Difference between revisions of "Template:HNNPaul245"

From Security Weekly Wiki
Jump to navigationJump to search
Line 7: Line 7:
 
#[https://www.computerworld.com/article/3489036/microsoft-to-end-updates-to-windows-7s-free-av-software-security-essentials.html Microsoft to end updates to Windows 7's free AV software, Security Essentials]
 
#[https://www.computerworld.com/article/3489036/microsoft-to-end-updates-to-windows-7s-free-av-software-security-essentials.html Microsoft to end updates to Windows 7's free AV software, Security Essentials]
 
#[https://www.securityweek.com/new-office-365-feature-provides-detailed-information-email-attack-campaigns New Office 365 Feature Provides Detailed Information on Email Attack Campaigns]
 
#[https://www.securityweek.com/new-office-365-feature-provides-detailed-information-email-attack-campaigns New Office 365 Feature Provides Detailed Information on Email Attack Campaigns]
#[https://nakedsecurity.sophos.com/2019/12/10/snatch-ransomware-pwns-security-using-sneaky-safe-mode-reboot/ Snatch ransomware pwns security using sneaky safe mode reboot]
+
#[https://nakedsecurity.sophos.com/2019/12/10/snatch-ransomware-pwns-security-using-sneaky-safe-mode-reboot/ Snatch ransomware pwns security using sneaky safe mode reboot] - We covered this technique on [https://wiki.securityweekly.com/Episode482#Interview:_Kobi_and_Doron_Naim.2C_Cyberark_Labs_-_7:00-7:30_PM Paul's Security Weekly Episode 482] with researchers from Cyberark Labs in September 2016.
 
#[https://www.forbes.com/sites/daveywinder/2019/12/07/google-confirms-critical-android-8-9-and-10-permanent-denial-of-service-threat/ Google Confirms Critical Android 8, 9 And 10 Permanent Denial Of Service Threat]
 
#[https://www.forbes.com/sites/daveywinder/2019/12/07/google-confirms-critical-android-8-9-and-10-permanent-denial-of-service-threat/ Google Confirms Critical Android 8, 9 And 10 Permanent Denial Of Service Threat]

Revision as of 17:23, 10 December 2019

  1. How Panasonic is using internet honeypots to improve IoT device security - This is really cool: in order to ensure development teams have as much information about potential security vulnerabilities in products as possible, both unreleased and on-the-market products are placed in the honeypots, which are monitored to gain insight into how devices are attacked by real-world hackers. "We deploy our real appliances as a honeypot and we collect attacks and malware targeting our devices. We can deploy products under development as well," Osawa explained. The Panasonic IoT threat-intelligence platform has been active for two years and in that time the company has collected information on about 30 million cyberattacks and 4,000 kinds of IoT malware – all attacks that are targeting real devices put through the security tests.
  2. A new Windows 10 ransomware threat? Examining claims of a potentially unstoppable vulnerability - Lets clear up the sensational headline, first this is a vulnerability in Microsoft's CFA (Controlled Folder Access): The idea behind CFA is simple: if you haven’t prevented malware from executing on the system...CFA can at least provide protection by thwarting the main thing that ransomware does: encrypt key files. and an example of one of the bypass techniques is as follows: in the “RIPlace” technique, malicious code replaces the file with its encrypted version rather than deleting the file first. Based on conversations with Nyotron, this situation occurs due to an error in the way that CFA is monitoring files to protect them. Also important to note, Microsoft is not motivated to fix this issue.
  3. Birth Certificate Data Laid Bare on the Web in Multiple States
  4. 'Hackable' karaoke and walkie talkie toys found by Which?
  5. Linux Bug Opens Most VPNs to Hijacking - According to researchers at University of New Mexico and Breakpointing Bad, the bug (CVE-2019-14899), “allows…an attacker to determine if…a user is connected to a VPN, the virtual IP address they have been assigned by the VPN server, and whether or not there is an active connection to a given website.” In an advisory released this week, they noted that once a proof-of-concept exploit allowed them to determine a VPN client’s virtual IP address and make inferences about active connections, they were then able to use encrypted replies to unsolicited packets to determine the sequence and acknowledgment numbers of connections. These allowed them to hijack TCP sessions and inject data into the TCP stream.
  6. Hardware-based Password Managers Store Credentials in Plaintext
  7. Microsoft to end updates to Windows 7's free AV software, Security Essentials
  8. New Office 365 Feature Provides Detailed Information on Email Attack Campaigns
  9. Snatch ransomware pwns security using sneaky safe mode reboot - We covered this technique on Paul's Security Weekly Episode 482 with researchers from Cyberark Labs in September 2016.
  10. Google Confirms Critical Android 8, 9 And 10 Permanent Denial Of Service Threat