Challenge: What can you do with Funky Directory Names (Part 2), (Mon, Apr 16th)
Following up on last weeks challenge I'd like to add a new element to the challenge, then review some of the EXCELLENT comments we received from our readers. First lets add a new element to the...
View ArticleMcAfee DAT troubles , (Mon, Apr 16th)
Thanks to reader Dan for sharing the following information: McAfee has confirmed that incremental DAT 6682 may trigger message scan failures and a system crash in GroupShield Exchange (MSME),...
View ArticleSysinternals Updates - 2012 Apr 17, (Wed, Apr 18th)
In case you have not seen or heard, some of our readers pointed us to Monday's posting on the Sysinternals Site Discussion panel about a number of updates that are now available. Among the release are...
View ArticleOracle Critical Patch Update Advisory - April 2012:...
(c) SANS Internet Storm Center. http://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View ArticleISC Feature of the Week: Suspicious Domains, (Wed, Apr 18th)
Overview After some maintenance downtime, the Suspicious Domains lists at https://isc.sans.edu/tools/suspicious_domains.html have been re-launched. This project was developed by handler Jason Lam and...
View ArticleISC StormCast for Thursday, April 19th 2012...
(c) SANS Internet Storm Center. http://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View ArticleOpenSSL Security Advisory - CVE-2012-2110, (Thu, Apr 19th)
Earlier today, the OpenSSL team released a fix for a recently discovered vulnerability that exposes applications, that use certain features of OpenSSL, to a heap overflow. Since OpenSSL is used...
View ArticleISC StormCast for Friday, April 20th 2012...
(c) SANS Internet Storm Center. http://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View ArticleWordPress Release Security Update, (Sat, Apr 21st)
WordPress released a security update (version 3.3.2) that fixes 3 external libraries (Plupload, SWFUpload and SWFObject) as well as privilege escalation and cross-site script (XSS) issues as well as 5...
View ArticleISC StormCast for Monday, April 23rd 2012...
(c) SANS Internet Storm Center. http://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View ArticleComments open for NIST-proposed updates to Digital Signature Standard, (Mon,...
The comment period forNational Institute of Standards and Technology (NIST) proposed changes to the Digital Signature Standard (FIPS 186-3) is open until May 25, 2012. Submit comments...
View ArticleContinued interest in Nikjju mass SQL injection campaign, (Mon, Apr 23rd)
Readers continue to write in conveying updates from sources regarding theNikjju mass SQL injection campaign. Like the Lilupophilupop campaign from December,ASP/ASP.net sites are target and scripts...
View ArticleISC StormCast for Tuesday, April 24th 2012...
(c) SANS Internet Storm Center. http://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View ArticleEmergency Operations Centers & Security Incident Management: A Correlation,...
I spent last Tuesday (17APR2012) taking orientation training at the State Emergency Operations Center (SEOC), a facility operated by the Washington State Military Department, Emergency Management...
View ArticleOpenSSL reissues fix for ASN1 BIO vulnerability, (Tue, Apr 24th)
OpenSSL has posted an updated advisory today indicating the fix for CVE-2012-2110 released on 19APR2012 was not sufficient to correct the ASN1 BIO vulnerability issue for OpenSSL version 0.9.8. Please...
View ArticleMozilla Firefox and Thunderbird 12 now available , (Tue, Apr 24th)
(c) SANS Internet Storm Center. http://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View ArticleISC StormCast for Wednesday, April 25th 2012...
(c) SANS Internet Storm Center. http://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View ArticleBlacole's obfuscated JavaScript, (Wed, Apr 25th)
Looking back on how we used to analyze malicious JavaScript five years ago, it is quite amazing to see the evolution of code obfuscation that the bad guys went through. Most of the current obfuscation...
View ArticleMicrosoft Security Intelligence Report (SIR) Volume #12:...
(c) SANS Internet Storm Center. http://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View ArticleBlacole's shell code, (Wed, Apr 25th)
Let's assume you finished the analysis of Blacole's obfuscated Javascript (see my earlier diary today), and you are still left with a code block like this and you wonder what it does. The first step...
View Article