High exploit vulnerability: Alt-N Security gateway

IBM’s ISS explains the potential problem and with informative links: The problem is the software is vulnerable to a specially crafted HTTP request to SecurityGateway.dll using a long username parameter, a remote attacker can overflow a buffer and execute arbitrary code. This means that a system vulnerable will be potentially owned by hackers in no … Read more

malware hunting for port 32764

Internet Storm Center  has an important current status on a new malware.   It scans for port 32764 and port 23 (telnet) so it can propagate and create more. It also tries to “phone home”   With our help we can scan (Alpha Scan) for any machines that actually respond to this open port (32764) … Read more

Cisco Cloud Portal Software gives up too much information

According to the National Vulnerability Database Cisco Intelligent Automation for Cloud in Cisco Cloud Portal does not properly restrict the content of MyServices action URLs, which allows remote authenticated users to obtain sensitive information by reading (1) web-server access logs, (2) web-server Referer logs, or (3) the browser history ——————————————————————————————— This vulnerability is medium, and … Read more

Extortion scheme via advertisement on Bing

Be careful on the advertisement you click on. Katie Matusik is a  Gymnast (took 3rd place in 2012 NCAA National Gymnastics) If you search for Kaite Matusik on Bing you will see the following: If someone clicks on it: then the following site comes up:   It is an extortion Scheme and is difficult to … Read more

targeted malware campaign -> to exploits in Dropbox

Malware campaign is using some old and new methods. One email claims to be from Maersk shipping line and the attachment (word doc) opens a backdoor connection to two hacker command and control servers The dropbox domain is also referenced, the links attempt to contact londonpaerl (. )co (. )uk and selombiznet(.)net (I added the … Read more