Tag: Latest Computer Security News

RAMMap v1.5

Have you ever wondered exactly how Windows is assigning physical memory, how much file data is cached in RAM, or how much RAM is used by the kernel and device drivers? RAMMap makes answering those questions easy. RAMMap is an advanced physical memory usage analysis utility for Windows Vista and higher. It presents usage information …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2016/09/28/rammap-v1-5/

Torrentz Shuts Down, Largest Torrent Meta-Search Engine Says Farewell

Torrentz.eu, one of the world’s largest torrent sites, has announced “farewell” to its millions of users. The meta-search engine, which hosted no torrents of its own but linked to other sites including The Pirate Bay, has decided to cease its operation. The surprise shutdown marks the end of an era. Full story here:https://torrentfreak.com/torrentz-shuts-down-largest-torrent-meta-search-engine-says-farewell-160805/

Permanent link to this article: http://www.darknessgate.com/2016/08/05/torrentz-shuts-down-largest-torrent-meta-search-engine-says-farewell/

Top Security Highlights from 2014

2014 has been a busy and exciting year for security at Cisco! The team has worked extremely hard to provide our customers with unmatched visibility, continuous control and advanced threat protection across the entire attack continuum. Among many things, Cisco launched the first threat-focused Next Generation Firewall: Cisco ASA with FirePOWER Services. This solution delivers …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2014/12/25/top-security-highlights-from-2014/

Tor Project puzzles over how the law shredded anonymity in Operation Onymous

In or about May 2014, the FBI identified a server located in a foreign country that was believed to be hosting the Silk Road 2.0 website at the time (the “Silk Road 2.0 Server”). On or about May 30, 2014, law enforcement personnel from that country imaged the Silk Road 2.0 Server and conducted a …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2014/11/13/tor-project-puzzles-law-shredded-anonymity-operation-onymous/

18 Critical Vulnerabilities Patched in Flash Player 15.0.0.223

The latest revision of Adobe Flash Player incorporates a set of 18 security fixes, all for critical vulnerabilities; most of them (15) would allow a potential attacker to execute arbitrary code on the affected machine. Previous versions of the software are susceptible to glitches ranging from memory corruption, use-after-free and heap buffer overflow to double …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2014/11/13/18-critical-vulnerabilities-patched-flash-player-15-0-0-223/

DDoS Attacks Cost $40,000 / €32,180 per Hour on Average

In report seeking to measure the impact of distributed denial-of-service (DDoS) attacks on affected organizations, it is revealed that the average cost per hour of assault is $40,000 / €32,180, with half of the surveyed companies recording losses of $500,000 / €402,000 during an incident. The study was conducted by Incapsula, a company providing protection …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2014/11/13/ddos-attacks-cost-40000-e32180-per-hour-average/

Symantec Intelligence Report September 2014

Symantec Intelligence Report September 2014 from Symantec Symantec Intelligence aims to provide the latest analysis of cyber security threats, trends, and insights concerning malware, spam, and other potentially harmful business risks. The average number of spear-phishing attacks rose to 53 per day in September, after a 12-month low in August. Spear phishing activity has returned …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2014/11/11/symantec-intelligence-report-september-2014/

Russian hackers’ ‘Trojan Horse’ malware inside U.S. critical infrastructure since 2011

A Russian hacking campaign against U.S. critical infrastructure has gone on since 2011 and puts hundreds of thousands of Americans at risk. http://www.washingtontimes.com/news/2014/nov/6/russian-hackers-trojan-horse-malware-inside-us-cri/

Permanent link to this article: http://www.darknessgate.com/2014/11/11/russian-hackers-trojan-horse-malware-inside-u-s-critical-infrastructure-since-2011/

Global cyber-attack instant map

Global cyber-attack instant map https://ctf365.com/pages/map

Permanent link to this article: http://www.darknessgate.com/2014/11/11/global-cyber-attack-instant-map/

Rotten Tomato: APT or Common Hack Attempt?

A fresh threat that Sophos is calling “Rotten Tomato” has splattered on the scene, and it shows that common hackers are now sharing code and techniques more common to advanced persistent threat (APT) malware campaigns. The name is a reference to the Tomato Garden campaign. As in that attack, several different groups used the same …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2014/11/10/rotten-tomato-apt-common-hack-attempt/

Malicious Word Macro Attacks Re-surging

Proving once again that old security problems die hard, Invincea reports a surge in weaponized Word document attachments leveraging an old, but effective, infection vector: malicious Word macros. Recent exploits via MS Office attachments grabbed headlines because vulnerabilities exploited by the Sandworm gang (CVE-2014-4114) or the most recent unpatched vulnerability (CVE-2014-6352) being exploited by poisoned …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2014/11/08/malicious-word-macro-attacks-re-surging/