Mobile Office—SIM and SD Card Security
January 31, 2019
Case AnalysisCase Analysis
If you do not report the loss of the SIM card after your phone is lost, a hacker may use it to obtain SMS verification codes. Activation of the quick pay service requires only the ID card number, bank card number, and SMS verification code. (more…)
NSFOCUS Releases IP Chain Gang Report on Behavior of Recidivist Hackers
January 30, 2019
In a new report, NSFOCUS introduced the IP Chain-Gang concept, in which each chain-gang is controlled by a single threat actor or a group of related threat actors that exhibit similar behavior among the various attacks conducted by the same gang. The report analyzes the IP Chain-Gangs attack types, volume, size of events, gang […]
APT/APT-GET RCE Vulnerability (CVE-2019-3462) Handling Guide
January 30, 2019
1 Vulnerability Overview
Recently, a security researcher discovered a critical vulnerability in the Advanced Packaging Tool (APT) of Linux. This vulnerability stems from the APT’s failure to properly handle redirects, which can be triggered via a man-in-the-middle attack or a malicious package mirror, resulting in remote code execution. (more…)
Technical Report on Container Security (IV)-5
January 30, 2019
Container Security Protection – Container Network Security
Container Network Security (more…)
Chrome 72 arrives with code injection blocking and new developer features
January 29, 2019
VentureBeat – Google today launched Chrome 72 for Windows, Mac, and Linux. The release includes code injection blocking and new developer features. You can update to the latest version now using Chrome’s built-in updater or download it directly from google.com/chrome. With over 1 billion users, Chrome is both a browser and a major platform that […]
Linux apt/apt-get Remote Code Execution (RCE) Vulnerability (CVE-2019-3462) Threat Alert
January 28, 2019
Overview
On January 22, 2019, local time, security researcher Max Justicz announced his discovery of a remote code execution (RCE) vulnerability in Linux apt/apt-get. This vulnerability stems from the APT’s failure to properly handle certain parameters involved in HTTP redirects. It can be triggered via a man-in-the-middle attack or a malicious package mirror, resulting in remote code execution. (more…)
Genius? Lunatic? Maybe Both (II)
January 28, 2019
The ubiquity of the Internet is attracting more and more youths to the computer industry, especially the hacker community that holds a supreme position in the realm of cyber security. Every person eager to be part of the IT industry seems to be able to get something from it, ranging from appearing cool to making quick money. Today, you will be told more stories about some other legendary hackers. (more…)
Week in review: Man in the Cloud attacks, Google GDPR fine, business resilience
January 27, 2019
Help Net Security – Researchers analyze DDoS attacks as coordinated gang activities In a new report, NSFOCUS introduced the IP Chain-Gang concept, in which each chain-gang is controlled by a single threat actor or a group of related threat actors and exhibit similar behavior among the various attacks conducted by the same gang.
IP Reputation Report-01252019
January 25, 2019
-
Top 10 countries in attack counts:
- The above diagram shows the top 10 regions with the most malicious IP addresses from the NSFOCUS IP Reputation databases at January 25, 2019.
- CN increased 1% from 43% to 44% and US stayed at 12% from last week.
Mobile Office — Two-Step Verification
January 25, 2019
Case Analysis
It is a common practice to protect an account with a password. However, the account will be compromised if the password is disclosed. Now many mobile phones or apps support two-step verification. When detecting a login to your account from another phone, the mechanism requires the other form of authentication, for example, a verification code sent via SMS.