Samsung: Check your smart TVs for malware!
infosec

Samsung: Check your smart TVs for malware!

Two years ago, in particular in 2017 in May, Wikileaks revealed that the CIA used software, the ...
Read More
infosec

ACU: University of Australia fell victim to phishing

Another phishing strike was recently reported at a Catholic University of Australia (ACU). The ACU announced that it ...
Read More
infosec

Coincheck: Russian hackers behind the theft of 530 million dollars?

In January of 2018, the Japanese exchange platform, Coincheck, received an attack, resulting in the loss of the New Economy Movement (NEM) ...
Read More
infosec

Echobot malware is a new version of Mirai!

If there is one thing that seems to have no end to security issues are the authors of malware who ...
Read More
infosec

Mermaids: Personal messages spilled between the organization and parents of transgender children

Mermaids UK is an organization founded by parents of transgender children and aims to support these children ....
Read More
Latest Posts

US-CERT warns of zero-day exploit of Windows

United States Computer Emergency Readiness Team (US-CERT) warns of a new exploit kit kit developed by Shadow Brokers hacking team The new exploit kit is available for sale and targets Windows systems.

Earlier this week, rumors were released that wanted Shadow Brokers to try to sell a zero-day Windows for 750 Bitcoin, and US-CERT says it should take action immediately.
US-CERT

In its publication, US-CERT reports that zero-day exploit targets a vulnerability that is available on all Windows systems through the Server Message Block (SMB) feature. A successful attack allows an attacker to obtain sensitive information from affected systems.

The team recommends Windows administrators to disable SMB v1 and block all SMB versions on the network limit by blocking the TCP 445 port along with all the relevant protocols on the UDP 137-138 ports and the TCP 139 port, for all devices, even if the above measures could obviously have an impact on the proper functioning of the system.

For the time being, however, it is important to note that there is still no confirmation of this zero-day in Windows, by Microsoft itself that does not seem to know that there is an unpatched vulnerability.

https://www.us-cert.gov

Do you have an opinion? Leave your comment.

The author allows you to copy his / her text only if you report the source (SecNews.gr), as an e-mail address (Live URL) of the article.
Updated on by

Reader Interactions

Leave a reply

Your email address is not published. Τα υποχρεωτικά πεδία σημειώνονται με *