Home Tags Root

Tag: Root

Windows bug used to spread Stuxnet remains world’s most exploited

Code-execution flaw is triggered by plugging a booby-trapped USB into vulnerable PCs.

Linux remote root bug menace: Make sure your servers, PCs, gizmos,...

Ping of pwn: Malicious UDP packets may take over gear A Linux kernel flaw that potentially allows miscreants to remotely control vulnerable servers, desktops, IoT gear, Android handhelds, and more, has been quietly patched.…

Shadow Brokers dump contained Solaris hacking tools

After the Shadow Brokers group opened up its archive of exploits allegedly stolen from the United States National Security Agency, security experts found a nasty surprise waiting for Solaris administrators.The Register reported that the dumped Shadow Broker files reference two programs, EXTREMEPARR and EBBISLAND, that would let attackers obtain root access remotely over the network on Solaris boxes running versions 6 to 10 on x86 and SPARC architectures.To read this article in full or to leave a comment, please click here

Unraveling the Lamberts Toolkit

The Lamberts is a family of sophisticated attack tools that has been used by one or multiple threat actors against high-profile victims since at least 2008.

The arsenal includes network-driven backdoors, several generations of modular backdoors, harvesting tools, and wipers.

Solaris admins! Look out – working remote root exploit leaked in...

x86, Sparc running Solaris 6-10 at risk – and potentially 11 Now that the sulky Shadow Brokers gang has leaked its archive of stolen NSA exploits, security experts are trawling Uncle Sam's classified attack code – and the results aren't good for anyone using Oracle's Solaris.…

VU#921560: Microsoft OLE URL Moniker improperly handles remotely-linked HTA data

Microsoft OLE uses the URL Moniker to open application data based on the server-provided MIME type,which can allow an unauthenticated remote attacker to execute arbitrary code on a vulnerable system.

First high-res look at microbial ballistics: Harpoons, spears, Gatling guns

The weaponry is complicated, savage, and unlike what’s seen in animals.

Smart TV hack embeds attack code into broadcast signal—no access required

Demo exploit is inexpensive, remote, scalable—and opens door to more advanced hacks.

Cisco Patches Critical IOx Vulnerability

Cisco Systems patched a critical vulnerability that could give an attacker root privileges to software running on two of its IoT router models.

Vastly improve your IT security in 2 easy steps

It’s a rough number, but I’d wager that 99 percent of computer security risk in most organizations can be attributed to two root causes: social engineering and unpatched software. I’m not talking about pure numbers of success exploits, but overall impact. Many CISOs and threat intelligence analysts have told me that 100 percent of the biggest events at their company involved social engineering.

Certainly, bad breaks enter your environment through other means, which is why we still need to secure our servers, encrypt our disks, and prevent physical intrusions.

But in terms of the biggest impact, most organizations can tie those events to two root causes.To read this article in full or to leave a comment, please click here

Abandoned calls clog 911 in Dallas and may have led to...

City may be at fault for problem initially blamed on T-Mobile "ghost calls."