End-of-Shift report
Timeframe: Dienstag 01-07-2014 18:00 − Mittwoch 02-07-2014 18:00
Handler: Alexander Riepl
Co-Handler: n/a
Microsoft Expands TLS, Forward Secrecy Support
Microsoft announced TLS support on Outlook.com and that OneDrive cloud storage now supports Perfect Forward Secrecy.
http://threatpost.com/microsoft-expands-tls-forward-secrecy-support/106965
Cisco Small Cell Command Execution Vulnerability
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3307
DOWNAD Tops Malware Spam Source in Q2 2014
DOWNAD , also known as Conficker remains to be one of the top 3 malware that affects enterprises and small and medium businesses. This is attributed to the fact that a number of companies are still using Windows XP, susceptible to this threat. It can infect ..
http://blog.trendmicro.com/trendlabs-security-intelligence/downad-tops-malware-spam-source-in-q2-2014/?
VMSA-2014-0006.4
VMware product updates address OpenSSL security vulnerabilities
http://www.vmware.com/security/advisories/VMSA-2014-0006.html
Microsoft Digital Crimes Unit disrupts Jenxcus and Bladabindi malware families
Today, following an investigation to which the Microsoft Malware Protection Center (MMPC) contributed, the Microsoft Digital Crimes Unit initiated a disruption of the Jenxcus and Bladabindi malware families. These families are believed to have been created by individuals Naser Al Mutairi, aka njQ8, and ..
http://blogs.technet.com/b/mmpc/archive/2014/06/30/microsoft-digital-crimes-unit-disrupts-jenxcus-and-bladabindi-malware-families.aspx
MONSTER COOKIES can nom nom nom ALL THE BLOGS
Blog networks can be force-fed more than they can chew Giant cookies could be used to create a denial of service (DoS) on blog networks, says infosec researcher Bogdan Calin.
http://go.theregister.com/feed/www.theregister.co.uk/2014/07/02/monster_cookies_can_nom_nom_nom_all_the_blogs/
Transparenzzentrum: Microsoft gewährt Behörden Quellcode-Einsicht
In einem Transparenzzentrum will Microsoft Behörden, die Code-Manipulationen durch fremde Geheimdienste befürchten, die Gelegenheit bieten, den Source-Code selbst zu untersuchen.
http://www.heise.de/security/meldung/Transparenzzentrum-Microsoft-gewaehrt-Behoerden-Quellcode-Einsicht-2245711.html
Anatomy of a buffer overflow - Googles "KeyStore" security module for Android
Heres a cautionary tale about a bug, courtesy of IBM. Not that IBM had the bug, just to be clear: Google had the bug, and IBM researchers spotted it.
http://nakedsecurity.sophos.com/2014/07/02/anatomy-of-a-buffer-overflow-googles-keystore-security-module-for-android/
OpenSSL legt Sanierungsplan vor
Nach der Heartbleed-Katastrophe hat das OpenSSL-Projekt nun eine Roadmap veröffentlicht, die helfen soll, organisatorische Mängel im Entwicklungsprozess auszubessern.
http://www.heise.de/security/meldung/OpenSSL-legt-Sanierungsplan-vor-2248106.html
Rig Exploit Kit Used in Recent Website Compromise
Attackers planted code in a popular Web portal to redirect users to an exploit kit ..
http://www.symantec.com/connect/blogs/rig-exploit-kit-used-recent-website-compromise