Temporal Based Intelligence
Jared's Network and Security Blog
  • Home
  • Telecom Corner
  • About
  • Contact
  • Donate
  • Site Index
  • Links

New VMware Vulnerabilities

November 22, 2017 Jared Hall General No Comments

VMware  has fixed critical vulnerabilities, releasing these versions: Horizon View Client 4.6.1,  Workstation Pro 12.5.8, Workstation Player 12.5.8, Fusion Pro / Fusion 8.5.9. These address issues ranging from Client O/S being able to run commands on the Host O/S, crashing Client VMs (Virtual Machines), and unprivileged users crashing their VMs.  Note that Workstation 14.X and Fusion 10.X versions […]

More

Microsoft Security Bulletin: Quakbot and Emotet Trojans

November 22, 2017 Jared Hall General No Comments

Earlier this month, Microsoft released a security bulletin with comprehensive information about the Quakbot and Emotet Banking Trojans. They release their own variant of this malware’s Kill Chain: To guard against this problem, Microsoft has two solutions; (1) Use Advanced Threat Protection (ATP) with Office 365/Exchange Online email services, and (2) Activate the Windows Defender […]

More

Patch Tuesday: November 2017

November 22, 2017 Jared Hall General No Comments

Microsoft’s Patch Tuesday for this month includes 53 updates.  There are four Zero-Days fixed, although no known exploits for these exist in the wild. CVE-2017-8700 (ASP.NET Core information disclosure) CVE-2017-11827 (Microsoft browser memory corruption) CVE-2017-11848 (Internet Explorer information disclosure) CVE-2017-11883 (ASP.NET Core denial of service) The Dot.Net fixes always present some challenges for business customers. […]

More

Intel AMT/ME, MINIX, and NSA’s HAP

November 17, 2017 Jared Hall General, Spy vs. Spy No Comments

MINIX (Mini-Unix) is a micro-kernel O/S based upon the AT&T’s 1979 release of Unix Version 7.  It was developed by Andrew Tanenbaum in 1987 for use on PC platforms.  Version 7 is significantly older than AT&T’s Unix System 5 Release 3/Release 4 variants that are the basis for most Unix, Linux, and BSD systems today.  However, […]

More

Top Attacking Countries: October 2017

November 15, 2017 Jared Hall General No Comments

The top three countries countries are Russia, United States, and China. Russia remains at #1. China moved back up to #3. September 2017’s report can be found here.

More

Exploiting Virtual Machines with RAM Row-Hammer Attacks

November 15, 2017 Jared Hall General No Comments

A “Row-hammer” attack exploits a physical problem that exists in RAM where an attacker can actually cause bit-flips in DRAM memory.  This has already been exploited and attacks successfully gained kernel privileges.  Researchers have taken this a step further and, by exploiting a Host kernel feature known as “memory de-duplication”, can flip bits in a controller […]

More

BOLO: IcedID Banking Trojan/Emotet Trojan

November 14, 2017 Jared Hall BOLOs No Comments

A unique banking trojan called IcedID is hitting businesses throughout the US and Canada. In most implementations, IcedID is being bundled with another Trojan called Emotet and delivered via spam Email of infected Word documents. What makes IcedID unusual is that it propagates through a business network.  It sets up a Command and Control channel […]

More

The Cyber Kill-Chain: Revisited

November 12, 2017 Jared Hall General No Comments

The Nay Sayers Trolling through articles released this week, I came across a review of Lockheed Martin’s “Cyber Kill Chain” that was written by CSO Online: https://www.csoonline.com/article/2134037/cyber-attacks-espionage/strategic-planning-erm-the-practicality-of-the-cyber-kill-chain-approach-to-security.html on 11/7/2017.    I found the article to be somewhat disingenuous.  The CSO Online article was more of a rehash of a Dark Reading article: https://www.darkreading.com/attacks-breaches/deconstructing-the-cyber-kill-chain/a/d-id/1317542? written on 11/18/2014.  “We’re not afraid to […]

More

Office 365: Lackluster Anti-Spam/Malware Performance

November 10, 2017 Jared Hall General No Comments

I came across this article in Dark Reading: https://www.darkreading.com/cloud/office-365-missed-34000-phishing-emails-last-month/d/d-id/1330282? As indicated in the post, this is based on the standard Exchange Online Protection (EOP) services offered by Microsoft, not Advanced Threat Protection (ATP). I currently run two manage much smaller Email systems for two ESPs.  I’ve always worried about anti-spam measures, trying to be effective, without too […]

More

Oh Brother (printers): Denial-Of-Service

November 9, 2017 Jared Hall General No Comments

Brother printers that are connected to a network are vulnerable to a Denial-Of-Service (DOS) attack through the printer’s embedded web server (called “Debut”). Of course, the attacker must have the ability to access the printer’s Web Server. No Brother printer should be exposed to the Internet.  You should also put Brother printers on their own […]

More

< 1 2 3 4 5 >»

Tools & Downloads

Download Center

Categories

Good Reads (PDF)

Recent Posts

  • Secure Your Amazon S3 Buckets
  • It’s almost too easy
  • Tech Support Scams
  • Apple Fixes Critically Stupid Error in High Sierra
  • Update Your Dahua NVR & IP Cameras

Donate

$
Select Payment Method
Personal Info

Donation Total: $20.00

Privacy & Cookies: This site uses cookies. By continuing, you agree to their use. Read our privacy policy here Cookie Policy

↑

  • Home
  • Telecom Corner
  • About
  • Contact
  • Donate
  • Site Index
  • Links
Temporal Based Intelligence © 2017