<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Cyber Security Trends May 2019</title>
	<atom:link href="http://www.epanorama.net/blog/2019/05/01/cyber-security-trends-may-2019/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2019/05/01/cyber-security-trends-may-2019/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Mon, 20 Apr 2026 04:43:41 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/05/01/cyber-security-trends-may-2019/comment-page-8/#comment-1641194</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sun, 02 Jun 2019 11:18:21 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=182313#comment-1641194</guid>
		<description><![CDATA[https://fossbytes.com/millions-of-cisco-routers-worldwide-are-at-risk-due-to-a-bug/]]></description>
		<content:encoded><![CDATA[<p><a href="https://fossbytes.com/millions-of-cisco-routers-worldwide-are-at-risk-due-to-a-bug/" rel="nofollow">https://fossbytes.com/millions-of-cisco-routers-worldwide-are-at-risk-due-to-a-bug/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/05/01/cyber-security-trends-may-2019/comment-page-8/#comment-1641193</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sun, 02 Jun 2019 11:17:56 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=182313#comment-1641193</guid>
		<description><![CDATA[https://www.vice.com/en_au/article/bjeznz/how-do-you-know-when-youve-been-hacked-gmail-facebook?utm_source=vicefbus]]></description>
		<content:encoded><![CDATA[<p><a href="https://www.vice.com/en_au/article/bjeznz/how-do-you-know-when-youve-been-hacked-gmail-facebook?utm_source=vicefbus" rel="nofollow">https://www.vice.com/en_au/article/bjeznz/how-do-you-know-when-youve-been-hacked-gmail-facebook?utm_source=vicefbus</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/05/01/cyber-security-trends-may-2019/comment-page-8/#comment-1641177</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sun, 02 Jun 2019 10:52:57 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=182313#comment-1641177</guid>
		<description><![CDATA[https://techcrunch.com/2019/05/22/tp-link-routers-vulnerable-remote-hijack/]]></description>
		<content:encoded><![CDATA[<p><a href="https://techcrunch.com/2019/05/22/tp-link-routers-vulnerable-remote-hijack/" rel="nofollow">https://techcrunch.com/2019/05/22/tp-link-routers-vulnerable-remote-hijack/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/05/01/cyber-security-trends-may-2019/comment-page-8/#comment-1641152</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sun, 02 Jun 2019 10:00:29 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=182313#comment-1641152</guid>
		<description><![CDATA[Intense scanning activity detected for BlueKeep RDP flaw
https://www.zdnet.com/article/intense-scanning-activity-detected-for-bluekeep-rdp-flaw/

A threat actor hidden behind Tor nodes is scanning for Windows systems vulnerable to BlueKeep flaw.]]></description>
		<content:encoded><![CDATA[<p>Intense scanning activity detected for BlueKeep RDP flaw<br />
<a href="https://www.zdnet.com/article/intense-scanning-activity-detected-for-bluekeep-rdp-flaw/" rel="nofollow">https://www.zdnet.com/article/intense-scanning-activity-detected-for-bluekeep-rdp-flaw/</a></p>
<p>A threat actor hidden behind Tor nodes is scanning for Windows systems vulnerable to BlueKeep flaw.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/05/01/cyber-security-trends-may-2019/comment-page-7/#comment-1641118</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sun, 02 Jun 2019 06:42:49 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=182313#comment-1641118</guid>
		<description><![CDATA[CVE-2018-15664: docker (all versions) is vulnerable to a symlink-race attack
https://seclists.org/oss-sec/2019/q2/131

There is no released Docker version with a fix for this issue at the
time of writing. I&#039;ve submitted a patch upstream[1] which is still
undergoing code review, and after discussion with them they agreed that
public disclosure of the issue was reasonable. Since the SUSE bug report
contains exploit scripts[2], I&#039;ve attached them here too.

If an attacker can
add a symlink component to the path *after* the resolution but *before*
it is operated on, then you could end up resolving the symlink path
component on the host as root. In the case of &#039;docker cp&#039; this gives you
read *and* write access to any path on the host.

As far as I&#039;m aware there are no meaningful protections against this
kind of attack (other than not allowing &quot;docker cp&quot; on running
containers -- but that only helps with his particular attack through
FollowSymlinkInScope). Unless you have restricted the Docker daemon
through AppArmor, then it can affect the host filesystem -- I haven&#039;t
verified if the issue is as exploitable under the default SELinux
configuration on Fedora/CentOS/RHEL.]]></description>
		<content:encoded><![CDATA[<p>CVE-2018-15664: docker (all versions) is vulnerable to a symlink-race attack<br />
<a href="https://seclists.org/oss-sec/2019/q2/131" rel="nofollow">https://seclists.org/oss-sec/2019/q2/131</a></p>
<p>There is no released Docker version with a fix for this issue at the<br />
time of writing. I&#8217;ve submitted a patch upstream[1] which is still<br />
undergoing code review, and after discussion with them they agreed that<br />
public disclosure of the issue was reasonable. Since the SUSE bug report<br />
contains exploit scripts[2], I&#8217;ve attached them here too.</p>
<p>If an attacker can<br />
add a symlink component to the path *after* the resolution but *before*<br />
it is operated on, then you could end up resolving the symlink path<br />
component on the host as root. In the case of &#8216;docker cp&#8217; this gives you<br />
read *and* write access to any path on the host.</p>
<p>As far as I&#8217;m aware there are no meaningful protections against this<br />
kind of attack (other than not allowing &#8220;docker cp&#8221; on running<br />
containers &#8212; but that only helps with his particular attack through<br />
FollowSymlinkInScope). Unless you have restricted the Docker daemon<br />
through AppArmor, then it can affect the host filesystem &#8212; I haven&#8217;t<br />
verified if the issue is as exploitable under the default SELinux<br />
configuration on Fedora/CentOS/RHEL.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/05/01/cyber-security-trends-may-2019/comment-page-7/#comment-1640949</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 31 May 2019 18:00:46 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=182313#comment-1640949</guid>
		<description><![CDATA[HiddenWasp Malware Stings Targeted Linux Systems
https://www.intezer.com/blog-hiddenwasp-malware-targeting-linux-systems/

• Intezer has discovered a new, sophisticated malware that we have named “HiddenWasp”, targeting Linux systems.

• The malware is still active and has a zero-detection rate in all major anti-virus systems.]]></description>
		<content:encoded><![CDATA[<p>HiddenWasp Malware Stings Targeted Linux Systems<br />
<a href="https://www.intezer.com/blog-hiddenwasp-malware-targeting-linux-systems/" rel="nofollow">https://www.intezer.com/blog-hiddenwasp-malware-targeting-linux-systems/</a></p>
<p>• Intezer has discovered a new, sophisticated malware that we have named “HiddenWasp”, targeting Linux systems.</p>
<p>• The malware is still active and has a zero-detection rate in all major anti-virus systems.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/05/01/cyber-security-trends-may-2019/comment-page-7/#comment-1640948</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 31 May 2019 17:59:52 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=182313#comment-1640948</guid>
		<description><![CDATA[Phila. Court Shuts Down Website, E-Filing Over &#039;Virus Intrusion&#039;
https://www.law.com/legaltechnews/2019/05/24/philadelphia-court-shuts-down-website-e-filing-over-virus-intrusion/

On Tuesday, a virus on &#039;a limited number of computers&#039; in Philadelphia’s court system led to the court shutting down its site and some online filing services as a safety precaution. City officials and the court haven’t said when all systems will go back online.]]></description>
		<content:encoded><![CDATA[<p>Phila. Court Shuts Down Website, E-Filing Over &#8216;Virus Intrusion&#8217;<br />
<a href="https://www.law.com/legaltechnews/2019/05/24/philadelphia-court-shuts-down-website-e-filing-over-virus-intrusion/" rel="nofollow">https://www.law.com/legaltechnews/2019/05/24/philadelphia-court-shuts-down-website-e-filing-over-virus-intrusion/</a></p>
<p>On Tuesday, a virus on &#8216;a limited number of computers&#8217; in Philadelphia’s court system led to the court shutting down its site and some online filing services as a safety precaution. City officials and the court haven’t said when all systems will go back online.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/05/01/cyber-security-trends-may-2019/comment-page-7/#comment-1640944</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 31 May 2019 17:36:46 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=182313#comment-1640944</guid>
		<description><![CDATA[Google white hat hacker found code execution flaw in Notepad
https://securityaffairs.co/wordpress/86297/hacking/code-execution-flaw-notepad.html

The popular white hat hacker Tavis Ormandy has announced the discovery of a code execution vulnerability in Microsoft’s Notepad text editor.]]></description>
		<content:encoded><![CDATA[<p>Google white hat hacker found code execution flaw in Notepad<br />
<a href="https://securityaffairs.co/wordpress/86297/hacking/code-execution-flaw-notepad.html" rel="nofollow">https://securityaffairs.co/wordpress/86297/hacking/code-execution-flaw-notepad.html</a></p>
<p>The popular white hat hacker Tavis Ormandy has announced the discovery of a code execution vulnerability in Microsoft’s Notepad text editor.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/05/01/cyber-security-trends-may-2019/comment-page-7/#comment-1640941</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 31 May 2019 17:33:53 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=182313#comment-1640941</guid>
		<description><![CDATA[Microsoft warns users to patch as exploits for ‘wormable’ BlueKeep bug appear
https://techcrunch.com/2019/05/31/microsoft-bluekeep-worm-exploits/

Microsoft has issued its second advisory this month urging users to update their systems to prevent a re-run of attacks similar to WannaCry.]]></description>
		<content:encoded><![CDATA[<p>Microsoft warns users to patch as exploits for ‘wormable’ BlueKeep bug appear<br />
<a href="https://techcrunch.com/2019/05/31/microsoft-bluekeep-worm-exploits/" rel="nofollow">https://techcrunch.com/2019/05/31/microsoft-bluekeep-worm-exploits/</a></p>
<p>Microsoft has issued its second advisory this month urging users to update their systems to prevent a re-run of attacks similar to WannaCry.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/05/01/cyber-security-trends-may-2019/comment-page-7/#comment-1640896</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 31 May 2019 08:38:31 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=182313#comment-1640896</guid>
		<description><![CDATA[Sophisticated HiddenWasp Malware Targets Linux
https://www.securityweek.com/sophisticated-hiddenwasp-malware-targets-linux

A recently uncovered piece of sophisticated malware targeting Linux provides attackers with remote control of the infected systems, Intezer’s security researchers have discovered. 

Called HiddenWasp, the threat is active and enjoys zero-detection rate in all major anti-virus systems, the researchers say. The threat appears to be used in targeted attacks on victims who went through heavy reconnaissance or are already compromised by the attackers. 




HiddenWasp Malware Stings Targeted Linux Systems
https://www.intezer.com/blog-hiddenwasp-malware-targeting-linux-systems/

Overview

• Intezer has discovered a new, sophisticated malware that we have named “HiddenWasp”, targeting Linux systems.

• The malware is still active and has a zero-detection rate in all major anti-virus systems.

• Unlike common Linux malware, HiddenWasp is not focused on crypto-mining or DDoS activity. It is a trojan purely used for targeted remote control.

• Evidence shows in high probability that the malware is used in targeted attacks for victims who are already under the attacker’s control, or have gone through a heavy reconnaissance.]]></description>
		<content:encoded><![CDATA[<p>Sophisticated HiddenWasp Malware Targets Linux<br />
<a href="https://www.securityweek.com/sophisticated-hiddenwasp-malware-targets-linux" rel="nofollow">https://www.securityweek.com/sophisticated-hiddenwasp-malware-targets-linux</a></p>
<p>A recently uncovered piece of sophisticated malware targeting Linux provides attackers with remote control of the infected systems, Intezer’s security researchers have discovered. </p>
<p>Called HiddenWasp, the threat is active and enjoys zero-detection rate in all major anti-virus systems, the researchers say. The threat appears to be used in targeted attacks on victims who went through heavy reconnaissance or are already compromised by the attackers. </p>
<p>HiddenWasp Malware Stings Targeted Linux Systems<br />
<a href="https://www.intezer.com/blog-hiddenwasp-malware-targeting-linux-systems/" rel="nofollow">https://www.intezer.com/blog-hiddenwasp-malware-targeting-linux-systems/</a></p>
<p>Overview</p>
<p>• Intezer has discovered a new, sophisticated malware that we have named “HiddenWasp”, targeting Linux systems.</p>
<p>• The malware is still active and has a zero-detection rate in all major anti-virus systems.</p>
<p>• Unlike common Linux malware, HiddenWasp is not focused on crypto-mining or DDoS activity. It is a trojan purely used for targeted remote control.</p>
<p>• Evidence shows in high probability that the malware is used in targeted attacks for victims who are already under the attacker’s control, or have gone through a heavy reconnaissance.</p>
]]></content:encoded>
	</item>
</channel>
</rss>
