SANS Internet Storm Center, InfoCON: green: 
Threat Hunting &...
Ladies and gentlemen, for our main attraction, I give you...The HELK vs APTSimulator, in a Death Battle! The late, great Randy "Macho Man" Savage said many things in his day, in his own special way,...
View ArticleSANS Internet Storm Center, InfoCON: green: ISC Stormcast For Friday, April...
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View ArticleUn informático en el lado del mal: LUCA: (Big) Data Storytelling Revolution...
No aplicar las infinitas posibilidades que ofrecen los datos y las técnicas de BigData a la toma de decisiones en la empresa es un error grave a la hora enfocar los esfuerzos de una organización. En la...
View Article/dev/random: [SANS ISC] Malicious Powershell using a Decoy Picture
I published the following diary on isc.sans.edu: “Malicious Powershell using a Decoy Picture“:I found another interesting piece of malicious Powershell while hunting. The file size is 1.3MB and most of...
View ArticleAlienVault Blogs: Why Spending More On Security Isn’t The Answer
Volume 8 of the AT&T Cyber Insights report looked into whether organizations who are investing more in cybersecurity are achieving better outcomes than those who aren’t.The outcome of the research...
View ArticleDidier Stevens: Update: oledump.py Version 0.0.38
This new version of oledump.py includes a new plugin to extract VBA code from PowerPoint files and an update to plugin plugin_http_heuristics.plugin_http_heuristics was updated to increase the chance...
View ArticleUn informático en el lado del mal: 6º Security Innovation Day: The Game Is...
El próximo 7 de Noviembre llega una cita muy especial para nosotros en ElevenPaths. Llega la 6ª Edición el evento que nos marcó los primeros deadlines en la construcción de productos y servicios en...
View Article/dev/random: [SANS ISC] Diving into Malicious AutoIT Code
I published the following diary on isc.sans.edu: “Diving into Malicious AutoIT Code”:Following my yesterday diary, I had a deeper look at the malicious AutoIT script dropped in my sandbox. For those...
View ArticleAlienVault Blogs: The Importance of Patch Management
With each passing year, our world becomes more and more digital. Our social interactions and personal data as well as many of our jobs are based primarily on the internet. Although this shift has come...
View ArticleArsTechnica: Security Content: How to make elections secure in the age of...
Video by Chris Schodt, production by Justin Wolfson. (video link)In our latest episode of Ars Technica Live, we talk about election security. My guest was Alex Stamos, a researcher at Stanford who...
View ArticleArsTechnica: Security Content: Another Windows 0-day flaw has been published...
https://t.co/1Of8EsOW8z Here's a low quality bug that is a pain to exploit.. still unpatched. I'm done with all this anyway. Probably going to get into problems because of being broke now.. but...
View ArticleZero in a bit: SOSS Volume 9 reveals how DevSecOps can overcome the volume...
Fall is a favorite season for many – in New England, we have beautiful colors and a chill in the air. At CA Veracode, fall is our favorite season because it signifies the release of our annual State...
View ArticleCisco Talos: Beers with Talos EP40: BWT XL feat. SuperMicro, Giant Patches,...
Beers with Talos (BWT) Podcast Ep. #40 is now available. Download this episode and subscribe to Beers with Talos:If iTunes and Google Play aren't your thing, click here.Ep. #40 show notes: Recorded...
View ArticleDidier Stevens: Analyzing PowerPoint Maldocs with oledump Plugin plugin_ppt
VBA macros inside a PowerPoint document are not stored directly inside streams, but as records in the “PowerPoint Document” stream. I have a plugin to parse the records of the “PowerPoint Document”...
View ArticleUn informático en el lado del mal: Colaboradores Pasivos de Abusones en Redes...
Si hay algo que llevo mal son los abusones. Los que humillan a otros por hacerse el gracioso burlándose de sus defectos. Los que insultan a la gente y dicen que es que son “sinceros” u “honestos” o que...
View ArticleAlienVault Blogs: NCSAM Finale: Social Media Sharing Tips
This is the last in our blog series on security awareness to celebrate National Cyber Security Awareness Month (NCSAM). We decided to take on social media sharing tips, and we tapped the Spiceworks...
View ArticleCisco Talos: Vulnerability Spotlight: TALOS-2018-0635/0636 - Sophos...
Marcin Noga of Cisco Talos discovered this vulnerability.Overview Cisco Talos is disclosing two vulnerabilities in Sophos HitmanPro.Alert, a malware detection and protection tool. Both vulnerabilities...
View ArticleFortinet FortiGuard Blog: DDoS-for-Hire Service Powered by Bushido Botnet
The FortiGuard Labs team recently discovered a new platform offering DDoS-for-hire service called “0x-booter.” First appearing on October 17, 2018, 0x-booter is available to anyone who signs up on the...
View ArticleFortinet FortiGuard Blog: Analysis: Inspecting Mach Messages in macOS...
In part I of this blog, we discussed how to inspect the sending of Mach messages in kernel-mode perspective. In part II, I will continue to define how to inspect received Mach messages by setting up a...
View Article