First quarter sales were up 50 percent and Palo Alto Networks raised its sales forecast for the second quarter.
Google's Macintosh Operations Team announced the availability of the source code for "Santa," a tool designed for whitelisting and blacklisting binaries on Apple's Mac OS X operating systems.
Google Apps corporate subscribers can look forward to some new specials that will hopefully keep sensitive data even more secure beyond the holidays.
Two governments working together are said to have developed the state-sponsored malware that attacked the European Union. Guess what? One of the makers was an EU country.
A number Hikvision digital video recorders contain vulnerabilities that an attacker could remotely exploit in order to gain full control of those devices.
Symantec wasn't the only company following Regin. Kaspersky and F-Secure have something to say about who was hit. Regin also spies on GSM cellular networks.
This is an interesting bug in qemu, although since its in a emulation software, it is not that critical in production environment[as far as i know, things might be different].
the cve entry for this bug says following:
“Buffer overflow in the e1000_receive function in the e1000 device driver (hw/e1000.c) in QEMU 1.3.0-rc2 and other versions, when the SBP and LPE flags are disabled, allows remote attackers to cause a denial of service (guest OS crash) and possibly execute arbitrary guest code via a large packet.”
1. set $PYTHONPATH to the sulley dir
2. set $PATH to include python executable.
3.Install libdnet. go to python dir and run python setup.py install
then run any fuzzer from sulley_l2 main dir. should work.
Denis Fisher talks with Costin Raiu of the Kaspersky Lab GReAT Team about the discovery of the Regin APT malware, the threat's targets and tactics, its ability to compromise GSM base stations and its other capabilities.