Author Archives: CIRT Team



CIRT Team

in News Clipping

Experts spotted Triada Trojan in firmware of low-cost Android smartphones [securityaffairs]

Another case of pre-installed malware make the headlines, malware researchers at the Russian anti-virus firm Dr.Web have spotted the Triada Trojan in the firmware of several low-cost Android smartphones, including Leagoo M5 Plus, Leagoo M8, Nomu S10, and Nomu S20. Experts speculate that threat actors compromised the supply chain infecting a small number of smartphones of the above models.

0
01 Aug 2017
in News Clipping

More Than 120,000 Internet Connected Cameras Can Be Easily Hacked [vice]

The researcher found that two cameras from Chinese gadget maker Shenzhen Neo Electronic have vulnerabilities that allow hackers to remotely access their video stream, or take full control of the cameras, opening up the possibility that someone could amass an an Internet of Things botnet of around 150,000 devices. Alex Balan, a researcher at security firm Bitdefender who found the flaw, told Motherboard that he...

Read More

0
01 Aug 2017
in Security Advisories & Alerts

Security Fixes for Google Chrome

Description: Google chrome before version 60.0.3112.78 for Windows, Mac, and Linux has multiple vulnerabilities that, if exploited, may allow an attacker to take control of an affected system. Impact: Attackers can exploit these issues to take control of an affected system. Mitigation: Updates are available. Please check specific vendor advisory for more information. Reference URL’s: https://chromereleases.googleblog.com/2017/07/stable-channel-update-for-desktop.html

0
31 Jul 2017
in Security Advisories & Alerts

CVE-2017-8572 Microsoft Office Outlook Information Disclosure Vulnerability

Description:  An information disclosure vulnerability exists when Microsoft Office improperly discloses the contents of its memory. To exploit the vulnerability, an attacker could craft a special document file and then convince the user to open it. An attacker must know the memory address location where the object was created. Impact: An attacker who exploited the vulnerability could use the information to compromise the user’s computer...

Read More

0
31 Jul 2017
in Security Advisories & Alerts

CVE-2017-8663 Microsoft Office Outlook Memory Corruption Vulnerability

Description:  A remote code execution vulnerability exists in the way that Microsoft Outlook parses specially crafted email messages Impact: An attacker who successfully exploited the vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Mitigation: Updates are available. Please check specific vendor advisory for more information. Reference...

Read More

0
31 Jul 2017
in News Clipping

Phishers’ techniques and behaviours, and what to do if you’ve been phished [helpnetsecurity]

Once a user has been phished, how long does it take for the phishers to misuse the stolen credentials? To discover the answer to that question and many others, Imperva researchers went undercover by creating 90 personal online accounts, including email and file sharing accounts with Google and Dropbox. Once the so-called honey pot accounts were active, the researchers deployed techniques to lure in the...

Read More

0
30 Jul 2017
Page 111 of 134« First...102030...109110111112113...120130...Last »