AlienVault Blogs: Things I Hearted this Week, 13th July 2018
AT&T To Acquire AlienaultI've covered and speculated, and even advised on security M&A over the years, but it's the first time I've been working in a technology company that has been acquired....
View ArticleCisco Talos: Threat Roundup for July 6-13
Today, as we do every week, Talos is giving you a glimpse into the most prevalent threats we've observed this week — covering the dates between July 6 and 13. As with previous roundups, this post isn't...
View ArticleUn informático en el lado del mal: Docker de My WordPress In Paranoid Mode...
En esta parte continuamos el trabajo que sigue a lo que hemos visto en la primera parte de este artículo sobre cómo hemos dockerizado WodPresss in Paranoid Mode. Una vez ya tenemos preparados los...
View ArticleCisco Talos: Beers with Talos EP33 - Change the Conversation or the People...
Beers with Talos (BWT) Podcast Episode 33 is now available. Download this episode and subscribe to Beers with Talos:If iTunes and Google Play aren't your thing: www.talosintelligence.com/podcast.Ep....
View ArticleUn informático en el lado del mal: CodeTalk for Developers de Evil FOCA,...
Normalmente los fines de semana os suelo dejar la agenda de actividades de la semana, pero ayer, después de disfrutar el sábado del concierto de los Iron Maiden, me pasé el día entero viajando para...
View ArticleDidier Stevens: !exploitable Crash Analyzer – Statically Linked CRT
Regularly when I use Microsoft MSEC’s !exploitable WinDbg extension, it doesn’t load because the correct VC runtime is not installed (vcredist 2012) on the machine I’m debugging on.Since it’s...
View ArticleAlienVault Blogs: Threats, Politics, and Cryptocurrency-Mining - Infosecurity...
Javvad Malik and the rest of the AlienVault team surveyed 928 participants at Infosecurity Europe 2018 on this topic. Read the full report from Javvad here!Key FindingsLooking forward, cloud security...
View ArticleUn informático en el lado del mal: ibombshell 0.0.1b en GitHub con bypass UAC...
Recientemente se ha liberado ibombShell 0.0.1 beta en el Github de ElevenPaths, una prueba de concepto que hemos trabajado en "Ideas Locas", en colaboración con mi compañero Álvaro Nuñez. En el propio...
View Article/dev/random: [SANS ISC] Searching for Geographically Improbable Login Attempts
I published the following diary on isc.sans.org: “Searching for Geographically Improbable Login Attempts“:For the human brain, an IP address is not the best IOC because, like phone numbers, we are bad...
View ArticleUn informático en el lado del mal: Más seminarios en vídeo de ElevenPaths &...
Desde casi el comienzo, las unidades de ElevenPaths y LUCA tienes seminarios online en los que se explican conceptos que tienen que ver con Ciberseguridad, Big Data o Inteligenica Artifical. En el caso...
View ArticleAlienVault Blogs: ZombieBoy
This is a guest post by independent security researcher James Quinn.Continuing the 2018 trend of cryptomining malware, I’ve found another family of mining malware similar to the “massminer” discovered...
View ArticleZero in a bit: CA Veracode Dynamic Analysis: Reduce the Risk of a Breach
CA Veracode Dynamic Analysis is a dynamic scanning solution that features automation, depth of coverage, and unmatched scalability. Built on microservices and cloud technologies, the CA Veracode...
View ArticleUn informático en el lado del mal: Cupón Verano 10 % descuento en @0xWord
Como todos los veranos, tenemos que cerrar la editorial de 0xWord durante el mes de Agosto, pero antes de que llegue ese días os vamos a dejar la oportunidad de tomar provisiones con todos el material...
View ArticleCisco Talos: Vulnerability Spotlight: Multiple Vulnerabilities in ACD Systems...
These vulnerabilities were discovered by Tyler Bohan of Cisco TalosToday, Talos is disclosing several vulnerabilities that have been identified in Canvas Draw graphics editing tool for Macs.Canvas Draw...
View ArticleCisco Talos: Vulnerability Spotlight: Foxit PDF Reader JavaScript Remote Code...
OverviewDiscovered by Aleksandar Nikolic of Cisco Talos.Talos is disclosing a pair of vulnerabilities in Foxit PDF Reader. Foxit PDF Reader is a popular free program for viewing, creating, and editing...
View ArticleCisco Talos: Blocking Cryptocurrency Mining Using Cisco Security Products
Cisco Talos is releasing a whitepaper addressing Cryptocurrency mining and all the ways to block it using Cisco Security products. The value of cryptocurrencies has fluctuated wildly, but the value is...
View ArticleUn informático en el lado del mal: Google Hacking sobre Trello para buscar...
Haciendo uso de consultas basadas en parámetros de búsqueda sencillos, se puede obtener una gran cantidad de información relevante que, en principio, podría ser difícil de recopilar mediante las...
View ArticleAlienVault Blogs: Things I Hearted this Week, 20th July 2018
INFOSEC RECRUITING - IS THE INDUSTRY CREATING ITS OWN DROUGHTWe've all been blasted with many a report that infosec has a massive skills gap. But what if the problem doesn't lie with the lack of...
View ArticleCisco Talos: Vulnerability Spotlight: Multiple Vulnerabilities in Sony IPELA...
Vulnerabilities discovered by Cory Duplantis and Claudio Bozzato of Cisco Talos.OverviewToday, Cisco Talos is disclosing several vulnerabilities discovered with the Sony IPELA E Series Network Camera....
View ArticleCisco Talos: Threat Roundup for July 13-20
Today, as we do every week, Talos is giving you a glimpse into the most prevalent threats we've observed this week — covering the dates between July 13 and 20. As with previous roundups, this post...
View Article