Darknet - The Darkside: Massive Yahoo Hack – 500 Million Accounts Compromised
So if you are a Yahoo user (which most of us probably have been at some point) you will be aware of the Yahoo Hack – with 200 Million e-mail addresses being up for sale on the black market it seems up...
View ArticleUn informático en el lado del mal: ¿Cuánto dinero gana #Facebook cada vez que...
Como sabéis, Facebook está últimamente en medio de una gran tormenta debido a la decisión de unir los datos de WhatsApp con los datos de la red social Facebook, algo por lo que está bajo investigación...
View ArticleArsTechnica: Security Content: iPhone exploit bounty surges to an eye-popping...
Enlarge (credit: Antoine Taveneaux)A controversial broker of security exploits is offering $1.5 million (£1.2 million) for attacks that work against fully patched iPhones and iPads, a bounty that's...
View ArticleSANS Internet Storm Center, InfoCON: green: ISC Stormcast For Friday,...
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View ArticleSANS Internet Storm Center, InfoCON: green: Another Day, Another Malicious...
Every day, we are spammed with thousands of malicious emails and attackers always try to find new ways to bypass the security controls. Yesterday, I detected a suspicious HTTP GET request: GET...
View Article/dev/random: [SANS ISC Diary] Another Day, Another Malicious Behaviour
I published the following diary on isc.sans.org: “Another Day, Another Malicious Behaviour“.Every day, we are spammed with thousands of malicious emails and attackers always try to find new ways to...
View ArticleLost In Security: El último superviviente (II) - iOS
En el pasado artículo estuvimos revisando los puntos débiles que tiene un malware a la hora de sobrevivir un reinicio del sistema, y nos centramos en OSX. Ahora toca el turno a iOS, que al ser una...
View ArticleDidier Stevens: Quickpost: Enhancing Radare2 Disassembly Listing
I threw a program together to add information to Radare2 disassembly listings: radare2-listing.py. I’m putting it in beta, because I hope there is another way to do this in Radare2 (e.g. without a...
View ArticleDarknet - The Darkside: mimikittenz – Extract Plain-Text Passwords From Memory
mimikittenz is a post-exploitation powershell tool that utilizes the Windows function ReadProcessMemory() in order to extract plain-text passwords from various target processes. The aim of mimikittenz...
View ArticleArsTechnica: Security Content: More than 400 malicious apps infiltrate Google...
Enlarge (credit: Curious Expeditions)Google Play was recently found to be hosting more than 400 apps that turned infected phones into listening posts that could siphon sensitive data out of the...
View ArticleUn informático en el lado del mal: Regístrate para asistir al Security...
Las plazas para nuestro cuarto Security Innovation Day están acabadas desde hace unos días, pero eso no significa que no puestas estar en directo con nosotros a través de Internet, desde cualquier...
View ArticleADD / XOR / ROL: "Why do you work in security instead of something more...
This post grew out of a friend on Facebook asking (I paraphrase) "why do you spend your time on security instead of using your brainpower for something more lasting ?". I tried to answer, and ended up...
View ArticleMcAfee Avert Labs: Taking a Look at W32/Ramnit
Today we’re going to take a look at an interesting file-infector virus. W32/Ramnit infects EXE, DLL and HTML files. That last one is right; W32/Ramnit also infects HTML files to replicate itself.Let’s...
View Articlehoneyblog: 2011 Honeynet Project Security Workshop Slides + Videos
The slides and videos from the 2011 Honeynet Project Security Workshop (Paris) are now available! You can get the material from http://www.honeynet.org/SecurityWorkshops/2011_Paris. About the...
View ArticleLost In Security: Españoles por la BlackHat
Siguiendo con la estela del artículo publicado 'Españoles por la Phrack', vuelvo a la carga con un artículo parecido, pero en este caso sobre una de las conferencias de seguridad que más conoce la...
View ArticleUn informático en el lado del mal: Las citas para la primera mitad de...
Como suelo hacer todos los meses, os anticipo alguna lista de conferencias, charlas y eventos que tendrán lugar durante las próximas dos semanas, para que podáis ver si alguna os convence. Hay charlas...
View ArticleNiels Provos: Early Experiments in Visualizing Pattern-Development for...
Visualizing pattern-welded steel has always been intriguing to me. At the forge, I end up layering different kinds of steels by varying carbon-content, nickel or phosphorous but ultimately don't know...
View ArticleInfosec Events: Information Security Events For October
Here are information security events in North America this month: Virus Bulletin 2016 : October 5 to 7 in Denver, CO, USA WACCI 2016 : October 5 to 7 in Oshkosh, WI, USA SecureWorld Denver 2016 :...
View ArticleSANS Internet Storm Center, InfoCON: green: Is there an Infosec Cybersecurity...
Over the past few months there has been a lot of discussion about a shortage in data scientist and cybersecurity analyst, to name a few, where organizations find it difficult in filling cyber security...
View ArticleArsTechnica: Security Content: Brace yourselves—source code powering potent...
Enlarge (credit: Michael Theis)A hacker has released computer source code that allows relatively unsophisticated people to wage the kinds of extraordinarily large assaults that recently knocked...
View Article