Week 6 In Review – 2015

Resources

  • OWASP Proactive Controls – owasp.org
    This document was written by developers for developers, to assist those new to secure development. It aims to guide developers and other software development professionals down the path of secure web application software development.
  • Anthem-From the Desk of CEO To Members – anthemfacts.com
    Anthem was the target of a very sophisticated external cyber attack. Based on what they know now, there is no evidence that credit card or medical information were targeted or compromised.

Tools

  • AirPcap Channel Hopping With Python – blog.didierstevens.com
    Didier Stevens is teaching a Wireshark WiFi and Lua 2-day class at Brucon Spring Training 2015. He made a modification to his Python program to do channel hopping with the AirPcap adapter. You can download it from here.
  • Nscan: Fast Internet Wide Scanner – pythonforpentesting.com
    Nscan is a fast Network scanner optimized for internet-wide scanning purposes and inspired by Masscan and Zmap. It has it’s own tiny TCP/IP stack and uses Raw sockets to send TCP SYN probes. You can download from here.

Vendor/Software patches

  • Adobe Begins Patching Third Flash Player Zero Day – threatpost.com
    Adobe announced today that it will begin distributing a patch for the third and most recent zero-day vulnerability in Flash Player.

    • Yet Another Flash Patch Fixes Zero-Day Flaw – krebsonsecurity.com
      For the third time in two weeks, Adobe has issued an emergency security update for its Flash Player software to fix a dangerous zero-day vulnerability that hackers already are exploiting to launch drive-by download attacks.
  • Microsoft Packing More CVEs into Fewer Security Bulletins – tripwire.com
    On the second (and sometimes fourth) Tuesday of every month, Microsoft releases a unique set of security bulletins that provide patches for a range of new Common Vulnerabilities and Exposures (CVEs). The VERT team’s research underscores Tripwire’s commitment to understanding how Patch Tuesday, as well as the field of information security more generally, is changing.

Vulnerabilities

  • Exploiting “BadIRET” vulnerability (CVE-2014-9322, Linux kernel privilege escalation) – labs.bromium.com
    We have seen neither a public exploit nor a detailed discussion about the issue. In this post Rafal Wojtczuk will try to explain the nature of the vulnerability and the exploitation steps as clearly as possible.
  • Pawn Storm Update: iOS Espionage App Found – blog.trendmicro.com
    In TrendLabs continued research on Operation Pawn Storm, they found one interesting poisoned pawn—spyware specifically designed for espionage on iOS devices. While spyware targeting Apple users is highly notable by itself, this particular spyware is also involved in a targeted attack.
  • Beemer, Open Thyself! – Security vulnerabilities in BMW’s ConnectedDrive – heise.de
    Cars with built-in modems are sending data to their manufacturers – German motorist’s club ADAC wanted to know what exactly gets sent. c’t connected ADAC with a specialist who analysed the data transmissions, using the example of BMW’s ConnectedDrive technology. He discovered security vulnerabilities that even allow unauthorised attackers to open the vehicles.

Other News

  • NIST Framework: Is It a Success? – bankinfosecurity.com
    It’s been nearly a year since the framework was unveiled. So it’s time for NIST to quickly develop the metrics to measure the framework efficacy. Framework users need a way to know if it’s truly effective.
2017-03-12T17:39:25-07:00 February 9th, 2015|Security Tools, Security Vulnerabilities, Vendor News, Week in Review|1 Comment

One Comment

  1. Week 6 In Review – 2015 | infopunk.org February 9, 2015 at 5:00 pm

    […] post Week 6 In Review – 2015 appeared first on Infosec […]

Leave A Comment