Un informático en el lado del mal: Quantum Cryptography: Una comunicación con...
Ayer tuvimos nuestro Network Innovation Day, un evento muy especial en el que quisimos contarle a nuestros clientes cómo trabajamos constantemente para innovar en la red. Cómo la desplegamos, como la...
View ArticleAlienVault Blogs: Things I Hearted this Week, 15th June 2018
Fear not, after a week without update because I was busy galavanting around atInfosecurity Europe and picking up awards, regular service has been resumed.Empathy in Incidence ResponseHis email message...
View Article/dev/random: SSTIC 2018 Wrap-Up Day #3
And here we go with the wrap-up of the 3rd day of the SSTIC 2018 “Immodium” edition. Indeed, yesterday, a lot of people suffered from digestive problems (~40% of the 800 attendees were affected!). This...
View ArticleCisco Talos: Threat Roundup for June 1-15
Today, Talos is publishing a glimpse into the most prevalent threats we've observed between June 01 and June 15. As with previous round-ups, this post isn't meant to be an in-depth analysis. Instead,...
View ArticleHex blog: Microcode in pictures
Since a picture is worth thousand words below are a few drawings for your perusal. Let us start at the top level, with the mbl_array_t class, which represents the entire microcode object: The above...
View ArticleUn informático en el lado del mal: Nuestras citas para la semana que viene:...
Como todos los fines de semana, aprovecho para dejaros la agenda de eventos, charlas, conferencias y citas varias que vamos a tener durante esta semana. La oferta no es muy larga pero espero que alguna...
View ArticleUn informático en el lado del mal: Dos sesiones para aprender high-tech en la...
Hoy domingo en España el tiempo acompaña para hacer algo de deporte (yo ya participé en mi carrerita de 10 KM esta mañana), bañarse en la piscina y comer con amigos y familiares antes de darse una...
View ArticleDidier Stevens: Update: translate.py Version 2.5.4
This is a minor update for #e# expressions.More details in this video:translate_v2_5_4.zip (https) MD5: C07B37F7AFA0386315843E6A493721C1 SHA256:...
View Article/dev/random: [SANS ISC] Malicious JavaScript Targeting Mobile Browsers
I published the following diary on isc.sans.org: “Malicious JavaScript Targeting Mobile Browsers“:A reader reported a suspicious piece of a Javascript code that was found on a website. In the meantime,...
View ArticleAlienVault Blogs: Cyber Security Awareness Tips for Businesses
We’ve all heard of cyber crime and the need to protect ourselves from it. But, what impact does it actually have on businesses?What you may not know is that cyber crime is costing UK businesses around...
View ArticleUn informático en el lado del mal: Indicadores de Compromiso de los ataques...
Powershell vino para quedarse y Microsoft sigue apostando fuerte por ella. Ya hemos comentado en otras ocasiones que Powershell es la línea de comandos, seguramente, más potente del mundo y que permite...
View ArticleDarknet - The Darkside: airgeddon – Wireless Security Auditing Script
Airgeddon is a Bash powered multi-use Wireless Security Auditing Script for Linux systems with an extremely extensive feature list.Airgeddon Wireless Security Auditing FeaturesInterface mode switcher...
View ArticleDidier Stevens: Update: cut-bytes.py Version 0.0.7
This too is a minor update for #e# expressions.More details in this video:cut-bytes_V0_0_7.zip (https) MD5: 95CF8E5D2BC2790B25101FC2BFF769FB SHA256:...
View ArticleUn informático en el lado del mal: Dumpzilla: Cómo hacer un análisis forense...
Como todos sabemos, la información que queda almacenada de las personas en los navegadores web, entre las que se encuentran nombres de los usuarios y contraseñas, cookies, historial de descargas y...
View Article/dev/random: [SANS ISC] PowerShell: ScriptBlock Logging… Or Not?
I published the following diary on isc.sans.org: “PowerShell: ScriptBlock Logging… Or Not?“:Here is an interesting piece of PowerShell code which is executed from a Word document (SHA256:...
View ArticleAlienVault Blogs: Corporate Information Security Vs Government Legislation:...
Data breaches have become a hot button topic in recent years. From the ransomware attack that breached the National Health Service in the U.K. to the disastrous Equifax breach that just keeps going,...
View ArticleCisco Talos: Vulnerability Spotlight: Multiple Remote Vulnerabilities In...
Vulnerabilities discovered by Claudio Bozzato of Cisco TalosTalos is disclosing twelve new vulnerabilities in Insteon Hub, ranging from remote code execution, to denial of service. The majority of the...
View ArticleDidier Stevens: Update: hash.py version 0.0.5
This new version adds option -v to validate hashes, and an indicator when archive files are decompressed.Compression:Validation:hash_V0_0_5.zip (https) MD5: 2A4D61F692D935E27E4BECA642F19D97 SHA256:...
View ArticleAlienVault Blogs: 10 Opportunities for MSPs and MSSPs to Deliver MDR Services
The proliferation of cybersecurity attacks and greater adoption of cloud applications and services is proving that traditional, prevention-only approaches are ineffective. Instead, organizations are...
View ArticleUn informático en el lado del mal: Network Innovation Day 2018: Conferencias...
El pasado 14 de Junio nos paramos en Telefónica para hablar de nuestros trabajos en la red durante la celebración del Network Innovation Day. Hablamos de lo que hacemos con BigData, con Seguridad...
View Article