Tuesday, May 21, 2019
SANS ISC

ISC StormCast for Tuesday, May 21st 2019

MSFT RDP Vulnerability (#BlueKeep) Update https://twitter.com/search?q=%23bluekeepSharepoint Exploited https://isc.sans.edu/forums/diary/CVE20190604+Attack/24952/Risks of JWT
SANS ISC

ISC StormCast for Monday, May 20th 2019

Google Analyzes Vendor Response to 0-Day Exploits https://googleprojectzero.blogspot.com/p/0day.htmlASUS WebStorage Abused
SANS ISC

ISC StormCast for Friday, May 17th 2019

The Risk of Authenticated Vulnerability Scans https://isc.sans.edu/forums/diary/The+Risk+of+Authenticated+Vulnerability+Scans/24942/ARIN Revokes about 735,000
SANS ISC

ISC StormCast for Thursday, May 16th 2019

Forbes Website Infected by Magecart https://twitter.com/bad_packets/status/1128517905765683201Malware Randomizes TLS Ciphers https://blogs.akamai.com/sitr/2019/05/bots-tampering-with-tls-to-avoid-detection.htmlGoogle
SANS ISC

ISC StormCast for Wednesday, May 15th 2019

New Intel CPU Vulnerabilitieshttps://cpu.fail/Microsoft Patch Tuesdayhttps://isc.sans.edu/forums/diary/Microsoft+May+2019+Patch+Tuesday/24934/Apple Updateshttps://support.apple.com/en-us/HT201222Broken Trustsealhttps://twitter.com/gwillem/status/1127890329175244800https://twitter.com/bestoftheweb/status/1128036593208524800
SANS ISC

ISC StormCast for Tuesday, May 14th 2019

Linux Remote Code Execution When Closing TCP Sockets https://github.com/torvalds/linux/commit/cb66ddd156203daefb8d71158036b27b0e2caf63WhatsApp Buffer
SANS ISC

ISC StormCast for Monday, May 13th 2019

DSSuite - A Docker Container with Didier's Tools https://isc.sans.edu/forums/diary/DSSuite+A+Docker+Container+with+Didiers+Tools/24926/Sqlite3 Vulnerability
SANS ISC

ISC StormCast for Friday, May 10th 2019

US DHS Warns of North Korean ELECTRICFISH Malware https://www.us-cert.gov/ncas/analysis-reports/AR19-129AFake KeePass
SANS ISC

ISC StormCast for Thursday, May 9th 2019

EMail Roulette May 2019 https://isc.sans.edu/forums/diary/Email+roulette+May+2019/24918/Turla Lightneuron https://www.welivesecurity.com/wp-content/uploads/2019/05/ESET-LightNeuron.pdfAlpine Linux Docker Image
SANS ISC

ISC StormCast for Wednesday, May 8th 2019

Jenkins Exploit Mines Cryptocurrencies https://isc.sans.edu/forums/diary/Vulnerable+Apache+Jenkins+exploited+in+the+wild/24916/Confluence Vulnerablity Exploited to Delivery Cryptocurrency
SANS ISC

ISC StormCast for Tuesday, May 7th 2019

Decoding UTF-16 in UDF Files https://isc.sans.edu/forums/diary/Text+and+TNULeNULxNULtNUL/24912/VMWare Fusion 11 Guest VM
SANS ISC

ISC StormCast for Monday, May 6th 2019

Git Ransomware https://www.theregister.co.uk/2019/05/03/git_ransomware_bitcoin/DLink Ransomware Patch https://eu.dlink.com/de/de/support/support-news/2019/february/28/dns320_trojan_cr1pttorJenkins Plugin Vulnerabilities https://www.nccgroup.trust/uk/about-us/newsroom-and-events/blogs/2019/may/story-of-a-hundred-vulnerable-jenkins-plugins/Malicious WPAD
SANS ISC

ISC StormCast for Friday, May 3rd 2019

New SAP Exploits Used to Target Exposed https://www.onapsis.com/10kblazeCisco Patches SSH
SANS ISC

ISC StormCast for Thursday, May 2nd 2019

RCE Vulnerability in Dell Support Assist https://d4stiny.github.io/Remote-Code-Execution-on-most-Dell-computers/Creston Multiple Vulnerabilities https://www.crestron.com/en-US/Security/Security_AdvisoriesPolymorphic
SANS ISC

ISC StormCast for Wednesday, May 1st 2019

Sodinokibi Ransomware Exploits WebLogic Server Vulnerability https://blog.talosintelligence.com/2019/04/sodinokibi-ransomware-exploits-weblogic.htmlFacebook Leaking Sellers Exact
Tripwire

HawkEye Attack Wave Sends Stolen Data to Another Keylogger Provider

A recent attack wave involving HawkEye malware sends data stolen from its victims to another keylogger provider’s website. On 21 May, My Online Security came across a new sample of HawkEye. The actual delivery mechanism itself wasn’t unique compared...

Washington Issues Temporary License to Huawei

Washington Issues Temporary License to Huawei The US government has issued a temporary license to Huawei and its affiliates, allowing American companies to supply the telecoms and handset giant until August. Despite reports emerging over the weekend of various chipmakers...
isBuzz

GDPR: The Best Strategy For International Businesses

The EU’s General Data Protection Regulation (GDPR) was created with the aim of homogenising data privacy laws across the EU. GDPR also applies to organisations outside the EU, if they monitor EU data subjects, or offer goods and services...
IBM Security

How Cyber-Secure Are Business Travelers? New Report Says Not Very

I travel frequently for business — to industry conferences such as RSA Conference and Black Hat and meeting with clients. Whenever I travel, I bring my work laptop, my personal cellphone enabled with work email and calendar, and, of...

Haas F1 team leans on service providers as security force multipliers

If today’s cars are smartphones on wheels, then race cars are supercomputers with engines attached. As the fastest racing sport in the world, Formula One cars come laden with over 100 sensors measuring every aspect of a car’s internal...