Security Alerts & News
by Tymoteusz A. Góral

History
#1648 Microsoft says Russian APT group behind zero-day attacks
Microsoft has singled out Sofacy, an APT group long thought to have ties to Russia’s military intelligence arm GRU, as the entity behind targeted attacks leveraging Windows kernel and Adobe Flash zero days in targeted attacks.

The group, which Microsoft calls Strontium, is also known as APT28, Tsar Team and Sednit among other identifiers.

Microsoft said the zero day vulnerability, the existence of which along with limited details were disclosed on Monday by Google, will be patched Nov. 8. Google said yesterday it privately disclosed both zero days, which were used in tandem in these targeted attacks against unknown victims, to Microsoft and Adobe on Oct. 21. Adobe rushed an emergency patch for Flash Player on Oct. 26, while Microsoft had yet to acknowledge the vulnerability until Google’s disclosure. Microsoft was critical of Google’s action yesterday and reiterated its stance today in a post, providing some details on the vulnerability and attacks.
Read more
#1660 Critical vulnerabilities pose a serious threat to Joomla sites
#1659 Web Bluetooth API privacy
#1658 Security update patches 13 Android vulnerabilities discovered by Trend Micro
#1657 AtomBombing: A code injection that bypasses current security solutions
#1656 Killing Mirai: Active defense against an IoT botnet
#1655 Google joins Mozilla and Apple in distrusting WoSign certificates
#1654 Kaspersky DDOS intelligence report for Q3 2016
#1653 Your home’s online gadgets could be hacked by ultrasound
#1652 Bug bounty hunter launches accidental DDoS attack on 911 systems via iOS bug
#1651 Google identified major vulnerability in Apple’s OS and iOS cores
#1650 How security flaws work: SQL injection
#1649 New, more-powerful IoT botnet infects 3,500 devices in 5 days
#1648 Microsoft says Russian APT group behind zero-day attacks
#1647 Firefox disables loophole that allows sites to track users via battery status
#1646 Phony Android Flash player installs banking malware
History
2017: 01 02 03 04 05
2016: 01 02 03 04 05 06 07 08 09 10 11 12