Some more 0-days from ZDI, (Thu, Jul 23rd)
For those of us that are in patching world the last few weeks has not been fun. It seemed like there was a new critical issue almost every other day and almost certainly just after you finished the...
View ArticleISC StormCast for Friday, July 24th 2015...
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View ArticlePatching in 2 days? - "tell him he's dreaming", (Fri, Jul 24th)
With all the patching you have been doing lately I thought it would be opportune to have a look at what can and cant be done within two days. Why two days? Well quite a few standards want you to, I...
View ArticleAngler's best friends, (Mon, Jul 27th)
Nope, not the kind of angler whose best friends are rubber boots, strings tied into flies, or a tape measure that starts with 5inches where others have a zero. This is about the Angler Exploit Kit,...
View ArticleISC StormCast for Monday, July 27th 2015...
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View ArticleISC StormCast for Tuesday, July 28th 2015...
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View ArticleGuest Diary: Xavier Mertens - Integrating VirusTotal within ELK, (Tue, Jul...
[Guest Diary: Xavier Mertens] [Integrating VirusTotal within ELK] Visualisation is a key when you need to keep control of whats happening on networks which carry daily tons of malicious files....
View ArticleBind 9.9.7-P2 and Bind 9.10.2-P3 now available -...
-- Rick Wanner MSISE - rwanner at isc dot sans dot edu - http://namedeplume.blogspot.com/ - Twitter:namedeplume (Protected) (c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons...
View ArticleCVE-2015-5477 - Bind: Error handling TKEY queries can lead to Bind DDOS,...
-- Rick Wanner MSISE - rwanner at isc dot sans dot edu - http://namedeplume.blogspot.com/ - Twitter:namedeplume (Protected) (c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons...
View ArticleAndroid Stagefright multimedia viewer prone to remote exploitation, (Tue,...
Joshua J. Drake from ZimperiumzLabshas reported a number ofvulnerabilities in the Stagefright media playback system deployed in Android operating system devices. These vulnerabilities permit remote...
View ArticleMalicious spam continues to serve zip archives of javascript files, (Wed,...
Introduction In January 2015, the Asprox botnet switched from sending malware attachments to spamming pornography and diet-related scams [1]. Since then, weve noticed an increase is a different type of...
View ArticleISC StormCast for Wednesday, July 29th 2015...
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View ArticleISC StormCast for Thursday, July 30th 2015...
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View ArticleTech tip: Invoke a system command in R, (Fri, Jul 31st)
I spend a lot of time using R, theprogramming language and software environment for statistical computing and graphics. Its incredibly useful for visualization and analysis, consider Data-Driven...
View ArticleISC StormCast for Friday, July 31st 2015...
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View ArticleCisco Security Advisory: Cisco ASR 1000 (Aggregation Services Routers)...
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View Articlefroxlor Server Management Portal severe security issue, (Fri, Jul 31st)
The froxlor Server Management Panel islightweight server management software. Your Handler on Duty was unaware of foxlor, if diary readers are users, feel free to comment or email regarding your user...
View ArticleTech tip follow-up: Using the data Invoked with R's system command, (Fri, Jul...
In follow up to yesterdays discussion re invoking OS commands with Rs system function, I wanted to show you just a bit of how straightforward it is to then use the resulting data. After grabbing the...
View ArticleYour Security Policy Is So Lame, (Sun, Aug 2nd)
Every person should avoid lame security policies because of the lack of clarity they leave behind. Often times we find ourselves forced into creating security policies due to compliance requirements....
View ArticleISC StormCast for Monday, August 3rd 2015...
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View Article