Linked InFacebookEmail me

Security,US-CERT Alerts: ta16-187a-symantec-and-norton-security-products-contain-critical-vulnerabilitiesta16-187a-symantec-and-norton-security-products-contain-critical-vulnerabilities TA16-187A: Symantec and Norton Security Products Contain Critical Vulnerabilities

submitted by admin on July 5, 2016

< ![CDATA[ Original release date: July 05, 2016 Systems Affected All Symantec and Norton branded antivirus products Overview Symantec and Norton branded antivirus products contain multiple vulnerabilities. Some of these products are in widespread use throughout government and industry. Exploitation of these vulnerabilities could allow a remote attacker to take control of an affected system. […]

Security,US-CERT Alerts: ta16-144a-wpad-name-collision-vulnerabilityta16-144a-wpad-name-collision-vulnerability TA16-144A: WPAD Name Collision Vulnerability

submitted by admin on May 23, 2016

< ![CDATA[ Original release date: May 23, 2016 | Last revised: June 01, 2016 Systems Affected Windows, OS X, Linux systems, and web browsers with WPAD enabled Networks using unregistered or unreserved TLDs Overview Web Proxy Auto-Discovery (WPAD) Domain Name System (DNS) queries that are intended for resolution on private or enterprise DNS servers have […]

Security,US-CERT Alerts: ta16-132a-exploitation-of-sap-business-applicationsta16-132a-exploitation-of-sap-business-applications TA16-132A: Exploitation of SAP Business Applications

submitted by admin on May 11, 2016

< ![CDATA[ Original release date: May 11, 2016 Systems Affected Outdated or misconfigured SAP systems Overview At least 36 organizations worldwide are affected by an SAP vulnerability [1]. Security researchers from Onapsis discovered indicators of exploitation against these organizations’ SAP business applications. The observed indicators relate to the abuse of the Invoker Servlet, a built-in […]

Security,US-CERT Alerts: ta16-105a-apple-ends-support-for-quicktime-for-windows-new-vulnerabilities-announcedta16-105a-apple-ends-support-for-quicktime-for-windows-new-vulnerabilities-announced TA16-105A: Apple Ends Support for QuickTime for Windows; New Vulnerabilities Announced

submitted by admin on April 14, 2016

< ![CDATA[ Original release date: April 14, 2016 Systems Affected Microsoft Windows with Apple QuickTime installed Overview According to Trend Micro, Apple will no longer be providing security updates for QuickTime for Windows, leaving this software vulnerable to exploitation. [1] Description All software products have a lifecycle. Apple will no longer be providing security updates […]

Security,US-CERT Alerts: ta16-091a-ransomware-and-recent-variantsta16-091a-ransomware-and-recent-variants TA16-091A: Ransomware and Recent Variants

submitted by admin on March 31, 2016

< ![CDATA[ Original release date: March 31, 2016 | Last revised: July 11, 2016 Systems Affected Networked Systems Overview In early 2016, destructive ransomware variants such as Locky and Samas were observed infecting computers belonging to individuals and businesses, which included healthcare facilities and hospitals worldwide. Ransomware is a type of malicious software that infects […]

Security: no-ads-pac-fileno-ads-pac-file No-Ads PAC file.

submitted by mjameshall on December 28, 2015

AC file rather than the HOSTS file to block ads

Security,US-CERT Alerts: ta15-337a-dorkbotta15-337a-dorkbot TA15-337A: Dorkbot

submitted by admin on December 3, 2015

< ![CDATA[ Original release date: December 03, 2015 Systems Affected Microsoft Windows Overview Dorkbot is a botnet used to steal online payment, participate in distributed denial-of-service (DDoS) attacks, and deliver other types of malware to victims’ computers. According to Microsoft, the family of malware used in this botnet “has infected more than one million personal […]

Security,US-CERT Alerts: ta15-314a-compromised-web-servers-and-web-shells-threat-awareness-and-guidanceta15-314a-compromised-web-servers-and-web-shells-threat-awareness-and-guidance TA15-314A: Compromised Web Servers and Web Shells – Threat Awareness and Guidance

submitted by admin on November 10, 2015

< ![CDATA[ Original release date: November 10, 2015 | Last revised: November 13, 2015 Systems Affected Compromised web servers with malicious web shells installed Overview This alert describes the frequent use of web shells as an exploitation vector. Web shells can be used to obtain unauthorized access and can lead to wider network compromise. This […]

Security,US-CERT Alerts: ta15-286a-dridex-p2p-malwareta15-286a-dridex-p2p-malware TA15-286A: Dridex P2P Malware

submitted by admin on October 13, 2015

< ![CDATA[ Original release date: October 13, 2015 | Last revised: October 15, 2015 Systems Affected Microsoft Windows Overview Dridex, a peer-to-peer (P2P) bank credential-stealing malware, uses a decentralized network infrastructure of compromised personal computers and web servers to execute command-and-control (C2). The United States Department of Homeland Security (DHS), in collaboration with the Federal […]

Uncategorized: ta15-240a-controlling-outbound-dns-accessta15-240a-controlling-outbound-dns-access TA15-240A: Controlling Outbound DNS Access

submitted by admin on August 28, 2015

< ![CDATA[ Original release date: August 28, 2015 | Last revised: August 30, 2015 Systems Affected Networked systems Overview US-CERT has observed an increase in Domain Name System (DNS) traffic from client systems within internal networks to publically hosted DNS servers. Direct client access to Internet DNS servers, rather than controlled access through enterprise DNS […]

« Newer PostsOlder Posts »


See my Resume, BIO, Bravos, Awards, Letters of Recomendations and Publication.


Check out my security and non-security applications that I developed.

Security Blog

Ill Post great news, tidbits and other security related items - plus more!