Cyber & co
43.3K views | +0 today
Follow
Your new post is loading...
Rescooped by Michel CAZENAVE from ICT Security-Sécurité PC et Internet
Scoop.it!

After WannaCry, EternalRocks digs deeper into the NSA’s exploit toolbox | #CyberSecurity #Ransomware #NSA

After WannaCry, EternalRocks digs deeper into the NSA’s exploit toolbox | #CyberSecurity #Ransomware #NSA | Cyber & co | Scoop.it

WannaCry may be behind us, but fears that the crooks might create new malware from the NSA's stash of exploits seem to be coming true...

 

Defensive measures

With the return of old-school worm outbreaks, it’s worth reviewing steps users can take to avoid infection. Unfortunately, some of those steps have proven unpopular, as Naked Security’s John Dunn wrote. Admins can block services or ports at firewall level but not often indefinitely. Suspending email is another tactic that works until everyone complains.

The best advice remains the same as it did when the outbreak began:

To guard against malware exploiting Microsoft vulnerabilities:

Stay on top of all patch releases and apply them quickly.If at all possible, replace older Windows systems with the latest versions.

 

Learn more / En savoir plus/ Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?&tag=CIA

 

http://www.scoop.it/t/securite-pc-et-internet/?&tag=Cyberespionage

 

http://www.scoop.it/t/securite-pc-et-internet/?&tag=NSA

 

http://www.scoop.it/t/securite-pc-et-internet/?&tag=Cyberattacks

 

 

 


Via Gust MEES
more...
Gust MEES's curator insight, May 22, 2017 2:54 PM

WannaCry may be behind us, but fears that the crooks might create new malware from the NSA's stash of exploits seem to be coming true...

 

Defensive measures

With the return of old-school worm outbreaks, it’s worth reviewing steps users can take to avoid infection. Unfortunately, some of those steps have proven unpopular, as Naked Security’s John Dunn wrote. Admins can block services or ports at firewall level but not often indefinitely. Suspending email is another tactic that works until everyone complains.

The best advice remains the same as it did when the outbreak began:

To guard against malware exploiting Microsoft vulnerabilities:

  • Stay on top of all patch releases and apply them quickly.
  • If at all possible, replace older Windows systems with the latest versions.

 

Learn more / En savoir plus/ Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?&tag=CIA

 

http://www.scoop.it/t/securite-pc-et-internet/?&tag=Cyberespionage

 

http://www.scoop.it/t/securite-pc-et-internet/?&tag=NSA

 

http://www.scoop.it/t/securite-pc-et-internet/?&tag=Cyberattacks

 

 

Rescooped by Michel CAZENAVE from ICT Security-Sécurité PC et Internet
Scoop.it!

BASHLITE Affects Devices Running on BusyBox | Routers | CyberSecurity

BASHLITE Affects Devices Running on BusyBox | Routers | CyberSecurity | Cyber & co | Scoop.it

When news of the Shellshock vulnerability broke out at the end of September, we spotted several attacks that leveraged the said vulnerability, thus manifesting the prevalence or even evolution on how attackers used the exploit. For instance, attackers used Shellshock to target SMTP servers, launch botnet attacks, and even to download KAITEN source code among others.


Via Gust MEES
more...
Gust MEES's curator insight, November 16, 2014 2:31 PM

When news of the Shellshock vulnerability broke out at the end of September, we spotted several attacks that leveraged the said vulnerability, thus manifesting the prevalence or even evolution on how attackers used the exploit. For instance, attackers used Shellshock to target SMTP serverslaunch botnet attacks, and even to download KAITEN source code among others.