Category Archives: Рањивости

Zero Days And Cargo Cult Science

By | октобар 9, 2017

I’ve complained prior to now concerning the lack of rigorous science in giant elements of IT security. Nevertheless there is not any lack of stories and publications that declare to offer information about this space. Recently RAND Company, a US-based assume tank, printed a report about zero day vulnerabilities. Many individuals praised it, an article… Сазнајте више »

Кућни Рутери: Mitigating Attacks that can Turn them to Zombies

By | децембар 14, 2016

Кевин г. Хуан, Fernando Mercês and Lion Gu With more households running smart devices that access the internet, the router is typically their only doorkeeper. And whether an end user has a laptop/desktop and router combo, or a miscellany of other devices connected to the network, the security risks are the same. Based on… Сазнајте више »

Patch Tuesday of December 2016: Microsoft Releases 12 Bulletins, Six Critical

By | децембар 14, 2016

For the last Patch Tuesday of 2016, Microsoft adds 12 bulletins split evenly into six rated Critical and six rated Important. Among the critical updates was MS16-148, which patches several vulnerabilities in Microsoft Office. Ако експлоатише, the most severe of these vulnerabilities could allow attackers to run arbitrary code in the guise of the user.… Сазнајте више »

New Flavor of Dirty COW Attack Discovered, Patched

By | децембар 7, 2016

Dirty COW (designated as CVE-2016-5195) is a Linux vulnerability that was first disclosed to the public in October 2016. It was a serious privilege escalation flaw that allowed an attacker to gain root access on the targeted system. It was described as an “ancient bugby Linus Torvalds and was quickly patched once it was disclosed,... Сазнајте више »

One Bit To Rule A System: Analyzing CVE-2016-7255 Exploit In The Wild

By | децембар 2, 2016

Недавно, Google researchers discovered a local privilege escalation vulnerability in Windows which was being used in zero-day attacks, including those carried out by the Pawn Storm espionage group. Microsoft was able to release a patch by the next Patch Tuesday, November 8. This entry provides a complete analysis of the vulnerability based on samples acquired… Сазнајте више »

Pawn Storm Ramps Up Spear-phishing Before Zero-Days Get Patched

By | новембар 9, 2016

by Feike Hacquebord and Stephen Hilt The effectiveness of a zero-day quickly deteriorates as an attack tool after it gets discovered and patched by the affected software vendors. Within the time between the discovery of the vulnerability and the release of the fix, a bad actor might try to get the most out of his previously… Сазнајте више »

Patch Tuesday of November 2016: Six Critical Bulletins, Eight Important

By | новембар 9, 2016

November is the second-to-last Patch Tuesday of 2016, and it brings a slightly higher than typical number of bulletins: six Critical bulletins and eight Important bulletins. The 8th is the earliest date that Patch Tuesday can take place in a month; December’s Patch Tuesday (and the last of 2016) takes place in exactly five weeks. Among the… Сазнајте више »

Security Update Patches 13 Android Vulnerabilities Discovered by Trend Micro

By | новембар 1, 2016

by Seven Shen, Ecular Xu and Wish Wu Mobile threats are trending upward, with vulnerability exploits gaining traction. The silver lining? More of these vulnerabilities are also disclosed, analyzed and detected. This helps better mitigate Android devices from zero-days and malware, enabling OEMs/vendors to more proactively respond to these threats. This is echoed by our… Сазнајте више »

CVE-2016-3298: Microsoft Puts the Lid on Another IE Zero-day Used in AdGholas Campaign

By | октобар 31, 2016

Microsoft’s Patch Tuesday for October fixed another previous zero-day vulnerability in Internet Explorer (IE) via MS16-118 and MS16-126: CVE-2016-3298. Before the was lid put on it, the security flaw was employed alongside CVE-2016-3351 by operators of the AdGholas malvertising campaign, analysis and disclosure of which were made with our collaboration with Proofpoint’s @kafeine last July… Сазнајте више »

Masque Attack Abuses iOS’s Code Signing to Spoof Apps and Bypass Privacy Protection

By | октобар 31, 2016

First reported in 2014, Masque Attack allowed hackers to replace a genuine app from the App Store with a malformed, enterprise-signed app that had the same Bundle Identifier (Bundle ID). Apple subsequently patched the vulnerabilities (CVE-2015-3772 and CVE-2015-3725), but while it closed a door, scammers seemed to have opened a window. Haima’s repackaged, adware-laden apps… Сазнајте више »