JudulPenulisKutipanDiposting
Is your website or blog at risk from this ImageMagick security hole?Paul Ducklin, Naked Security (Sophos Blog)What this means is that ImageMagick often runs in the background on internet-facing servers, automatically processing untrusted images that are uploaded by remote users. ....Senin, 23 May 2016
How a modern car thief can steal a vehicle by clicking a buttonPierluigi Paganini, Security AffairsIn August 2015, Samy Kamkar presented RollJam, a $30 device designed to exploit a design flaw in the protocol that determines how keys communicate with car and unlock the majority of car doors. ...Senin, 23 May 2016
Buffalo buffalo buffalo: malware that attacks malwareAdrian Bridgwater, SC MagazineIn the same vein then, reflexive pronouns and restrictive clauses notwithstanding, we can also imagine a world where malware bullies other malware. Specifically, what if malware is dispatched to attack inside a network where other malware already exists -- does it first kill off the other malware? ...Jumat, 20 May 2016
Analysis of a Botnet CampaignForcePoint Security What JAKU demonstrates is the re-use of Infrastructure, Tools, Techniques and Processes (TTPs), as well as the herding of victims into separate groupings; some indiscriminate and others highly targeted. ...Jumat, 20 May 2016
Prince of Persia: Infy Malware Active In Decade of Targeted AttacksTomer Bar and Simon Conant, Unit 42 (Palo Alto Networks Blog)In May 2015, Palo Alto Networks WildFire detected two e-mails carrying malicious documents from a genuine and compromised Israeli Gmail account, sent to an Israeli industrial organization. One e-mail carried a Microsoft PowerPoint file named “thanks.pps” (VirusTotal), the other a Microsoft Word document named “request.docx”. ...Jumat, 20 May 2016
New Poison Ivy Activity Targeting Myanmar, Asian CountriesJason Jones, Arbor Networks BlogThe infamous Remote Access Trojan (RAT) Poison Ivy (hereafter referred to as PIVY) has resurfaced recently, and exhibits some new behaviors. PIVY has been observed targeting a number of Asian countries for various purposes over the past year.Jumat, 20 May 2016
Action Fraud warns of new wave of Lizard Squad DDoS attacksTim Ring, SC MagazineA number of UK businesses have been hit by extortion demands from the Lizard Squad hacker group, according to an alert issued by Action Fraud. At least 20 companies have been threatened, with victims told that if they don't pay five bitcoins – just over £1,500 – they will suffer a DDoS attack. ...Senin, 16 May 2016
2013 DDoS Attacks on US Banking Sector Used Sweden's Military ServersCatalin Cimpanu, SoftpediaSwedish newspaper Daily News discovered that a large number of Web servers belonging to Sweden's Armed Forces were hijacked and forced to participate in DDoS attacks against US banking institutions. ...Senin, 16 May 2016
Richland County Websites including Sheriffs Department HackedWaqas, HackReadRICHLAND COUNTY WEBSITES INCLUDING SHERIFFS DEPARTMENT WERE HACKED BY PRO-ISIS HACKERS ”TEAM SYSTEM DZ” THIS FRIDAYSenin, 16 May 2016
Nuclear EK Leveraged In Large WordPress Compromise CampaignJérôme Segura, Malwarebytes UnpackedSecurity company Sucuri recently noted a spike in WordPress infections, with a large number of sites getting injected with the same malicious scripts. ...Jumat, 01 Apr 2016
Disclaimer | Copyright © 2013 - Id-SIRTII/CC
Id-SIRTII/CC - Indonesia Security Incident Response Team on Internet Infrastructure/Coordination Center
Menara Ravindo Lt. 17, Jl. Kebon Sirih No. 75 Jakarta Pusat, 10340, Indonesia
Member of: