Netizen Cyber Threat Intelligence – July 8th, 2015

Welcome to the Netizen IT Threat Intelligence Newsletter.  A complimentary service of Netizen Corporation, intended to help protect your business from the ever growing and ever changing threat of cyber attacks.

 ZERO DAY VULNERABILITY ALERT 

Microsoft Office – OLE Packager Allows Code Execution In All Office Versions, With Macros Disabled And High Security Templates Applied

“OLE Packager is a feature introduced in Windows 3.1, which ran “up to” Windows XP. It is still present in every version of Microsoft Office, on every Windows OS. It allows you to embed any file into Office documents.  It is also very dangerous and there is no way to disable it.”

July 2nd, 2015 – Seclist.org


Hacking Team Hacked, Attackers Claim 400GB In Dumped Data

Specializing in surveillance technology, Hacking Team is now learning how it feels to have their internal matters exposed to the world.”


Bug in Android ADB Backup System Can Allow Injection of Malicious Apps

“There’s a severe vulnerability in the way that all versions of Android handle the restoration of backups that can allow an attacker to inject a malicious APK file into the backup archive.”

July 9th, 2015 – ThreatPost.com


Harvard Reveals It Had An IT Breach In June Impacting 8 Colleges And Administrations

“Harvard University on Wednesday announced that on June 19, it discovered a breach in the IT systems of its Faculty of Arts and Sciences and Central Administration, currently impacting eight different schools and administrative organizations at the university.”

July 2nd, 2015 – TechCrunch.com


In Other News:
Orlando Health, Cuesta College, Firekeepers Casino Acknowledge Data Breaches – Esecurityplanet.com, 7/8/2015
Card Breach At Trump Hotel Properties – KrebsOnSecurity.com, 7/2/2015

Now Is The Time To Be Proactive In Protecting Your Business.  We Can Help:

Netizen Corporation, with years of security expertise, can provide your business with the understanding and preparation needed to most effectively protect its valuable information. We implement dynamic and flexible solutions, establishing a proactive defense against security breaches from the human element to the cloud.  We will help safeguard  your valuable information.

Leave a Reply

Please log in using one of these methods to post your comment:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.