A Honeypot for home: Raspberry Pi, (Thu, Jul 31st)
In numerous previous Diaries, my fellow Internet Storm Center Handlers have talk on honeypots, the values of full packet capture and value of sharing any attack data. In this Diary I'm going to...
View ArticleWireShark 1.10.9 and 1.12.0 has been released, (Fri, Aug 1st)
Chris Mohan --- Internet Storm Center Handler on Duty (c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View ArticleISC StormCast for Friday, August 1st 2014...
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View ArticleMicrosoft's Enhanced Mitigation Experience Toolkit 5.0 is out:...
Chris Mohan --- Internet Storm Center Handler on Duty (c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View ArticleAll Samba 4.x.x are vulnerable to a remote code execution vulnerability in...
A remote code execution in nmbd (the NetBIOS name services daemon) has been found in Samba versions 4.0.0 to 4.1.10. ( assgined CVE-2014-3560) and a patch has been release by the team at samba.org....
View ArticleISC StormCast for Monday, August 4th 2014...
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View ArticleThreats & Indicators: A Security Intelligence Lifecycle , (Mon, Aug 4th)
In our recent three-part series, Keeping the RATs Out (Part 1, Part 2, Part 3), I tried to provide analysis offering you an end-to-end scenario wherein we utilized more than one tool to solve a...
View ArticleISC StormCast for Tuesday, August 5th 2014...
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View ArticleLegal Threat Spam: Sometimes it Gets Personal, (Tue, Aug 5th)
Yesterday, I spotted the following tweet mentioning me: Needless to say, I got intrigued, and luckily the sender of the tweet was willing to share a sample. The sample turned out to be simple legal...
View ArticleSynolocker: Why OFFLINE Backups are important, (Tue, Aug 5th)
One current threat causing a lot of sleepless nights to victims is "Cryptolocker" like malware. Various variations of this type of malware are still haunting small businesses and home users by...
View ArticleCenter for Internet Security Releases Benchmark for VMWare ESXi 5.5...
--- Johannes B. Ullrich, Ph.D. STI|Twitter|LinkedIn (c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View ArticleISC StormCast for Wednesday, August 6th 2014...
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View ArticleAll Passwords have been lost: What's next?, (Wed, Aug 6th)
Some of it may be hype. But no matter if 500 Million, 1.5 Billion or even 3.5 Billion passwords have been lost as yesterday's report by Hold Security states, given all the password leaks we had over...
View ArticleOUCH is out, this month we explain what encryption is and how to use it....
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View ArticleExploit Available for Symantec End Point Protection, (Wed, Aug 6th)
An exploit is no available at exploit-db.com for the Symantec End Point Protection privilege escalation vulnerability. Symantec released a patch for this issue earlier this week [1]. The vulnerability...
View ArticleOpenSSL Security Advisories http://www.openssl.org/news/secadv_20140806.txt,...
Chris Mohan --- Internet Storm Center Handler on Duty (c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View ArticleFree Service to Help CryptoLocker Victims by FireEye and Fox-IT, (Wed, Aug 6th)
Various Internet Storm Center Handlers have written Diaries on the malware called CryptoLocker, a nasty piece of malware which encrypting the files of the systems it infects, then gives victims 72...
View ArticleISC StormCast for Thursday, August 7th 2014...
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View ArticleChecking for vulnerabilities in the Smart Grid System, (Thu, Aug 7th)
SCADA systems are not composed the same way as regular IT systems. Therefore, the risk and vulnerability assessment cannot be performed as it is done for any other IT system. The most important...
View ArticleISC StormCast for Friday, August 8th 2014...
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View Article