NIST Site Search
Search NIST.GOV
Custom Search
[Official NIST.GOV TIME]
Product Research

Advertise on this site
Conflicker Worm / Botnet Downloads Mystery Payload – April 9th update
Not a lot of information but Conflicker has apparently downloaded new instructions and a keylogger.No Longer Supported

[ Read the rest of the article... ]
Posted by NIST.org on Thursday 09 April 2009 - 22:51:20 | |printer friendly
Translate to: {GOOGLETRANS}
Google Ads




Headlines

»CVE-2012-3509 (binutils, debian_linux, libiberty, ubuntu_linux)
Multiple integer overflows in the (1) _objalloc_alloc function in objalloc.c and (2) objalloc_alloc ...
»CVE-2012-5201 (intelligent_management_center, intelligent_management_center_for_automated_network_manager)
Unspecified vulnerability in HP Intelligent Management Center (iMC) and Intelligent Management Cente ...
»CVE-2012-5202 (intelligent_management_center, intelligent_management_center_for_automated_network_manager)
Unspecified vulnerability in HP Intelligent Management Center (iMC) and Intelligent Management Cente ...
»CVE-2012-5203 (intelligent_management_center, intelligent_management_center_for_automated_network_manager)
Unspecified vulnerability in HP Intelligent Management Center (iMC) and Intelligent Management Cente ...
»CVE-2012-5204 (intelligent_management_center, intelligent_management_center_for_automated_network_manager)
Unspecified vulnerability in HP Intelligent Management Center (iMC) and Intelligent Management Cente ...
»CVE-2012-5205 (intelligent_management_center, intelligent_management_center_for_automated_network_manager)
Unspecified vulnerability in HP Intelligent Management Center (iMC) and Intelligent Management Cente ...
»CVE-2012-5206 (intelligent_management_center, intelligent_management_center_for_automated_network_manager)
Unspecified vulnerability in HP Intelligent Management Center (iMC) and Intelligent Management Cente ...
»CVE-2012-5207 (intelligent_management_center, intelligent_management_center_for_automated_network_manager)
Unspecified vulnerability in HP Intelligent Management Center (iMC) and Intelligent Management Cente ...
»CVE-2012-5208 (intelligent_management_center, intelligent_management_center_for_automated_network_manager)
Unspecified vulnerability in HP Intelligent Management Center (iMC) and Intelligent Management Cente ...
»CVE-2012-5209 (intelligent_management_center, intelligent_management_center_for_automated_network_manager)
Unspecified vulnerability in HP Intelligent Management Center (iMC) and Intelligent Management Cente ...
»CVE-2012-5210 (intelligent_management_centertacacs+_authentication_manager)
Unspecified vulnerability in HP Intelligent Management Center (iMC) TACACS+ Authentication Manager ( ...
»CVE-2012-5211 (intelligent_management_center_user_access_manager)
Unspecified vulnerability in HP Intelligent Management Center (iMC) User Access Manager (UAM) before ...
»CVE-2012-5212 (intelligent_management_center, intelligent_management_center_for_automated_network_manager)
Unspecified vulnerability in HP Intelligent Management Center (iMC) and Intelligent Management Cente ...
»CVE-2012-5213 (intelligent_management_center, intelligent_management_center_for_automated_network_manager)
Unspecified vulnerability in HP Intelligent Management Center (iMC) and Intelligent Management Cente ...
»CVE-2013-0334 (bundler, fedora, opensuse)
Bundler before 1.7, when multiple top-level source lines are used, allows remote attackers to instal ...


Date published: 2016-08-26T04:50:06Z
Details

»Apple Releases Security Update
Original release date: August 25, 2016 Apple has released a security update to address multip ...
»VMWare Releases Security Updates
Original release date: August 24, 2016 VMWare has released security updates to address vulner ...
»FTC Releases Alert on Louisiana Flood Disaster Scams
Original release date: August 23, 2016 The Federal Trade Commission (FTC) has released an ale ...
»Fortinet Releases Security Advisory
Original release date: August 22, 2016 Fortinet has released a security advisory to highlight ...
»Cisco Releases Security Updates
Original release date: August 20, 2016 Cisco has released security updates to address vulnera ...
»Cisco Releases Security Update
Original release date: August 12, 2016 Cisco has released a security update to address a vuln ...
»Microsoft Releases August 2016 Security Bulletin
Original release date: August 09, 2016 Microsoft has released nine updates to address vulnera ...
»VMware Releases Security Update
Original release date: August 05, 2016 VMware has released a security update to address vulne ...
»Apple Releases Security Update
Original release date: August 05, 2016 Apple has released a security update to address a vuln ...
»Cisco Releases Security Updates
Original release date: August 03, 2016 Cisco has released security updates to address vulnera ...


Date published: not known
Details

»Research shows web security products perform well against exploit kits
Research by Virus Bulletin, in which five web security products wer ...
»Throwback Thursday: Olympic Games
In 1994, along with the Olympic Games came an Olympic virus, from a ...
»VB2016 call for last-minute papers opened, discounts announced
Announcing the VB2016 call for last-minute papers and a number of d ...
»Guest Blog: Malicious Scripts Gaining Prevalence in Brazil
In the run up to VB2016, we invited the conference sponsors to writ ...
»Romanian university website compromised to serve Neutrino exploit kit
The website of the Carol Davila University of Medicine and Pharmacy ...
»It's 2016. Can we stop using MD5 in malware analyses?
While there are no actually risks involved in using MD5s in malware ...
»Throwback Thursday: Holding the Bady
In 2001, ‘Code Red’ caused White House administrators to change the ...
»Paper: The Journey of Evasion Enters Behavioural Phase
A new paper by FireEye researcher Ankit Anubhav provides an overvie ...
»Guest blog: Espionage toolkit uncovered targeting Central and Eastern Europe
Recently, ESET researchers uncovered a new espionage toolkit target ...


Date published: not known
Details
Main Menu
· Home
Current Security News
 
US-CERT Current Activity

» Apple Releases Security Update
[25 Aug 2016 01:53pm]

» VMWare Releases Security Updates
[24 Aug 2016 03:33pm]

» FTC Releases Alert on Louisiana Flood Disaster Scams
[23 Aug 2016 05:48pm]

» Fortinet Releases Security Advisory
[22 Aug 2016 02:36pm]

» Cisco Releases Security Updates
[20 Aug 2016 12:56am]

» Cisco Releases Security Update
[12 Aug 2016 01:31pm]

» Microsoft Releases August 2016 Security Bulletin
[09 Aug 2016 12:55pm]

» VMware Releases Security Update
[05 Aug 2016 01:38pm]

» Apple Releases Security Update
[05 Aug 2016 01:25pm]

» Cisco Releases Security Updates
[03 Aug 2016 02:33pm]

***
US-CERT Alerts

» TA16-187A: Symantec and Norton Security Products Contain Critical Vulnerabilities
[05 Jul 2016 08:50am]

» TA16-144A: WPAD Name Collision Vulnerability
[23 May 2016 05:38am]

» TA16-132A: Exploitation of SAP Business Applications
[11 May 2016 05:31am]

» TA16-105A: Apple Ends Support for QuickTime for Windows; New Vulnerabilities Announced
[14 Apr 2016 01:48pm]

» TA16-091A: Ransomware and Recent Variants
[31 Mar 2016 04:00pm]

» TA15-337A: Dorkbot
[03 Dec 2015 04:40pm]

» TA15-314A: Compromised Web Servers and Web Shells - Threat Awareness and Guidance
[10 Nov 2015 06:12pm]

» TA15-286A: Dridex P2P Malware
[13 Oct 2015 05:23am]

» TA15-240A: Controlling Outbound DNS Access
[28 Aug 2015 11:31am]

» TA15-213A: Recent Email Phishing Campaigns – Mitigation and Response Recommendations
[01 Aug 2015 04:01pm]

***
Computerworld Security

» Real-life examples test whether you are prepared for a cyberattack
[26 Aug 2016 07:08am]

» Dropbox prompts certain users to change their passwords
[26 Aug 2016 04:35am]

» U.S. convicts Russian hacker in credit card theft scheme
[25 Aug 2016 04:17pm]

» Apple patches iOS security flaws found in spyware targeting activist
[25 Aug 2016 02:05pm]

» IDG Contributor Network: Blockchain: It's not just for finance anymore
[25 Aug 2016 01:20pm]

» Cisco starts patching firewall devices against NSA-linked exploit
[25 Aug 2016 09:06am]

» So your company’s been hacked: How to handle the aftermath
[25 Aug 2016 08:36am]

» IDG Contributor Network: Lost and stolen devices account for 1 in 4 breaches in the financial services sector
[25 Aug 2016 06:00am]

» HP's Sure View -- protecting your laptop screen from prying eyes
[25 Aug 2016 05:18am]

» Android botnet relies on Twitter for commands
[24 Aug 2016 04:58pm]

» Security Sessions: The pitfalls of security awareness training
[24 Aug 2016 02:49pm]

» Hackers use vBulletin flaw to break into 27M more accounts
[24 Aug 2016 12:17pm]

» Baltimore cops using private company's aerial cameras to conduct secret surveillance
[24 Aug 2016 08:22am]

» NY Times says Moscow bureau was targeted by cyberattack
[24 Aug 2016 04:40am]

» 19% of shoppers would abandon a retailer that’s been hacked
[23 Aug 2016 02:39pm]

***
Microsoft Security Advisories

» 3179528 - Update for Kernel Mode Blacklist - Version: 1.0
[09 Aug 2016 11:00am]

» 2880823 - Deprecation of SHA-1 Hashing Algorithm for Microsoft Root Certificate Program - Version: 2.0
[18 May 2016 11:00am]

» 3155527 - Update to Cipher Suites for FalseStart - Version: 1.0
[10 May 2016 11:00am]

» 3152550 - Update to Improve Wireless Mouse Input Filtering - Version: 1.1
[22 Apr 2016 11:00am]

» 3137909 - Vulnerabilities in ASP.NET Templates Could Allow Tampering - Version: 1.1
[10 Feb 2016 11:00am]

» 2871997 - Update to Improve Credentials Protection and Management - Version: 5.0
[09 Feb 2016 11:00am]

» 3123479 - Deprecation of SHA-1 Hashing Algorithm for Microsoft Root Certificate Program - Version: 1.0
[12 Jan 2016 11:00am]

» 3109853 - Update to Improve TLS Session Resumption Interoperability - Version: 1.0
[12 Jan 2016 11:00am]

» 3118753 - Updates for ActiveX Kill Bits 3118753 - Version: 1.0
[12 Jan 2016 11:00am]

» 2755801 - Update for Vulnerabilities in Adobe Flash Player in Internet Explorer and Microsoft Edge - Version: 53.0
[05 Jan 2016 11:00am]

» 3123040 - Inadvertently Disclosed Digital Certificate Could Allow Spoofing - Version: 1.0
[08 Dec 2015 11:00am]

» 3057154 - Update to Harden Use of DES Encryption - Version: 1.1
[08 Dec 2015 11:00am]

» 3119884 - Inadvertently Disclosed Digital Certificates Could Allow Spoofing - Version: 1.0
[30 Nov 2015 11:00am]

» 3108638 - Update for Windows Hyper-V to Address CPU Weakness - Version: 1.0
[10 Nov 2015 11:00am]

» 3097966 - Inadvertently Disclosed Digital Certificates Could Allow Spoofing - Version: 2.0
[13 Oct 2015 11:00am]

***
WIRED

» Where Are Trump’s and Clinton’s Biggest Donations Coming From? We Made a Map
[26 Aug 2016 05:00am]

» A Hacking Group Is Selling iPhone Spyware to Governments
[25 Aug 2016 11:46am]

» WhatsApp’s Privacy Cred Just Took a Big Hit
[25 Aug 2016 10:16am]

» Of Course Everyone’s Already Using the Leaked NSA Exploits
[24 Aug 2016 11:19am]

» Security News This Week: Eddie Bauer Stores, Hotels and Hospitals Hacked
[20 Aug 2016 05:00am]

» WIRED’s Latest HTTPS Update: We’re Almost There, Folks
[19 Aug 2016 06:27pm]

» Hackers Trick Facial-Recognition Logins With Photos From Facebook (What Else?)
[19 Aug 2016 06:00am]

» Twitter Says It Suspended 360,000 Suspected Terrorist Accounts in a Year
[18 Aug 2016 10:07am]

» Why #LochteGate Is the Diversion America Deserves
[18 Aug 2016 09:43am]

» Voting Machines Are a Mess—But the Feds Have a (Kinda) Plan
[18 Aug 2016 05:00am]

***
Network World Security

» Real-life examples test whether you are prepared for a cyberattack
[26 Aug 2016 06:21am]

» Privacy Shield data transfer agreement now shelters 200 companies
[26 Aug 2016 06:18am]

» Dropbox prompts certain users to change their passwords
[26 Aug 2016 12:39am]

» U.S. convicts Russian hacker in credit card theft scheme
[25 Aug 2016 04:17pm]

» Review: Promisec goes the extra step to secure PCs
[13 Jul 2016 06:21am]

» 4 tools for managing firewall rules
[07 Jul 2016 11:03am]

» 10 advanced endpoint protection tools
[05 Jul 2016 04:00am]

» How to buy endpoint security products
[05 Jul 2016 04:00am]

» 7 trends in advanced endpoint protection
[05 Jul 2016 04:00am]

» 10 cutting-edge tools that take endpoint security to a new level
[05 Jul 2016 04:00am]

» Buyer’s Guide to 9 multi-factor authentication products
[06 Jun 2016 04:00am]

» 5 trends shaking up multi-factor authentication
[06 Jun 2016 04:00am]

» 9-vendor authentication roundup: The good, the bad and the ugly
[06 Jun 2016 04:00am]

» Privacy Shield data transfer agreement now shelters 200 companies
[26 Aug 2016 06:18am]

» Dropbox prompts certain users to change their passwords
[26 Aug 2016 12:39am]

***


More IT Security
News Feeds
More Sponsors

Advertise on this site
RSS Feeds
Our news can be syndicated by using these rss feeds.
rss1.0
rss2.0
rdf
Welcome
Username:

Password:




Remember me

[ ]

NIST.org is in no way connected to the U.S. government site NIST.gov

This site is © John Herron, CISSP. All Rights Reserved.

Please visit daily to stay up to date on all your IT Security compliance issues.

http://www.nist.org -
Hosted by BlueHost. We've never had a better hosting company.
{THEMEDISCLAIMER}