The Internet of Things: A New Opportunity for Hackers

The Internet of Things: A New Opportunity for Hackers The Internet of Things is an exciting and innovative technological evolution that is changing the way we live, do business, and interact.  The IoT provides improvements in efficiency, convenience, and overall business processes.  Such technological advancements are welcomed and ought to be embraced.  However, from a […]

2021 Mid-Year Phishing Report

phishing report

2021 Mid-Year Phishing Report Authored by Joel Garcia, Cyber Security Operator III at Security On-Demand As the world re-opens and employees make the transition back to some normalcy, scammers remain hard at work to score payoffs and gain unauthorized access. Looking back, the FBI’s 2020 Internet Crime Report ranks email fraud as the most financially […]

Out with IP, In with DNS for Security Operations

  Out with IP, In with DNS for Security Operations DNS is a critical protocol for the success of security operations. It contains valuable indicators that identify malicious activity such as malware command and control, data exfiltration points, crypto-jacking, ransomware, and Trojans/rootkits.  As data analytics, machine learning, and data processing power continues to improve, the […]

Threat Advisory: Linux File System Vulnerability

Linux File System Vulnerability Event Summary An Out-of-bounds Write flaw was found in the Linux kernel’s seq_file in the filesystem layer. This flaw was discovered by the Qualys Research Team (QRT). If exploited successfully, this vulnerability could lead to data corruption, system crashes and up to the execution of unauthorized code. This flaw allows unprivileged […]

Threat Advisory: High Severity Flaw in HP, Xerox and Samsung Printers

High Severity Flaw in HP, Xerox and Samsung Printers Event Summary Sentinel Labs discovered a vulnerability that affects HP, Xerox and Samsung printers. This vulnerability could allow for privilege escalation via the vulnerable printer driver and could allow threat actors to install programs, view, change, encrypt, or delete data, or create privileged accounts.  Samsung, Xerox […]

Understanding Service Location Protocol as a Security Threat

Understanding Service Location Protocol as a Security Threat Hunting for obscure protocols is a way to proactively find malicious activity. Today, I want to talk about one of those obscure protocols, Service Location Protocol (SLP). While hunting through the billions of logs, we at Security On-Demand process every day, I found considerable activity across a […]