White Hat Computer Consulting

Solutions are only the beginning

Internet Storm Center

Subscribe to Internet Storm Center feed Internet Storm Center
Updated: 9 min 33 sec ago

Oracle July 2014 CPU (patch bundle), (Tue, Jul 15th)

Tue, 07/15/2014 - 16:29

In addition to the Java vulnerabilities that I

Oracle Java: 20 new vulnerabilities patched, (Tue, Jul 15th)

Tue, 07/15/2014 - 14:09

Welcome to the n-th iteration of "patch now" for Java on Workstations. Oracle today published the ...(more)...

AOC Cloud, (Tue, Jul 15th)

Mon, 07/14/2014 - 18:08

In matters of food and wine, the Europeans have this concept of "AOC", based on the originally Fr ...(more)...

E-ZPass phishing scam, (Mon, Jul 14th)

Mon, 07/14/2014 - 13:45

Over the last couple of days, we have been seeing a number of quite credibly looking phishing ema ...(more)...

The Internet of Things: How do you "on-board" devices?, (Mon, Jul 14th)

Mon, 07/14/2014 - 03:43

Certified pre-pw0ned devices are nothing new. We talked years ago about USB picture frames t ...(more)...

Metasploit Update Alert, (Fri, Jul 11th)

Fri, 07/11/2014 - 09:27

Update your metasploit instances to take advantage of the new "Reverse HTTP Hop Stager" for meter ...(more)...

Egress Filtering? What - do we have a bird problem?, (Fri, Jul 11th)

Fri, 07/11/2014 - 08:48

One of the major tools that we have in our arsenal to control malware is outbound filtering at fi ...(more)...

Finding the Clowns on the Syslog Carousel, (Thu, Jul 10th)

Thu, 07/10/2014 - 10:39

So often I see clients faithfully logging everything from the firewalls, routers and switches - t ...(more)...

Certificate Errors in Office 365 Today, (Thu, Jul 10th)

Thu, 07/10/2014 - 08:34

It looks like there's a mis-assignment of certificates today at Office 365.  After login, th ...(more)...

Who inherits your IP address?, (Wed, Jul 9th)

Wed, 07/09/2014 - 03:33

Somewhat similar to the typo squatting story earlier, the recent proliferation of cloud service u ...(more)...

Who owns your typo?, (Wed, Jul 9th)

Tue, 07/08/2014 - 19:18

Here's one way how to get at sensitive data that seems to be making a comeback. Already in the ol ...(more)...

Pages