Category Archives: Security News

The FIREBALL PUP, PUA, Adware or Malware Outbreak? Or just a successful Adware Campaign?

FIREBALL Adware or Malware? The malware, called Fireball, acts as a browser-hijacker but and can be turned into a full-functioning malware downloader. Fireball is capable of executing any code on the victim machines, resulting in a wide range of actions from stealing credentials to dropping additional malware. Fireball is spread mostly via bundling i.e. installed… Read More »

Share Button

What is the Difference between Adware and Malware FIREBALL / Elex – WHAT YOU NEED TO KNOW!

A question I am frequently asked about is what is the difference between adware (legal software that will however overload you with ads and make money) vs. malware (crimeware to be specific). Typically there is a fine line between the two, a good example of a successful adware company is that of OpinionSpy/Marketscore which bundles… Read More »

Share Button

D-Link DIR-850L – Unauthenticated OS Command Execution Vulnerability RCE Router

D-Link DIR-850L suffers from a serious vulnerability allowing for OS command execution, if you have this version of D-Link it is highly recommended that you upgrade the firmware immediately and firewall off all access to this device. This will not help you prevent insider threats but will stop the masses from locating and owning your… Read More »

Share Button

HUGE VULNERABILITY Remote Code Execution Possible with Cisco Smart Install Protocol Misuse

. Technical Details Smart Install is a plug-and-play configuration and image-management feature that provides zero-touch deployment for new switches. The Smart Install feature incorporates no authentica-tion by design. SmartInstall also has mechanisms in place for subsequent Cisco IOS Software and configura-tion upgrades on groups of switches, using a single command line interface (CLI) and switch… Read More »

Share Button

Wcry WannaCry WCry Ransomware Malware ETERNALBLUE/MS17-010 Worm is dead or is it? – active new IOCs Domain Names/IPs

Ransomware is nothing new, since 2012 it has been wreaking havoc on the world. The TTPs for delivering and infecting victims has changed over the years but the end goal remains the same, give me your money or you’ll never see your files again. Some of the first ransomware campaigns used mechanisms such as exploit… Read More »

Share Button