17 C
Friday, September 22, 2017
Home Tags Internet Protocol (IP)

Tag: Internet Protocol (IP)

Epic intellectual property battle: San Diego Comic-Con versus Sal Lake Comic Con.
Infected Avast tool's payload went after the likes of Microsoft, Intel and Cisco, hit 20 targets Cisco's Talos security limb Talos has probed the malware-laden CCleaner utility that Avast so kindly gave to the world and has concluded it's purpose was to create secondary attacks that attempted to penetrate top technology companies.

Talos also thinks the malware may have succeeded in delivering a payload to targeted companies.…
My first novel is out today! Here's an excerpt.
Avast's recent acquisition spreads a backdoor signed with its own certificate.
BBC News equipping its fleet of newsgathering trucks and fly-aways with Newtecrsquo;s multiservice broadcast solutionLONDON, U.K., and SINT-NIKLAAS, Belgium, 13 September 2017. Newtec – a specialist in designing, developing and manufacturing equipment and technologies for satellite communications – today announced its Newtec Dialogreg; multiservice platform is being used by BBC News for its provision of IP connectivity over satellite.Newtec Dialog will allow the BBCrsquo;s news team to deploy mobile solutions capable of transmitting video, voice,... Source: RealWire
Thanks for using Asterisk. Your call is transparent to us, so stay on the line to get p0wned One of the Asterisk bugs published last week is worse than first thought: Enable Security warns it exposes the popular IP telephony system to stream injection and interception without an attacker holding a man-in-the-middle position.…
Relinquish your IP or lose one of the world's largest markets China's new cybersecurity law will enable its government to discover potential security vulnerabilities of any company doing business in the country, threat intelligence firm Recorded Future warns.…
IP telephony server discloses three vulns, one critical. You know what to do next Admins of the popular IP telephony application Asterisk have a lovely end to the week ahead of them - there's two moderate vulnerabilities, and one critical mess, that need patches.…

Introducing WhiteBear

As a part of our Kaspersky APT Intelligence Reporting subscription, customers received an update in mid-February 2017 on some interesting APT activity that we called WhiteBear.
It is a parallel project or second stage of the Skipper Turla cluster of activity documented in another private report. Like previous Turla activity, WhiteBear leverages compromised websites and hijacked satellite connections for command and control (C2) infrastructure.
Itrsquo;s never good news when your workloads, data, or both get hacked in a public cloud.

Fortunately, itrsquo;s something that rarely occurs.

But as workloads and data sets on the public clouds become more numerous, such a hack could occur.The best way to recover from an attack, aka a hack, is to remain calm and follow these simple rules.[ What is cloud computing? Everything you need to know now. | Also: InfoWorldrsquo;s David Linthicum explains how to move into a cloud career from traditional IT. ]What do if your public cloud is hacked Do shut down the machine instances as quickly as you can. Irsquo;m often taken aback by the number of admins who keep compromised systems up and running.

Chances are that the hackers have not yet culled all your data, so you can stop further damage by taking those systems down quickly. Do contact your provider right away. It typically has automated procedures to lock things down for you, and even locate the source of the attack. Do review your security policies and security tools, at your first opportunity. Something fell through the cracks, and most breaches that I see are due to human error. While itrsquo;s fresh in your mind, itrsquo;s time to do some self-discovery to ensure something like this does not happen again.

Even if this specific breach was the cloud providerrsquo;s fault, the next time it could be your faultmdash;so use the incident to review what you control. Do contact those whose information may have been compromised. The days of keeping breaches to yourself are long over.
If Social Security numbers or credit card data has been compromised, the owners need to be contacted so they can watch for fraud.
If itrsquo;s personally identifiable information (PII) or other protected data, you need to contact your regulatory authority as well. What not to do if your public cloud is hacked Donrsquo;t try to combat the hackers with a counterattack. Shut the systems down first, remove the IP addresses, and then figure out what happened. Retaliation is a macho thing that Irsquo;ve seen occur in the last few yearsmdash;donrsquo;t go there.
Itrsquo;s not a street fight.
Irsquo;ve even seen companies that were attacked launch counter-DDOS attacks at the offending IP addresses. Not smart.
In the long run, yoursquo;ll just waste more time and money, and possibly open yourself to a full-on vendetta attack. Donrsquo;t make rash decisions about rehosting. These days, many companies move to the cloud because their on-premises systems got hacked.
If cloud-based systems are hacked, I suspect wersquo;ll hear a lot of people say, “Wersquo;re heading back to the enterprise data center.” The grass is always greener, and you need to thoroughly think through such a move. Huge and expensive rehosting decisions could turn into huge and expensive mistakes.  Donrsquo;t play the blame game. Although itrsquo;s tempting to call people out who you view as responsible, that almost never delivers the outcome yoursquo;re seeking. Donrsquo;t overexplain. Among the great many mistakes Irsquo;ve seen included a company sending out press releases, where one would have done the trick.

The public will view such overexplaining as a weakness, and many will assume yoursquo;re hiding something in the deluge of explanationsmdash;that yoursquo;re fast-talking. Make your points and be done with it. To read this article in full or to leave a comment, please click here
Move over, IoT.

Attackers are abusing a new widely used platform to knock out sites.
Andrei Iascu has enforced patents for TiVo and Immersion Corp.