-067 in our healthcare system, what could possibly go wrong?
#[https://blog.sucuri.net/2016/06/large-cctv-botnet-leveraged-ddos-attacks.html/ CCTV DVR systems Hacked, Used in DDoS Attack
#[http://www.v3.co.uk/v3-uk/news/2463269/the-top-5-security-threats-and-how-to-defend-against-them "The Top 5 Security Threats] - TL;DL: XSS, SQLi, social engineering, "APTs", Insider Threat. More fluff from a news site that wants me to disable my ad blocker to read the rest of the article.
#[http://www.bbc.com/news/technology-36661557 Facebook 'Hack' Victim Exposes Passport Scam] - Apparently you can fake a photo of a Passport, and
use that to gain access to someone's Facebook account. No matter how much OPSEC you got, you are vulnerable to this. This is clearly Facebook's problem, however, I will give shout outs to Facebook's internal security and incident response team for helping us this week.
#[http://www.theinquirer.net/inquirer/news/2463219/symantec-security-flaws-are-as-bad-as-it-gets-claims-googles-project-zero "Symantec Flaws As Bad As It Gets] - ''Because no interaction is necessary to exploit it, this is a wormable vulnerability with potentially devastating consequences to Norton and Symantec customers. An attacker could easily compromise an entire enterprise fleet using a vulnerability like this.'' Whoa. Turns out the unpacking of executables is really error prone and vulnerable.
#[http://www.theregister.co.uk/2016/06/30/hackers_ditch_malware_to_move_around_networks/ Hackers Note That Most Breaches Just Need Normal Admin Tools] - Oh, captain obvious reports that after attackers break into networks they use Nmap, Angry IP scanner, TeamViewer and VNC. Not sure why this is news... Begs the question though, do you blend if you use the same tools as the local admins?
#[https://www.engadget.com/2016/06/24/fbi-no-warrant-hack-computer/ Judge says the FBI can hack your computer without a warrant] - Okay, getting the IP address of a computer is NOT hacking, and does not require a warrant according to the judge. This is the same as your phone number, in fact often time law enforcement does not need a warrant to obtain your phone number.
#[https://github.com/RedBalloonShenanigans/MonitorDarkly "GitHub - RedBalloonShenanigans/MonitorDarkly: Poc] - Hacking monitors, still trying to figure out how this works and what is gained by doing so.
== Larry's Stories ==
Retrieved from "
Application Security Weekly
Business Security Weekly
Enterprise Security Weekly
Paul's Security Weekly
Security Weekly News
Security And Compliance Weekly
Tradecraft Security Weekly
Security Weekly Links
About Security Weekly Wiki