SlideShare uma empresa Scribd logo
1 de 6
Security News Bytes
- Aniket Rastogi
Severe Vulnerabilities identified in HTTP/2
 The new HTTP/2 protocol (considered a replacement to the HTTP/1) was
approved by the IESG in February 2015
 Included the benefits over the HTTP/1 like header compression, multiplexing
and concurrency and Server push
 There were 4 major flaws identified in the protocol which as mentioned
below:
 Slow read attack or the Slowloris attack (CVE-2016-1546) – Attack calls on a
malicious client to read responses very slowly. This vulnerability also existed in
HTTP/1.1 protocol
 HPACK Bomb Attack (CVE-2016-1544, CVE-2016-2525) – An attacker sends a small
message to the server that unpacks into gigabytes of data thereby consuming all
the server memory resources
 Dependency Cycle Attack (CVE-2015-8659) - A specially crafted requests can be
used to prompt a dependency cycle getting the server into an infinite loop. Can
cause a DoS attack or allow to run arbitrary code.
 Stream Multiplexing Abuse (CVE-2016-0150) - Attack allows attacker to exploit
vulnerabilities in the way servers implement the stream multiplexing functionality
in order to crash the server.
 All these vulnerabilities have now been fixed!!!
Bitcoins worth USD $72 Million stolen
 Hong Kong-based Bitcoin exchange 'Bitfinex' had shutdown its operation on 2nd
August 2016, after discovering a security breach that allowed an attacker to
steal some user funds.
 The cause of the breach and the people behind the incident is still not known,
but the attackers appear to have bypassed Bitfinex’s mandated limits of
withdrawals.
 Bitfinex is the third-largest Bitcoin exchange in the world.
 After the news of the Bitfinex hack, the price of Bitcoin dropped almost 20%,
from $602.78 to $541 per Bitcoin, within a day
 Bitfinex's security firm Bitgo — a Bitcoin security company that allows bitcoin
exchanges to provide separate, multi-signature wallets for each user's funds
said it did not find any evidence of a breach on any BitGo servers during its
investigation
 So is this a possible case of corporate vengeance to bring down bitcoin
popularity or is it an insider job, only time will tell
Torrentz.eu Shutdown!!!
 Few days after US authorities arrested the owner of Kickass Torrents in
Poland, Torrentz.eu, the Internet's biggest BitTorrent meta-search engine, has
shut down
 Torrentz was a free, fast and powerful meta-search engine combining results
from dozens of search engines
 The purpose of the site was to index torrents from several large portals and
aggregate all the different trackers. This allowed users to download torrent
files with multiple trackers in their source, speeding up downloads and
preventing dead links in case servers went down
 All Torrentz backup domains including the main .EU domain and its backups
.ME, .CH, and .IN are also down. The site's HTTPS version also features the
messages “Torrentz will always love you. Farewell”
 With legal pressure increasing on The Pirate Bay and following the Kickass
Torrents arrests, many piracy portals have decided to shut down on their own,
so could be the case with torrentz as well
 A possibility of a hostile takeover by a group of attackers can not be
neglected as such websites generally do not have strong defense controls
Other News…
 A newly discovered PoS (Point-of-Sale) malware can bypass computer
defences such as User Account Control (UAC) by posing as a legitimate
Microsoft application, Doctor Web researchers have discovered
 Adobe’s Flash Player might be the most targeted product when criminal
exploit kits are involved, but Microsoft products such as Office, Windows and
Internet Explorer take centre stage when Russian advanced persistent threat
(APT) groups are involved
 Just two weeks after Chrome 52 was released in the stable channel, Google
has issued an update to resolve 10 security vulnerabilities, 7 of which were
discovered by external developers
THANK YOU!!!

Mais conteúdo relacionado

Destaque

2015 Brookhaven Arts Festival: Artists & Details
2015 Brookhaven Arts Festival: Artists & Details2015 Brookhaven Arts Festival: Artists & Details
2015 Brookhaven Arts Festival: Artists & Details
Kelly Marsh
 
資策會網路系統整合工程師就業養成班
資策會網路系統整合工程師就業養成班資策會網路系統整合工程師就業養成班
資策會網路系統整合工程師就業養成班
Ryan Chung
 
iOS App Development - Animation Ease Out
iOS App Development - Animation Ease OutiOS App Development - Animation Ease Out
iOS App Development - Animation Ease Out
Ryan Chung
 
Repaso Proyecto2
Repaso Proyecto2Repaso Proyecto2
Repaso Proyecto2
guestab8254
 
newbeginnings_easter2015
newbeginnings_easter2015newbeginnings_easter2015
newbeginnings_easter2015
Jennifer Halsey
 
Subversion快速入门教程
Subversion快速入门教程Subversion快速入门教程
Subversion快速入门教程
wensheng wei
 
SU Budget Process And Systems Presentation
SU Budget Process And Systems PresentationSU Budget Process And Systems Presentation
SU Budget Process And Systems Presentation
aharker
 

Destaque (20)

Innovaciòn educativa con recursos abiertos
Innovaciòn educativa con recursos abiertosInnovaciòn educativa con recursos abiertos
Innovaciòn educativa con recursos abiertos
 
Jenifer Sosa
Jenifer SosaJenifer Sosa
Jenifer Sosa
 
2015 Brookhaven Arts Festival: Artists & Details
2015 Brookhaven Arts Festival: Artists & Details2015 Brookhaven Arts Festival: Artists & Details
2015 Brookhaven Arts Festival: Artists & Details
 
資策會網路系統整合工程師就業養成班
資策會網路系統整合工程師就業養成班資策會網路系統整合工程師就業養成班
資策會網路系統整合工程師就業養成班
 
Application letter update 5 Desember 2016
Application letter update 5 Desember 2016Application letter update 5 Desember 2016
Application letter update 5 Desember 2016
 
iOS App Development - Animation Ease Out
iOS App Development - Animation Ease OutiOS App Development - Animation Ease Out
iOS App Development - Animation Ease Out
 
Repaso Proyecto2
Repaso Proyecto2Repaso Proyecto2
Repaso Proyecto2
 
newbeginnings_easter2015
newbeginnings_easter2015newbeginnings_easter2015
newbeginnings_easter2015
 
Arte NeocláSico Ernesto
Arte NeocláSico ErnestoArte NeocláSico Ernesto
Arte NeocláSico Ernesto
 
DAligre Residences
DAligre ResidencesDAligre Residences
DAligre Residences
 
EDUCA VERD PLAY. SITUACIONS PER A L’APRENENTATGE DE VALORS A L’EDUCACIÓ FÍSICA
EDUCA VERD PLAY. SITUACIONS PER A L’APRENENTATGE DE VALORS A L’EDUCACIÓ FÍSICAEDUCA VERD PLAY. SITUACIONS PER A L’APRENENTATGE DE VALORS A L’EDUCACIÓ FÍSICA
EDUCA VERD PLAY. SITUACIONS PER A L’APRENENTATGE DE VALORS A L’EDUCACIÓ FÍSICA
 
Subversion快速入门教程
Subversion快速入门教程Subversion快速入门教程
Subversion快速入门教程
 
SU Budget Process And Systems Presentation
SU Budget Process And Systems PresentationSU Budget Process And Systems Presentation
SU Budget Process And Systems Presentation
 
Nariz, cavidad nasal y senos paranasales
Nariz, cavidad nasal y senos paranasalesNariz, cavidad nasal y senos paranasales
Nariz, cavidad nasal y senos paranasales
 
Conferencia marco
Conferencia marcoConferencia marco
Conferencia marco
 
Fitxa tasca relleu
Fitxa tasca relleuFitxa tasca relleu
Fitxa tasca relleu
 
Ryocco 2016 - 5
Ryocco 2016 - 5Ryocco 2016 - 5
Ryocco 2016 - 5
 
Moda Club 2016
Moda Club 2016Moda Club 2016
Moda Club 2016
 
Modaclub Intermedio GLAMOUR
Modaclub Intermedio GLAMOURModaclub Intermedio GLAMOUR
Modaclub Intermedio GLAMOUR
 
20 days of inspiration
20 days of inspiration 20 days of inspiration
20 days of inspiration
 

Semelhante a Security news bytes

Fortinet_FortiDDoS_Introduction
Fortinet_FortiDDoS_IntroductionFortinet_FortiDDoS_Introduction
Fortinet_FortiDDoS_Introduction
swang2010
 
A short visit to the bot zoo
A short visit to the bot zooA short visit to the bot zoo
A short visit to the bot zoo
UltraUploader
 
Botnets And Alife
Botnets And AlifeBotnets And Alife
Botnets And Alife
Zotronix
 

Semelhante a Security news bytes (20)

News bytes Oct-2011
News bytes  Oct-2011News bytes  Oct-2011
News bytes Oct-2011
 
Bittorrent
BittorrentBittorrent
Bittorrent
 
Fortinet_FortiDDoS_Introduction
Fortinet_FortiDDoS_IntroductionFortinet_FortiDDoS_Introduction
Fortinet_FortiDDoS_Introduction
 
How to stay protected against ransomware
How to stay protected against ransomwareHow to stay protected against ransomware
How to stay protected against ransomware
 
Botnets
BotnetsBotnets
Botnets
 
VOIP2DAY 2015: "WebRTC security concerns, a real problem?"
VOIP2DAY 2015: "WebRTC security concerns, a real problem?"VOIP2DAY 2015: "WebRTC security concerns, a real problem?"
VOIP2DAY 2015: "WebRTC security concerns, a real problem?"
 
WebRTC Security Concerns, a real problem?
WebRTC Security Concerns, a real problem?WebRTC Security Concerns, a real problem?
WebRTC Security Concerns, a real problem?
 
Bots and Botnet
Bots and BotnetBots and Botnet
Bots and Botnet
 
All you know about Botnet
All you know about BotnetAll you know about Botnet
All you know about Botnet
 
A short visit to the bot zoo
A short visit to the bot zooA short visit to the bot zoo
A short visit to the bot zoo
 
Drive By Downloads: How To Avoid Getting a Cap Popped in Your App
Drive By Downloads:  How To Avoid Getting a Cap Popped in Your App Drive By Downloads:  How To Avoid Getting a Cap Popped in Your App
Drive By Downloads: How To Avoid Getting a Cap Popped in Your App
 
Module 11 (hacking web servers)
Module 11 (hacking web servers)Module 11 (hacking web servers)
Module 11 (hacking web servers)
 
Botnet
BotnetBotnet
Botnet
 
Mcs2453 aniq mc101053-assignment1
Mcs2453 aniq mc101053-assignment1Mcs2453 aniq mc101053-assignment1
Mcs2453 aniq mc101053-assignment1
 
Botnets And Alife
Botnets And AlifeBotnets And Alife
Botnets And Alife
 
DEFCON28_2020_EthereumSecurity_PreventingDDoS_VDF
DEFCON28_2020_EthereumSecurity_PreventingDDoS_VDFDEFCON28_2020_EthereumSecurity_PreventingDDoS_VDF
DEFCON28_2020_EthereumSecurity_PreventingDDoS_VDF
 
News bytes Sept-2011
News bytes Sept-2011News bytes Sept-2011
News bytes Sept-2011
 
Guarding Against Large-Scale Scrabble In Social Network
Guarding Against Large-Scale Scrabble In Social NetworkGuarding Against Large-Scale Scrabble In Social Network
Guarding Against Large-Scale Scrabble In Social Network
 
Secure client
Secure clientSecure client
Secure client
 
October 2017 Ivanti Patch Tuesday Analysis
October 2017 Ivanti Patch Tuesday AnalysisOctober 2017 Ivanti Patch Tuesday Analysis
October 2017 Ivanti Patch Tuesday Analysis
 

Último

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Último (20)

Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 

Security news bytes

  • 1. Security News Bytes - Aniket Rastogi
  • 2. Severe Vulnerabilities identified in HTTP/2  The new HTTP/2 protocol (considered a replacement to the HTTP/1) was approved by the IESG in February 2015  Included the benefits over the HTTP/1 like header compression, multiplexing and concurrency and Server push  There were 4 major flaws identified in the protocol which as mentioned below:  Slow read attack or the Slowloris attack (CVE-2016-1546) – Attack calls on a malicious client to read responses very slowly. This vulnerability also existed in HTTP/1.1 protocol  HPACK Bomb Attack (CVE-2016-1544, CVE-2016-2525) – An attacker sends a small message to the server that unpacks into gigabytes of data thereby consuming all the server memory resources  Dependency Cycle Attack (CVE-2015-8659) - A specially crafted requests can be used to prompt a dependency cycle getting the server into an infinite loop. Can cause a DoS attack or allow to run arbitrary code.  Stream Multiplexing Abuse (CVE-2016-0150) - Attack allows attacker to exploit vulnerabilities in the way servers implement the stream multiplexing functionality in order to crash the server.  All these vulnerabilities have now been fixed!!!
  • 3. Bitcoins worth USD $72 Million stolen  Hong Kong-based Bitcoin exchange 'Bitfinex' had shutdown its operation on 2nd August 2016, after discovering a security breach that allowed an attacker to steal some user funds.  The cause of the breach and the people behind the incident is still not known, but the attackers appear to have bypassed Bitfinex’s mandated limits of withdrawals.  Bitfinex is the third-largest Bitcoin exchange in the world.  After the news of the Bitfinex hack, the price of Bitcoin dropped almost 20%, from $602.78 to $541 per Bitcoin, within a day  Bitfinex's security firm Bitgo — a Bitcoin security company that allows bitcoin exchanges to provide separate, multi-signature wallets for each user's funds said it did not find any evidence of a breach on any BitGo servers during its investigation  So is this a possible case of corporate vengeance to bring down bitcoin popularity or is it an insider job, only time will tell
  • 4. Torrentz.eu Shutdown!!!  Few days after US authorities arrested the owner of Kickass Torrents in Poland, Torrentz.eu, the Internet's biggest BitTorrent meta-search engine, has shut down  Torrentz was a free, fast and powerful meta-search engine combining results from dozens of search engines  The purpose of the site was to index torrents from several large portals and aggregate all the different trackers. This allowed users to download torrent files with multiple trackers in their source, speeding up downloads and preventing dead links in case servers went down  All Torrentz backup domains including the main .EU domain and its backups .ME, .CH, and .IN are also down. The site's HTTPS version also features the messages “Torrentz will always love you. Farewell”  With legal pressure increasing on The Pirate Bay and following the Kickass Torrents arrests, many piracy portals have decided to shut down on their own, so could be the case with torrentz as well  A possibility of a hostile takeover by a group of attackers can not be neglected as such websites generally do not have strong defense controls
  • 5. Other News…  A newly discovered PoS (Point-of-Sale) malware can bypass computer defences such as User Account Control (UAC) by posing as a legitimate Microsoft application, Doctor Web researchers have discovered  Adobe’s Flash Player might be the most targeted product when criminal exploit kits are involved, but Microsoft products such as Office, Windows and Internet Explorer take centre stage when Russian advanced persistent threat (APT) groups are involved  Just two weeks after Chrome 52 was released in the stable channel, Google has issued an update to resolve 10 security vulnerabilities, 7 of which were discovered by external developers

Notas do Editor

  1. Server Push - The server can send resources the client has not yet requested Dependency Cycle Attack - Attack leverages the flow control mechanisms used by HTTP/2 uses for network optimization.
  2. Server Push - The server can send resources the client has not yet requested Dependency Cycle Attack - Attack leverages the flow control mechanisms used by HTTP/2 uses for network optimization.
  3. Server Push - The server can send resources the client has not yet requested Dependency Cycle Attack - Attack leverages the flow control mechanisms used by HTTP/2 uses for network optimization.