Well this is interesting … a vulnerability in VxWorks that NASA’s space tools leverage. Imagine one day a hacker compromising and remotely driving a lunar lander. Hopefully that doesn’t happen. The original post from net-security.org can be found HERE.
A critical, remotely exploitable vulnerability in VxWorks, the world’s most popular real-time operating system (RTOS), can be exploited by attackers to gain backdoor access to the systems using it. Continue reading →
Cisco very recently acquired OpenDNS. For those that are not familiar with OpenDNS, they see around 80 billion DNS records a day meaning they can be pretty effective at determining what is a possible threat from a reputation perspective. Customers can point their devices at OpenDNS and enable content filtering along with different threat blocking features. Cisco also just announced that they have integrated other threat intelligence research from ThreatGrid and AMP making the OpenDNS offering much more effective.
I have tried out the free version in the past and now running the Umbrella upgrade. This post will cover my experience with both the free and paid Umbrella offering. Continue reading →
Joe Malenfant from the Cisco Talos team wrote a great post summering Cisco’s Advanced Malware Protection AMP (original post found HERE). The focus of the article is going beyond sandbox technology.
A few years ago sandboxing technology really came of age in the security industry. The ability to emulate an environment, detonate a file without risk of infection, and analyze its behavior became quite a handy research tool. Since then, sandboxes have become relatively popular (not nearly on the same scale as anti-virus or firewalls) and can be found in larger organizations. You may even have purchased a sandbox a few years ago, but it’s likely that your malware analysis needs have gone beyond the traditional sandboxing technologies that simply extract suspicious samples, analyze in a local virtual machine, and quarantine. Continue reading →
Thehill.com posted about how the USA Today released documents stating hackers are breaching the Department of Energy (original post found HERE). In summary, hackers infiltrated the Department of Energy’s computer system over 150 times between 2010 and 2014. Continue reading →
I know there are tons of articles on the Ashley Madison madness however a new one posted by Gizmodo is just insane regarding the level of scam. Apparently (according to Gizmodo) men accessing the Ashely Madison website to have an affair were actually talking to a artificial program known as Sensuous Kitte designed to manage fake female accounts. New members would feel like desperate women are reaching out to chat when in fact it was just the automated phantom accounts trying to get men to pay to read their fake email requests. Click here to read more. CRAZY!
San Francisco CBS posted about how hacked baby monitors can be a source for hackers to gain visibility of peoples homes. According to Rapid7 research, “several of the most popular Internet-connected baby monitors lack basic security features, making them vulnerable to even the most basic hacking attempts”. Read about this HERE and make sure to check the security capabilities for any baby monitors in use.
Its a bird … no its a plane … no its the police flying a drone that is about to taser and tear gas you … RUN! Yes this is becoming a reality in North Dakota and possible in a town near you. Inquisitr.com posted a article about how this has been legalized in North Dakota HERE. Below is the article.
Police in North Dakota will soon be able to taser and tear gas people from the comfort of the police station using aerial drones thanks to a new law. The regulation has lawmakers worried that a more “depersonalized” policing strategy will cause problems, others are upset the law will tighten warrant restrictions for using the weaponized drones. Continue reading →
I have been a fan of the gadgets produced by Hak5. For example, you can find a post I wrote on the WIFI Pineapple HERE. I picked up the latest tool from Hak5 known as the LAN Turtle from DEFCON23 and have configured it to auto SSH to a server hosted in the cloud (thanks to Aamir aka DrChaos for the server). This post will cover an overview of the LAN Turtle and how to setup an auto SSH to remotely access the LAN Turtle as well as cloud folder to easily remove data from a target network. Continue reading →