System Security & Vulnerability Threat Warning

New wave of attacks against Ukrainian power industry

  • Friday, 05 Feb 2016
  • Author: Robert Lipovsky, WeLiveSecurity

Yesterday we discovered a new wave of these attacks, where a number of electricity distribution companies in Ukraine were targeted again following the power outages in December. ...

Read more

Polycom VVX-Series Business Media Phones Path Traversal Vulnerability (0-Day)

  • Wednesday, 03 Feb 2016
  • Author: Depth Security Blog

In June I spent a little time in the web administrative interface of a Polycom VVX600 IP phone running UC Software Version 5.1.3.1675. As I proxied the traffic through BurpSuite, I immediately noticed something interesting in the requests that the interface uses to display phone background images and ring tones to web users. The requests contained actual file names.

Read more

Microsoft Windows VBScript Split Function Use-After-Free Information Disclosure Vulnerability

  • Wednesday, 03 Feb 2016
  • Author: Zero Day Initiative

This vulnerability allows remote attackers to disclose the contents of memory on applications using the VBScript scripting language on vulnerable installations of Microsoft Windows. .....

Read more

Exploit upgrade for Microsoft Word Intruder crimeware kit

  • Tuesday, 02 Feb 2016
  • Author: Gabor Szappanos, Naked Security (Sophos Blog)

Microsoft Word Intruder, or MWI for short, is a toolkit for sneaking malware onto your computer using booby-trapped Word files. ...

Read more

Come to the dark side. Chimera ransomware asks victims to become affiliates

  • Tuesday, 02 Feb 2016
  • Author: David Bisson, Graham Cluley Blog

Researchers have observed that the Chimera ransomware offers victims the option of joining its affiliate program upon infection. ...

Read more

Bitcoin stolen via malware infected pirated copy of Fallout 4

  • Tuesday, 02 Feb 2016
  • Author: Duncan Riley, siliconAngle

Various industry bodies over the years have tried all sorts of scare tactics in relation to piracy, up to and including taking people to court, but what if your pirated item ended up stealing Bitcoin? ...

Read more

Angler Exploit Kit Spreading Cryptowall 4.0 Ransomware

  • Tuesday, 02 Feb 2016
  • Author: Chris Brook, Threat Post (Kaspersky Lab Blog)

As expected, it didn’t take long for one of the most popular exploit kits, Angler, to start spreading the latest iteration of Cryptowall ransomware. ...

Read more

New helpme@freespeechmail.org Ransomware can be Decrypted for Free

  • Tuesday, 02 Feb 2016
  • Author: Lawrence Abrams, Bleeping Computer

A new ransomware has started to become seen on various computer support forums that encrypts your data and then appends the helpme@freespeechmail.org string to the filename ....

Read more

Threat Spotlight: Cryptowall 4 - The Evolution Continues

  • Tuesday, 02 Feb 2016
  • Author: Andrea Allievi and Holger Unterbrink, Talos Blog

Over the past year, Talos has devoted a significant amount of time to better understanding how ransomware operates, its relation to other malware, and its economic impact. This research has proven valuable for Talos and led the development of better detection methods within the products we support along with the disruption of adversarial operations. ....

Read more

New Spy Banker Trojan Telax abusing Google Cloud Servers

  • Tuesday, 02 Feb 2016
  • Author: Deepen Desai, Nirmal Singh, Lenart Brave, ThreatLabZ Blog (Zscaler)

Introduction Zscaler ThreatLabZ has been closely monitoring a new Spy Banker Trojan campaign that has been targeting Portuguese-speaking users in Brazil. ...

Read more

Monitoring National Internet Traffic

National internet traffic monitoring report featuring weekly traffic reports, monthly traffic reports and annual traffic reports.

System Security & Vulnerability Threat Warning

A collection of articles about the early warnings of security threats and system vulnerabilities.

Security News

Newsgroups of Cyber Security or IT.