Home Tags Packet

Tag: Packet

Dridex: A History of Evolution

In the several years that the Dridex family has existed, there have been numerous unsuccessful attempts to block the botnetrsquo;s activity.

The ongoing evolution of the malware demonstrates that the cybercriminals are not about to bid farewell to their brainchild, which is providing them with a steady revenue stream.

Cisco TelePresence ICMP Denial of Service Vulnerability

A vulnerability in the ICMP ingress packet processing of Cisco TelePresence Collaboration Endpoint (CE) Software could allow an unauthenticated, remote attacker to cause the TelePresence endpoint to reload unexpectedly, resulting i...

Use of DNS Tunneling for C&C Communications

Often, virus writers don't even bother to run encryption or mask their communications. However, you do get the occasional off-the-wall approaches that don't fall into either of the categories.

Take, for instance, the case of a Trojan that Kaspersky Lab researchers discovered in mid-March and which establishes a DNS tunnel for communication with the C&C server.

SDN dilemma: Linux kernel networking vs. kernel bypass

Sujal Das is chief strategy and marketing officer at Netronome, a provider of high-performance x86 co-processing solutions for networking, security, load balancing, virtualization, and SDN.If we've learned anything in the technology business in the last 25 years, it would be to never underestimate the Linux kernel. Why, then, have so many networking companies been so eager to bypass the Linux kernel -- or more specifically, the Linux kernel networking stack? What could be so wrong with the networking packet arteries in the Linux kernel that motivates so many of us to bypass them?To read this article in full or to leave a comment, please click here

Inmates built computers hidden in ceiling, connected them to prison network

Ohio prison's lax supervision was akin to "an episode from Hogan's Heroes."

VU#600671: PCAUSA Rawether for Windows local privilege escalation

PCAUSA's Rawether framework does not properly validate BPF data,allowing a crafted malicious BPF program to perform operations on memory outside of its typical bounds on the driver's receipt of network packets.

This vulnerability may be exploited to perform local privilege escalation on Windows systems.

Sterlite Tech’s Elitecore BSS with Digital Commerce Customer Management Platform is...

- Enables CSPs to offer services online and manage complete customer lifecycle digitallyMWC, Barcelona, Spain: March 2, 2017:- Sterlite Technologies’ Telecom Software Division – Elitecore, a global IT product and service provider of pre-integrated BSS, Packet-Core and Carrier Wi-Fi solution, is pleased to announce that its BSS with Digital Commerce and Customer Management (DCCM) Platform is declared ‘Nominee’ in TM Forum Excellence Awards 2017 for Outstanding Contribution to Enabling Improved Customer Centricity.TM Forum compliant Elitecore... Source: RealWire

Breaking The Weakest Link Of The Strongest Chain

Around July last year, more than a 100 Israeli servicemen were hit by a cunning threat actor.

The attack compromised their devices and exfiltrated data to the attackers’ C&C.
In addition, the compromised devices were pushed Trojan updates.

The operation remains active at the time of writing this post.

HPE acquires security startup Niara to boost its ClearPass portfolio

Hewlett Packard Enterprise has acquired Niara, a startup that uses machine learning and big data analytics on enterprise packet streams and log streams to detect and protect customers from advanced cyberattacks that have penetrated perimeter defenses.The financial terms of the deal were not disclosed.[ Download the InfoWorld quick guide: Learn to crunch big data with R. | Sign up for InfoWorld's Big Data Report to stay atop all the latest news and developments in the field. ]Operating in the User and Entity Behavior Analytics (UEBA) market, Niara’s technology starts by automatically establishing baseline characteristics for all users and devices across the enterprise and then looking for anomalous, inconsistent activities that may indicate a security threat, Keerti Melkote, senior vice president and general manager of HPE Aruba and cofounder of Aruba Networks, wrote in a blog post on Wednesday.To read this article in full or to leave a comment, please click here

Aricent Announces Availability of its Industry-Leading Intelligent Switching Solution to Support...

The latest release of the Aricent Intelligent Switching Solution (ISS) is now available on the Marvell Prestera 98DX323x, 98DX333x, 98DX325x and 98DX83xx chipsets to power next-generation service delivery networksREDWOOD CITY, California - January 31, ...

FCC exempts small ISPs from broadband truth-in-billing rules

Rule requiring disclosure of hidden fees won't benefit customers of small ISPs.

Cisco TelePresence control software had remote-exploitable bug

Cisco's collaborationware is a mess: that WebEx bug also hit Firefox and IE Cisco has turned up a packet fragmentation issue in its TelePresence Multipoint Control Unit software that opens up a denial-of-service and remote code execution vulnerability.…