SlideShare a Scribd company logo
By – Sai Kiran
12 million office/home routers vulnerable to ‘Misfortune Cookie’
attacks
• The Misfortune Cookie vulnerability is due to an error within the
HTTP cookie management
• They further added that, all an attacker has to do is to send a
specially crafted HTTP cookie to the public IP address of the
device and take over total control of the network.
• No hacking tools required, just a simple modern browser.
Critical Git Client vulnerability Allows Malicious Remote
Code Execution
 Developers running the open source Git code-repository
software and tools, like GitHub, on Mac OS X and
Windows computers are highly being recommended to
install a security update
 An attacker can craft a malicious Git tree that will cause
Git to overwrite its own .git/config file when cloning or
checking out a repository, leading to arbitrary
command execution in the client machine,
 Git version 2.2.1 release for further information on the
security fixes.
Global Internet Authority ICANN Has Been Hacked
 The Internet Corporation for Assigned Names and
Numbers (ICANN) has been hacked by unknown
attackers that allowed them to gain administrative access
to some of the organization's systems, the organization
confirmed.
 The attackers used "spear phishing" campaign to target
sensitive systems operated by ICANN and sent spoofed
emails disguised as internal ICANN communications to its
staff members.
 The link in the emails took the staff to bogus login page,
where they provided their usernames and passwords with
the keys to their work email accounts.
Detroit City Database Hacked
The entire Detroit data base was hacked and
encrypted via a malware.They demanded 2000
bitcoins to Decrypt the data.Since the files are of no
good use to the city the ransom was not paid
Not Compatiable
Back in 2012 malware called Not Compatible was haunting
android devices. Now more powerful than ever the latest version
of NotCompatible.C has its own self protected encryption. Thus
making this program difficult to find and delete. The only way you
can find out is through Manage Applications>Settings. This will
show you that an application by the long name of
(com.andriod.fixed.update) is running. All you need to do is
simply uninstall it.
A Drone That Can Steal What’s on Your Phone
SensePost Information Security created a drone called Snoopy.
The software designed for Snoopy deceives the person connected to it simply
by making the user think that it is a part of the network that already exists
After being a part of the network that is approved like Macy’s and other public
routers. Once in, it is capable of recording data such as pictures, locations,
Facebook information, Twitter details, contact details, usernames, passwords
RedHack Hacks Turkish Power Distribution System & Deletes INR
41,397.24k Debt of Soma region
The famous Turkish hacker team ‘Redhack’ announced hacking
into power administration system and canceling 1.5 million liras
(approx. 650K US dollars) of electricity bills to be paid to Soma
Electricity Production company.
Sony Hack
 Last month, hackers infiltrated the computer
network of Sony Pictures Entertainment, a major
Hollywood movie studio.
 A group calling itself the Guardians of Peace, or GOP, targeted
the film studio last month.
 There have been suggestions that the attack was retaliation for
a Sony-backed comedy Program “THE INTERVIWE”.
 The hackers posted five Sony movies (four unreleased) to file-
sharing networks.(Annie,Firy, Mr. Turner,Still Alice and To Write
Love on Her Arms.)
 Sony Pictures employees received e-mails from hackers
threatening to harm them and their family members.
 Celebrities' Personal Data - like phone numbers,email id.
 Release Schedules - a number of files detailed confidential
movie release schedules, both for Sony Pictures and Sony-
owned Columbia Pictures.
 Bank Accounts - there are files which contain dozens of bank
accounts, both personal and belonging to Sony corporation.
 Latest :A draft script for the new James Bond film has been
stolen and leaked by hackers, producers have confirmed.
The pirate bay has been taken down by Sweden Police
 Isohunt claims to have tossed copy of Pirate DB
into a lifeboat
 Oldpiratebay.org
Anonymous Hacks Swedish Government in Revenge for 'Pirate
Bay' Takedown
The Anonymous group also left a message at the end of the leak:
"Warning: Merry Christmas & a Happy New Year to all!! Bye :*“
hacked into the government email accounts of Israel, India, Brazil,
Argentina, and Mexico, and revealed their email addresses with
passwords in plain-text.
Chrome Plans to Mark All 'HTTP' Traffic as Insecure from 2015
Let’s Encrypt — A Certificate Authority to Provide Free SSL
Certificates for Entire Web
'SoakSoak' Malware Compromises 100,000 WordPress
Websites
GCHQ Releases 'Cryptoy' App for Kids to Teach Encryption
Las Vegas Sands' Casino Network hit by Destructive
Malware
The cyber attack occurred on this year’s February but the
details of damages to the casino was not publicized until
Bloomberg Businessweek exposed it in a story on Thursday
 The critical zero-day IE vulnerability (CVE-2014-
8967) was discovered by security researcher
Arthur Gerkis of Zero Day Initiative (ZDI) in June this
year.
Microsoft Releases 7 Security Updates
'DeathRing' Chinese Malware Found Pre-Installed On
Several Smartphones
• Counterfeit Samsung GS4/Note II
• A variety of TECNO devices
• Gionee Gpad G1
• Gionee GN708W
• Gionee GN800
• Polytron Rocket S2350
• Hi-Tech Amaze Tab
• Karbonn TA-FONE A34/A37
• Jiayu G4S – Galaxy S4 clones,
• Haier H7
• a i9502+ Samsung clone by an
unspecified manufacturer
Google's reCAPTCHA can tell if You're a Spambot or Human
with Just a Click
Crash Your Friends' WhatsApp Remotely with Just a
Message
Adobe Releases Emergency Flash Player Update to
Address Critical Vulnerability
The critical vulnerability (CVE 2014-8439) in Flash Player for
Windows, Mac and Linux was originally mitigated more
than a month ago in October 14, 2014 patch release, but a
French researcher Kafeine found its exploits in
the Angler and Nuclear malware kits after Adobe released
a patch,
UpCumming
Blackhat – An upcoming
cyber thriller
Newsbytes_NULLHYD_Dec
Thank You 

More Related Content

PPTX
Security News Bytes Null Dec Meet Bangalore
PDF
NewsByte Mumbai October 2017
PDF
News Bytes by Jaskaran Narula - Null Meet Bhopal
PPTX
News Byte Session By Mukesh Pathak
PPTX
Hackers
PPTX
Personal Data Security in a Digital World
PDF
News Bytes - December 2012
PPSX
Cyber Crime and Ethical Hacking
Security News Bytes Null Dec Meet Bangalore
NewsByte Mumbai October 2017
News Bytes by Jaskaran Narula - Null Meet Bhopal
News Byte Session By Mukesh Pathak
Hackers
Personal Data Security in a Digital World
News Bytes - December 2012
Cyber Crime and Ethical Hacking

What's hot (20)

PPT
PPTX
Hacking (cs192 report )
PPTX
Security News Byes- Nov
DOCX
ethical hacking report
PPSX
Hacking
PPTX
DDOS ATTACK - MIRAI BOTNET
PPTX
Hacking & its types
DOCX
Final report ethical hacking
PDF
InfoSec Monthly News Recap: April 2017
PDF
InfoSec Deep Learning in Action
PDF
Nastiest Malware 2021
KEY
Post Apocalyptic Cyber Realism
PPTX
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
PPTX
Security News Bytes (Aug Sept 2017)
PPT
Cybercrime 1
PPTX
Parag presentation on ethical hacking
PPTX
Ethical hacking
PPTX
Hacking ppt
PPTX
Hacking (cs192 report )
Security News Byes- Nov
ethical hacking report
Hacking
DDOS ATTACK - MIRAI BOTNET
Hacking & its types
Final report ethical hacking
InfoSec Monthly News Recap: April 2017
InfoSec Deep Learning in Action
Nastiest Malware 2021
Post Apocalyptic Cyber Realism
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Security News Bytes (Aug Sept 2017)
Cybercrime 1
Parag presentation on ethical hacking
Ethical hacking
Hacking ppt
Ad

Viewers also liked (20)

PDF
Raspberry pi 2
PDF
CSM Storage Debugging
PPTX
88001174636 Marvella city in haridwar
PPTX
Baseball stats
PPTX
Example problems Binomials
DOC
Buying a business in florida
PDF
Heartbleed by-danish amber
PDF
Xss 101 by-sai-shanthan
PPTX
Seh based exploitation
PDF
World Cup! Young Germany Guest Blogging
PDF
Security News Bytes
DOC
So you want to retire in florida 1997 far
PDF
The art of_firewalking-by-sujay
DOC
SAmador CV
PPT
Null dec 2014
PPTX
UGA Guest Lecture: Social Media 101
PPTX
Internet safety presentation
PPTX
PDF
Null July - OWTF - Bharadwaj Machiraju
PDF
Nomadic Display Setup Fabri Mural
Raspberry pi 2
CSM Storage Debugging
88001174636 Marvella city in haridwar
Baseball stats
Example problems Binomials
Buying a business in florida
Heartbleed by-danish amber
Xss 101 by-sai-shanthan
Seh based exploitation
World Cup! Young Germany Guest Blogging
Security News Bytes
So you want to retire in florida 1997 far
The art of_firewalking-by-sujay
SAmador CV
Null dec 2014
UGA Guest Lecture: Social Media 101
Internet safety presentation
Null July - OWTF - Bharadwaj Machiraju
Nomadic Display Setup Fabri Mural
Ad

Similar to Newsbytes_NULLHYD_Dec (20)

PPTX
News bytes Sept-2011
PPTX
Risk base approach for security management fujitsu-fms event 15 aug 2011
PPT
News Bytes June 2012
PPTX
cyber attacks in May , breaches in May
PDF
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
PPTX
Forensic And Cloud Computing
DOCX
SEC 573 Project 1 2.22.15
PDF
On April 19, 2011, system administrators at Sonys On April 22, Sony .pdf
PPSX
APT & Data Breach - Lesson Learned
PPTX
beware of Thing Bot
PDF
Software management, the seasonal return of DDoS - This Week in Security.pdf
PPTX
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
PDF
Developer is an attack vector
PPTX
News Bytes - December 2015
PDF
09 09 2014
PPTX
Year of pawnage - Ian trump
PPTX
Cybercrime trends in last five years
PDF
2015 Labris SOC Annual Report
PPT
Computer hacking
PDF
UQ_Cybercrime_Professionalism_Lecture_2024_07.pdf
News bytes Sept-2011
Risk base approach for security management fujitsu-fms event 15 aug 2011
News Bytes June 2012
cyber attacks in May , breaches in May
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Forensic And Cloud Computing
SEC 573 Project 1 2.22.15
On April 19, 2011, system administrators at Sonys On April 22, Sony .pdf
APT & Data Breach - Lesson Learned
beware of Thing Bot
Software management, the seasonal return of DDoS - This Week in Security.pdf
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
Developer is an attack vector
News Bytes - December 2015
09 09 2014
Year of pawnage - Ian trump
Cybercrime trends in last five years
2015 Labris SOC Annual Report
Computer hacking
UQ_Cybercrime_Professionalism_Lecture_2024_07.pdf

More from Raghunath G (14)

PPSX
Securitynewsbytes
PPT
Whats app forensic
PPSX
Securitynewsbytes april2015-150418153901-conversion-gate01
PPTX
Analysis of malicious pdf
PPTX
Mobile application security 101
PPTX
Security News Bytes
PPTX
Is iso 27001, an answer to security
PDF
Null HYD Playing with shodan null
PDF
Null HYD VRTDOS
PPTX
Metasploit
PPTX
Decoy documents
PDF
Spear phishing attacks-by-hari_krishna
PDF
Social engineering by-rakesh-nagekar
PDF
Netcat 101 by-mahesh-beema
Securitynewsbytes
Whats app forensic
Securitynewsbytes april2015-150418153901-conversion-gate01
Analysis of malicious pdf
Mobile application security 101
Security News Bytes
Is iso 27001, an answer to security
Null HYD Playing with shodan null
Null HYD VRTDOS
Metasploit
Decoy documents
Spear phishing attacks-by-hari_krishna
Social engineering by-rakesh-nagekar
Netcat 101 by-mahesh-beema

Recently uploaded (20)

PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
VCE English Exam - Section C Student Revision Booklet
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
TR - Agricultural Crops Production NC III.pdf
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
01-Introduction-to-Information-Management.pdf
PDF
Complications of Minimal Access Surgery at WLH
PPTX
master seminar digital applications in india
PPTX
Cell Structure & Organelles in detailed.
PDF
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
PPTX
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
PPTX
PPH.pptx obstetrics and gynecology in nursing
PPTX
Pharma ospi slides which help in ospi learning
STATICS OF THE RIGID BODIES Hibbelers.pdf
Pharmacology of Heart Failure /Pharmacotherapy of CHF
VCE English Exam - Section C Student Revision Booklet
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
O5-L3 Freight Transport Ops (International) V1.pdf
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
2.FourierTransform-ShortQuestionswithAnswers.pdf
Supply Chain Operations Speaking Notes -ICLT Program
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
TR - Agricultural Crops Production NC III.pdf
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
01-Introduction-to-Information-Management.pdf
Complications of Minimal Access Surgery at WLH
master seminar digital applications in india
Cell Structure & Organelles in detailed.
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
PPH.pptx obstetrics and gynecology in nursing
Pharma ospi slides which help in ospi learning

Newsbytes_NULLHYD_Dec

  • 1. By – Sai Kiran
  • 2. 12 million office/home routers vulnerable to ‘Misfortune Cookie’ attacks • The Misfortune Cookie vulnerability is due to an error within the HTTP cookie management • They further added that, all an attacker has to do is to send a specially crafted HTTP cookie to the public IP address of the device and take over total control of the network. • No hacking tools required, just a simple modern browser.
  • 3. Critical Git Client vulnerability Allows Malicious Remote Code Execution
  • 4.  Developers running the open source Git code-repository software and tools, like GitHub, on Mac OS X and Windows computers are highly being recommended to install a security update  An attacker can craft a malicious Git tree that will cause Git to overwrite its own .git/config file when cloning or checking out a repository, leading to arbitrary command execution in the client machine,  Git version 2.2.1 release for further information on the security fixes.
  • 5. Global Internet Authority ICANN Has Been Hacked
  • 6.  The Internet Corporation for Assigned Names and Numbers (ICANN) has been hacked by unknown attackers that allowed them to gain administrative access to some of the organization's systems, the organization confirmed.  The attackers used "spear phishing" campaign to target sensitive systems operated by ICANN and sent spoofed emails disguised as internal ICANN communications to its staff members.  The link in the emails took the staff to bogus login page, where they provided their usernames and passwords with the keys to their work email accounts.
  • 7. Detroit City Database Hacked The entire Detroit data base was hacked and encrypted via a malware.They demanded 2000 bitcoins to Decrypt the data.Since the files are of no good use to the city the ransom was not paid
  • 8. Not Compatiable Back in 2012 malware called Not Compatible was haunting android devices. Now more powerful than ever the latest version of NotCompatible.C has its own self protected encryption. Thus making this program difficult to find and delete. The only way you can find out is through Manage Applications>Settings. This will show you that an application by the long name of (com.andriod.fixed.update) is running. All you need to do is simply uninstall it.
  • 9. A Drone That Can Steal What’s on Your Phone SensePost Information Security created a drone called Snoopy. The software designed for Snoopy deceives the person connected to it simply by making the user think that it is a part of the network that already exists After being a part of the network that is approved like Macy’s and other public routers. Once in, it is capable of recording data such as pictures, locations, Facebook information, Twitter details, contact details, usernames, passwords
  • 10. RedHack Hacks Turkish Power Distribution System & Deletes INR 41,397.24k Debt of Soma region The famous Turkish hacker team ‘Redhack’ announced hacking into power administration system and canceling 1.5 million liras (approx. 650K US dollars) of electricity bills to be paid to Soma Electricity Production company.
  • 11. Sony Hack  Last month, hackers infiltrated the computer network of Sony Pictures Entertainment, a major Hollywood movie studio.
  • 12.  A group calling itself the Guardians of Peace, or GOP, targeted the film studio last month.  There have been suggestions that the attack was retaliation for a Sony-backed comedy Program “THE INTERVIWE”.  The hackers posted five Sony movies (four unreleased) to file- sharing networks.(Annie,Firy, Mr. Turner,Still Alice and To Write Love on Her Arms.)  Sony Pictures employees received e-mails from hackers threatening to harm them and their family members.
  • 13.  Celebrities' Personal Data - like phone numbers,email id.  Release Schedules - a number of files detailed confidential movie release schedules, both for Sony Pictures and Sony- owned Columbia Pictures.  Bank Accounts - there are files which contain dozens of bank accounts, both personal and belonging to Sony corporation.  Latest :A draft script for the new James Bond film has been stolen and leaked by hackers, producers have confirmed.
  • 14. The pirate bay has been taken down by Sweden Police
  • 15.  Isohunt claims to have tossed copy of Pirate DB into a lifeboat  Oldpiratebay.org
  • 16. Anonymous Hacks Swedish Government in Revenge for 'Pirate Bay' Takedown The Anonymous group also left a message at the end of the leak: "Warning: Merry Christmas & a Happy New Year to all!! Bye :*“ hacked into the government email accounts of Israel, India, Brazil, Argentina, and Mexico, and revealed their email addresses with passwords in plain-text.
  • 17. Chrome Plans to Mark All 'HTTP' Traffic as Insecure from 2015
  • 18. Let’s Encrypt — A Certificate Authority to Provide Free SSL Certificates for Entire Web
  • 19. 'SoakSoak' Malware Compromises 100,000 WordPress Websites
  • 20. GCHQ Releases 'Cryptoy' App for Kids to Teach Encryption
  • 21. Las Vegas Sands' Casino Network hit by Destructive Malware The cyber attack occurred on this year’s February but the details of damages to the casino was not publicized until Bloomberg Businessweek exposed it in a story on Thursday
  • 22.  The critical zero-day IE vulnerability (CVE-2014- 8967) was discovered by security researcher Arthur Gerkis of Zero Day Initiative (ZDI) in June this year. Microsoft Releases 7 Security Updates
  • 23. 'DeathRing' Chinese Malware Found Pre-Installed On Several Smartphones • Counterfeit Samsung GS4/Note II • A variety of TECNO devices • Gionee Gpad G1 • Gionee GN708W • Gionee GN800 • Polytron Rocket S2350 • Hi-Tech Amaze Tab • Karbonn TA-FONE A34/A37 • Jiayu G4S – Galaxy S4 clones, • Haier H7 • a i9502+ Samsung clone by an unspecified manufacturer
  • 24. Google's reCAPTCHA can tell if You're a Spambot or Human with Just a Click
  • 25. Crash Your Friends' WhatsApp Remotely with Just a Message
  • 26. Adobe Releases Emergency Flash Player Update to Address Critical Vulnerability The critical vulnerability (CVE 2014-8439) in Flash Player for Windows, Mac and Linux was originally mitigated more than a month ago in October 14, 2014 patch release, but a French researcher Kafeine found its exploits in the Angler and Nuclear malware kits after Adobe released a patch,
  • 28. Blackhat – An upcoming cyber thriller