Here You Have Worm and E-Jihad Connection
On Friday, September 10, I hinted that a cyber-jihad group might be behind the ?Here you have? mass-mailer worm. Here is some additional information.
View ArticleRSA compromise: Impacts on SecurID
On March 17, 2011, RSA announced that a cyberattack that they attributed to an ?Advanced Persistent Threat? resulted in the compromise and disclosure of information ?specifically related to RSA?s...
View ArticleSCADA Vulns and Exploits Published
The safety and security of nuclear facilities, power plants and oil/gas production seems a little shakier in recent days. No, this isn't about instability in the Middle East or a nuclear incident in...
View ArticleCertificate Authorities for SSL/TLS: Crypto’s weak link
In the wake of Comodo?s announcement of a compromised [1] affiliate Registration Authority (RA) and their subsequent issuance of fraudulent certificates [2], the information security community has...
View ArticleApril 2011 Patch Tuesday sets a new record
This month?s Microsoft Patch Tuesday release set a new record. Microsoft released a total of 17 bulletins covering 64 CVEs, the largest number of patches in one month to date. While some users may have...
View ArticleRats in a Sinking Server
At the 2013 RSA security conference in San Francisco, Dell SecureWorks Counter Threat Unit™ (CTU) researchers will present some new techniques we have found around sinkholing. We believe these...
View ArticleLearning from Cyber Security Competitions (NECCDC edition)
The Northeast Collegiate Cyber Defense Competition (NECCDC) is a three-day event designed to give college students the opportunity to handle the challenges of administering and defending a mock...
View ArticleDNS Amplification Variation Used in Recent DDoS Attacks (Update)
Attackers typically rely on large botnets to generate distributed denial of service (DDoS) traffic; however, there are additional ways to amplify attack traffic. The DNS amplification attack is a...
View ArticleDell SecureWorks’ Brand Surveillance Team Warns Organizations of Hacktivists...
Hactivists, disgruntled employees, and other cyber threat actors intent on sabotaging an organization, are expanding their tactics beyond Distributed Denial of Service (DDoS) attacks, warns Dell...
View ArticleHow to Hide Malware in Unicode
Unicode character sets are used throughout Windows systems, largely to make it easier to present the same information (warning messages, alerts, notices, etc.) in different languages. Windows...
View ArticleUsing Unicode to hide malware within the file system
Dell SecureWorks Counter Threat Unit™ (CTU) analysts previously observed the use of Unicode characters within the Windows Registry to obscure the presence of malware on a system. Similar techniques can...
View Article
More Pages to Explore .....