Oct 28, 2018

APT report for 2018-10-27

TRANSNATIONAL / UNKNOWN

Nil

CHINA

Nil

INDIA

Nil

NORTH KOREA

Nil

PAKISTAN

Nil

VIETNAM

Nil

IRAN

Nil

IRAQ

Nil

LEBANON

Nil

PALESTINE

Nil

SAUDI ARABIA

Nil

SYRIA

Nil

TURKEY

Nil

UNITED ARAB EMIRATES

Nil

YEMEN

Nil

RUSSIA

Nil

SERBIA

Nil

UKRAINE

  1. News of the Week: October 27, 2018

Platform report for 2018-10-27

WINDOWS

  1. Cisco launches patches for vulnerabilities in WEBEX Meetings app

LINUX

  1. The LibSSH Security Bug in the Nutshell

UNIX

Nil

ANDROID

  1. The LibSSH Security Bug in the Nutshell

IOS

  1. The LibSSH Security Bug in the Nutshell

MACOS

  1. The LibSSH Security Bug in the Nutshell

Threat report for 2018-10-27

DATA BREACH & DATA LOSS

Nil

DENIAL-OF-SERVICE

  1. DDoS and Ransomware Tools Used by Cyber Criminals Discovered
  2. A few dollars to bring down sites with new Bushido-based DDoS-for-hire service
  3. Hackers Offering DDoS-for-Hire Service Powered by Bushido Botnet in Dark Web Markets

MALVERTISING

Nil

PHISHING

Nil

WEB DEFACEMENT

Nil

BOTNET

  1. Hackers Offering DDoS-for-Hire Service Powered by Bushido Botnet in Dark Web Markets

RANSOMWARE

  1. DDoS and Ransomware Tools Used by Cyber Criminals Discovered
  2. Decrypt files attacked with the latest versions of GandCrab ransomware

CRYPTOMINING & CRYPTOCURRENCIES

  1. Sorry friends, I'm afraid I just can't quite afford the Bitcoin to stop that vid from leaking everywhere
  2. Australian Cryptocurrency Theft Highlights Security Mistakes

MALWARE

  1. .@FireEye researchers have attributed the #Triton #malware -- used in an attack on an industrial control system in Saudi Arabia
  2. Bankbot/Anubis downloader hits #1 trending at finance @ThreatFabric @
  3. Twelve malicious Python libraries found and removed from PyPI
  4. The forensics analysts log the adversaries’ actions and every network packet the hackers send. The adversaries use a process running
  5. Executable Formats and How To Exploit Them
  6. Unpatched Critical Bug in Microsoft Word Online Video Feature Allow Attacker to Deliver Powerful Malware
  7. New malware attacks targeting voters in key states in the 2018 US midterm elections
  8. Two hours after the deadline, the forensics team notices someone accessing the MES system server using domain administrator credentials through

EXPLOIT

  1. Executable Formats and How To Exploit Them

VULNERABILITY

  1. Researchers recently found vulnerabilities within the robot controllers from @Universal_Robot. Learn what these #robot controllers are used for and how
  2. In this week's Risk & Repeat podcast, editors discuss the #GAOreport on vulnerabilities and weaknesses in military weapons systems and
  3. The LibSSH Security Bug in the Nutshell
  4. The Pentagon expands the scope of its vulnerability bounty program
  5. Unpatched Critical Bug in Microsoft Word Online Video Feature Allow Attacker to Deliver Powerful Malware
  6. Cisco launches patches for vulnerabilities in WEBEX Meetings app
  7. A #RemoteCodeExecution flaw in @Cisco Webex -- called WebExec -- could be an easy vector for insider attacks, and the

Region brief for 2018-10-27

ASIA

  1. .@FireEye researchers have attributed the #Triton #malware -- used in an attack on an industrial control system in Saudi Arabia

OCEANIA

  1. Australian Cryptocurrency Theft Highlights Security Mistakes

NORTH AMERICA

  1. In this week's Risk & Repeat podcast, editors discuss the #GAOreport on vulnerabilities and weaknesses in military weapons systems and
  2. Australian Cryptocurrency Theft Highlights Security Mistakes
  3. The Pentagon expands the scope of its vulnerability bounty program
  4. Decrypt files attacked with the latest versions of GandCrab ransomware
  5. New malware attacks targeting voters in key states in the 2018 US midterm elections

SOUTH AMERICA

Nil

EUROPE

  1. .@FireEye researchers have attributed the #Triton #malware -- used in an attack on an industrial control system in Saudi Arabia
  2. Decrypt files attacked with the latest versions of GandCrab ransomware
  3. New malware attacks targeting voters in key states in the 2018 US midterm elections

AFRICA

Nil

Sector brief for 2018-10-27

HEALTHCARE

Nil

TRANSPORT

  1. A few dollars to bring down sites with new Bushido-based DDoS-for-hire service

BANKING & FINANCE

  1. News of the Week: October 27, 2018
  2. Australian Cryptocurrency Theft Highlights Security Mistakes
  3. Bankbot/Anubis downloader hits #1 trending at finance @ThreatFabric @
  4. The Pentagon expands the scope of its vulnerability bounty program

INFORMATION & TELECOMMUNICATION

  1. A few dollars to bring down sites with new Bushido-based DDoS-for-hire service
  2. Bankbot/Anubis downloader hits #1 trending at finance @ThreatFabric @
  3. The LibSSH Security Bug in the Nutshell

FOOD

Nil

WATER

Nil

ENERGY

Nil

GOVERNMENT & PUBLIC SERVICE

  1. .@FireEye researchers have attributed the #Triton #malware -- used in an attack on an industrial control system in Saudi Arabia
  2. In this week's Risk & Repeat podcast, editors discuss the #GAOreport on vulnerabilities and weaknesses in military weapons systems and
  3. Australian Cryptocurrency Theft Highlights Security Mistakes
  4. The Pentagon expands the scope of its vulnerability bounty program
  5. Decrypt files attacked with the latest versions of GandCrab ransomware
  6. New malware attacks targeting voters in key states in the 2018 US midterm elections

Daily brief for 2018-10-27

ASIA

  1. .@FireEye researchers have attributed the #Triton #malware -- used in an attack on an industrial control system in Saudi Arabia

WORLD

  1. .@FireEye researchers have attributed the #Triton #malware -- used in an attack on an industrial control system in Saudi Arabia
  2. In this week's Risk & Repeat podcast, editors discuss the #GAOreport on vulnerabilities and weaknesses in military weapons systems and
  3. Australian Cryptocurrency Theft Highlights Security Mistakes
  4. The Pentagon expands the scope of its vulnerability bounty program
  5. Decrypt files attacked with the latest versions of GandCrab ransomware
  6. New malware attacks targeting voters in key states in the 2018 US midterm elections

ATTACKS

Nil

THREATS

  1. .@FireEye researchers have attributed the #Triton #malware -- used in an attack on an industrial control system in Saudi Arabia
  2. DDoS and Ransomware Tools Used by Cyber Criminals Discovered
  3. Researchers recently found vulnerabilities within the robot controllers from @Universal_Robot. Learn what these #robot controllers are used for and how
  4. In this week's Risk & Repeat podcast, editors discuss the #GAOreport on vulnerabilities and weaknesses in military weapons systems and
  5. Sorry friends, I'm afraid I just can't quite afford the Bitcoin to stop that vid from leaking everywhere
  6. Australian Cryptocurrency Theft Highlights Security Mistakes
  7. Bankbot/Anubis downloader hits #1 trending at finance @ThreatFabric @
  8. Twelve malicious Python libraries found and removed from PyPI
  9. The forensics analysts log the adversaries’ actions and every network packet the hackers send. The adversaries use a process running
  10. The LibSSH Security Bug in the Nutshell
  11. Executable Formats and How To Exploit Them
  12. The Pentagon expands the scope of its vulnerability bounty program
  13. Decrypt files attacked with the latest versions of GandCrab ransomware
  14. Unpatched Critical Bug in Microsoft Word Online Video Feature Allow Attacker to Deliver Powerful Malware
  15. Cisco launches patches for vulnerabilities in WEBEX Meetings app
  16. New malware attacks targeting voters in key states in the 2018 US midterm elections
  17. Two hours after the deadline, the forensics team notices someone accessing the MES system server using domain administrator credentials through
  18. A #RemoteCodeExecution flaw in @Cisco Webex -- called WebExec -- could be an easy vector for insider attacks, and the

CRIME

  1. DDoS and Ransomware Tools Used by Cyber Criminals Discovered
  2. Australian Cryptocurrency Theft Highlights Security Mistakes
  3. Hackers Offering DDoS-for-Hire Service Powered by Bushido Botnet in Dark Web Markets

POLITICS

Nil