Information Security News
In case you missed it. In the US there has been a ruling that mobile phone searches require a warrant. This may have some implications for those of you that are forensically inclined. Some articles can be found here:
Mark H(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
If you have log records or packets for traffic from this particular subnet. If you have anything you can share I'd appreciate it.
Likely what you will have is DNS open resolver checks, as well as SSH bruteforce pwd guessing attacks. I'm interested in those as well as anything else from this subnet.
Mark H - markh.isc (at) gmail.com(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
A zero-day vulnerability in the popular TimThumb plugin for WordPress leaves many websites vulnerable to exploits that allow unauthorized attackers to execute malicious code, security researchers have warned.
The vulnerability, which was disclosed Tuesday on the Full Disclosure mailing list, affects WordPress sites that have TimThumb installed with the webshot option enabled. Fortunately, it is disabled by default, and sites that are hosted on WordPress.com are also not susceptible. Still, at press time, there was no patch for the remote-code execution hole. People who are unsure if their WordPress-enabled site is vulnerable should open the timthumb file inside their theme or plugin directory, search for the text string "WEBSHOT_ENABLED," and ensure that it's set to false.
When "WEBSHOT_ENABLED" is set to true, attackers can create or delete files and execute a variety of other commands, Daniel Cid, CTO of security firm Sucuri, warned in a blog post published Thursday. He said uploading a file to a vulnerable site was possible using URLs such as the following, where a.txt was the file being created:
Posted by InfoSec News on Jun 26http://www.eweek.com/security/third-party-service-providers-scrutinized-after-seas-reuters-hack.html
Posted by InfoSec News on Jun 26http://www.infosecnews.org/want-to-know-the-wifi-password-for-the-brasil-world-cup-security-center/
Posted by InfoSec News on Jun 26http://www.wired.com/2014/06/hospital-networks-leaking-data/
Posted by InfoSec News on Jun 26http://www.zdnet.com/hackonomics-cybercrimes-cost-to-business-7000030908/
Posted by InfoSec News on Jun 26http://www.bankinfosecurity.com/ffiec-cybersecurity-assessments-begin-a-6988