HP Security Research Blog
The HP Security Research blog provides a platform for security experts from across HP to discuss innovative research, industry observations, and updates on the threat landscape to help organizations proactively identify and manage risk.

HPSR Threat Intelligence Briefing - Episode 11

Iranian hacker groups and their allies launched increasing numbers of cyber attacks over the last year, despite strict state controls of Internet traffic including: spying, censorship, and filtering laws and technology. 

 

In this report (see attached report for full content), we examine Iran’s cyber warfare capabilities, particularly the hacker groups that serve as a force multiplier to Iran’s continually expanding cyber presence. The report covers how these groups recruit and train members, the primary actors involved, TTPs, motivations, and indicators of state sponsorship by the regime. Through this analysis, the goal is to educate the reader on the capabilities of these groups and the significance and implications of state sponsorship of underground cyber actors. It also advises potential targets on mitigation strategies in the face of state sponsored cyber activities.

 

HP Security Research Threat Intelligence Briefing episode 10 - ZDI 2013 in review

It’s that time again, when we look at the vulnerability year that was and muse about the vulnerability year that will be. 2013 was a huge year for the Zero Day Initiative – we purchased more cases this year than in any other since the inception of the ZDI program 10 years ago. And what cases they were – vulnerabilities unearthed in widespread critical software used by enterprises and the greater computing community alike.  In this month’s Threat Briefing we walk 2013’s vulnerabilities, talk vendors, and think out loud about where this is going in 2014.

HP Security Research Threat Intelligence Briefing - Episode 9

In this Threat Briefing we discuss some of the security implications of using open source and describe a process you can use to minimize the associated risks.

SEA attack on President’s social media tools

The Syrian Electronic Army continued their western targeted attacks this week by attacking President Barack Obama’s campaign media. Once again, by targeting a third-party and insiders’ email, they were able to modify shortened urls to redirect visitors to their own website, as well as a YouTube video.

One-Third Ain't Bad

Of the Oracle vulnerabilities patched yesterday, HP's Zero Day Initiative (ZDI) researchers were responsible for 33% of Java's most critical issues (CVSS = 10.0) and one of them resolves an issue with Oracle's Middleware technology. All of the corrected Java vulnerabilities allow attackers to bypass the sandbox and execute attacker controlled code.

Oh no! Not another security patch Tuesday blog post!

Patch Tuesday is upon us.  But don’t worry; this isn’t your typical blog post on the latest round of patches. It’s a look at the role the Zero Day Initiative plays in the process...plus some simple advice. Continue reading to join me on this journey. 

What to Expect from #OpPetrol

According to the announcement, the operation will “engage” on June 20, 2013. As we know from past events, actors may be compromising sites now only to release the results as part of the operation. Potential targets may have already seen activity that could later be associated with this announcement.

#OpUSA Lessons Learned

Did your company prepare for #OpUSA?  How much time and resources were spent handling this threat?  Is there such a thing as being overly prepared?  How can you predict the impact of the next threat?

Understanding the Syrian Electronic Army (SEA)

Over the last few years, interest in hacktivist organizations and state sponsored hacking groups has increased greatly around the world. The lines are blurred when comparing independent groups that operate in support of their government or country and those that are directly sanctioned by nation states. The Syrian Electronic Army (SEA) is a group based in Syria, which claims to operate independently in support of Syrian President Bashar al-Assad. 

A pair of intriguing HP Security Research talks in Amsterdam this week

If you happen to be around Amsterdam this week, you might want to come listen to two talks I will give there. One of the at the HackIntheBox conference discusses hacking power plugs, or at least those used to charge electric cars, while the other at an OWASP Netherlands meeting discusses challenges and innovative solutions for pen-testing RESTful web services.

 

Formation of HP Security Research

We're pleased to announce the formation of HP Security Research (HPSR), a new group that will provide actionable security intelligence through published reports, threat briefings, and content delivered through the HP security product portfolio.

Search
Showing results for 
Search instead for 
Do you mean 
About the Author(s)
Follow Us


HP Blog

HP Software Solutions Blog

Labels
The opinions expressed above are the personal opinions of the authors, not of HP. By using this site, you accept the Terms of Use and Rules of Participation