• Articles
    • Editorial Articles
    • Research Articles
    • WatchGuard Articles
  • Daily Security Bytes
  • The 443 Podcast
  • Threat Landscape
  • About
    • About Us
    • Contact Us
    • Contribute to Secplicity

Secplicity - Security Simplified

Powered by WatchGuard Technologies

WatchGuard Security Week in Review: Episode 53 – RSA 2013

March 1, 2013 By Corey Nachreiner

RSA 2013: Big Data, Chinese APT, and User Awareness

This week’s InfoSec news video comes from the 2013 RSA Security Conference in San Francisco. As such, much of the episode covers the major themes from the show flow. However, cyber attackers don’t take a break just because the security industry is having a pow-wow. I also cover other big stories from the week, including an emergency Flash update, a cPanel breach, new nation-state malware, and even an HTML5 trick than can fill you hard drive. Check out the episode below.

As always, feel free to browse the Reference section for more details on any of these stories, and thanks for watching. Comment if you have any suggestions.

(Episode Runtime: 10:11)

Direct YouTube Link: http://www.youtube.com/watch?v=AJbDQnkUToE

Episode References:

  • RSA-related Articles:
    • Big Data helps and hinders security – ComputerWorld
    • We need more user security education – v3.co.uk
    • How to stop China hacking – CRN
    • China claims the US attacks their military sites – Phys.org
  • Emergency Flash Patch Fixes 0day – WGSC
  • Researchers find two more Java 0day – ZDNet
  • cPanel support server breached, credentials stolen – The Register
  • Miniduke APT blog post [and PDF report] – Securelist Blog
  • FillDisk HTML5 (LocalStorage) hack – Jeffrey Carr Blog
  • EXTRAS
    • Australia teen raided for gaming network hacks – ComputerWorld
    • Stuxnet may have existed in 2005 – NetworkWorld
    • Anonymous leaks BoA data, supposedly via a third party – ComputerWorld

— Corey Nachreiner, CISSP (@SecAdept)

Share This:

Related

Filed Under: Security Bytes Tagged With: Adobe, Android malware, Anonymous, DroidCleaner, Federal Reserve Bank, Hacked, Hacking, Honeywell, ICS, Infosec news, Malware, Microsoft, oday, OpLastResort, SCADA, Security breach, Software vulnerabilities, Updates and patches, Zero day exploit

Comments

  1. Alexander Kushnarev (Rainbow Security) says

    March 3, 2013 at 10:31 am

    Both Kaspersky Lab and CrySyS Lab found very professional crafted malware (MiniDuke). Just think about it this way – how many efforts of professional coders (I think it was not created by a single person) were spent to create such “chain of worklogic”: using 0-day vulnerability as transport, 3 stages of infection (using 20KB downloader, created on assembler, at 1st stage), using Google search and Twitter as a pointers to the next piece of malware, highly obfuscated code, 4 C&C servers in different countries, self-generated and polymorphous body-files and various masquerading memorandums inside PDF? Looks like hacker’s team work. If only such peoples work for professional security companies – their great talent wasn’t used in so destructive manner.

    Reply
    • Corey Nachreiner says

      March 25, 2013 at 10:38 am

      Yup.. miniduke was impressive. Have you read about the new South Korean malware (deleted drives). Not that advanced, but still interesting.

      Reply
  2. Clash of Clans Free Gems says

    July 11, 2013 at 10:34 pm

    Good day I am so glad I found your site, I really found you by mistake, while I was looking on Yahoo for something else, Nonetheless I am here now and would just
    like to say kudos for a marvelous post and a all round thrilling blog (I also love the theme/design),
    I don’t have time to read it all at the moment but I have saved it and also added your RSS feeds, so when
    I have time I will be back to read much more, Please do keep up the superb b.

    Reply
  3. Hack Clash of Clans says

    July 30, 2013 at 4:24 pm

    My spouse and I stumbled over here different web address and thought I
    may as well check things out. I like what I see so now i’m following you. Look forward to looking at your web page for a second time.

    Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

The 443 Podcast

A weekly podcast featuring the leading white-hat hackers and security researchers. Listen Now
the 443 podcast

Threat Landscape

Filter and view Firebox Feed data by type of attack, region, country, and date range. View Now
threat landscape

Top Posts

  • USA’s Answer to GDPR
  • Rolling PWN
  • Hacker Summer Camp 2022

Email Newsletter

Sign up to get the latest security news and threat analysis delivered straight to your inbox

By signing up you agree to our Privacy Policy.


The views and opinions expressed on this website are those of the authors and do not necessarily reflect the policy or position of WatchGuard Technologies.

Stay in Touch

Recent Posts

  • Hacker Summer Camp 2022
  • Private Sector Offensive Actors
  • USA’s Answer to GDPR
  • Rolling PWN
  • Over a Billion Records Leaked in Shanghai National Police Database Hack
View All

Search

Archives

Copyright © 2022 WatchGuard Technologies · Cookie Policy · Privacy Policy · Terms of Use