Security Talk (144)
News, and Disucssions centered on Security
Friday, 04 February 2022 08:41
New Vulnerability Found that Exposes a Large Number Routers to UPnProxy Attack
Written by Sean Kalinich
Universal Plug and Play UPnP) is one of those technology decisions that make you wonder what people were thinking. The concept is fairly clear, find a way to make things easy for someone to just connect a device to a…
Read 1030 times
Published in
Security Talk
Friday, 04 February 2022 07:29
Apple iOS Privacy Changes take a $10 Billion Chunk Out of Facebook’s Ad Plans.
Written by Sean Kalinich
Facebook makes their money off their users. That is no shock to anyone considering the number of investigations currently ongoing over Facebook’s data collection practices. Of course, Facebook is not the only group collecting this type of information, they just…
Read 691 times
Published in
Security Talk
Thursday, 03 February 2022 06:59
Microsoft Identifies New and Improved UpdateAgent macOS Malware
Written by Sean Kalinich
Microsoft’s Threat Intelligence team has recently disclosed their discovery and analysis of a new malware family. The malware in question is being tracked as a Trojan named UpdateAgent. The team has been watching as it progressed from a simple information…
Read 810 times
Published in
Security Talk
Wednesday, 02 February 2022 13:41
SolarWinds Supply Chain Attack is the Gift that Keeps on Giving for Security Research
Written by Sean Kalinich
The SolarWinds supply chain attack was and still is one of the most complex and ingenious attacks that has come to light. How it was discovered is also an interesting topic for another conversation. The attack group in question is…
Read 1444 times
Published in
Security Talk
Wednesday, 02 February 2022 09:41
23 vulnerabilities found in UEFI firmware used across multiple vendors
Written by Sean Kalinich
We first talked about the using the UEFI firmware as an attack vector (At Def Con 22 in 2014). Since that time there have been three identified and disclosed versions of malware that directly targeted this critical subsystem. That would…
Read 627 times
Published in
Security Talk
Tuesday, 01 February 2022 10:39
Device Fingerprinting Takes a Step Forward as the GPU Becomes the Focus
Written by Sean Kalinich
Tracking users and devices as they browse the web is a common thing these days and has been for many years. The technology has evolved from the original tracking cookie to some of the more advanced methods in use now,…
Read 506 times
Published in
Security Talk
Tuesday, 01 February 2022 07:24
Just When You Thought It Was Safe to Samba Again, New Vulnerability Allows Remote Code Execution
Written by Sean Kalinich
Samba has released several updates that patch critical flaws in their popular Sever Message Block (SMB) freeware implementation. SMB is a protocol that allows for simple sharing of network resources and has had its share of critical vulnerabilities in the…
Read 732 times
Published in
Security Talk
Monday, 31 January 2022 14:49
New Apps Allow Retrieval of Deleted Message for Users of WhatsApp on Android
Written by Sean Kalinich
WhatsApp is one of a group of relatively secure messaging services available to both iPhone and Android users. WhatsApp states that it supports full end-to-end encryption, secure deletion of messages (by the sender and receiver) as well as the option…
Read 515 times
Published in
Security Talk
Monday, 31 January 2022 12:16
Direct Carrier Billing Scam Apps Nab 105 Million Users on Mobile Devices
Written by Sean Kalinich
Scammers and threat groups are nothing if not creative. They have time and quite a bit of talent on their hands to figure out ways around security features and gateways to get what they want. Take the recent discovery of…
Read 594 times
Published in
Security Talk
Monday, 31 January 2022 07:59
MFA App on Google Play Store Used to Install Banking Malware
Written by Sean Kalinich
Mobile device security is not where is should be. There is just no way around this fact. The vas majority of people simple download and install an app on their phone or tablet thinking that they are not going to…
Read 654 times
Published in
Security Talk
Friday, 28 January 2022 09:30
Security Awareness Training Versus Security Culture Building
Written by Sean Kalinich
We have all opened our emails and seen the message “you have annual security awareness training assigned”. This message is one that usually elicits eye-rolls and groans of frustration. Who wouldn’t be annoyed? After all, these trainings are simplistic, boring…
Read 524 times
Published in
Security Talk
Yesterday Apple released several patches for their different operating systems. One that we have talked about before is a core bug in Apple’s WebKit based Safari. This bug could potentially leak personal information regardless of the privacy settings you had…
Read 987 times
Published in
Security Talk
Friday, 28 January 2022 06:55
Meta works to add security to messenger that should have been there
Written by Sean Kalinich
Metabook has announced some new security features in their messenger app and platform. Many of these are items that competing SMS/MMS applications and services already have, but Meta knows that they need are now facing some solid competition, so they…
Read 624 times
Published in
Security Talk
Thursday, 27 January 2022 08:52
Phishing Campaign Leverages New Technique to Evade Detection
Written by Sean Kalinich
Researchers at Morphisec have detailed a new delivery type for AsyncRAT (Remote Access Trojan) used in part of a phishing campaign that has been running since at least September 2021. The phishing part of the campaign is routine, an email…
Read 655 times
Published in
Security Talk
Wednesday, 26 January 2022 15:11
IAG Prophet Spider Targeting VMWare Horizon Servers Via Log4J Vulnerability
Written by Sean Kalinich
A shell for me, a shell for you, a shell for everybody in the room. If you have not heard about Log4J and the associated vulnerabilities in versions between 2.0 and 2.16 you might have not been near a computer…
Read 638 times
Published in
Security Talk
Wednesday, 26 January 2022 12:09
Bug in Safari Used in Watering Hole attack on macOS devices in Asia.
Written by Sean Kalinich
When you are hunting, finding out where your target frequents and laying in wait is an often-used tactic. If your information is good, you are going to have a successful hunt. The same is true in cybersecurity, both from an…
Read 582 times
Published in
Security Talk
Page 8 of 9