Archive for the ‘Shodan’ Category

Was the Devil’s Ivy Vulnerability a Dud? Don’t Count on It.

August 11th, 2017

In-brief: The Devil’s Ivy vulnerability in the open source gSOAP library is widespread and supposedly trivial to exploit. So why, one month later, haven’t we seen any attacks? Is Devil’s Ivy a dud? ‘Don’t count on it,’ security experts tell us. In July, the warnings were all about the so-called...

Read the whole entry... »

Related Stories

Posted in connected devices, Devil's Ivy, hardware, Internet of things, malware, password, Patching, Reports, Search engine, Senrio, Senrio (Xipiter), Shodan, software, Top Stories, vulnerabilities | Comments (0)

Heartbleed’s Heartburn: Why a 5 Year Old Vulnerability Continues to Bite

July 6th, 2017

In-brief: more than three years after it was first discovered, the Heartbleed vulnerability in OpenSSL continues to plague organizations worldwide. Why has it been so hard to fix? In this Industry Perspective, Mike Pittenger of the firm Black Duck talks about some of the complicating factors that make vulnerabilities like Heartbleed so hard to...

Read the whole entry... »

Related Stories

Posted in contributed, forensics, heartbleed, Microsoft, Mobile Threats, Open Source, OpenSSL, Opinion, Patching, Policy, privacy, Reports, Search engine, Shodan, Top Stories, trends, vulnerabilities | Comments (0)

Malware Hunter Crawls Internet Looking for RAT C2s

May 2nd, 2017
A new crawler from Shodan and Recorded Future called Malware Hunter seeks out command and control servers managing endpoints infected with remote access Trojans and other malware.

Posted in Daniel Hatheway, GhostRAT, John Matherly, malware, malware crawler, malware detection, Malware Hunter, RATs, Recorded Future, Remote Access Trojans, Shodan, Web Security | Comments (0)

New Shodan Module hunts RATs

May 2nd, 2017

In-brief: a new service built into Internet of Things search engine Shodan promises to find the computers that control remote access trojans (RATs) – a common form of information stealing malware.  A new service from Internet of Things search engine Shodan promises to find computers infected with remote access trojans (or RATs). The...

Read the whole entry... »

Posted in apt, data theft, Internet of things, keylogger, malware, RAT, Recorded Future, Search engine, Shodan, threat intelligence, Threats, Top Stories, trojan | Comments (0)

Malware Hunter — Shodan’s new tool to find Malware C&C Servers

May 2nd, 2017
Rapidly growing, insecure internet-connected devices are becoming albatross around the necks of individuals and organizations with malware authors routinely hacking them to form botnets that can be further used as weapons in DDoS and other cyber attacks. But now finding malicious servers, hosted by attackers, that control botnet of infected machines gets a bit easier. Thanks to Shodan and

Posted in Botnet, botnet detection, Cyber Attacks, DDoS, IoT Search Engine, Malware Hunter, Search engine, Shodan, Shodan search engine | Comments (0)

Unsecured database exposed diabetics’ sensitive data

April 11th, 2017
Close to a million records belonging to senior citizens in the US were exposed - and since deleted - but included details such as health insurance providers and medical issues

Posted in breach, data loss, DataBreaches.net, Daynier Brown, Dino Romano, Flash Gordan, Have I been pwned, MediboxSolutions, medical records, phishing, privacy, Security threats, Shodan, Spear Phishing, telemarketing | Comments (0)

Brickerbot: and You will know It by the Trail of Linux Devices

April 7th, 2017

In-brief: new botnets, dubbed “Brickerbot” were first spotted in recent weeks conducting what Radware termed “permanent denial of service” attacks: compromising and then destroying data on vulnerable connected endpoints.  The security firm Radware is warning about a pair of new and destructive botnets that are crippling...

Read the whole entry... »

Posted in apt, Botnet, Brickbot, connected devices, Hacking, hacks, Internet of things, Radware, Reports, Search engine, Shodan, vulnerabilities | Comments (0)

NAS Holes: Air Force Data Leak the Tip of Very Large Iceberg

March 22nd, 2017

In-brief: The recently disclosed trove of personnel files by an US Air Force officer is one piece of a much larger phenomenon: exposed, vulnerable and Internet-connected network attached storage (or NAS) devices chock full of gigabytes sensitive data. The recently disclosed trove of personnel files by an US Air Force officer is just the latest...

Read the whole entry... »

Posted in data breach, data loss, data privacy, Hacking, hacks, Hacks & Hackers, hardware, Internet of things, MacKeeper, NAS, network attached storage, password, passwords, Patching, Reports, rsync, Search engine, Shodan, software, Top Stories, trends, vulnerabilities | Comments (0)

NAS Holes: Air Force Data Leak the Tip of Very Large Iceberg

March 22nd, 2017

In-brief: The recently disclosed trove of personnel files by an US Air Force officer is one piece of a much larger phenomenon: exposed, vulnerable and Internet-connected network attached storage (or NAS) devices chock full of gigabytes sensitive data. The recently disclosed trove of personnel files by an US Air Force officer is just the latest...

Read the whole entry... »

Posted in data breach, data loss, data privacy, Hacking, hacks, Hacks & Hackers, hardware, Internet of things, MacKeeper, NAS, network attached storage, password, passwords, Patching, Reports, rsync, Search engine, Shodan, software, Top Stories, trends, vulnerabilities | Comments (0)

Spam Operation Laid Open, Exposing Data on 1.4 Billion

March 6th, 2017

In-brief: A security researcher searching the Internet for insecure data archives stumbled upon an information gold mine: 5 Terabytes of unsecured back ups belonging to one of the globe’s biggest and longest running spam e-mail operations. The data – more than five terabytes in all – has laid open the workings of a little known...

Read the whole entry... »

Posted in data loss, data privacy, email, google, Hacking, hacks, MacKeeper, Reports, Search engine, Shodan, spam, Spamhaus, Top Stories | Comments (0)