Skip to content

Gotham Security Daily Threat Alerts

by on October 17, 2013

October 16, The Register – (International) Oracle drops shedload of CRITICAL vuln-busting Java patches. Oracle released its October Critical Patch Update (CPU) which includes patches for 127 security vulnerabilities across a range of products. Fifty-one vulnerabilities were addressed in Java, including 12 that could allow attackers to take full control of targeted machines without authentication. Source:

October 16, Softpedia – (International) 5 vulnerabilities fixed with release of Chrome 30.0.1599.101. Google released the latest update for its Chrome browser, closing five security issues. Source: 27.

October 16, Softpedia – (International) Researchers identify two sandbox escape vulnerabilities in IBM SDK for Java 7.0. Researchers from Security Explorations identified and reported two Java sandbox escape vulnerabilities affecting Java SDK for Java Technology Edition, version 7.0 SR5. The researchers sent a report and proof-of-concept to IBM October 16. Source:

October 16, CNET – (International) Microsoft-DS no longer hackers’ top target. Akamai stated in their “State of the Internet” report that Microsoft-DS, also known as Port 445, was no longer the primary path of attack for attackers, for the first time since Akamai began gathering data on attack vectors in 2008. Cybercriminals have instead changed to targeting users through HTTP Port 80 and SSL Port 443. Source:

October 16, Softpedia – (International) hijacking: Theft of employee credentials, not faxed DNS change request. Rapid7 reported that a recent attack by hacktivist group KDMS Team did not use a fax request to to change Rapid7 and Metasploit’s DNS records, as previously reported. Instead, Rapid7 found that the attackers used social engineering to obtain employee credentials for use in the DNS record change. Source:

October 15, Softpedia – (International) Info stealer trojan Nemim used against organizations from the U.S. and Japan. Symantec researchers found that the Nemim trojan is being used in a campaign targeting U.S. and Japanese organizations to collect information from infected computers, and that the campaign and trojan appear similar to the Egobot trojan that has been used to target South Korean organizations since 2009. Source:

From → Security

Comments are closed.

%d bloggers like this: