Un informático en el lado del mal: UAC-A-Mola^2 Evolution
Cuando Santiago Hernández y yo comenzamos a trabajar en UAC-A-Mola veíamos claro el objetivo. Una nueva herramienta que permitiera investigar en nuevos bypasses, detectar y explotar bypasses de UAC...
View ArticleAlienVault Blogs: It’s the Season of Lists - Time for a Meaningful Risk List
I attended the Cybersecurity Summit in Phoenix recently and presented on the topic of minimizing risk. There were some great conversations around the value of risk management within the cyber threat...
View ArticleCisco Talos: Anatomy of a sextortion scam
This blog was written by Jaeson Schultz.Since this July, attackers are increasingly spreading sextortion-type attacks across the internet. Cisco Talos has been investigating these campaigns over the...
View ArticleCisco Talos: Vulnerability Spotlight: Multiple Vulnerabilities in Yi...
Vulnerabilities Discovered by Lilith [x_x] of Cisco Talos.OverviewCisco Talos is disclosing multiple vulnerabilities in the firmware of the Yi Technology Home Camera. In order to prevent the...
View ArticleFortinet FortiGuard Blog: CTA Adversary Playbook: Goblin Panda
The FortiGuard SE Team has released a new adversary playbook on the threat actor group known as Goblin Panda as part of its role in the Cyber Threat Alliance (CTA).
View ArticleUn informático en el lado del mal: Los Principios de Telefónica con la...
Desde que comenzamos a hablar de Aura y de Inteligencia Artificial que tenemos en todos nuestros Internal Use Cases de la 4ª Plataforma hablamos de poner control a las acciones que pudiera tomar una AI...
View ArticleAlienVault Blogs: Cybersecurity & Formula 1 Racing - It’s a Profession
This is perspective from one of our MSSP partners, CyberHat.Formula 1 is a serious business. It takes years of expertise and practical foot work to design, build and operate a winning Formula 1 team....
View ArticleCisco Talos: Talos Vulnerability Deep Dive - TALOS-2018-0636 / CVE-2018-3971...
Marcin Noga of Cisco Talos discovered this vulnerability.IntroductionAfter disclosing two vulnerabilities in Sophos HitmanPro.Alert on Thursday, Cisco Talos will show you the process of developing an...
View ArticleDarknet - The Darkside: Web Security Stats Show XSS & Outdated Software Are...
Netsparker just published some anonymized Web Security Stats about the security vulnerabilities their online solution identified on their users’ web applications and web services during the last 3...
View ArticleCisco Talos: CyberVets U.S.A.: The mission after transition
Christopher Marshall, a veteran of the U.S. Navy, currently serves as Director of Cybersecurity Research for Cisco Talos Intelligence Group.As a veteran of the U.S. Navy, I’ve had the opportunity to...
View ArticleDidier Stevens: Overview of Content Published in October
Here is an overview of content I published in October:Blog posts:KEIHash: Fingerprinting SSHRelease: Python Tool TemplatesNew tool: decompress_rtf.pyUpdate: pdf-parser.py Version 0.6.9Update:...
View ArticleFortinet FortiGuard Blog: How-to Guide: Defeating an Android Packer with FRIDA
FortiGuard Labs has encountered a lot of packed Android malware recently. One interesting aspect to this malware is that even though the packer being used is consistently the same, the malware that it...
View ArticleUn informático en el lado del mal: Eventos del 1 al 10 de Noviembre de...
Comenzado Noviembre, tenemos una buena lista de actividades por delante. La más importante, como te puedes imaginar, es nuestro 6º Security Innovation Day en ElevenPaths, que parece que fue ayer mismo...
View ArticleAlienVault Blogs: Things I Hearted this Week, 2nd Nov 2018
It’s November already, where has the year gone? I can almost still remember typing out the words for the year’s first ‘Things I hearted’ blog back in January. Re-reading it now, it feels as if not much...
View ArticleCisco Talos: Threat Roundup for Oct. 26 to Nov. 2
Today, Talos is publishing a glimpse into the most prevalent threats we've observed between Oct. 26 and Nov. 02. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead,...
View ArticleUn informático en el lado del mal: Focalizado con un póster gigante y una...
Aprovechando que estamos con la nueva línea de 0xWord Cómics, he hecho una pequeña tirada de pegatinas y posters. El número que hacemos de cada coa es muy pequeño, y solo para los amantes de estas...
View ArticleDidier Stevens: Quickpost: Using pcapy with Npcap on Windows
I installed pcapy on a Windows machine, but importing in Python failed due to a missing DLL.Process Monitor showed me what was missing: wpcap.dll, a WinPcap DLL:The DLL was missing because I had...
View ArticleAlienVault Blogs: Financial Data and Analysis Predictions for 2019
https://pixabay.com/en/analytics-google-data-visits-page-3680198/PasteThe use of big data and data from the internet of things (IoT) is changing business so rapidly it is hard to predict what is next,...
View ArticleCisco Talos: Persian Stalker pillages Iranian users of Instagram and Telegram
This blog post is authored by Danny Adamatis, Warren Mercer, Paul Rascagneres, Vitor Ventura and with the contributions of Eric Kuhla.IntroductionState-sponsored actors have a number of different...
View ArticleHex blog: IDA 7.2: Qt 5.6.3 configure options & patch
A handful of our users have already requested information regarding the Qt 5.6.3 build, that is shipped with IDA 7.2. Configure options Here are the options that were used to build the libraries on:...
View Article