Hackers scan sites in search for private SSH-keys

Hackers scan sites in search for private SSH-keys A publication of a report on the lack of adequate protection for SSH led to an unexpected surge of scans Hackers scanned Web sites running WordPress in search for directories containing private SSH keys, in order to hack them with accidentally compromised credentials. Authentication by SSH can be carried with a classical model (using the login and password), as well as with the help of keys. In the second case, the administrator generates a pair...


Closed critical vulnerability in the PeopleSoft kernel engine

Closed critical vulnerability in the PeopleSoft kernel engine Closed on Tuesday, October 17, a vulnerability with remote code execution as part of a large quarterly issue of Oracle's critical patches has become an alarming call for businesses using PeopleSoft with open access from the Internet This bug with CVE-2017-10366 allows an attacker to remotely execute code on a server running PeopleSoft software. Researchers from ERPScan found that the error lies in the kernel engine. In other words,...


Security of Java applications at a low level

Security of Java applications at a low level Veracode has released a report on the state of application security for the period from April 1, 2016 to March 31, 2017. The new statistics are based on the analysis of about 250 billion lines of code obtained during 400 thousand checks in 1,400 client companies. According to the new statistics, 77% of applications used in the corporate environment suffer from at least one vulnerability, which can be detected at the first scan. For Java applications,...


Google Play again found the malware that integrated infected devices into an advertising botnet

Google Play again found the malware that integrated infected devices into an advertising botnet Experts at Symantec found in the applications from Google Play malware Sockbot Experts at Symantec found in the applications from Google Play malware Sockbot, which combined infected devices into a botnet. As a result, in early October 2017, eight programs from the developer FunBaster, downloaded from 600,000 to 2.6 million times, were removed from the official application catalog. It is worth noting...


Google started a reward program for finding a vulnerabilities in Play Store applications

b Google start a reward program for finding a vulnerability in the Play Store applications A well-known proverb says: “better late than never”. This is exactly the case with GOOGL’s latest decision. As you may know, a variety of malware and “problem” applications are found in the official directory of Google Play. Apparently, neither automated control systems nor manual checks are able to eradicate malware. Google finally decided to take the first step toward recognizing this obvious...


Chrome Web Store removed the Adblock Plus clone

The Chrome Web Store removed the Adblock Plus clone Before Google noticed an error, the extension was downloaded by about 37 thousand users The extension, imitating a popular tool for blocking Adblock Plus ads, was posted on the Chrome Web Store. Before Google noticed the error, the extension was downloaded and installed by about 37 thousand users. It is noteworthy that Google removed the extension only after the anonymous cybersecurity researcher under the pseudonym @SwiftOnSecurity drew the...


LINUX KERNEL FIXES A TWO YEAR OLD VULNERABILITY

LINUX KERNEL FIXES A TWO YEAR OLD VULNERABILITY The problem allowed obtaining a superuser rights on the system Linux kernel eliminates the dangerous privilege vulnerability found more than two years ago. The problem was discovered by a Google employee Michael Davidson in April 2015 and wad fixed in the Linux kernel 4.0 version. Linux developers ported the patch to obsolete 3.x branches with the release of the Linux kernel 3.10.77, but because the vulnerability was not considered to be a serious...