Cisco 2015 Midyear Security Report is now Available

Cisco Security Report

Cisco Systems just released the 2015 Midyear Security Report found HERE. This report provides an overview of major threats observed in the first half of 2015. There are also parts that look at future trends and offers for small, midsize and enterprise organizations. Topics on the latest threats include exploit kits, Microsoft office exploits, malware research, java exploits and so on. Its free to download. Check it out.

Here are some highlights from the report.  Continue reading

VN:F [1.9.22_1171]
Rating: 0.0/5 (0 votes cast)

Talos on Phishing: Hook, Line and Sinker: Catching Unsuspecting Users Off Guard

phishing-attack

Cisco’s research team Talos wrote a interesting article on their research on Phishing. The original post can be found HERE. For those that don’t know what Phishing is, its the cyber attack where a malicious party pretends to be a legitimate source with the goal to trick a victim into clicking a email, accessing a website, or just giving up sensitive data. Here is the Talos article.  Continue reading

VN:F [1.9.22_1171]
Rating: 3.0/5 (1 vote cast)

Cisco ASA 5506 Unboxing and First Look At New ASDM Management

ASAs1I finally received a brand new ASA5506 and thought I would share my experience along with the new FirePOWER ASDM GUI. For those that are not aware of this release or the ASA series, the history goes like this. Cisco released the VPN concentrator and PIX firewall a long time ago. Eventually those technologies were consolidated into the Adaptive Security Appliance (ASA) series of appliances. The smallest 1st generation ASA is the 5505 that has been around for a long time and designed for small offices or home networks (shown in the above picture on the right). Cisco released a new line of ASA appliances known as the X series however didn’t release a replacement for the 5505 until this past March. That replacement is the ASA5506 (the black appliance on the left). Continue reading

VN:F [1.9.22_1171]
Rating: 5.0/5 (2 votes cast)

Breaking SSH, VNC, and other passwords with Kali Linux and Hydra

crackedMy buddy Aamir Lakhani aka drchaos wrote a great post on breaking SSH, VNC and other services. The original post can be found HERE.

Hydra is a very fast and effective network login cracker. It will help you perform brute force attacks against SSH servers, VNC, and other services. When you launch Hydra it will launch the GUI in Kali, however in this tutorial we will use xHydra, which is the command line version of the tool. The command line version of the tool gives you much for flexibility in how to use the tool.

Continue reading

VN:F [1.9.22_1171]
Rating: 0.0/5 (0 votes cast)

4 Million Records Stolen – U.S. Office of Personnel Management Hacked!

www.usnews

According to datalossdb.org, the U.S Department of the Interior, U.S. Office of Personnel Management lost 4 Million records from a massive data breach. Dataloss lists “At least 4 million names, dates and place of birth, Social Security numbers, benefit selections, job assignments, performance ratings and training information of current and former Federal employees compromised by hackers”. USNEWS.com wrote the following article about this breach found below (original post found HERE).  Continue reading

VN:F [1.9.22_1171]
Rating: 0.0/5 (0 votes cast)

Bug will Crash every Apple iOS Device right now

iOS6bugMy buddy drchaos posted about a bug that impacts all iOS devices. The original post can be found HERE. I also added a update on another method to resolve the issue.

An iOS bug has been uncovered that allows potential attackers to send specific rendered text messages that in turn cause Apple iOS devices to crash. It specifically affects iOS version 8.3. When the victim receives the text message, the device either crashes or reboots. Continue reading

VN:F [1.9.22_1171]
Rating: 0.0/5 (0 votes cast)

2015 Verizon Breach Investigation Report (VBIR) Out Now – First Look

verizonreport1

The latest 2015 Verizon Breach Investigation Report (VBIR) is now out and can be downloaded HERE. For those that have not seen these reports, they survey a number of customers and gather information about different types of breaches. It is a trend based report but great data to get an idea of which types of attacks are being seen by different types of businesses. Continue reading

VN:F [1.9.22_1171]
Rating: 0.0/5 (0 votes cast)

Talos Discovery Spotlight: Hundreds of Thousands of Google Apps Domains’ Private WHOIS Information Disclosed

dataleakThe security research team at Cisco known as Talos released a huge discovery of complete hidden whois data attached to more than 282,000 domains registered through the company’s Google Apps for work service. This accounts for around 94% of the addresses Google Apps has registered through a partnership with eNom. The original post can be found HERE. The post was created by Nick Biasini, Alex Chiu, Jaeson Schultz, Craig Williams and William McVey. Continue reading

VN:F [1.9.22_1171]
Rating: 0.0/5 (0 votes cast)