Skip to main content


Showing posts from December, 2017

Satori:Sudden Awakening With Over 280,000 Active Bots - Exploits Zero-Day to Zombify Huawei Routers

Security researchers are raising the alarm in regards to a new botnet named Satori that has been seen active on over 280,000 different IPs in the past 12 hours. Satori — the Japanese word for "awakening"— is not new, but a variant of the more infamous Mira i IoT DDoS malware. Li Fengpei, a security researcher with Qihoo 360 Netlab, says the Satori variant came to life out of the blue today and started scans on ports 37215 and 52869. Satori variant differs from previous Mirai versions According to a report, Li shared with Bleeping Computer today, the Mirai Satori variant is quite different from all previous pure Mirai variants. Previous Mirai versions infected IoT devices and then downloaded a Telnet scanner component that attempted to find other victims and infect them with the Mirai bot. The Satori variant does not use a scanner but uses two embedded exploits that will try to connect to remote devices on ports 37215 and 52869. Effectively, this makes Satori an IoT worm, bein

Firewall Bursting: A New Approach in Network Security

One of the most common network security solutions is the branch firewall. Branch firewall appliances can pack into a single device a wide range of security capabilities including a stateful or next-generation firewall, anti-virus, URL filtering, and IDS/IP S. But the reality is that most of these edge devices lack the processing power to apply the full scope of capabilities on all of the necessary traffic. If the firewall deployed in the branch cannot scale to address critical security needs, an alternative strategy must be used. Wholesale appliance upgrades are easy but expensive. Regional security hubs are complex and also costly. A new approach, called firewall bursting, leverages cloud scalability to offer an easier, more cost-effective alternative to branch office security. (You can find a great table comparing the different Firewall approaches here.) Costly Appliance Upgrades and Secure Hub Architectures The existing methods of evolving branch security force IT into a tough trade

Know about TCL scripting - PART 0

What is Tcl? The name Tcl is derived from "Tool Command Language" and is pronounced "tickle". Tcl is a radically simple open-source interpreted programming language that provides common facilities such as variables, procedures, and control structures as well as many useful features that are not found in any other major language. Tcl runs on almost all modern operating systems such as Unix, Macintosh, and Windows (including Windows Mobile). Tcl is a very simple programming language. If you have programmed b efore, you can learn enough to write interesting Tcl programs within a few hours. History The Tcl programming language was created in the spring of 1988 by John Ousterhout while working at the University of California, Berkeley.Originally "born out of frustration", according to the author, with programmers devising their own languages intended to be embedded into applications, Tcl gained acceptance on its own. John Ousterhout was awarded the ACM Software

Cyber Security predictions 2018 by FireEye

    The year of 2017 has been tough for enterprise security teams. Attacks like Petya and Wannacry suggest that the impact scale is increasing dramatically. The recent leak of government-developed malware and hoarded vulnerabilities has given cybercriminals greater capabilities. IT is struggling to keep pace with the flow of important security software patches and updates, and the continued adoption of new technologies like the internet of things (IoT) creates new vulnerabilities to contend with. Finally, 2017 going to end. So, get ready to face 2018 cyber Attacks with FireEye Lab's Cyber Security predictions 2018. What cloud trends do you expect to see as we move into 2018? This past year was something of a turning point for public cloud adoption – not just with regard to traditional public cloud providers such as Amazon and Azure, but also with software as a service. This means people are really starting to put critical data into the cloud. We saw that some of the largest compani

Shodan providing service to find vulnerable servers in Internet

 "This content only for educational purpose not for illegal activities" Shodan is a search engine that lets the user find specific types of computers (webcams, routers, servers, etc.) connected to the internet using a variety of filters. Some have also described it as a search engine of service banners, which are meta-data the server sends back to the client. This can be information about the server software, what options the service supports, a welcome message or anything else that the client can find out before interacting with the server. The website began as Matherly's pet project. It was launched in 2009 by computer programmer John Matherly, who, in 2003, conceived the idea of searching devices linked to the Internet.The name Shodan is a reference to SHODAN, a character from the System Shock video game series. Shodan users are able to find systems including traffic lights, security cameras, home heating systems as well as control systems for water parks, gas stations

Beware hackers uses your PC to mine Cryptocurrency

CPU Mining CPU Mining is the use of a computer’s CPU to perform proof of work mining for a cryptocurrency. Proof of Work cryptocurrency mining requires a processor to perform calculations called hashes. These calculations can be performed by a regular general purpose Central Processing Unit (CPU) of the kind you will find in any computer, by a slightly more specialized Graphics Processing Unit (GPU), or a highly specialized ASIC chip designed just for performing that type of calculation. The relative merits of each method will depend on the hashing algorithm used by the digital currency in question. Usually, CPU mining is the least effective, ASIC mining is the most efficacious, and GPU mining is somewhere in the middle. This is considered to be problematic by some, because the more specialist and expensive the hardware needed for profitable mining becomes, the fewer people get involved in it, leading to mining centralization and therefore a less secure network. For many people, the i