<?xml version="1.0" encoding="utf-8" standalone="yes" ?>
<rss version="2.0" 
  xmlns:content="http://purl.org/rss/1.0/modules/content/" 
  xmlns:dc="http://purl.org/dc/elements/1.1/" 
  xmlns:atom="http://www.w3.org/2005/Atom" 
  xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" 
  xmlns:media="http://search.yahoo.com/mrss/">
  <channel>
    <title>Heartbleed on Untrusted Network</title>
    <link>https://untrustednetwork.net/en/tag/heartbleed/</link>
    <description>Recent content in Heartbleed on Untrusted Network</description>
    <generator>Hugo -- gohugo.io</generator>
    <language>en</language>
    <copyright>&amp;copy; Jan Kopriva 2015 - {year}</copyright>
    <lastBuildDate>Mon, 16 Nov 2020 11:08:20 +0200</lastBuildDate>
    <sy:updatePeriod>weekly</sy:updatePeriod>
    <sy:updateFrequency>weekly</sy:updateFrequency>
    
        <atom:link href="https://untrustednetwork.net/en/tag/heartbleed/index.xml" rel="self" type="application/rss+xml" />
    
    
    

      
      <item>
        <title>SANS ISC Diary - Vulnerabilities don’t disappear just because we don’t talk about them anymore</title>
        <link>https://untrustednetwork.net/en/2020/11/16/sans-isc-diary-vulnerabilities-dont-disappear-just-because-we-dont-talk-about-them-anymore/</link>
        <pubDate>Mon, 16 Nov 2020 11:08:20 +0200</pubDate>
        
        <atom:modified>Mon, 16 Nov 2020 11:08:20 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2020/11/16/sans-isc-diary-vulnerabilities-dont-disappear-just-because-we-dont-talk-about-them-anymore/</guid>
        <description>A Diary of mine was published today on the SANS Internet Storm Center. In this one, we take a look at couple of pre-2020 high-impact vulnerabilities, which still affect surprising number of publicly accessible systems.</description>
        <content:encoded>&lt;p&gt;A &lt;a href=&#34;https://isc.sans.edu/forums/diary/Heartbleed+BlueKeep+and+other+vulnerabilities+that+didnt+disappear+just+because+we+dont+talk+about+them+anymore/26798/&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt;. In this one, we take a look at couple of pre-2020 high-impact vulnerabilities, which still affect surprising number of publicly accessible systems.&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>BlueKeep</category>
            
          
            
              <category>HeartBleed</category>
            
          
            
              <category>Shodan</category>
            
          
            
              <category>Vulnerability</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2020</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>Looking back at September 2015</title>
        <link>https://untrustednetwork.net/en/2015/10/18/looking-back-at-september-2015/</link>
        <pubDate>Sun, 18 Oct 2015 16:13:47 +0100</pubDate>
        
        <atom:modified>Sun, 18 Oct 2015 16:13:47 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2015/10/18/looking-back-at-september-2015/</guid>
        <description>Information concerning number of devices vulnerable to Heartbleed vulnerability has appeared in the news during September. Given that the existence of Heartbleed was made public almost a year and a half ago it may be surprising that the number of vulnerable devices exceeds 200.000.
Affair concerning the Stagefright vulnerability (which was mentioned in the last Looking back) continued in September when Zimperium – the company which discovered Stagefright – released a proof-of-concept code which exploits the vulnerability.</description>
        <content:encoded>&lt;p&gt;Information concerning number of devices &lt;a href=&#34;http://www.theinquirer.net/inquirer/news/2426409/heartbleed-still-affects-200-000-devices-because-vendors-are-lazy-maybe&#34;&gt;vulnerable to Heartbleed&lt;/a&gt; vulnerability has appeared in the news during September. Given that the existence of Heartbleed was made public almost a year and a half ago it may be surprising that the number of vulnerable devices exceeds 200.000.&lt;br /&gt;
Affair concerning the Stagefright vulnerability (which was mentioned in the &lt;a href=&#34;https://www.untrustednetwork.net/en/2015/09/08/looking-back-at-august-2015/&#34;&gt;last Looking back&lt;/a&gt;) continued in September when Zimperium – the company which discovered Stagefright – &lt;a href=&#34;http://arstechnica.com/security/2015/09/attack-code-exploiting-androids-critical-stagefright-bugs-is-now-public/&#34;&gt;released&lt;/a&gt; a proof-of-concept code which exploits the vulnerability.&lt;br /&gt;
A stealth malware hidden in modified Cisco IOS images and named &lt;a href=&#34;http://arstechnica.com/security/2015/09/malicious-cisco-router-backdoor-found-on-79-more-devices-25-in-the-us/&#34;&gt;SYNful knock&lt;/a&gt; has been discovered on tens of Cisco routers around the world. The malware functions as a backdoor and besides the (persistent) IOS-embedded main component uses tens of modules which provide further functionality which it loads into volatile memory.&lt;br /&gt;
It should be mentioned that Google, Microsoft and Mozzila made a &lt;a href=&#34;http://threatpost.com/google-mozilla-microsoft-to-sever-rc4-support-in-early-2016/114498/&#34;&gt;press release&lt;/a&gt; announcing that their browsers will stop supporting the RC4 encryption algorithm early next year.&lt;br /&gt;
One final piece of interesting news we will mention has been the discovery of a malware targeted at online poker players. The trojan horse is named &lt;a href=&#34;http://www.welivesecurity.com/2015/09/17/the-trojan-games-odlanor-malware-cheats-at-poker/&#34;&gt;Odlanor&lt;/a&gt; and captures screenshots of applications used for playing poker online and then sends them to the attacker.&lt;/p&gt;
</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        
        
        
        
          
            
              <category>Heartbleed</category>
            
          
            
              <category>Vulnerability</category>
            
          
            
              <category>Cisco</category>
            
          
            
              <category>Malware</category>
            
          
            
              <category>Google</category>
            
          
            
              <category>Microsoft</category>
            
          
            
              <category>Mozzila</category>
            
          
        
        
          
            
              <category>2015</category>
            
          
        
        
          
            
              <category>Looking back</category>
            
          
        
      </item>
      

    
  </channel>
</rss>