Threat report for 2018-10-14
DATA BREACH & DATA LOSS
- My Health Record privacy amendments 'woefully inadequate': Labor
- #NetSpectre exploits speculative execution to leak data remotely via side-channel attacks. Learn how this #SecurityVulnerability affects the #cloud from expert
- Web Hosting Provider Suffers Data Breach Second Time in a Year
- Find out how #TLBleed abuses @Intel's HTT chip feature to leak data via TLB
- Microsoft still has not completely solved the Microsoft JET database engine vulnerability
- See how SearchLight identifies when your data is exposed, your brand is abused, or your company is mentioned on the
- Pentagon Discloses Data Breach, More Than 30,000 Workers Have Affected
- A @Google security audit uncovered a glitch in #GooglePlus that exposed data from nearly 500,000 accounts, causing the company to
- PHASE 4 – INFORMATION GATHERING AND PLANNING
Meet Eric, a control systems engineer working for a third-party integrator.
He’s guy who uploaded
DENIAL-OF-SERVICE
- DDoS Attacks Hit Games Like Assassin’s Creed and Final Fantasy XIV
MALVERTISING
Nil
PHISHING
Nil
WEB DEFACEMENT
Nil
BOTNET
Nil
RANSOMWARE
- New @ESET research finds APT group dubbed #TeleBots was behind #Industroyer #malware attacks, #NotPetya #ransomware outbreaks, and a recent Exaramel
CRYPTOMINING & CRYPTOCURRENCIES
- Fake Flash Updates pushing Malware to Inject XMRig Cryptocurrency Miners
MALWARE
- Week in review: Enterprise cybersecurity PKIs, keeping your cloud malware-free
- New @ESET research finds APT group dubbed #TeleBots was behind #Industroyer #malware attacks, #NotPetya #ransomware outbreaks, and a recent Exaramel
- .@ThreatFabric researchers uncovered a #malware that uses overlay techniques to avoid detection. Learn from @lewisnic how this new #Androidmalware --
- At the 2018 @RSAConference, researchers discussed the rise of stegware -- #malware that uses #steganography techniques to avoid detection. Learn
- How a remote access #Trojan checks for
- Fake Flash Updates pushing Malware to Inject XMRig Cryptocurrency Miners
EXPLOIT
- Expert released PoC Code Microsoft Edge Remote Code Execution flaw
- Exploiting Windows Using Microsoft Office DDE Exploit (MACROLESS)
VULNERABILITY
- Microsoft fixed the Zero-Day for JET flaw, but the fix is incomplete
- A2SV – SSL Vulnerability Analysis Tool
- Microsoft patch for JET flaw zero-day is ‘incomplete,’ Windows still vulnerable
- Microsoft still has not completely solved the Microsoft JET database engine vulnerability
- Expert released PoC Code Microsoft Edge Remote Code Execution flaw