Cisco Talos: Connecting the dots between recently active cryptominers
Post authored by David Liebenberg and Andrew Williams.Executive SummaryThrough Cisco Talos' investigation of illicit cryptocurrency mining campaigns in the past year, we began to notice that many of...
View ArticleCisco Talos: As Cryptocurrency Crash Continues, Will Mining Threat Follow?
Post authored by Nick Biasini.Executive SummaryAs 2018 draws to a close, one technology has definitively left its mark on the year: cryptocurrencies. Digital currencies started the year out strong...
View ArticleZero in a bit: SQLite Vulnerability May Be Putting Your Applications at Risk
Late last week, Tencent announced that researchers from its Blade Team had discovered a remote code execution (RCE) vulnerability in SQLite, dubbed Magellan. SQLite is a very popular embedded SQL...
View ArticleZero in a bit: Beyond Scanning: Don’t Let AppSec Ignorance Become Negligence
In recent months, as I’ve worked with more and more prospects and customers, I’ve started to see an interesting trend: As more agile dev teams become responsible for their own security posture, they...
View ArticleDarknet - The Darkside: Acunetix Vulnerability Scanner For Linux Now Available
Acunetix Vulnerability Scanner For Linux is now available, now you get all of the functionality of Acunetix, with all of the dependability of Linux.Following extensive customer research, it became...
View ArticleSANS Internet Storm Center, InfoCON: green: Microsoft OOB Patch for Internet...
Microsoft just published an out-of-band patch for Internet Explorer. It fixes a memory corruption vulnerability in the scripting engine. This vulnerabiliy is identified as %%cve:2018-8653%%.When...
View ArticleBreakingPoint Labs Blog: Building an Empire one PowerShell Exploit at a Time
In the last two years, PowerShell use in malware has sharply risen. A lot of penetration tools and…
View ArticleZero in a bit: Indictment of Chinese Hackers Underscores Need for Stronger...
According to a newly unsealed indictment, two Chinese nationals working with the Chinese ministry of state security have been charged with hacking a number of U.S. government agencies and corporations....
View ArticleZero in a bit: Flaws and Vulnerabilities and Exploits – Oh My!
With the slew of terms that exist in the world of application security, it can be difficult to keep them all straight. “Flaws,” “vulnerabilities,” and “exploits” are just a few that are likely on your...
View ArticleBreakingPoint Labs Blog: Examples of How The Financial Industry Is Navigating...
The financial industry is experiencing a massive wave of change over the last several years.…
View ArticleCisco Talos: Year in Malware 2018: The most prominent threats Talos tracked...
It was easy to see a wild year coming in cybersecurity. It started with a bang, with Olympic Destroyer targeting the Winter Olympics in February in an attempt to disrupt the opening ceremonies. Things...
View ArticleWired: Security: How China’s Elite Spies Stole the World’s Secrets
A new Justice Department indictment outlines how Chinese hackers allegedly compromised data from companies in a dozen countries in a single intrusion.
View ArticleWired: Security: In Project Maven's Wake, the Pentagon Seeks AI Tech Talent
The Defense Department wants to use AI in warfare. In the aftermath of Project Maven, it still needs Big Tech’s help.
View ArticleCisco Talos: Submissions for talks at the 2019 Talos Threat Research Summit...
When Cisco Talos launched the first ever Talos Threat Research Summit last year, we never could have anticipated how popular it would be. Tickets sold out quickly, and our inaugural Talos-backed...
View ArticleZero in a bit: Carnegie Mellon’s Software Engineering Institute Report Shows...
A new report from Carnegie Mellon University’s Software Engineering Institute shows that automated, integrated Static Analysis improves software quality, reduces development time, and makes software...
View ArticleSANS Internet Storm Center, InfoCON: green: Phishing Attempts That Bypass...
In today's world, we all try to do as much as we can to be secure while online. Most have learned the signs to try to spot phishing attempts: misspelled words, broken english, urgent requests etc. We...
View ArticleCisco Talos: Threat Roundup for Dec. 14 to Dec. 21
Today, Talos is publishing a glimpse into the most prevalent threats we've observed between Dec. 14 and Dec. 21. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead,...
View ArticleUn informático en el lado del mal: Una reflexión final (y personal) sobre...
Ayer no publiqué ningún artículo en El lado del mal. Años atrás hubiera sido algo extraño, pero desde hace tres hacia acá intento tomarme ciertos días de descanso, o no preocuparme cuando el tiempo no...
View ArticleWired: Security: A NASA Hack, a PewDiePie Fan, and More Security News
Amazon sends Echo recordings to the wrong person, Russians tried to get US Treasury dirt on Clinton donors, and more of the week's top security news.
View ArticleSANS Internet Storm Center, InfoCON: green: KringleCon 2018, (Sat, Dec 22nd)
The SANS Holiday Hack Challenge is an annual, free CTF. Most of you already know that.This year, it includes KringleCon 2018. A virtual online hacker conference hosted on YouTube with 51 presentations...
View Article