Threatpost for B2B

Syndicate content
The First Stop For Security News
Updated: 9 hours 32 min ago

Facebook Open Sources Host Monitoring Tool, Increases Internet Defense Prize

Wed, 10/29/2014 - 12:00
Facebook announced that it has released a host monitoring tool it developed to open source, and that it will increase its Internet Defense Prize payouts to $300,000 in 2015.

Dyreza Banker Trojan Attackers Exploiting CVE-2014-4114 Windows Flaw

Wed, 10/29/2014 - 10:29
The Dyreza Trojan is exploiting the recently disclosed CVE-2014-4114 vulnerability in Windows that was first used by the Sandworm attackers.

BlackEnergy Malware Used in Attacks Against Industrial Control Systems

Wed, 10/29/2014 - 09:25
Attackers are using BlackEnergy malware to attack HMI software running inside industrial control systems, according to an advisory from ICS-CERT.

Cyberespionage: ‘This Isn’t a Problem That Can Be Solved’

Wed, 10/29/2014 - 07:48
The issue of cyberespionage is a thorny one, both technically and politically speaking, but some experts say there may not actually be a solution to the problem.

Four Distinct Watering Hole Attacks Dropping ScanBox Keylogger

Tue, 10/28/2014 - 14:49
PwC has published research on four watering hole attacks likely carried out by different attackers, all connected by the ScanBox JavaScript-based reconnaissance tool.

US-CERT Warns of Dyre Banking Trojan

Tue, 10/28/2014 - 12:09
DHS sounded the alarm Monday on Dyre, the banking Trojan that’s been siphoning bank credentials from large enterprises and major financial institutions.

Russian APT28 Group Linked to NATO, Political Attacks

Tue, 10/28/2014 - 11:23
APT28, a Russian hacking group, has been tied to attacks against the country of Georgia, Eastern European political and military organizations, and NATO, a report from FireEye said.

Government, Industry Focusing on Issue of Resiliency

Tue, 10/28/2014 - 11:05
WASHINGTON–As things stand right now, the United States has no overarching national information security policy or centralized agency responsible for defending the government’s networks in the event of a serious cyberattack. There have been many pushes over the years to change that and put one agency or another at the head of the table, but […]

Infighting, Politics Hampering Cybersecurity Progress in Washington

Tue, 10/28/2014 - 09:03
WASHINGTON–The United States government and private sector are unprepared for a major cyber attack on the country’s critical infrastructure, a former Congressman said, thanks to a divided, risk-averse Congress and an inability for agencies and other organizations to share information effectively. Tom Davis, a former longtime representative from Virginia, said Tuesday that there are a number of challenges that […]

Cyberattacks Most Imminent Threat to U.S., Economy

Tue, 10/28/2014 - 06:38
A round-table consisting of military, government and former NSA officials in Alexandria, Va., on Monday agreed that cyberattacks targeting U.S. critical infrastructure and private industry are an eminent threat.

Shellshock Exploits Targeting SMTP Servers at Webhosts

Mon, 10/27/2014 - 15:18
SANS Internet Storm Center reports attacks against SMTP servers using Shellshock exploits to create a DDoS botnet.

New Koler Variant Spreading Through SMS

Mon, 10/27/2014 - 14:09
A new iteration of the Android ransomware Koler has surfaced that’s propagating through SMS messages.

Samsung Rebuffs Criticism of Knox Crypto, Password Management

Mon, 10/27/2014 - 12:20
Samsung has answered a researcher's critique of alleged encryption and password weaknesses in early version of its Knox technology on Galaxy and Note devices.

NSA-Approved Samsung Knox Stores PIN in Cleartext

Fri, 10/24/2014 - 12:21
A research report claims that Samsung's Knox containers store PIN data in clear text. The report comes shortly after the NSA endorsed Galaxy devices for agency use.

Researcher Finds Tor Exit Node Adding Malware to Binaries

Fri, 10/24/2014 - 11:07
A security researcher has identified a Tor exit node that was actively patching binaries users download, adding malware to the files dynamically. The discovery, experts say, highlights the danger of trusting files downloaded from unknown sources and the potential for attackers to abuse the trust users have in Tor and similar services. Josh Pitts of Leviathan […]

Facebook, Yahoo Curb Identity Theft with New Email Ownership Header

Fri, 10/24/2014 - 09:39
A new SMTP header developed by Facebook and Yahoo confirms ownership of Yahoo email accounts.

NAT-PMP Protocol Vulnerability Puts 1.2 Million SOHO Routers At Risk

Thu, 10/23/2014 - 15:23
More than 1 million SOHO routers and embedded devices are vulnerable to a serious vulnerability in the NAT-PMP protocol that enables traffic hijacking and denial of service attacks.

Malvertising Campaign on Yahoo, AOL, Triggers CryptoWall Infections

Thu, 10/23/2014 - 11:54
Attackers have been leveraging the FlashPack Exploit Kit to peddle CryptoWall 2.0 ransomware on unsuspecting visitors to sites like Yahoo, The Atlantic and AOL.

Cybersecurity Legislation Forecast is Grim

Thu, 10/23/2014 - 09:38
A D.C. insider is pessimistic that we'll see cybersecurity legislation before 2016, pointing toward a number on contributing political and national security factors.

Cisco Patches Three-Year-Old Telnet Remote Code Execution Bug in Security Appliances

Thu, 10/23/2014 - 08:08
There is a severe remote code execution vulnerability in a number of Cisco's security appliances, a bug that was first disclosed nearly three years ago.