Hackin9
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
 

In case you missed it. In the US there has been a ruling that mobile phone searches require a warrant. This may have some implications for those of you that are forensically inclined.  Some articles can be found here: 

  • http://www.smh.com.au/technology/sci-tech/warrant-needed-for-mobile-phone-search-us-20140626-zsm5b.html
  • http://guardianlv.com/2014/06/mobile-phones-protected-by-fourth-amendment/

Regards

Mark H

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
 

If you have log records or packets for traffic from this particular subnet.  If you have anything you can share I'd appreciate it.  

Likely what you will have is DNS open resolver checks, as well as SSH bruteforce pwd guessing attacks. I'm interested in those as well as anything else from this subnet. 

Regards

Mark H - markh.isc (at) gmail.com

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
 
Startup Le Tote is hoping to gain an edge in the world of online retail with a Netflix-like shopping platform for women who want to add new pieces to their wardrobes without buying them.
 
The German government is reportedly dropping Verizon Communications as a service provider because of worries about U.S. spying.
 
Catching up with Apple, Google is setting the stage for device makers to release 64-bit smartphones and tablets with the Android L operating system.
 
Samba DNS Protocol Handling Denial of Service Vulnerability
 
Samba CVE-2014-3493 Memory Corruption Vulnerability
 
When it comes to big data, many enterprises are getting slammed with big problems. Google plans to focus on helping those companies over the next year.
 
If it weren't enough of a challenge for IT architects and system managers to glue enterprise systems together, they must also now worry about connecting their systems to mobile and Web applications as well.
 
Salesforce.com is teaming up with Philips to develop a software platform to connect patients with health care in a much faster and easier way than is usually possible today.
 
In Google's vision of the future, tablets will provide a 3D view of the world and smartphones will have uses that haven't been thought of yet.
 
The Digital Advertising Alliance, a consortium of advertising trade groups, will roll out two new apps later this year aimed at giving mobile device users a choice of what ads they see.
 
Microsoft blew it Tuesday when its Exchange Online hosted email service went dark and the company made no effort to explain what was going on to customers.
 
Android Wear, the 'L' operating system and Android auto -- those were just some of the announcements from this year's Google I/O. Which do you think was most important?
 
Hardly content to rest on its laurels, Amazon is adding clients in the government, education and nonprofit sectors, vying for public-sector contracts and looking to build its apps marketplace into a research and development hub.
 
Apple today cut prices of its iPod Touch as sales of that device and others in the iPod lineup have plummeted.
 
Smart thermostat maker Nest Labs plans to soon start sharing some customer data with Google, its corporate parent, and that means the search engine giant will have to address users' privacy concerns as it expands into home automation.
 
Google has begun removing search results in compliance with a European court ruling that search engine providers must respond to requests to delete links to outdated information about a person.
 
As the dwindling number of IPv4 addresses starts to cause problems for organizations around the world, the time has come to roll out IPv6 on a larger scale, according to the chief of the regional Internet registry in the Asia-Pacific region.
 
IBM WebSphere Application Server CVE-2014-0857 Unspecified Information Disclosure Vulnerability
 
IBM WebSphere Application Server CVE-2014-0823 Arbitrary File Disclosure Vulnerability
 

A zero-day vulnerability in the popular TimThumb plugin for WordPress leaves many websites vulnerable to exploits that allow unauthorized attackers to execute malicious code, security researchers have warned.

The vulnerability, which was disclosed Tuesday on the Full Disclosure mailing list, affects WordPress sites that have TimThumb installed with the webshot option enabled. Fortunately, it is disabled by default, and sites that are hosted on WordPress.com are also not susceptible. Still, at press time, there was no patch for the remote-code execution hole. People who are unsure if their WordPress-enabled site is vulnerable should open the timthumb file inside their theme or plugin directory, search for the text string "WEBSHOT_ENABLED," and ensure that it's set to false.

When "WEBSHOT_ENABLED" is set to true, attackers can create or delete files and execute a variety of other commands, Daniel Cid, CTO of security firm Sucuri, warned in a blog post published Thursday. He said uploading a file to a vulnerable site was possible using URLs such as the following, where a.txt was the file being created:

Read 1 remaining paragraphs | Comments

 
D-link DSL-2760U-E1 Router 'dhcpinfo.html' HTML Injection Vulnerability
 
 
Linux Kernel 'control.c' File Use After Free Memory Corruption Vulnerability
 
Linux Kernel Multiple Local Security Bypass Vulnerabilities
 
Multiple Asterisk Products CVE-2014-4046 Remote Privilege Escalation Vulnerability
 
AlienVault OSSIM CVE-2014-3805 Multiple Unspecified Remote Code Execution Vulnerabilities
 
Python CGIHTTPServer Module Path Separators Handling Information Disclosure Vulnerability
 
A new jailbreak for Apple's iOS software that uses confidential information intended only for security researchers could develop into a more sinister attack, according to security analysts.
 
Google has begun removing search results in compliance with a European court ruling that search engine providers must respond to requests to delete links to outdated information about a person.
 
There's a new industrial revolution in the offing that will rely heavily on Internet of Things technologies, the cloud and low-cost design and fabrication tools.
 
New smartphones with curved displays were the target of a joke by Foxconn Technology Group's CEO, who mocked the products from Foxconn's Korean rivals as devices designed to fit people's rear ends.
 
A European bank may have lost as much as $682,000 in a week earlier this year, according to Kaspersky Lab, which analyzed data on a server used in attacks against online banking users in Italy and Turkey.
 
Yo is a flash in the pan of an app that lets you say 'Yo' to your followers. That's it. Is it curmudgeonly to wonder how that could draw $1.2 million in funding?
 
Piwigo 'picture_modify.php' SQL Injection Vulnerability
 

Posted by InfoSec News on Jun 26

http://www.eweek.com/security/third-party-service-providers-scrutinized-after-seas-reuters-hack.html

By Robert Lemos
eWEEK.com
2014-06-25

One content provider's lapse in spotting the odd behavior of privileged
users allowed the Syrian Electronic Army cyber-propaganda group to deface
Reuters.com.

As popular cyber-attack targets continue to make progress in locking down
access to their networks and data, attackers searching for other...
 

Posted by InfoSec News on Jun 26

http://www.infosecnews.org/want-to-know-the-wifi-password-for-the-brasil-world-cup-security-center/

By William Knowles
Senior Editor
InfoSec News
June 24, 2014

(Updated – June 26, 2014) The password and WiFi SSID for the World Cup’s
security center were exposed after a photograph appeared n the online
version of Correio Braziliense.

Luiz Cravo Dorea, head of international cooperation at the Federal Police
is standing in the main...
 

Posted by InfoSec News on Jun 26

http://www.wired.com/2014/06/hospital-networks-leaking-data/

By Kim Zetter
Threat Level
Wired.com
06.25.14

Two researchers examining the security of hospital networks have found
many of them leak valuable information to the internet, leaving critical
systems and equipment vulnerable to hacking.

The data, which in some cases enumerates every computer and device on a
hospital’s internal network, would allow hackers to easily locate and map...
 

Posted by InfoSec News on Jun 26

http://www.zdnet.com/hackonomics-cybercrimes-cost-to-business-7000030908/

By Violet Blue
Zero Day
ZDNet News
June 25, 2014

They say "crime pays" -- but we can be certain the paychecks for
cybercrime come right out of the pockets of every business with a digital
footprint.

In March, Juniper Networks and RAND Corporation released Hackonomics: A
First-of-Its-Kind Economic Analysis of the Cyber Black Markets; its
conclusion that the...
 

Posted by InfoSec News on Jun 26

http://www.bankinfosecurity.com/ffiec-cybersecurity-assessments-begin-a-6988

By Jeffrey Roman
Bank Info Security
June 24, 2014

The Federal Financial Institutions Examination Council has started its
cybersecurity assessment pilot program, which will examine more than 500
community banking institutions. Plus, the council has launched a Web page
dedicated to cybersecurity information.

The pilot program is slated to run through July, says...
 
Xen CVE-2014-3968 Denial of Service Vulnerability
 
Internet Storm Center Infocon Status