AlienSpy RAT Resurfaces as JSocket

  • Selasa, 01 Sep 2015
  • Penulis: Michael Mimoso, Threat Post (Kaspersky Lab Blog)

Researchers at Fidelis in April reported on an outbreak of AlienSpy infections moving via phishing messages. .....

Selengkapnya

Credit Card Breach at a Zoo Near You

  • Jumat, 14 Aug 2015
  • Penulis: Brian Krebs, KrebsOnSecurity

Service Systems Associates, a company that serves gift shops and eateries at zoos and cultural centers across the United States, has acknowledged a breach of its credit and debit card processing systems. ...

Selengkapnya

Darkhotel’s attacks in 2015

  • Kamis, 13 Aug 2015
  • Penulis: Kaspersky Labs' Global Research & Analysis Team, Secure List

Darkhotel APT attacks dated 2014 and earlier are characterized by the misuse of stolen certificates, the deployment of .hta files with multiple techniques, and the use of unusual methods like the infiltration of hotel Wi-Fi to place backdoors in targets’ systems. In 2015,

Selengkapnya

Flaw in 802.11n opens wireless networks to remote attacks

  • Kamis, 09 Jul 2015
  • Penulis: Pierluigi Paganini, Security Affairs

Researchers discovered a vulnerability in the 802.11n wireless networking standard that could be exploited by a remote attacker to target wireless networks. ....

Selengkapnya

Unknowns are cloning and booby trapping hundreds of Dark Web sites

  • Kamis, 09 Jul 2015
  • Penulis: Pierluigi Paganini, Security Affairs

Founder of the ahmia.fi project reported that someone is cloning and booby trapping hundreds of Dark Web sites and is re-writing some of the content. .....

Selengkapnya

Three New Masque Attacks against iOS: Demolishing, Breaking and Hijacking

  • Kamis, 09 Jul 2015
  • Penulis: Zhaofeng Chen, Tao Wei, Hui Xue, Yulong Zhang, Fireeye Inc.

In the recent release of iOS 8.4, Apple fixed several vulnerabilities including vulnerabilities that allow attackers to deploy two new kinds of Masque Attack (CVE-2015-3722/3725, and CVE-2015-3725). .....

Selengkapnya

Win32/Lethic Botnet Analysis

  • Kamis, 09 Jul 2015
  • Penulis: Shaman Vilen, Infosec Institute

Lethic is a spam botnet consisting of an estimated 210 000 – 310 000 individual machines which are mainly involved in pharmaceutical and replica spam. At the peak of its existence, the botnet was responsible for 8-10% of all the spam sent worldwide. ...

Selengkapnya

Evasion Techniques Keep Angler EK’s Cryptowall Business Thriving

  • Kamis, 09 Jul 2015
  • Penulis: Michael Mimoso, Threat Post (Kaspersky Lab Blog)

The Angler Exploit Kit is turning into a model for malware rapidly integrating new evasion techniques. ....

Selengkapnya

Plex Forums Hacked, Private Messages Exposed

  • Kamis, 09 Jul 2015
  • Penulis: Ionut Ilascu, Softpedia

Card data not exposed, passwords hashed and salted Registered users of the Plex media server forums have received an email from the company today informing of a breach that exposed private data tied to accounts.

Selengkapnya

SCADA systems available for sale in the Underground

  • Rabu, 08 Jul 2015
  • Penulis: Pierluigi Paganini, Security Affairs

The new Dell Annual Threat Report revealed that the number of attacks against supervisory control and data acquisition (SCADA) systems doubled in 2014 respect the previous year.

Selengkapnya

Pemantauan Trafik Internet Nasional

Laporan pemantauan trafik internet nasional dengan menampilkan laporan trafik mingguan, trafik bulanan dan trafik tahunan.

Peringatan Ancaman Keamanan & Kerentanan Sistem

Kumpulan arikel tentang peringatan dini ancaman keamanan dan kerentanan sistem.

Security News

Kumpulan berita tentang keamanan siber atau IT.

Laporan Insiden

Id-SIRTII/CC menerima pelaporan insiden dari publik untuk kemudian dilakukan koordinasi kepada pihak-pihak yang berkepentingan.