Un informático en el lado del mal: Redes sociales de contactos íntimos que...
Probablemente muchas de las personas que utilizan servicios de contactos online para encontrar parejas de larga o corta duración, la privacidad de que están utilizando dicho servicio sea un plus. Es...
View ArticleUn informático en el lado del mal: Eventos, conferencias, charlas y cursos...
Volviendo a la rutina de los domingos del curso escolar, os recojo cuáles son los eventos, charlas, cursos y conferencias en las que vamos a participar de una u otra forma en Telefónica, desde las...
View ArticleDidier Stevens: Quickpost: Compiling EXEs and Resources with MinGW on Kali
To compile a Windows executable with version information and an icon on Kali, we use MinGW again.The version information and icon (demo.ico) we want to use are defined in a resource file (demo.rc):...
View ArticleAlienVault Blogs: People and Passwords
In today's world, the Internet is a vast place filled with websites, services, and other content. Most content along with computers and other technology requires a password. The number of passwords a...
View ArticleUn informático en el lado del mal: Coinhive y el mercado legal {e ilegal} de...
Coinhive es uno de los crypto miner más famosos y utilizados. Este tipo de crypto miner permiten a un usuario minar mientras visita un sitio web. El tema está de actualidad y es de los que llaman la...
View ArticleCisco Talos: Beers with Talos EP 37: Snort 3 Beta Uses Multithreading. It’s...
Beers with Talos (BWT) Podcast Ep. #37 is now available. Download this episode and subscribe to Beers with Talos:If iTunes and Google Play aren't your thing: www.talosintelligence.com/podcast.Ep. #37...
View ArticleAlienVault Blogs: AI and ML; Key Tools in Emerging Cybersecurity Strategy and...
Recently, the Defense Advanced Research Project Agency (DARPA) announced a multi-year investment of more than $2 billion in new and existing programs in artificial intelligence called the “AI Next...
View ArticleUn informático en el lado del mal: Unos (7) trucos de usuario que he...
Muchas veces algunas personas piensan que por saber hacer cosas de seguridad informática, ser CDO de Telefónica, o haber estudiado la carrera de Ingeniería Informática, se sabe todo. Ni mucho menos....
View ArticleUn informático en el lado del mal: Ya puedes conseguir "Pentesting con FOCA"...
Ayer por la tarde se puso a la venta la 2ª Edición del libro "Pentesting con FOCA", que escribí sobre nuestra querida herramienta. Dese la primera edición - que ya tenía unos años - el proyecto ha ido...
View ArticleFortinet FortiGuard Blog: Cyber Threat Alliance Members Issue First...
The CTA has just released a new joint analysis report on the growing threat of cryptomining, an activity that poses both short and long-term threats to individuals and enterprises. This report lays out...
View ArticleHex blog: Hex-Rays Microcode API vs. Obfuscating Compiler
This is a guest entry written by Rolf Rolles from Mobius Strip Reverse Engineering. His views and opinions are his own, and not those of Hex-Rays. Any technical or maintenance issues regarding the code...
View ArticleCisco Talos: Cyber Threat Alliance Releases Cryptomining Whitepaper
This post is authored by Ashlee Benge.Despite the recent devaluation of some cryptocurrencies, illicit cryptocurrency miners remain a lucrative and widespread attack vector in the threat landscape....
View ArticleZscaler Research: The latest cloud hosting service to serve malware
In recent years, there have been many studies related to compromised cloud hosting services. It has been reported that these services are increasingly being abused by hackers and malware authors for...
View ArticleUn informático en el lado del mal: Cómo integrar Empire Project con...
Si hablamos de PowerShell Empire Project y de Metasploit Framework hablamos de dos de los grandes proyectos de la ciberseguridad. El primero es una realidad en la parte de post-explotación, con...
View Article/dev/random: [SANS ISC] Hunting for Suspicious Processes with OSSEC
I published the following diary on isc.sans.edu: “Hunting for Suspicious Processes with OSSEC“:Here is a quick example of how OSSEC can be helpful to perform threat hunting. OSSEC is a free security...
View ArticleAlienVault Blogs: Security Risks of Removable Media - Naughty USBs
Carrying on with National Security Cybersecurity Awareness Month (NSCAM), we continue our celebratory blog series. This one is on the dangers the Universal Serial Bus (USB) and other removable media....
View ArticleDancho Danchev's Blog - Mind Streams of Information Security Knowledge:...
Dear blog readers, I wanted to take the time and effort and introduce you to Threat Data - the World's Most Comprehensive Threats Database, a proprietary invite-only MISP-based data information and...
View ArticleAlienVault Blogs: Things I Hearted this Week, 21st Sept 2018
Next week I’ll be flying out to Dallas, Texas to attend the AT&T Business Summit. I’ve never been to Dallas before, so hope to check out the sites and maybe even find out who did shoot JR (if...
View ArticleAlienVault Blogs: Forrester Says that AlienVault “Challenges” Enterprise SIEM...
Forrester just released their “Security Analytics Wave” report that evaluates Security Analytics/SIEM technologies used by large enterprises (5000+ employees). I am super excited that AlienVault was...
View ArticleUn informático en el lado del mal: WordPress in Paranoid Mode para...
Hoy la noticia sobre WordPress en Internet tiene que ver con miles de sitios troyanizados con un código malicioso. Un nuevo problema de seguridad que afecta algunos administradores de sitios basados...
View Article