Threat Level: green Handler on Duty: Xavier Mertens

SANS ISC: Information Security News - SANS Internet Storm Center Information Security News


Sign Up for Free!   Forgot Password?
Log In or Sign Up for Free!

Popular News

20 hours ago Botnet of >145k cameras reportedly deliver Internet's biggest DDoS ever

ArsTechnica View Synopsis+1
Once unthinkable, 1 terabit attacks may soon be the new normal.

20 hours ago D-Link DWR-932 B owner? Trash it, says security bug-hunter

The Register View Synopsis+1
More than 20 vulns in SOHOpeless LTE gateway

If you've got a D-Link DWR-932 B LTE router, you might want to fire it into the sun - or hope that a firmware upgrade lands soon.

12 hours ago Yahoo attack not 'state-sponsored,' researchers claim

ZDNet View Synopsis+1
InfoArmor says that not only was customer data sold in the underground, but the damage is far more extensive than reported.

14 hours ago Brandis swings his golden hammer, misses mark

ZDNet View Synopsis+1
Criminalising the re-identification of de-identified government data will hinder legitimate researchers and do nothing to improve citizens' privacy.

14 hours ago Clinton vows to retaliate against foreign hackers

Yahoo Security View Synopsis+1

Hillary Clinton is vowing anew to respond to foreign hacking the same as any other attack against the United States. When she openly blamed Russia for recent U.S. cyber break-ins, Donald Trump wondered ...

Top News

10 hours ago All Your iMessage Contacts Are Belong to Apple

SecurityWeek View Synopsis+1

Apple can't tap into iMessage conversations, thanks to end-to-end encryption, but the iPhone maker does know who you message or attempt to message with.

9 hours ago Security: It might not be the outside world that's the largest threat to businesses

TechRepublic View Synopsis+1
A new report reveals that one in three businesses experienced an insider attack in the past year. More devices with more access are putting sensitive info in the hands of everyone: Spies included.

8 hours ago Hacked IoT Devices Unleash Record DDoS Mayhem

InfoRiskToday View Synopsis+1
Firepower Fueled by Vulnerable Internet of Things DevicesVulnerable internet-connected devices have been unwittingly drafted into electronic battle for DDoS attacks that have escalated to a new intensity in recent weeks.

2 hours ago PORTKnockOut: Data Exfiltration via Port Knocking over UDP

SANS Reading Room View Synopsis+1
Data Exfiltration is arguably the most important target for a security researcher to identify. The seemingly endless breaches of major corporations are done via channels of various stealth, and an endless array of methods exist to communicate the data to remote endpoints while bypassing Intrusion Detection Systems, Intrusion Prevention Systems, firewalls, and proxies. This research examines a novel way to perform this data exfiltration, utilizing port knocking over User Datagram Protocol. It focuses specifically on the ease at which this can be done, the relatively low signal to noise ratio of the resultant traffic, and the plausible deniability of receiving the exfiltration data. Particular attention is spent on an implemented Proof of Concept, while the complete source code may be found in the Appendix.

Latest News

31 minutes ago Why Won't Trump Blame the DNC Hack on Russia?

Yahoo Security View Synopsis+1
After FBI Director Jim Comey warned a congressional panel on Wednesday that hackers are "poking around" voter-registration systems in various states, law-enforcement officials told CNN that the U.S. suspects Russian involvement. ABC News reported that nearly half of U.S. states have come under cyberattack from hackers affiliated with Russia, which helps explain Comey's comment during Wednesday's hearing that the FBI is looking into "just what mischief is Russia up to in connection with our election."

43 minutes ago 'Syrian Electronic Army' goon extradited from Germany now coughs to hacking, extortion

The Register View Synopsis+1
His crime boss The Shadow remains at large

An associate of the self-styled Syrian Electronic Army has been sentenced to five years in an American prison for his part in running a cyber extortion scheme against businesses around the world.

1 hour ago U.S. to open new vetting agency for 'secret' security clearances

Yahoo Security View Synopsis+1
By Mark Hosenball WASHINGTON (Reuters) - The U.S. government will open the doors next week to a new agency, with stronger data protections, meant to shorten by many weeks the time it takes to vet government workers seeking "secret" and "top secret" security clearances. The National Background Investigations Bureau will be headed by Charles Phalen, who has worked as a security executive at the CIA, the FBI and defense contractor Northrop Grumman, officials said on Thursday on a conference call with reporters. The bureau will replace an Office of Personnel Management (OPM) clearance system that was hit by hackers who stole potentially sensitive personal data on as many as 22 million people, including government employees and job applicants.

2 hours ago Microsoft sees rise in number of secret data requests

ZDNet View Synopsis+1
The number of classified data demands remained about the same but covered a larger number of user accounts.

3 hours ago Dridex Banking Trojan Adopts Improved Encryption

SecurityWeek View Synopsis+1

The infamous Dridex banking Trojan has adopted new tactics and more advanced encryption and obfuscation to better avoid detection and to hinder security analysis, researchers warn.

3 hours ago Microsoft sees rise in secret government data demands

ZDNet View Synopsis+1
The number of classified data demands remained about the same but covered a larger number of user accounts.

4 hours ago Jive resets Producteev passwords after August data breach

ZDNet View Synopsis+1
It took a month for the company to inform customers by letter.

4 hours ago "Vendetta Brothers" Are After Your Payment Card Data

SecurityWeek View Synopsis+1

If you live in the United States or one of several Nordic countries, your payment card data might be of interest to a duo of cybercriminals that FireEye refers to as the "Vendetta Brothers."

4 hours ago Firms Spend Big Money on Flaws They Could Fix in Development

SecurityWeek View Synopsis+1

Companies are spending millions on bug bounty programs whose goal is to identify vulnerabilities, but it might be more efficient to take a proactive approach and focus on identifying flaws in the development phase.

4 hours ago Apple's Messages Metadata Could Be ValuableTo Law Enforcement

Forbes View Synopsis+1
A leaked document shows that authorities can use data from the iPhone chat app to figure out someone's location.

5 hours ago Banks tighten SWIFT system security after hacks

Yahoo Security View Synopsis+1

By Tom Bergin GENEVA (Reuters) - Banks are tightening the security of their SWIFT messaging networks - used by the industry to shift trillions of dollars each day - following revelations that hackers are increasingly able to get into this system to steal money. Bankers at SWIFT's annual SIBOS conference in Geneva said they were adopting new security tools, reviewing procedures and pressing their counterparties to do the same. Some banks are also looking at alternative technologies for transferring money, such as blockchain-type systems.

5 hours ago Poll: Should Edward Snowden be pardoned?

TechRepublic View Synopsis+1
Is the NSA hacker a whistleblower or traitor? Hero or villain? Take our poll and tell us whether you think Edward Snowden deserves a break.

6 hours ago Microsoft widens Edge browser bug hunt for bounty hunters

The Register View Synopsis+1
Keeping you in hoodies

Microsoft has expanded its programme for rewarding those who find and report bugs in its Edge browser, enabling bounty hunters to claim their prize for a broader range of vulnerabilities.

6 hours ago VESK coughs up £18k in ransomware attack

The Register View Synopsis+1
Biz took the precaution to pay up as a belt and braces approach

Exclusive Hosted desktop and cloud provider VESK is staggering back to its feet after paying 29 Bitcoins (£18,600) in a ransomware attack earlier this week.

7 hours ago Yahoo Hacked by Cybercrime Gang, Security Firm Reports

InfoRiskToday View Synopsis+1
1 Billion Accounts Stolen by 'Professional Blackhats,' InfoArmor SaysBlunting Yahoo's attempt to blame nation-state attackers for its record-breaking breach, security firm InfoArmor says it's traced the 2014 hack to a cybercrime gang that's quietly resold the stolen data several times over.

8 hours ago Web Applications Are The Achilles' Heel Of Cybersecurity

Forbes View Synopsis+1
Luckily, protecting yourself -- and your organization -- isn't rocket science.

9 hours ago Spy Tech 'Hacks WhatsApp Encrypted Chat From A Backpack'

Forbes View Synopsis+1
Israeli surveillance company says it can decode WhatsApp encryption and intercept all messages using a Wi-Fi box hidden in a backpack.