(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
 
 
ImageMagick Multiple Heap Buffer Overflow Vulnerabilities
 
Golang Go CVE-2018-16874 Directory Traversal Vulnerability
 

Posted by InfoSec News on Dec 18

https://www.taiwannews.com.tw/en/news/3599182

By Ryan Drillsma
Staff Writer
Taiwan News
2018/12/18

TAIPEI (Taiwan News) -- U.S. think tank Council on Foreign Relations
released its 2019 Preventive Priorities Survey on Dec. 17, which lists
Chinese cyberwarfare and potential conflict across the Taiwan Strait as
top tier possible crises.

The report states threats to the U.S. homeland have been consistently
ranked among top-tier concerns, but...
 

Posted by InfoSec News on Dec 18

https://www.straitstimes.com/asia/se-asia/cimb-denies-security-breach-after-clients-complain-of-hacking

By Nadirah H. Rodzi
The Straits Times
December 18, 2018

Malaysia's second-largest bank CIMB yesterday denied that it suffered a
security breach after several customers complained on social media at the
weekend that their accounts had been hacked.

In a statement, the bank assured its customers that the site remains
secure, and that...
 

Posted by InfoSec News on Dec 18

https://reason.com/blog/2018/12/16/tim-may-influential-writer-on-crypto-ana

By Jim Epstein
Reason.com
Dec. 16, 2018

Tim May, co-founder of the influential Cypherpunks mailing list and a
significant influence on both bitcoin and WikiLeaks, passed away last week
at his home in Corralitos, California. The news was announced Saturday on
a Facebook post written by his friend Lucky Green.

In his influential 1988 essay, "The Crypto Anarchist...
 

Posted by InfoSec News on Dec 18

https://techcrunch.com/2018/12/17/malware-commands-code-twitter-hidden-memes/

By Zack Whittaker
TechCrunch.com
December 17, 2018

Security researchers said they’ve found a new kind of malware that takes
its instructions from code hidden in memes posted to Twitter.

The malware itself is relatively underwhelming: like most primitive remote
access trojans (RATs), the malware quietly infects a vulnerable computer,
takes screenshots and pulls...
 

Posted by InfoSec News on Dec 18

https://www.defenseone.com/technology/2018/12/inspectors-find-big-cyber-vulnerabilities-us-missile-defense-system/153613/

By Patrick Tucker
Technology Editor
Defense One
December 17, 2018

The managers of the nation's missile defense system aren't implementing
basic cybersecurity practices, according to a new inspector report.

Critical cyber vulnerabilities could allow adversaries to undermine the
system of interceptors and sensors...
 

Posted by InfoSec News on Dec 18

https://www.cyberscoop.com/cyber-readiness-institute-supply-chain-cybersecurity-guide/

By Jeff Stone
CYBERSCOOP
DEC 17, 2018

Help is on the way for leaders at small and medium-sized businesses that
have had to contend with cyberthreats that would be a challenge even for
massive firms with multimillion-dollar security budgets.

A program led by alumni of President Barack Obama's cybersecurity
commission was unveiled Monday, offering free...
 
ImageMagick 'ReadDIBImage()' Function Denial of Service Vulnerability
 
Internet Storm Center Infocon Status