Badlock was discovered by the Open Source Samba community and apparently underpins both Samba and Windows Server Message Block (SMB). The malware is significant, because it potentially allows privileged access to Windows and Samba resources through a flaw in the SMB protocol. Steve Donald, CTO at Hexis Commented below. Steve Donald, CTO at Hexis Cyber Solutions: “Its commendable that Microsoft and the Samba community got on top of the bug as soon as it was discovered, a positive benefit for the wider user community. However, one issue that needs investigation is whether or not the bug has been embedded into any of…
Author: Information Security Buzz Editorial Staff
ESET researchers analysed a scam campaign on Facebook that spreads a malicious browser plugin via social engineering techniques. The attack starts by luring a Facebook user into playing a video, most often titled “My first video”, “My video” or “Private video”. After clicking on the link, the victims are directed to a fake YouTube website where, instead of downloading and playing the video, they are requested to install an additional extension: The extension is a malicious version of the otherwise legitimate “Make a GIF” plug-in. ESET detects this threat as JS/Kilim.SO and JS/Kilim.RG and users of ESET security products are protected from it. If the victims install the malicious plug-in,…
Following the announcement that the GDPR has been ratified by the European Parliament, security experts from Micro Focus Thales and Netskope commented below. David Mount, Director Security Solutions, Micro Focus: “The GDPR is going to have a huge impact on any businesses operating in the European Union, and how they store and process data. Throughout the drafting and ratification of the legislation, some elements of the regulation have been more controversial than others and it is interesting to see which measures have made it into the final text. Perhaps one of the more controversial elements is mandatory data breach reporting, since under the GDPR companies…
What could be better than sitting in your favorite café, sipping latte and browsing whatever the drama of the day is on Reddit? I’ll tell you – doing it securely! Although public Wi-Fi networks are useful for staying connected on the go, they’re also notorious for being easy for attackers to spy on and install various malware on your device. So, why are these networks so insecure? What are some of the common ways they get attacked and what can you do to keep yourself safe? Even though public Wi-Fi hotspots have been around since the early 2000s and people…
Carbon Black®, a leader in Next-Generation Endpoint Security (NGES), today announced the results from its first Unified Threat Research report, which details how PowerShell, a scripting language inherent to Microsoft operating systems, is being exploited by threat actors to launch cyber attacks. The report outlines how the Carbon Black Threat Research Team, in conjunction with more than two dozen managed security services provider (MSSP) and incident response (IR) security partners, has increasingly seen PowerShell exploitation during cyber attacks, supporting a growing industry trend of malware authors creatively attempting to evade detection by exploiting native tools on operating systems. The report…
Every company in the UK that processes and stores customer payment information is ultimately responsible for its own compliance with regulations such as PCI-DSS (Payment Card Industry Data Security Standard). However, what many don’t realise is that they don’t have to go it alone. Outsourcing certain operational responsibilities to third-party experts can save significant time, money and resources, whilst also minimising the risk of a security data breach. But perhaps unsurprisingly, outsourcing comes with a number of unique challenges, meaning an effective due diligence programme must also be in place to ensure success. This article will discuss some of the…
New dynamic classification ensures organizations worldwide are quickly protected from socially-engineered impostor emails, also known as business email compromise (BEC) or CEO fraud Proofpoint, Inc., (NASDAQ: PFPT), a leading next-generation cybersecurity company, today announced the immediate availability of a new impostor email classification to help organizations stop fraudulent messages that trick employees into sending money and confidential information to cybercriminals. Added to the flagship Proofpoint Email Protection product, this dynamic classifier and quarantine functionality allows administrators to quickly see, report and stop this attack technique. According to the FBI, attackers used impostor emails to steal more than two billion dollars over the last…
The free online service will enable anyone to test a web server and its configuration for security and reliability based on cybersecurity industry best-practices. High-Tech Bridge, an award-winning web security company, has announced the addition of a webserver security test to its portfolio of free web security services. The new service performs the following security checks: – HTTP headers presence, validity and secure configuration – HTTP methods allowed by the web server – Web server version and other software-related tests Unlike other free services, High-Tech Bridge’s web server security test performs more sophisticated security testing. For example, HTTP headers will not just be tested…
Business and government leaders grapple daily with innovation’s double-edged sword: as new technologies introduce unprecedented levels of efficiency, speed, and capability to the world, a new wave of cybersecurity risks immediately follow, threatening that very technology and the people who use it. In many instances, the technology organizations use to protect themselves has dramatically failed to keep pace with the speed and agility of modern threats, creating billions of dollars of damage from data breaches annually. But this is only half the story. Less visible is the widespread lack of personal and organizational accountability for the protection of a company’s…
Following the news that an SQL injection has been discovered on one of the corporate systems of the Panamanian lawyers who leaked the Panama papers, Paul Farrington, senior solution architect at Veracode commented below: Paul Farrington, senior solution architect at Veracode “The panama papers hack at Mossack Fonseca proves that security breaches can trigger huge political and financial ramifications for companies, individuals and even Prime Ministers around the world. All major law firms hold large amounts of sensitive information and know the risks posed by hackers, so it’s unacceptable that despite the initial breach, the company has not fully secured its systems and remains…