Security,US-CERT Alerts category: ta16-187a-symantec-and-norton-security-products-contain-critical-vulnerabilitiesta16-187a-symantec-and-norton-security-products-contain-critical-vulnerabilities slugTA16-187A: Symantec and Norton Security Products Contain Critical Vulnerabilities title

filed undedr submitted by admin authoron July 5, 2016 date thumbnail

< ![CDATA[ Original release date: July 05, 2016 Systems Affected All Symantec and Norton branded antivirus products Overview Symantec and Norton branded antivirus products contain multiple vulnerabilities. Some of these products are in widespread use throughout government and industry. Exploitation of these vulnerabilities could allow a remote attacker to take control of an affected system. […]

excerpt


Security,US-CERT Alerts category: ta16-144a-wpad-name-collision-vulnerabilityta16-144a-wpad-name-collision-vulnerability slugTA16-144A: WPAD Name Collision Vulnerability title

filed undedr submitted by admin authoron May 23, 2016 date thumbnail

< ![CDATA[ Original release date: May 23, 2016 | Last revised: June 01, 2016 Systems Affected Windows, OS X, Linux systems, and web browsers with WPAD enabled Networks using unregistered or unreserved TLDs Overview Web Proxy Auto-Discovery (WPAD) Domain Name System (DNS) queries that are intended for resolution on private or enterprise DNS servers have […]

excerpt


Security,US-CERT Alerts category: ta16-132a-exploitation-of-sap-business-applicationsta16-132a-exploitation-of-sap-business-applications slugTA16-132A: Exploitation of SAP Business Applications title

filed undedr submitted by admin authoron May 11, 2016 date thumbnail

< ![CDATA[ Original release date: May 11, 2016 Systems Affected Outdated or misconfigured SAP systems Overview At least 36 organizations worldwide are affected by an SAP vulnerability [1]. Security researchers from Onapsis discovered indicators of exploitation against these organizations’ SAP business applications. The observed indicators relate to the abuse of the Invoker Servlet, a built-in […]

excerpt


Security,US-CERT Alerts category: ta16-105a-apple-ends-support-for-quicktime-for-windows-new-vulnerabilities-announcedta16-105a-apple-ends-support-for-quicktime-for-windows-new-vulnerabilities-announced slugTA16-105A: Apple Ends Support for QuickTime for Windows; New Vulnerabilities Announced title

filed undedr submitted by admin authoron April 14, 2016 date thumbnail

< ![CDATA[ Original release date: April 14, 2016 Systems Affected Microsoft Windows with Apple QuickTime installed Overview According to Trend Micro, Apple will no longer be providing security updates for QuickTime for Windows, leaving this software vulnerable to exploitation. [1] Description All software products have a lifecycle. Apple will no longer be providing security updates […]

excerpt


Security,US-CERT Alerts category: ta16-091a-ransomware-and-recent-variantsta16-091a-ransomware-and-recent-variants slugTA16-091A: Ransomware and Recent Variants title

filed undedr submitted by admin authoron March 31, 2016 date thumbnail

< ![CDATA[ Original release date: March 31, 2016 | Last revised: July 11, 2016 Systems Affected Networked Systems Overview In early 2016, destructive ransomware variants such as Locky and Samas were observed infecting computers belonging to individuals and businesses, which included healthcare facilities and hospitals worldwide. Ransomware is a type of malicious software that infects […]

excerpt


Security category: no-ads-pac-fileno-ads-pac-file slugNo-Ads PAC file. title

filed undedr submitted by mjameshall authoron December 28, 2015 date thumbnail

AC file rather than the HOSTS file to block ads

excerpt


Security,US-CERT Alerts category: ta15-337a-dorkbotta15-337a-dorkbot slugTA15-337A: Dorkbot title

filed undedr submitted by admin authoron December 3, 2015 date thumbnail

< ![CDATA[ Original release date: December 03, 2015 Systems Affected Microsoft Windows Overview Dorkbot is a botnet used to steal online payment, participate in distributed denial-of-service (DDoS) attacks, and deliver other types of malware to victims’ computers. According to Microsoft, the family of malware used in this botnet “has infected more than one million personal […]

excerpt


Security,US-CERT Alerts category: ta15-314a-compromised-web-servers-and-web-shells-threat-awareness-and-guidanceta15-314a-compromised-web-servers-and-web-shells-threat-awareness-and-guidance slugTA15-314A: Compromised Web Servers and Web Shells – Threat Awareness and Guidance title

filed undedr submitted by admin authoron November 10, 2015 date thumbnail

< ![CDATA[ Original release date: November 10, 2015 | Last revised: November 13, 2015 Systems Affected Compromised web servers with malicious web shells installed Overview This alert describes the frequent use of web shells as an exploitation vector. Web shells can be used to obtain unauthorized access and can lead to wider network compromise. This […]

excerpt


Security,US-CERT Alerts category: ta15-286a-dridex-p2p-malwareta15-286a-dridex-p2p-malware slugTA15-286A: Dridex P2P Malware title

filed undedr submitted by admin authoron October 13, 2015 date thumbnail

< ![CDATA[ Original release date: October 13, 2015 | Last revised: October 15, 2015 Systems Affected Microsoft Windows Overview Dridex, a peer-to-peer (P2P) bank credential-stealing malware, uses a decentralized network infrastructure of compromised personal computers and web servers to execute command-and-control (C2). The United States Department of Homeland Security (DHS), in collaboration with the Federal […]

excerpt


Uncategorized category: ta15-240a-controlling-outbound-dns-accessta15-240a-controlling-outbound-dns-access slugTA15-240A: Controlling Outbound DNS Access title

filed undedr submitted by admin authoron August 28, 2015 date thumbnail

< ![CDATA[ Original release date: August 28, 2015 | Last revised: August 30, 2015 Systems Affected Networked systems Overview US-CERT has observed an increase in Domain Name System (DNS) traffic from client systems within internal networks to publically hosted DNS servers. Direct client access to Internet DNS servers, rather than controlled access through enterprise DNS […]

excerpt


« Newer PostsOlder Posts »
index.php