JudulTipsDiposting
PowerWare or PoshCoder? Comparison and Decryption

PowerWare was brought to my attention by Carbon Black via their blog
post. PowerWare is downloaded by a malicious macro-enabled Microsoft
Word document that is distributed via a phishing email campaign. The
malicious document in question attempts to convince the user to enable

Kamis, 26 May 2016
OpenSSH patches vulnerabilities

"OpenSSH has released patches to fix vulnerabilities which could lead to
information leakage. They affect versions prior to 7.2p2 with x11
forwarding enabled."

Senin, 28 Mar 2016
opular WordPress plugin opens backdoor, steals user credentials

"If you are one of the 10,000+ users of the Custom Content Type Manager
(CCTM) WordPress plugin, consider your site to be compromised and
proceed to clean your installation up, Sucuri Security researchers have
warned.

After finding “a very suspicious auto-upda

Senin, 28 Mar 2016
Barcode attack technique (Badbarcode)

"The barcode attack that @Tk described on PacSec and included in his
demo video on twitter are so cool that I bought a scanner for research
as well. During my research, I went through all information whether it
is at home or abroad, but none covers the possible attack techn

Rabu, 02 Mar 2016
Beware! That bogus tax-related email could be hiding the NanoCore trojan

"Researchers have spotted an ongoing tax-themed malicious email
campaign that is delivering the NanoCore remote access trojan (RAT) as
its malware payload.

Anthony Kasza and Tyler Halfpop, malware researchers at Palo Alto
Networks, write in a blog post how they rece

Rabu, 02 Mar 2016
Critical VPN key exchange flaw exposes Cisco security appliances to remote hacking

Cisco Systems patched a critical vulnerability that could allow
remote attackers to take over Cisco Adaptive Security Appliance (ASA)
firewalls configured as virtual private network servers by simply
sending malformed network packets to them.

For devices that are designe

Rabu, 02 Mar 2016
A Guide on 5 Common LinkedIn Scams

"SCAM #1: ADVANCED FEE/INHERITANCE SCHEMES
SCAM #2: FAKE (PAYING) JOB OFFERS
SCAM #3: ILLEGITIMATE CONTACT REQUESTS
SCAM #4: DATING/ROMANCE SCAMS
SCAM #5: SPEAR-PHISHING OR “WHALING” PLOYS"

 

Selasa, 16 Feb 2016
Anatomy of a Wi-Fi hole: Take care in your hotel this Christmas!

"Fast, free Wi-Fi sounds handy, and it is, but we’ve written about the
potential problems with open Wi-Fi hotspots several times before.
...
One handy countermeasure is to use a VPN, short for Virtual Private Network.
...
Of course, many free Wi-Fi network

Senin, 01 Feb 2016
Amazon releases open source cryptographic module

"Potentially saving the world from another online security disaster like
last year's Heartbleed, Amazon Web Services has released as open source
a cryptographic module for securing sensitive data passing over the
Internet.

The software, s2n, is a new implementat

Kamis, 09 Jul 2015
How To Securely Share Your Private Docker Registry With External Clients and Partners

"Today Docker announced their new “Trusted Registry”, which is a
commercial version of the open-source Docker Registry image storage
and distribution service. Teams can run a Trusted Registry to control
how their images are physically stored and enhance their ab

Rabu, 08 Jul 2015
Disclaimer | Copyright © 2013 - Id-SIRTII/CC
Id-SIRTII/CC - Indonesia Security Incident Response Team on Internet Infrastructure/Coordination Center
Menara Ravindo Lt. 17, Jl. Kebon Sirih No. 75 Jakarta Pusat, 10340, Indonesia
Member of: