Darknet - The Darkside: HTTrack – Website Downloader Copier & Site Ripper...
HTTrack is a free and easy-to-use offline browser utility which acts as a website downloader and a site ripper for copying websites and downloading them for offline viewing.HTTrack Website Downloader...
View ArticleAlienVault Blogs: Delivery (Key)Boy
IntroductionBelow we’ve outlined the delivery phase of some recent attacks by KeyBoy, a group of attackers believed to operate out of China. They were first identified in 2013 targeting governments and...
View ArticleArsTechnica: Security Content: Apple to Congress: Chinese spy-chip story is...
Enlarge/ Apple CEO Tim Cook. (credit: Drew Angerer/Getty Images)Apple isn't relenting in its attacks on last week's Bloomberg story claiming that tiny Chinese chips had compromised the security of...
View ArticleUn informático en el lado del mal: Bettercap 2: La evolución de la navaja...
Hace un par de años hablé sobre Bettercap y MITMf dos herramientas que permiten llevar a cabo pruebas de ataques en redes IPv4 & IPv6 modernos. Con Bettercap hablamos de la facilidad de uso y de la...
View ArticleAlienVault Blogs: 5 Steps to Maximize Your Financial Data Protection
A series of high-profile data breaches in 2017 made it clear that it's becoming more difficult to protect your and your customer's sensitive information from nefarious agents. As businesses expand,...
View ArticleZero in a bit: Application Security Mistake No. 6: Going It Alone
We’ve been in the application security business for more than 10 years, and we’ve learned a lot in that time about what works, and what doesn’t. This is the sixth and final post in a blog series that...
View ArticleCisco Talos: Vulnerability in the Intel Unified Shader compiler for the Intel...
Vulnerabilities discovered by Piotr Bania of Cisco TalosTalos is disclosing a pointer corruption vulnerability in the Intel Unified Shader compiler for the Intel Graphics Accelerator.OverviewIn order...
View ArticleCisco Talos: Microsoft Patch Tuesday — October 18: Vulnerability disclosures...
Microsoft released its monthly security update today, disclosing a variety of vulnerabilities in several of its products. The latest Patch Tuesday covers 49 vulnerabilities, 12 of which are rated...
View ArticleCisco Talos: Vulnerability Spotlight: VMWare Workstation DoS Vulnerability
Today, Cisco Talos is disclosing a vulnerability in VMware Workstation that could result in denial of service. VMware Workstation is a widely used virtualization platform designed to run alongside a...
View ArticleDidier Stevens: KEIHash: Fingerprinting SSH
keihash.py is a program to parse pcap files and calculate the KEIHash of SSH connections.The KEIHash is the MD5 hash of the Key Exchange Init (KEI) data (strings). For obvious reasons, I could not call...
View ArticleUn informático en el lado del mal: 18 de Octubre: Movistar Home en Late Motiv
El próximo 18 de Octubre es el día que teníamos marcado en el calendario para presentar la versión final de Movistar Home que vamos a entregar a todos los clientes "early adopters" que han hecho la...
View Article/dev/random: [SANS ISC] “OG” Tools Remain Valuable
I published the following diary on isc.sans.edu: “‘OG’ Tools Remain Valuable“:For vendors, the cybersecurity landscape is a nice place to make a very lucrative business. New solutions and tools are...
View ArticleAlienVault Blogs: Time to Cover your Selfie Camera
I am reading an excellent book named “Cringeworthy: A Theory of Awkardness”, which examines exactly as the title describes, awkward situations and how to deal with them. I love reading non-fiction...
View ArticleCisco Talos: Microsoft WindowsCodecs.dll SniffAndConvertToWideString...
These vulnerabilities were discovered by Marcin Noga of Cisco Talos.Today, Cisco Talos is disclosing a vulnerability in the WindowsCodecs.dll component of the Windows operating system.WindowsCodecs.dll...
View ArticleUn informático en el lado del mal: Chromecast Hacking con Metasploit y Kali...
Una ventaja que presenta Chromecast es que es un dispositivo realmente pequeño, y por tanto resulta muy práctico llevarlo de viaje, ya que no todos los hoteles cuentan con todos los canales en sus...
View Article/dev/random: [SANS ISC] New Campaign Using Old Equation Editor Vulnerability
I published the following diary on isc.sans.edu: “New Campaign Using Old Equation Editor Vulnerability“:Yesterday, I found a phishing sample that looked interesting:From: sales@tjzxchem[.]com To: me...
View ArticleAlienVault Blogs: AlienVault Product Roundup – the Latest Updates!
September was another busy month for product development at AlienVault, an AT&T Company. We are excited that the AlienVault Agent is getting great traction with our USM Anywhere user base, and we...
View ArticleCisco Talos: GPlayed Trojan - .Net playing with Google Market
This blog post is authored byVitor Ventura.IntroductionIn a world where everything is always connected, and mobile devices are involved in individuals' day-to-day lives more and more often, malicious...
View ArticleDarknet - The Darkside: How To Recover When Your Website Got Hacked
The array of easily available Hacking Tools out there now is astounding, combined with self-propagating malware, people often come to me when their website got hacked and they don’t know what to do, or...
View ArticleUn informático en el lado del mal: Conferencias, charlas y eventos del 14 al...
Si esta semana que hoy termina con día festivo en España tenía pocas citas, la que viene está cargada de ellas y yo tengo varios compromisos en los que participaré, pero además mis compañeros también...
View Article