Microsoft Patch Tuesday – September 2015

By Talos Group Today, Microsoft has released their monthly set of security bulletins designed to address security vulnerabilities within their products. This month’s release sees a total of 12 bulletins released which address 55 CVEs. Five bulletins are rated “Critical” this month and address vulnerabilities in Edge, Graphics Component, Internet Explorer, Journal, and Office. The other seven bulletins are rated “Important” and address vulnerabilities in the .NET Framework, Active Directory, Exchange, Hyper-V, Media Center, Skype for Business, and Task Management. Bulletins Rated Critical []

Source:: Cisco Security Notice

Research Spotlight: Learning Detectors of Malicious Network Traffic

By Talos Group This post was authored by Karel Bartos , Vojtech Franc , & Michal Sofka . Malware is constantly evolving and changing. One way to identify malware is by analyzing the communication that the malware performs on the network. Using machine learning, these traffic patterns can be utilized to identify malicious software. Machine learning faces two obstacles: obtaining a sufficient training set of malicious and normal traffic and retraining the system as malware evolves. This post will analyze an approach that overcomes these obstacles by developing a []

Source:: Cisco Security Notice

Research Spotlight: Learning Detectors of Malicious Network Traffic

By Talos Group This post was authored by Karel Bartos , Vojtech Franc , & Michal Sofka . Malware is constantly evolving and changing. One way to identify malware is by analyzing the communication that the malware performs on the network. Using machine learning, these traffic patterns can be utilized to identify malicious software. Machine learning faces two obstacles: obtaining a sufficient training set of malicious and normal traffic and retraining the system as malware evolves. This post will analyze an approach that overcomes these obstacles by developing a []

Source:: Cisco Security Notice

Malware Meets SysAdmin – Automation Tools Gone Bad

By Talos Group This post was authored by Alex Chiu and Xabier Ugarte Pedrero . Talos recently spotted a targeted phishing attack with several unique characteristics that are not normally seen. While we monitor phishing campaigns used to distribute threats such as Dridex , Upatre , and Cryptowall , targeted phishing attacks are more convincing because the format of the message is personalized to the targeted user. This targeted attack was more difficult to detect because adversaries chose to leverage AutoIT, a well known freeware administration tool for automating system management []

Source:: Cisco Security Notice

Malware Meets SysAdmin – Automation Tools Gone Bad

By Talos Group This post was authored by Alex Chiu and Xabier Ugarte Pedrero . Talos recently spotted a targeted phishing attack with several unique characteristics that are not normally seen. While we monitor phishing campaigns used to distribute threats such as Dridex , Upatre , and Cryptowall , targeted phishing attacks are more convincing because the format of the message is personalized to the targeted user. This targeted attack was more difficult to detect because adversaries chose to leverage AutoIT, a well known freeware administration tool for automating system management []

Source:: Cisco Security Notice

Microsoft Internet Explorer Out of Band Advisory

By Talos Group Today an out of band advisory was released by Microsoft to address CVE-2015-2502 . This vulnerability is addressed by MS15-093 . MS15-093 address a memory corruption vulnerability in Internet Explorer versions 7, 8, 9, 10, and 11. This affects all currently supported versions of Windows, including Windows 10. This advisory is rated critical. An attacker can craft a web page designed to exploit this vulnerability and lure a user into visiting it. The compromise will result in remote code execution at the []

Source:: Cisco Security Notice

Microsoft Internet Explorer Out of Band Advisory

By Talos Group Today an out of band advisory was released by Microsoft to address CVE-2015-2502 . This vulnerability is addressed by MS15-093 . MS15-093 address a memory corruption vulnerability in Internet Explorer versions 7, 8, 9, 10, and 11. This affects all currently supported versions of Windows, including Windows 10. This advisory is rated critical. An attacker can craft a web page designed to exploit this vulnerability and lure a user into visiting it. The compromise will result in remote code execution at the []

Source:: Cisco Security Notice

A Global Cybergovernance Framework: The Real Infrastructure Needed to Support a More Secure Internet

By Eric Wenger As part of a broader “Cybersecurity Call to Action” outlined in the Cisco 2015 Midyear Security Report , Cisco has called for the development of a cohesive, multi-stakeholder, global cybergovernance framework. Investing in the development of such a framework is essential to supporting innovation and economic growth in business on the global stage. While there has been an increasing awareness that managing cyber risks is essential to the operation of any networked system, current mechanisms are not effective to protect businesses from cyberattacks. The lack []

Source:: Cisco Security Notice

A Global Cybergovernance Framework: The Real Infrastructure Needed to Support a More Secure Internet

By Eric Wenger As part of a broader “Cybersecurity Call to Action” outlined in the Cisco 2015 Midyear Security Report , Cisco has called for the development of a cohesive, multi-stakeholder, global cybergovernance framework. Investing in the development of such a framework is essential to supporting innovation and economic growth in business on the global stage. While there has been an increasing awareness that managing cyber risks is essential to the operation of any networked system, current mechanisms are not effective to protect businesses from cyberattacks. The lack []

Source:: Cisco Security Notice

Talos Identifies Multiple Memory Corruption Issues in Quicktime

By Talos Group Talos, in conjunction with Apple’s security advisory issued on August 13, is releasing five advisories for vulnerabilities that Talos found in Apple Quicktime. In accordance with our Vendor Vulnerability Reporting and Disclosure policy, these vulnerabilities have been reported to Apple and CERT. This post serves as a summary for the advisories being released in coordination with Apple and CERT. Ryan Pentney and Richard Johnson of Talos are credited with the discovery of these vulnerabilities. Advisory Summary Several memory corruption vulnerabilities exist in Apple Quicktime []

Source:: Cisco Security Notice