Saturday, January 31, 2015

Threatpost News Wrap, January 30, 2015 Secure Hunter

Dennis Fisher and Mike Mimoso discuss the Ghost glibc vulnerability and its repercussions, the Apple iOS and OSX patches, the link between the Regin APT platform and the NSA. Plus Super Bowl predictions!

Threatpost | The first stop for security news

Secure Hunter Anti -Malware



The post Threatpost News Wrap, January 30, 2015 Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1yj6Sau

Secure Hunter

Friday, January 30, 2015

Thursday, January 29, 2015

ZeroAccess Botnet Returns, Resumes Click-Fraud Activity Secure Hunter

Long thought dead, the peer-to-peer (P2P) ZeroAccess botnet has resurfaced and as of just a few weeks ago, has returned to propagating click-fraud scams.

Threatpost | The first stop for security news

Secure Hunter Anti -Malware



The post ZeroAccess Botnet Returns, Resumes Click-Fraud Activity Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1zb1vOM

Secure Hunter

Wednesday, January 28, 2015

Of Ghost glibc Vulnerability Patching and Exploits Secure Hunter

Experts urge system administrators to patch the Ghost vulnerability in glibc immediately, but counter that as well that exploiting the bug may be challenging.

Threatpost | The first stop for security news

Secure Hunter Anti -Malware



The post Of Ghost glibc Vulnerability Patching and Exploits Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1z4IfCw

Secure Hunter

Tuesday, January 27, 2015

Analysis of Flash Zero Day Shows Layers of Obfuscation Secure Hunter

The Flash zero day that made its way into the Angler exploit kit was wrapped in multiple layers of obfuscation and has the ability to inject its malicious payload straight into users’ browsers. In the last week, since the news broke of the Adobe Flash zero-day flaw appearing in the Angler kit, security researchers have […]

Threatpost | The first stop for security news

Secure Hunter Anti -Malware



The post Analysis of Flash Zero Day Shows Layers of Obfuscation Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1D6ojOu

Secure Hunter

Researchers Link Regin to Malware Disclosed in Recent Snowden Documents Secure Hunter

Kaspersky Lab has found shared code and functionality between the Regin malware platform and a keylogger described in recently disclosed Snowden documents.

Threatpost | The first stop for security news

Secure Hunter Anti -Malware



The post Researchers Link Regin to Malware Disclosed in Recent Snowden Documents Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1uXBm5Y

Secure Hunter

Friday, January 23, 2015

Threatpost News Wrap, January 23, 2015 Secure Hunter

Dennis Fisher and Mike Mimoso talk about all of the zero days that were dropped this week on Adobe and Apple, the Oracle backdoor drama and the upcoming Kaspersky Security Analyst Summit in Cancun. Then, Dennis calls Brian Donohue to talk about the wonders of the Blackhat movie and Brian’s dog makes a special appearance, too!

Threatpost | The first stop for security news

Secure Hunter Anti -Malware



The post Threatpost News Wrap, January 23, 2015 Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/15yiUEV

Secure Hunter

System Center Endpoint Protection support for Windows Server 2003

From July 14, 2015, Windows Server 2003 will cease to be a supported operating system. From this date Windows Server 2003 customers will no longer receive:



  • Definition updates for System Center Endpoint Protection and Forefront Endpoint Protection

  • Free or paid assisted support options

  • Online technical content updates

  • Security updates


We recommend finalizing your Windows Server migration plans today. Our research in the Security Intelligence Report Volume 17 has shown some of risks associated with unsupported operating systems.


The following links have more information about the end of support for Windows Server 2003:



  • System Center Configuration Manager blog: System Center Endpoint Protection support for Windows Server 2003

  • Windows Server 2003 end of support


MMPC





Microsoft Malware Protection Center

Secure Hunter Anti -Malware



The post System Center Endpoint Protection support for Windows Server 2003 appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1yZYtOC

Secure Hunter

Thursday, January 22, 2015

Details on Regin Malware Modules Disclosed Secure Hunter

Researchers at Kaspersky Lab today released a detailed analysis of two modules belonging to the Regin malware platform, one for lateral movement, the other a backdoor.

Threatpost | The first stop for security news

Secure Hunter Anti -Malware



The post Details on Regin Malware Modules Disclosed Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1uA1LGK

Secure Hunter

Wednesday, January 21, 2015

Like a Nesting Doll, Vawtrak Malware Has Many Layers Secure Hunter

Researchers have peeled back more layers on Vawtrak, a relatively new banking Trojan so complex that those who have taken it apart have likened it to a Matryoshka, or Russian nesting doll.

Threatpost | The first stop for security news

Secure Hunter Anti -Malware



The post Like a Nesting Doll, Vawtrak Malware Has Many Layers Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1yO9geU

Secure Hunter

Wednesday, January 14, 2015

Skeleton Key Malware Opens Door to Espionage Secure Hunter

The Skeleton Key malware bypasses single-factor authentication on Active Directory domain controllers and paves the way to stealthy cyberespionage.

Threatpost | The first stop for security news

Secure Hunter Anti -Malware



The post Skeleton Key Malware Opens Door to Espionage Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1E0ULTA

Secure Hunter

Tuesday, January 13, 2015

Gitrob Combs Github Repositories for Secret Company Data Secure Hunter

Gitrob, an open source intelligence tool, helps security analysts search Github organization repositories for files not meant for public consumption.

Threatpost | The first stop for security news

Secure Hunter Anti -Malware



The post Gitrob Combs Github Repositories for Secret Company Data Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/14Tenxe

Secure Hunter

Thursday, January 8, 2015

Users Report Malicious Ads in Skype Secure Hunter

Some Skype users have reported seeing malicious ads inside their Skype clients in recent days that lead to a site that tries to download a fake Adobe or Java update.

Threatpost | The first stop for security news

Secure Hunter Anti -Malware



The post Users Report Malicious Ads in Skype Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1Ayd8k3

Secure Hunter

New Emomet Variant Targets Banking, Email Credentials Secure Hunter

Security researchers are tracking a new version of the Emomet malware that is targeting users’ banking credentials and also has the ability to steal email usernames and passwords, which are then used to send spam from compromised accounts. The new variant of Emomet has mostly been seen targeting users in Germany, but researchers at Microsoft […]

Threatpost | The first stop for security news

Secure Hunter Anti -Malware



The post New Emomet Variant Targets Banking, Email Credentials Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1tN6E9B

Secure Hunter

Wednesday, January 7, 2015

Dridex Banking Trojan Spreading Via Office Macros Secure Hunter

Spam campaigns in the U.K. are using Office macros to spread the Dridex banking Trojan, researchers at Trustwave report.

Threatpost | The first stop for security news

Secure Hunter Anti -Malware



The post Dridex Banking Trojan Spreading Via Office Macros Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1HPYPZ2

Secure Hunter

Inside Cryptowall 2.0 Ransomware Secure Hunter

An analysis of Cryptowall 2.0 reveals that the ransomware relies on complex encryption routines and sandbox detection capabilities to survive. It also uses Tor for command and control, and can execute on 32- and 64-bit systems.

Threatpost | The first stop for security news

Secure Hunter Anti -Malware



The post Inside Cryptowall 2.0 Ransomware Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1xEwNwj

Secure Hunter

Monday, January 5, 2015