Wednesday, April 19, 2017

Shadow Brokers return with more cyberweapons, including previously patched Windows exploits

Security Digest
Information security news and advice from TechTarget's network | April 19, 2017
TechTarget
FEATURED STORY
Shadow Brokers' Windows exploits target unsupported systems
by Michael Heller, Senior Reporter

A new release of NSA cyberweapons falls flat as Windows exploits from the Shadow Brokers have mostly been patched, but unsupported systems still at risk. (SearchSecurity.com)

Advertisement
NEWS
 
Shadow Brokers release SWIFT banking and Windows exploits

The Shadow Brokers released another cache of cyberweapons linked to the Equation Group, including Windows exploits and attack details for the SWIFT banking system. (SearchSecurity.com)

 
U.S. election hacking not an act of cyberwarfare, experts say

The government needs a better definition for an act of cyberwarfare, says ex-CIA Director Michael Hayden, because he doesn't think the U.S. election hacking applies. (SearchCloudSecurity.com)

 
DARPA's SSITH program takes aim at hardware vulnerabilities
News roundup: DARPA's SSITH program tackles hardware vulnerabilities for better security. Plus, new risks placed in OWASP Top 10, SWIFT launches new anti-fraud tool, and more. (SearchSecurity.com)
 
 
 

CLDAP reflection attacks may be the next big DDoS technique

Security researchers discovered a new reflection attack method using CLDAP that can be used to generate destructive but efficient DDoS campaigns. (SearchSecurity.com)

 
Symantec CA woes debated by browser community
Compliance with CA/B Forum Baseline Requirements was debated after Symantec CA posted responses to 14 issues raised by Mozilla developers. (SearchCloudSecurity.com)
 
Risk & Repeat: Juniper's Kevin Walker on SDN security challenges
In this episode of SearchSecurity's Risk & Repeat podcast, Kevin Walker, Juniper Networks' security chief technology and strategy officer, talks about SDN security challenges. (SearchSecurity.com)
 
 
 
EXPERT ADVICE
 
Preparing enterprise systems for the scriptless Linux exploit

The scriptless Linux exploit deviates from usual methods that security tools recognize as attacks. Expert Nick Lewis explains how the exploit works and how to prevent it. (SearchSecurity.com)

 
How to detect and mitigate malicious content from the cloud
Malicious content hosted in the cloud is more common than you might think. Expert Ed Moyle looks at what enterprises need to know about cloud malware and how to stop it. (SearchCloudSecurity.com)
 
 
 
 

Enterprise SSO: The promise and the challenges ahead

It was inevitable that enterprise SSO would encounter the cloud. Learn how to adjust your company's approach to single sign-on so it keeps working well. (SearchCloudSecurity.com)

 
How does the PoisonTap exploit bypass password locks on computers?

The PoisonTap exploit can bypass password locks on computers, enabling an attacker to remotely control systems. Expert Nick Lewis explains how the attack works. (SearchSecurity.com)

 
About This E-Newsletter
This e-newsletter is published by the TechTarget network. To unsubscribe from Security Digest, click here. Please note, this will not affect any other subscriptions you have signed up for.

TechTarget Security Media Group, 275 Grove Street, Newton, MA 02466. Contact: webmaster@techtarget.com

Copyright 2017 TechTarget. All rights reserved.
TechTarget

No comments: