UltraDNS DDOS, (Wed, Apr 30th)
We've received multiple reports regarding impact to UltraDNS services which are allegedly the result of a 100Gb/s attack on one of their customers, which in turn is causing latency for others. Monitor...
View ArticleISC StormCast for Thursday, May 1st 2014...
(c) SANS Internet Storm Center. http://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View ArticleBusybox Honeypot Fingerprinting and a new DVR scanner, (Thu, May 1st)
My little "lab of vulnerable devices" is still getting regular visits from script kiddies world wide. By now, I replaced some of the simulated honeypots with actual devices, giving me a bit a more...
View ArticleMicrosoft Announces Special Patch for IE 0-day (Win XP included!), (Thu, May...
Microsoft will release a special update later today (10am PT, 1pm ET, 7pm UTC) fixing the Internet Explorer vulnerability which has been used in targeted attacks recently. The vulnerability was...
View ArticleISC StormCast for Friday, May 2nd 2014...
(c) SANS Internet Storm Center. http://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View ArticleExposing WPA2 Paper, (Fri, May 2nd)
A new paper(1) discussing vulnerabilities on WPA2-PSK was released recently and many people have been interested in it, but have not gained access. By using a library, yes they still exist and are...
View ArticlePHP 5.4.28 available. 19 bugs were fixed including CVE-2014-0185., (Fri, May...
Tom Webb (c) SANS Internet Storm Center. http://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View ArticleObservations from Key-logged Passwords, (Sat, May 3rd)
I recently had the opportunity to look at a sample of key-logged passwords collected from compromised machine over a period of 4 years. I wanted to share some of the takeaways, since I'm not...
View ArticleVerizon 2014 Data Breach Report, (Sun, May 4th)
Verizon have released their 2014 Data Breach Report which is classified in 9 attack patterns, each have their own section grouped by industries. Their 60 pages reports provides some interesting...
View ArticleISC StormCast for Monday, May 5th 2014...
(c) SANS Internet Storm Center. http://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View ArticleCoin Mining DVRs: A compromise from start to finish., (Mon, May 5th)
The Criminals Behind It After posting this diary, a brand new twitter account was used to post two tweets admitting to be behind this particular string of *coin miners: The python code posted to...
View ArticleISC StormCast for Tuesday, May 6th 2014...
(c) SANS Internet Storm Center. http://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View ArticleAnd the Web it keeps Changing: Recent security relevant changes to Browsers...
As we all know, web standards are only leaving "draft" status once they start becoming irrelevant. It is a constant challenge to keep up with how web browsers interpret standards and how the standards...
View ArticleISC StormCast for Wednesday, May 7th 2014...
(c) SANS Internet Storm Center. http://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View ArticleNew DNS Spoofing Technique: Why we haven't covered it., (Wed, May 7th)
The last couple of days, a lot of readers sent us links to articles proclaiming yet another new flaw in DNS. "Critical Vulnerability in BIND Software Puts DNS Protocol Security At Risk" [1] claimed one...
View ArticleMay OUCH Newsletter: I'm Hacked, Now What?...
(c) SANS Internet Storm Center. http://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View ArticleISC StormCast for Thursday, May 8th 2014...
(c) SANS Internet Storm Center. http://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View ArticleSNMP: The next big thing in DDoS Attacks?, (Thu, May 8th)
It started with DNS: Simple short DNS queries are easily spoofed and the replies can be much larger then the request, leading to an amplification of the attack by orders of magnitude. Next came NTP....
View ArticleISC StormCast for Friday, May 9th 2014...
(c) SANS Internet Storm Center. http://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View ArticleA fun read on the VRT blog about the recent IE 0-day - Anatomy of an...
=============== Rob VandenBrink Metafore (c) SANS Internet Storm Center. http://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View Article