Skip to main content

Wiper Malware Advisory

As per the cyber threat landscape, researchers have identified the latest strain of malware to have wiper capabilities and has so far affected many organizations globally. Wiper Malware refers to sophisticated malicious software that destroys data on the compromised hard disk with extremely low chances of recovery. A successful attack would therefore be VERY damaging to an organization’s information.

Microsoft Excel CVE-2013-3890 Memory Corruption Vulnerability

Microsoft Excel is prone to a memory-corruption vulnerability. Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial-of-service conditions.

Technologies Affected

Microsoft Excel 2007 SP3
Microsoft Excel Viewer
Microsoft Office Compatibility Pack SP3
Recommendations

Run all software as a nonprivileged user with minimal access rights.

Fraudulent Pyramid Schemes

The public attention is drawn to emerging fraudulent business models that depend on members recruiting new entrants in exchange for quick win  payments. They are classified as fraudulent Pyramid Schemes since they rely on a continuous enrolment cycle of new members/ subscribers/ agents with the following characteristics:

WSO2 Security Advisory

WSO2 released security updates that addresses the ‘unrestricted file upload’ vulnerability affecting WSO2 products: A

Subscribe to