HP Security Research Blog
The HP Security Research blog provides a platform for security experts from across HP to discuss innovative research, industry observations, and updates on the threat landscape to help organizations proactively identify and manage risk.

Technical analysis of the SandWorm Vulnerability (CVE-2014-4114)

fig00.png

Malware, Russian cyber-espionage campaign, and Microsoft PowerPoint are not necessarily three things one expects to go together and yet they did just recently. We take a technical dive into the world of the SandWorm vulnerability (CVE-2014-4114).

HP Security Research OSINT (OpenSource Intelligence) articles of interest – October 17, 2014

OSINT.jpgWelcome to the October 17th edition of the HP Security Research OSINT articles of interest. This is a list of publically available articles that we find relevant in today's security news

The New BEAST – Poodle

7387541_m.jpgA newly revealed vulnerability in the SSLv3 protocol made the news this week. We look at POODLE to see whether its bark is worse than its bite.

Don’t let anyone shock your shells

It’s been the better part of a month since the ShellShock vulnerability disclosure, and the whole Internet has been buzzing ever since. There are probably more posts, POCs, and FUD articles right now than vulnerable systems. Why write another post about it, you ask? Keep on reading ...

Hacking my smart TV - an old new thing

It’s hard to conceive of now, but there was a time when hacking a system was something easy enough for pretty much anyone to do. Developers were barely cognizant of the concept of security and many security holes were thought of as just minor glitches in the software. It took considerable effort from the security community to bring these security issues to the attention of vendors and it was a long road to the current level of security we have now. Having said that, the current security of software isn’t exactly perfect, but what I’m getting at is how the current security status of new things resembles the security status of old things in the ‘bad’ old days. Old vulnerabilities are new vulnerabilities again in the Internet of Things (IoT) and smart appliance space. Vulnerability types we thought were gone are now reappearing. I keep having déjà vu.

HP Security Research OSINT (OpenSource Intelligence) articles of interest – October 10, 2014

OSINT.jpgWelcome to the October 10th edition of the HP Security Research OSINT articles of interest. This is a list of publically available articles that we find relevant in today's security news.  

Labels: HPSR

Mail server-related injections: Whose problem?

During September, the SSR team conducted new research on mail server-related vulnerabilities. The results expand Fortify detections for numerous Java, PHP, and Python libraries and frameworks, but revealed a problem developers can’t expect library or framework vendors to fix.

Update your Struts 1 ClassLoader manipulation filters

In May, the SSR team discussed a vulnerability affecting both versions 1 and 2 of Struts, Apache’s open-source web application framework. The ensuing five months indicate that new protections are now necessary.

HP Security Research OSINT (OpenSource Intelligence) articles of interest – Friday, October 3, 2014

OSINT.jpgWelcome to the October 3rd edition of the HP Security Research OSINT articles of interest. This is a list of publically available articles that we find relevant in today's security news.

Labels: HPSR| OSINT

HPSR Software Security Content 2014 Update 3

HP Software Security Research is pleased to announce the immediate availability of updates to HP Application Defender, HP WebInspect SecureBase (available via SmartUpdate), the HP Fortify Secure Coding Rulepacks (English language, version 2014.3.0), and HP Fortify Premium Content. 

 

The Software Security Research team translates cutting-edge security research into security intelligence that powers the HP Enterprise Security Products portfolio. Today, HPSR Software Security Content supports over 880 vulnerability categories across 22 programming languages and spans more than 806,000 individual APIs.

HP Security Research OSINT (OpenSource Intelligence) articles of interest – September 27, 2014

OSINT.jpgWelcome to the September 27th edition of the HP Security Research OSINT articles of interest. This is a list of publically available articles that we find relevant in today's security news.

HP Security Briefing episode 17 - Thinking outside the sandbox

In this edition of the HP Security Briefing we discuss the modern browser, its plug-ins, the ever-shrinking attack surface and how to violate the trust boundaries of the sandbox.

HP Security Research: GNU Bash vulnerability "Shellshock" (CVE-2014-6271)

HP Security Research takes a look at GNU Bash vulnerability, CVE-2014-6271, offering their unique insight and recommendations for remediation.

Labels: HPSR

Reverse engineering NAND Flash Memory – POS device case study (part 2/3)

In my previous blog, I talked about a method for acquiring bare-metal images directly from NAND Flash memory. In that post, I used a Verifone POS device as my reverse engineering example. The next step is to dissect the image and change it into a more meaningful form for our investigation. Let’s start with making sense of the out-of-band (OOB) data from the image and removing bad blocks. After that, we will have a flat image that can be used for further analysis.

HP Security Research OSINT (OpenSource Intelligence) articles of interest – September 19, 2014

OSINT.jpgWelcome to the September 19th edition of the HP Security Research OSINT articles of interest. This is a list of publically available articles that we find relevant in today's security news.

HP Security Research OSINT (OpenSource Intelligence) articles of interest – September 12, 2014

OSINT.jpgWelcome to the September 12th edition of the HP Security Research OSINT articles of interest. This is a list of publically available articles that we find relevant in today's security news.  

Labels: HPSR

Converting executable file structure metadata to a feature vector, cook book examples

One of the major hurdles in the research we conducted on malicious files visualisation and clustering was trying to convert executable file structure metadata to a feature vector, also known as a data frame. To clarify the path we’ve taken and to make it easier to reproduce the results, we are showing the steps (with code examples) on how to convert the PE-structure raw data to an R package data frame.

Labels: HPSR

Reloaded: The Seven Pernicious Kingdoms, 2014 edition

13016697_ml.jpgJust shy of ten years after the release of the landmark Seven Pernicious Kingdoms taxonomy of software errors, the HP Software Security Research team has released a refreshed and revitalized edition of the ultimate guide to the failings that source code analysis can reveal. What’s new – and what endures? Read the refreshed HP Software Security Taxonomy

 

HP Security Research OSINT (OpenSource Intelligence) articles of interest – September 5, 2014

OSINT.jpgWelcome to the September 5th edition of the HP Security Research OSINT articles of interest. This is a list of publically available articles that we find relevant in today's security news.

Labels: HPSR| OSINT

Threat: Cryptographic Locker- Ransomware on a Budget

You’ve been hit by the new ransomware, Cryptographic Locker. Time to dust off that backup (you have a backup, don’t you?) and do a system restore, Right?

Labels: DVLabs| HPSR

Mobile Pwn2Own Tokyo 2014

HP Security Research’s Zero Day Initiative (ZDI) invites you to join us for the third annual Mobile Pwn2Own competition, to be held this year on November 12-13 at PacSec Applied Security Conference in Tokyo, Japan.  We’re looking forward to rewarding the world’s top researchers for demonstrating and disclosing their stealthy attacks on mobile devices, and we’re delighted that our friends at Google’s Android Security Team and BlackBerry are joining us again as sponsors.

Labels: HPSR

HP Security Research OSINT (OpenSource Intelligence) articles of interest--August 29, 2014


OSINT.jpgWelcome to the August 29th edition of the HP Security Research OSINT articles of interest. This is a list of publically available articles that we find relevant in today's security news.

Labels: HPSR

Working together toward secure development

IEE-14-TA-026-TA_CFSD_Logo_300dpi.png

 

Secure coding doesn’t have to be an exercise in developer pain, as a new whitepaper shows

Labels: HPSR

HP Security Briefing, episode 16 - Profiling an enigma: North Korea’s cyber threat landscape

In the latest edition of the HP Security Briefing, we discuss the cyber threat landscape within the Democratic People’s Republic of Korea.

The importance of languages for the professional developer

How building a small custom fuzzer demonstrates the importance of fluency in multiple programming languages. 

HP Security Research OSINT (OpenSource Intelligence) articles of interest--August 22, 2014

OSINT.jpgWelcome to the August 22nd edition of the HP Security Research OSINT articles of interest. This is a list of publically available articles that we find relevant in today's security news.

Labels: HPSR

Reverse Engineering NAND Flash Memory – POS device case study (part 1/3)

Modern life wouldn’t be quite so modern without NAND Flash memory. It is used everywhere - from USB sticks and smart phones to security cameras and the Internet of Things (IoT). I’ve spent some time reverse engineering the NAND flash memory used in popular POS (Point of Sale) devices.  Aside from sharing my findings from the evaluation of these devices, I wanted to share the process I followed to acquire the right firmware and to perform the reverse engineering. 

How to Identify (and contribute) mobile platform vulnerabilities - Building your own SMS/MMS fuzzer

This past weekend at DEF CON 22, Matt Molinyawe and I presented to a full house. Clearly, there is a growing interest in mobile phones as an attack surface.

Labels: HPSR

HP Security Research OSINT (OpenSource Intelligence) articles of interest--August 15, 2014

OSINT.jpgWelcome to the August 15th edition of the HP Security Research OSINT articles of interest. This is a list of publically available articles that we find relevant in today's security news.  

Labels: HPSR

HP Security Research OSINT (OpenSource Intelligence) articles of interest--August 1, 2014

hpsr.jpgIt's the August 1st edition of the HP Security Research OSINT articles of interest. This is a list of publically available articles that we find relevant in today's security news. 

Labels: HPSR
Search
Showing results for 
Search instead for 
Do you mean 
About the Author(s)
HP Blog

HP Software Solutions Blog



Follow Us
Labels
The opinions expressed above are the personal opinions of the authors, not of HP. By using this site, you accept the Terms of Use and Rules of Participation.