BF-SIRT Newsletter 2015-05

Welcome to another edition of the newsletter! This week we cover things such as The GHOST Vulnerability and a story from Brian Krebs about “Spreading the Disease and Selling the Cure”. We also have some stories such as a report on how Insider threats change security spending and how China sets new regulations for foreign tech companies.

Top 5 Security links
The GHOST Vulnerability
Thousands of US Gas Stations Vulnerable to Remote Hacks
Spreading the Disease and Selling the Cure
Silk Road paid thousands in shake-downs from malicious hackers
The Internet of Dangerous Things

Top 5 Business Intelligence links
Insider threats changing security spending, report says
Dating site buys back 20 million hacked email addresses
China sets new regulations for foreign tech companies
FBI: Businesses Lost $215M to Email Scams
CTB-Locker ransomware variant being distributed in spam campaign

BF-SIRT Newsletter 2015-04

Welcome to another edition of the newsletter! This week we cover things such as Cisco’s annual report which goes through how
spammers sneak small botnets under the wire and that companies are not patching security vulnerabilities. We also cover how NSA hacked North Korea with custom malware long before Sony breach and that a story on what helped Sony’s hackers break in.

Oracle also released critical updates for their application suites, and Adobe updated their Flash player to fix a critical vulnerability.

Top 5 Security links
How Was Your Credit Card Stolen?
Root Password Found in Ceragon Microwave Bridges
2014 in infosec: Spammers sneak small botnets under the wire, Java is dull
NSA hacked North Korea with custom malware long before Sony breach
Details on Regin Malware Modules Disclosed

Top 5 Business Intelligence links
Here’s What Helped Sony’s Hackers Break In: Zero-Day Vulnerability
Report: Companies Still Not Patching Security Vulnerabilities
U.S. and U.K. to team up in cyber defense exercises
Holes in Progressive Dongle Could Lead to Car Hacks
SoShabby GoDaddy flings patch at domain hijack hole

BF-SIRT Newsletter 2015-03

Welcome to another edition of the newsletter! This week we cover things such as how “Another Lizard Arrested, Lizard Lair Hacked” and “How a $10 USB Charger Can Record Your Keystrokes Over the Air”. We also have some information about an “Open source tool that trawls Github repositories for sensitive data” as well as a white paper from Puppetlabs called “How Quickly Can You Respond to Software Vulnerability Announcements?”.

Top 5 Security links
Inside North Korea’s Naenara Browser
Another Lizard Arrested, Lizard Lair Hacked
Malware coders adopt DevOps to target smut sites
Hong Kong SWC attack
How a $10 USB Charger Can Record Your Keystrokes Over the Air

Top 5 Business Intelligence links
How Quickly Can You Respond to Software Vulnerability Announcements?
19,000 French websites hit by DDoS, defaced in wake of terror attack
Over 930M Android users in danger as Google stops delivering critical patches
Attackers planting banking Trojans in industrial systems
Open source tool trawls Github repositories for sensitive data

Basefarm Blog posts
Patch Tuesday January 2015

Patch Tuesday January 2015

Another month, another patch Tuesday!

Microsoft has released eight updates to address vulnerabilities in Microsoft Windows.

Adobe has released security updates to address multiple vulnerabilities in Flash Player.

Some of these vulnerabilities could allow elevation of privilege, denial of service, remote code execution, or security feature bypass that allows an attacker to take control of the affected system. It is advised to upgrade as soon as possible.

More information:
Microsoft
Adobe

BF-SIRT Newsletter 2015-02

Welcome back to the newsletter! This week we cover the big events from the Christmas holidays. One of the top news during the holidays were the Lizard Squad’s attack on Sony’s and Microsoft’s online gaming services. Other big news were how Ukrainian Hackers Leak Russian Interior Ministry Docs with ‘Evidence’ of Russian Invasion and that Scandinavian banks were hit with DDoS attacks. Krebs also made about about Who’s Attacking Whom? Realtime Attack Trackers which are interesting to have a look at.

Top 5 Security links
USBDriveby Device Can Install Backdoor, Override DNS Settings in Seconds
Ukrainian Hackers Leak Russian Interior Ministry Docs with ‘Evidence’ of Russian Invasion
Majority of 4G USB Modems, SIM Cards Exploitable
Who’s Attacking Whom? Realtime Attack Trackers
Thunderstrike — Infecting Apple MacBooks with EFI Bootkit via Thunderbolt Ports

Top 5 Business Intelligence links
Tens of millions of dollars, credit cards and intellectual property stolen by a new group of cyber criminals
Scandinavian banks hit with DDoS attacks
Social engineering will ramp up in 2015
For North Korea’s cyber army, long-term target may be telecoms, utility grids
Bots account for more than half of all 2014 web traffic, report shows