Reversing Prince Harming’s kiss of death

  • Senin, 06 Jul 2015
  • Penulis: Fg, reverse.put.as Blog

The suspend/resume vulnerability disclosed a few weeks ago (named Prince Harming by Katie Moussouris) turned out to be a zero day. While (I believe) its real world impact is small, it is nonetheless a critical vulnerability and (another) spectacular failure from Apple.

Selengkapnya

Drupal plugs critical vulnerability leaving thousands of websites open to attack

  • Senin, 06 Jul 2015
  • Penulis: Alastair Stevenson, V3.co.uk

Open source content management system (CMS) service Drupal has rushed out a wave of security updates plugging flaws that leave numerous businesses and government departments open to attack.

Selengkapnya

NSA and GCHQ target security firm including Kaspersky

  • Senin, 06 Jul 2015
  • Penulis: Pierluigi Paganini, Security Affairs

The list of companies hacked by the intelligence agencies is long and includes prestigious names like Kaspersky Lab, F-Secure, ESET, Avast, BitDefender, AVG, and Checkpoint.

Selengkapnya

Critical vulnerabilities in Windows and Adobe Reader exposed by hacker

  • Jumat, 03 Jul 2015
  • Penulis: Karl Thomas, welivesecurity

A hacker has published an extensive list of Adobe Reader and Windows vulnerabilities based on his research into a relatively obscure area of font management.

Selengkapnya

Default SSH Key Found in Many Cisco Security Appliances

  • Kamis, 02 Jul 2015
  • Penulis: Dennis Fisher, ThreatPost (Kaspersky Blog)

"The company said that all of its Web Security Virtual Appliances, Email Security Virtual Appliances, and Content Security Management Virtual Appliances are affected by the vulnerability. This bug is about as serious as they come for enterprises."

Selengkapnya

Trend Micro Discovers Apache Cordova Vulnerability that Allows One-Click Modification of Android Apps

  • Rabu, 17 Jun 2015
  • Penulis: Steven Shen, Security Intelligence Blog (Trend Micro)

We’ve discovered a vulnerability in the Apache Cordova app framework that allows attackers to modify the behavior of apps just by clicking a URL. The extent of the modifications can range from causing nuisance for app users to crashing the apps completely.

Selengkapnya

The Cost of Bad Threat Intelligence

  • Rabu, 17 Jun 2015
  • Penulis: Sergio Caltagirone, activeresponse.org

There is no doubt that threat intelligence is now “a thing.” At RSA 2015 I couldn’t help but notice how many vendor booths were hawking their relevance to threat intelligence. I hear about a threat intelligence start-up almost weekly. That is not surprising given venture capital is flowing and C-suite customers are now investing in “threat intelligence.” Everyone wants a piece of the pie.

Selengkapnya

Synology Fixes File-Takeover Flaw in Cloud Station OS X Client

  • Rabu, 17 Jun 2015
  • Penulis: Dennis Fisher, Threat Post (Kaspersky blog)

There is a vulnerability in some versions of Synology’s Cloud Station client for OS X that can enable any user to take over system files and gain complete control of the machine. ...

Selengkapnya

Redis EVAL Lua Sandbox Escape

  • Rabu, 17 Jun 2015
  • Penulis: Ben Murphy's Blog

It is possible to break out of the Lua sandbox in Redis and execute arbitrary code. This vulnerability is not new and is heavily based on Peter Cawley’s work with Lua bytecode type confusion.

Selengkapnya

Pixiewps - Bruteforce Offline the WPS Pin (Pixie Dust Attack)

  • Rabu, 17 Jun 2015
  • Penulis: Lydecker Black, Kitploit

Pixiewps is a tool written in C used to bruteforce offline the WPS pin exploiting the low or non-existing entropy of some APs (pixie dust attack). It is meant for educational purposes only. All credits for the research go to Dominique Bongard.

Selengkapnya

Pemantauan Trafik Internet Nasional

Laporan pemantauan trafik internet nasional dengan menampilkan laporan trafik mingguan, trafik bulanan dan trafik tahunan.

Peringatan Ancaman Keamanan & Kerentanan Sistem

Kumpulan arikel tentang peringatan dini ancaman keamanan dan kerentanan sistem.

Security News

Kumpulan berita tentang keamanan siber atau IT.

Laporan Insiden

Id-SIRTII/CC menerima pelaporan insiden dari publik untuk kemudian dilakukan koordinasi kepada pihak-pihak yang berkepentingan.