Un informático en el lado del mal: Hundir la flota por computador: Fallos de...
Los barcos de transporte que hoy día navegan por el mundo son quizás el entorno IoT definitivo ya que integran cientos de sensores, motores, etcétera. Hasta hace relativamente poco tiempo los ICS...
View ArticleAlienVault Blogs: SMBs: 3 Signs It’s Finally Time to Replace Your AntiVirus
Antivirus has been a foundational element of protecting endpoints at small and medium-sized businesses for going on three decades. During that time, the threat landscape has changed dramatically....
View ArticleCisco Talos: Files Cannot Be Decrypted? Challenge Accepted. Talos Releases...
This blog post was authored by Edmund Brumaghin, Earl Carter and Andrew Williams.Executive summaryCisco Talos has analyzed Thanatos, a ransomware variant that is being distributed via multiple malware...
View ArticleDidier Stevens: Quickpost: Decoding Certutil Encoded Files
As I showed a colleague, it’s easy to analyze a file encoded with certutil using my base64dump.py tool:Just use option -w to ignore all whitespace, and base64dump.py will detect and decode the base64...
View ArticleUn informático en el lado del mal: macOS & Windows: Pentesting it with...
El fin de semana pasado estuvimos en Euskalhack 2018. Una CON que sin duda merece, y mucho, la pena. No solo por la calidad de los ponentes, sino también por la calidad humana y el trato que todos...
View Article...And you will know me by the trail of bits: Announcing the Trail of Bits...
As great as it is, osquery could be a whole lot better. (Think write access for extensions, triggered responses upon detection, and even better performance, reliability and ease of use.)Facebook’s...
View ArticleDarknet - The Darkside: Metta – Information Security Adversarial Simulation Tool
Metta is an information security preparedness tool in Python to help with adversarial simulation, this can help you check various detection and control capabilities within your organisation.This...
View ArticleCisco Talos: Beers with Talos EP 32 - Live from Orlando Part 2: Take All the...
Beers with Talos (BWT) Podcast Episode 32 is now available. Download this episode and subscribe to Beers with Talos:If iTunes and Google Play aren't your thing: www.talosintelligence.com/podcast.Ep....
View ArticleZero in a bit: What the CA Veracode Verified Continuous Tier Looks Like
We recently announced our CA Veracode Verified program. To better suit the needs of organizations that are producing and updating apps at DevOps speed, we are attesting to the security of the overall...
View ArticleUn informático en el lado del mal: macOS & Windows: Pentesting it with...
Continuando con la primera parte de este artículo, evolucionamos las ideas que ahí se muestran comenzando con una pregunta. ¿Y si luego perdemos la conexión a Internet desde la máquina y no podemos...
View ArticleFortinet FortiGuard Blog: Recent Security Research News
This blog post is a summary of some recent research work that caught my attention in May 2018.
View ArticleFortinet FortiGuard Blog: An Analysis of the Use-After-Free Bug in the...
Microsoft fixed an use-after-free bug in the Edge Chakra Engine in the May 2018 Patch. This bug (CVE-2018-0946) causes the Chakra Engine to access a freed function address that can possibly be...
View ArticleDidier Stevens: Update: re-search.py Version 0.0.10
This new version of re-search.py comes with 3 new regular expressions in its library:email-domainurl-domainonionRegular expressions email-domain and url-domain match exactly like regular expressions...
View ArticleUn informático en el lado del mal: Unos "consejos veraniegos" para cuidar tu...
Llega el verano a España, y con él también el salir a hacer mil y una actividad al aire libre, que van desde tomar unas cañas, hasta pasar días desplazado de nuestra zona habitual de vida. En esos...
View Article...And you will know me by the trail of bits: Trail of Bits donates $100,000...
We have a soft spot in our hearts for SummerCon. This event, the longest-running hacker conference in the US, is a great chance to host hacker friends from around the world in NYC, catch up in person,...
View ArticleAlienVault Blogs: Things I Hearted this Week – 29th June 2018
It's been an absolutely lovely warm week in London. The sun has been shining, allergies have been high, and kids have been missing out on all the wonders because they're too busy being indoors staring...
View ArticleCisco Talos: Vulnerability Spotlight: VMWare Workstation DoS Vulnerability
Today, Talos is disclosing a vulnerability in VMWare Workstation that could result in Denial of Service. VMWare Workstation is a widely used virtualization platform designed to run alongside a normal...
View ArticleCisco Talos: Threat Roundup for June 22-29
Today, Talos is publishing a glimpse into the most prevalent threats we've observed between June 22 and June 29. As with previous round-ups, this post isn't meant to be an in-depth analysis. Instead,...
View ArticleZero in a bit: How CA Veracode’s Integrations With Defect-Tracking Systems...
Software development deadlines are getting shorter. Business requirements are getting more complex, and cybersecurity threats are becoming more real. According to the Accenture report on 2018 State of...
View Article