Blog

Blog

FireEye Filed Injunction Against Security Firm to Protect Intellectual Property

FireEye filed an injunction against German IT security research firm ERNW GmBH last month in order to protect its intellectual property. According to CIO , ERNW first contacted FireEye, a former intern of which recently pleaded guilty to selling Dendroid malware on Darkode, back in April of this year after its researchers discovered five vulnerabilities in the company's Malware Protection System...
Blog

Attack Leverages Outdated CMS, Plugins to Redirect to Neutrino EK and Teslacrypt Ransomware

Ransomware is on the rise. According to the McAfee Labs Threat Report: May 2015 , this threat saw a 165% increase in the first quarter of 2015 alone. In response, security researchers have periodically released removal kits designed to help victims of crypto-ransomware variants recover their encrypted files. However, given the diversification of ransomware, including their incorporation of popular...
Blog

Sakawa Scams Spread to the UK

Earlier this year, I focused on the emerging trend of Sakawa scams originating from the west coast of Africa. If you've never heard this term before, there is some learning for you to do! Sakawa, or JuJu, scams are a subsection of traditional online cyber crime. Whilst many scams originating from all over the world could be classed as 'sakawa,' the term is associated with a lifestyle, culture and...
Blog

Board Talk: How to Improve Your Board's Cyber Security Literacy

With security breaches such as Sony , WHSmith and Ashley Madison hitting the headlines every week, the level of security awareness among the general public has never been higher. You could therefore be forgiven for thinking that (at least theoretically) it would be an easy task to impress the importance of information security matters on a board of directors. But company directors have a lot on...
Blog

Malware Capable of Bypassing CAPTCHA Systems Found in Google Play

Security researchers have spotted a sophisticated type of malware that is capable of bypassing CAPTCHA authentication systems in the Google Play Store. According to a blog post written by Bitdefender security researcher Liviu Arsene, the malware, which has been identified as Android.Trojan.MKero.A, seems to have somehow found its way into legitimate apps hosted on the Play Store and simultaneously...
Blog

VERT Threat Alert: September 2015 Patch Tuesday Analysis

Today’s VERT Alert addresses 12 new Microsoft Security Bulletins. VERT is actively working on coverage for these bulletins in order to meet our 24-hour SLA and expects to ship ASPL-632 on Wednesday, September 9th. Ease of Use (published exploits) to Risk Table Automated Exploit Easy Moderate Difficult Extremely Difficult No Known Exploit MS15-103 MS15-096 MS15-094 MS15-095 MS15-098 MS15-100 MS15...
Blog

First Report of Simulated Human Being Hacked - But Don't Panic

Yes, simulated humans exist. And even if they don't quite walk amongst us, they do lie in beds in hospitals, helping medical students get valuable experience in caring for patients without the worry that one wrong step might result in a real human life being lost. Don't know what I'm talking about? Then meet iStan , the "most advanced wireless patient simulator on the market" according to its...
Blog

Android Ransomware Masquerades as Pornography App

A security firm has discovered a variant of Android ransomware that masquerades as a pornography app called "Adult Player." According to a post published on Zscaler's blog, the ransomware, which is not found on legitimate app stores like Google Play Store and the Apple App Store, successfully loads onto a device after asking for admin permissions. It then uses a technique known as reflection to...
Blog

Data Security Standards in a Post-Wyndham v. FTC World

The Federal Trade Commission (“FTC”) can now sue a company for failing to adequately protect client data. Let that sink in for a moment. In short, the recent court ruling confirmed the FTC’s authority to create, impose, and enforce data security rules on virtually any business that holds consumer data. QUICK BACKGROUND On August 24, 2015, the US Court of Appeals ruled that the FTC has the...
Blog

A Security Wake Up Call for Chief Information Officers

The nation is in the midst of a torrent of major data breaches. The most recent breaches include the Ashley Madison breach , the Office of Personnel Management breach , and the theft of millions of dollars from small- to mid-size businesses. In addition to the financial impacts, the breaches include the release of personal-data including social security numbers, health and financial records, and...
Blog

This Week in Security: Malware Hits iPhones, Lizard Squad Attacks NCA Website, Malvertising Campaign Targets Match.com

Our security roundup series covers the week’s trending topics in the world of InfoSec. In this quick read compilation, we’ll let you know of the latest news and controversies that the industry has been talking about recently. Here’s what you don’t want to miss from the week of August 31st, 2015: On the one-year anniversary of ' The Fappening ,' an incident in which hundreds of explicit images of...
Blog

Remote File Overwrite Vulnerability Patched by Cisco in IMC Supervisor, UCS Director

Cisco has patched a remote file overwrite vulnerability in its Integrated Management Controller (IMC) Supervisor and UCS Director products. On Thursday, Cisco issued an advisory that explains how a vulnerability in JavaServer Pages (JSP) input validation routines of both the IMC Supervisor and UCS Director products could be exploited by a remote, unauthenticated attacker to produce system...
Blog

What's On Your Network?

You can't protect what you don't know about. It may seem trite to bring out that cliché, but the fact is that it remains relevant in information security today. So much of what we do in this industry is about discovery, whether it's discovery of assets, discovery of vulnerabilities, or discovery of an existing compromise. As information security professionals, we often play the role of a high-tech...
Blog

Study Finds Finance, HR Staff Pose Biggest Security Risks to the Enterprise

According to recent research , employees in the finance and human resources departments are seen as the mostly likely to cause a data breach. The study, which polled more than 500 information technology decision makers and 4,000 employees in the US, UK, Germany and Australia, found that nearly half of respondents (46%) believe finance departments pose the biggest security threat to the...
Blog

Netflix's Sleepy Puppy Tool Helps Researchers Track XSS Propagation

Netflix has released a new tool called Sleepy Puppy that helps security researchers capture, manage, and track cross-site scripting (XSS) propagation over extended periods of time. Two application security researchers for the movie-streaming service, Scott Behrens ( @helloarbit ) and Patrick Kelley ( @monkeysecurity ), created the Sleepy Puppy tool to address a critical weakness in traditional XSS...
Blog

Detecting Man-in-the-Cloud (MitC) Attacks with Adaptive Threat Protection

Imperva has published some pretty interesting research on how an attacker might use cloud-based file synchronization services to exfiltrate data and deliver malware to systems inside an organization. The TL;DR of this attack is that a malicious adversary can steal and replace the authentication token for these services, allowing them to effectively both retrieve and plant files on the target...
Blog

WHSmith Data Breach Sends Customers' PII Out Via Email

British retailer WHSmith has suffered a data breach that has resulted in users' personally identifiable information (PII) being sent out to hundreds of customers' inboxes. According to The Guardian , personal information including names, phone numbers, and email addresses that users typed into the retailer's contact form was not sent to the company but was instead delivered to its entire mailing...
Blog

The Ashley Madison Hack – A Timeline (Updated: 9/10/15)

Ashley Madison, a website for those who are interested in committing adultery, has made headline after headline in recent weeks after a hacking group penetrated its servers and published the information of all 37 million users online. As of this writing, it is believed that this incident dates back to mid-July of 2015. The timeline below recounts all of the major developments of this ongoing...
Blog

U.S. Secret Service Agent Admits to Impeding Silk Road Investigation, Stealing Bitcoin

A former United States Secret Service Agent has admitted in court that he stole Bitcoin from drug dealers and attempted to hinder an investigation into Silk Road , the underground dark web market. On Monday, Shaun Bridges, 33, appeared in federal court in San Francisco and pleaded guilty to money laundering and the obstruction of justice, reports The Guardian . Source: Business Insider Between...
Blog

Attacks Might Be Sophisticated, But So Can Be Your Defense Mechanisms

When working in security, the top priority is to protect your organization’s business-critical data from cyber attacks. You know that your traditional security mechanisms are in place – the database is secure; you have implemented audit trails and encryption on sensitive data, and you instituted pretty tight access control. Anti-virus solutions are in place, patches are applied systematically, and...