Is your website or blog at risk from this ImageMagick security hole?

  • Senin, 23 May 2016
  • Penulis: Paul Ducklin, Naked Security (Sophos Blog)

What this means is that ImageMagick often runs in the background on internet-facing servers, automatically processing untrusted images that are uploaded by remote users. ....

Selengkapnya

How a modern car thief can steal a vehicle by clicking a button

  • Senin, 23 May 2016
  • Penulis: Pierluigi Paganini, Security Affairs

In August 2015, Samy Kamkar presented RollJam, a $30 device designed to exploit a design flaw in the protocol that determines how keys communicate with car and unlock the majority of car doors. ...

Selengkapnya

Buffalo buffalo buffalo: malware that attacks malware

  • Jumat, 20 May 2016
  • Penulis: Adrian Bridgwater, SC Magazine

In the same vein then, reflexive pronouns and restrictive clauses notwithstanding, we can also imagine a world where malware bullies other malware. Specifically, what if malware is dispatched to attack inside a network where other malware already exists -- does it first kill off the other malware? ...

Selengkapnya

Analysis of a Botnet Campaign

  • Jumat, 20 May 2016
  • Penulis: ForcePoint Security

What JAKU demonstrates is the re-use of Infrastructure, Tools, Techniques and Processes (TTPs), as well as the herding of victims into separate groupings; some indiscriminate and others highly targeted. ...

Selengkapnya

Prince of Persia: Infy Malware Active In Decade of Targeted Attacks

  • Jumat, 20 May 2016
  • Penulis: Tomer Bar and Simon Conant, Unit 42 (Palo Alto Networks Blog)

In May 2015, Palo Alto Networks WildFire detected two e-mails carrying malicious documents from a genuine and compromised Israeli Gmail account, sent to an Israeli industrial organization. One e-mail carried a Microsoft PowerPoint file named “thanks.pps” (VirusTotal), the other a Microsoft Word document named “request.docx”. ...

Selengkapnya

New Poison Ivy Activity Targeting Myanmar, Asian Countries

  • Jumat, 20 May 2016
  • Penulis: Jason Jones, Arbor Networks Blog

The infamous Remote Access Trojan (RAT) Poison Ivy (hereafter referred to as PIVY) has resurfaced recently, and exhibits some new behaviors. PIVY has been observed targeting a number of Asian countries for various purposes over the past year.

Selengkapnya

Action Fraud warns of new wave of Lizard Squad DDoS attacks

  • Senin, 16 May 2016
  • Penulis: Tim Ring, SC Magazine

A number of UK businesses have been hit by extortion demands from the Lizard Squad hacker group, according to an alert issued by Action Fraud. At least 20 companies have been threatened, with victims told that if they don't pay five bitcoins – just over £1,500 – they will suffer a DDoS attack. ...

Selengkapnya

2013 DDoS Attacks on US Banking Sector Used Sweden's Military Servers

  • Senin, 16 May 2016
  • Penulis: Catalin Cimpanu, Softpedia

Swedish newspaper Daily News discovered that a large number of Web servers belonging to Sweden's Armed Forces were hijacked and forced to participate in DDoS attacks against US banking institutions. ...

Selengkapnya

Richland County Websites including Sheriffs Department Hacked

  • Senin, 16 May 2016
  • Penulis: Waqas, HackRead

RICHLAND COUNTY WEBSITES INCLUDING SHERIFFS DEPARTMENT WERE HACKED BY PRO-ISIS HACKERS ”TEAM SYSTEM DZ” THIS FRIDAY

Selengkapnya

Nuclear EK Leveraged In Large WordPress Compromise Campaign

  • Jumat, 01 Apr 2016
  • Penulis: Jérôme Segura, Malwarebytes Unpacked

Security company Sucuri recently noted a spike in WordPress infections, with a large number of sites getting injected with the same malicious scripts. ...

Selengkapnya

Pemantauan Trafik Internet Nasional

Laporan pemantauan trafik internet nasional dengan menampilkan laporan trafik mingguan, trafik bulanan dan trafik tahunan.

Peringatan Ancaman Keamanan & Kerentanan Sistem

Kumpulan arikel tentang peringatan dini ancaman keamanan dan kerentanan sistem.

Security News

Kumpulan berita tentang keamanan siber atau IT.

Laporan Insiden

Id-SIRTII/CC menerima pelaporan insiden dari publik untuk kemudian dilakukan koordinasi kepada pihak-pihak yang berkepentingan.