McAfee Avert Labs: Taking a Look at W32/Ramnit
Today we’re going to take a look at an interesting file-infector virus. W32/Ramnit infects EXE, DLL and HTML files. That last one is right; W32/Ramnit also infects HTML files to replicate itself.Let’s...
View Articlehoneyblog: 2011 Honeynet Project Security Workshop Slides + Videos
The slides and videos from the 2011 Honeynet Project Security Workshop (Paris) are now available! You can get the material from http://www.honeynet.org/SecurityWorkshops/2011_Paris. About the...
View ArticleLost In Security: Españoles por la BlackHat
Siguiendo con la estela del artículo publicado 'Españoles por la Phrack', vuelvo a la carga con un artículo parecido, pero en este caso sobre una de las conferencias de seguridad que más conoce la...
View ArticleLost In Security: El último superviviente (II) - iOS
En el pasado artículo estuvimos revisando los puntos débiles que tiene un malware a la hora de sobrevivir un reinicio del sistema, y nos centramos en OSX. Ahora toca el turno a iOS, que al ser una...
View ArticleArsTechnica: Security Content: Windows 7, not XP, was the reason last week’s...
Enlarge (credit: Kaspersky Lab)Eight days ago, the WCry ransomware worm attacked more than 200,000 computers in 150 countries. The outbreak prompted infected hospitals to turn away patients and shut...
View ArticleUn informático en el lado del mal: Nuestras charlas, eventos, cursos y...
Para hoy domingo os traigo la agenda de eventos, conferencias y charlas para la semana que viene. El resumen trae muchas cosas, y yo voy a participar en varios actos, así que toma nota por si quieres...
View ArticleDidier Stevens: Update: zipdump.py Version 0.0.8
Added handling of zlib errors when performing a dictionary attack.zipdump_v0_0_8.zip (https) MD5: 51B971B57800D126B2067DC53303355A SHA256: 095EE6000E99B9193C830B8BA11139907CB9445FD7D94D81E3F97A8B458D5D16
View ArticleSANS Internet Storm Center, InfoCON: green: ISC Stormcast For Monday, May...
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View ArticleUn informático en el lado del mal: Una PoC de Mobile Connect con Biometría de...
A la hora de implantar una estrategia de identidad en una organización hay que pensar en el conjunto de soluciones que permitan dotar a cada aplicación o sistema en el que hay que identificarse del...
View ArticleFortinet FortiGuard Blog: Byline: Artificial Intelligence: Cybersecurity...
Security strategies need to undergo a radical evolution. Tomorrow’s security devices will need to see and interoperate with each other to recognize changes in the networked environment,...
View ArticleArsTechnica: Security Content: “Yahoobleed” flaw leaked private e-mail...
Enlarge (credit: BenGrantham)For years, Yahoo Mail has exposed a wealth of private user data because it failed to update widely used image-processing software that contained critical vulnerabilities....
View ArticleDarknet - The Darkside: Sn1per – Penetration Testing Automation Scanner
Sn1per is a penetration testing automation scanner that can be used during a penetration test to enumerate and scan for vulnerabilities. Features Automatically collects basic recon (ie. whois, ping,...
View ArticleSANS Internet Storm Center, InfoCON: green: Investigating Sites After They...
A reader sent us an interesting find of a phishing site that is going after Uber credentials. Uber credentials are often stolen and resold to obtain free rides. One method the credentials are stolen is...
View ArticleSANS Internet Storm Center, InfoCON: green: ISC Stormcast For Tuesday, May...
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View ArticleArsTechnica: Security Content: There’s new evidence tying WCry ransomware...
Enlarge (credit: Health Service Journal)Researchers have found more digital fingerprints tying this month's WCry ransomware worm to the same prolific hacking group that attacked Sony Pictures in 2014...
View ArticleUn informático en el lado del mal: WordPress Latch Enforcement: Cómo forzar...
La seguridad de un sistema es tan fuerte como lo es en el eslabón más débil. Esta es una frase que seguro que muchos conocéis. En un proceso de fortificación de una plataforma tomar decisiones de...
View ArticleDidier Stevens: WannaCry Simple File Analysis
In this video, I show how to get started with my tools and a WannaCry sample.Tools: pecheck.py, zipdump.py, strings.pySample: 84c82835a5d21bbcf75a61706d8ab549
View ArticleSANS Internet Storm Center, InfoCON: green: Infocon: green
ISC Stormcast For Tuesday, May 23rd 2017 https://isc.sans.edu/podcastdetail.html?id=5512
View ArticleSANS Internet Storm Center, InfoCON: green: What did we Learn from WannaCry?...
In the aftermath of last weeks excitement over the WannaCry malware, Ive had a lot of lessons learned meetings with clients. The results are exactly what youd expect, but in some cases came as a...
View ArticleArsTechnica: Security Content: Examining the FCC claim that DDoS attacks hit...
Enlarge (credit: Getty Images | Valery Brozhinsky)On May 8, when the Federal Communications Commission website failed and many people were prevented from submitting comments about net neutrality, the...
View Article