R V Peeler

2,556 Flips | 2 Magazines | 1 Like | 1 Following | 338 Followers | @rvpeeler | Keep up with R V Peeler on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “R V Peeler”

SAP Patches Critical HANA Vulnerability That Allowed Full Access

SAP patched a critical vulnerability in its cloud-based business platform HANA today that if exploited, could allow for a full system compromise, …

Google Eliminates Android Adfraud Botnet Chamois

Google removed a family of malicious apps, Chamois, from its Play marketplace recently that were found manipulating ad traffic.

To keep Tor hack source code secret, DOJ dismisses child porn case

DOJ: "Disclosure is not currently an option."<p>Rather than share the now-classified technological means that investigators used to locate a child porn …

Mobile Malware Masquerades as POS Management App

Adware vs. ad fraud

Adware and ad fraud are in the same business and both don’t care very much how they make money, as long as it keeps pouring in. But there are some …

How not to phish a security researcher on Twitter

You’ve compromised a few accounts. You’ve worked up a list of people most likely to click your links or send you personal data. You’ve figured out …

Nigerian Cybercrime Matures, Morphs

INTERPOL, security researchers see West Africa cybercrime scene expanding and getting more sophisticated.

Defense against Doxing

A decade ago, I wrote about the death of ephemeral conversation. As computers were becoming ubiquitous, some unintended changes happened, too. Before …

Enticing Clicks With Spam

Among the key findings from the 2017 IBM X-Force Threat Intelligence Index, is the ongoing use of spam as an entry vector for attackers. While …

Google Chrome 57 Browser Update Patches ‘High’ Severity Flaws

Google paid out $38,000 in bounty rewards tied to flaws it fixed with a Chrome 57 browser update.

Zero Days Have Staying Power

A look at 200 zero day vulnerabilities reveals key details on longevity, value and how long it takes to create one after a software vulnerability has …

Apache Attack Traffic Dropping, Limited to Few Sources

While probes looking for vulnerable Apache Struts 2 deployments continue, malicious traffic has tapered off, researchers at Rapid7 said.

WikiLeaks Dumps Docs on CIA’s Hacking Tools

<b>WikiLeaks</b> on Tuesday dropped one of its most explosive word bombs ever: A secret trove of documents apparently stolen from the <b>U.S. Central</b> …

New macOS Proton RAT Available for Sale on Russian Hacking Forum

A new remote access tool (RAT) targeting macOS users is currently being advertised on Russian underground hacking forums, a custom website, and …

"Super Malware" Steals Encryption Keys from Intel SGX Enclaves

In a research paper published at the end of February, a team of five scientists from the Graz University of Technology has described a novel method …

The Cyberwar Information Gap

Unlike a conventional military strike, state-on-state cyberattacks can go unreported for years.<p>U.S. government hackers began developing destructive …

North Korea

New Fileless Attack Using DNS Queries to Carry Out PowerShell Commands

A unique attack called DNSMessenger uses DNS queries to carry out malicious PowerShell commands on compromised computers.

Destructive StoneDrill Wiper Malware On The Loose

Kaspersky Lab released details about new wiper malware called StoneDrill that bears similarities to Shamoon2 and an APT outfit known as NewsBeef.

Spammer’s Leaky Backup Exposes Massive Empire

A massive spam operation that sent out more than one billion messages a day was exposed by researchers who called the operation "illegal" and a …

DOJ Dismisses Playpen Case to Keep Tor Hack Private

Prosecutors with the U.S. Department of Justice dropped their case against a suspect who visited the dark web site child pornography site Playpen.

Java, Python FTP Injection Attacks Bypass Firewalls

Newly disclosed FTP injection vulnerabilities in Java and Python that are fueled by rather common XML External Entity (XXE) flaws allow for firewall …

Researchers Uncover New Leads Behind Shamoon2

Researchers from Arbor Networks' Security Engineering and Response Team (ASERT) say they have unearthed fresh leads on the tools and techniques used …

First Practical SHA-1 Collision Attack Arrives

Researchers unveiled the first-ever practical collision attack the cryptographic hash function SHA-1.

UK police arrested the alleged mastermind of the MIRAI attack on Deutsche Telekom

The prosecutor’s office in Cologne and the Federal Criminal Police Office have arrested the alleged mastermind of the MIRAI attack on Deutsche Telekom<p>…

Shamoon 2 malware, ASERT has shed light on the C2 and the infection process

The analysis conducted by Arbor Networks on the Shamoon 2 malware has shed light on the control infrastructure and the infection process.<p>Security …

US Oil and Gas Industry unprepared to mitigate risks in operational technology (OT) environments

A study commissioned by Siemens revealed that US oil and gas industry is unprepared to mitigate cybersecurity risks in operational technology …

Out-of-band resource load in Google allows attacker to launch a DDoS attack from its servers

A security researcher discovered an Out-of-band resource load flaw in Google’s servers that allowed him to perform a DDoS attack on remote …

How to Bury a Major Breach Notification

Amid the hustle and bustle of the <b>RSA Security Conference</b> in San Francisco last week, researchers at RSA released a startling report that received …

Who Ran Leakedsource.com?

Late last month, multiple news outlets reported that unspecified law enforcement officials had seized the servers for <b>Leakedsource.com</b>, perhaps the …

iPhone Robbers Try to iPhish Victims

In another strange tale from the kinetic-attack-meets-cyberattack department, earlier this week I heard from a loyal reader in Brazil whose wife was …