...And you will know me by the trail of bits: $10,000 research fellowships...
The Trail of Bits SummerCon Fellowship program is now accepting applications from emerging security researchers with excellent project ideas. Fellows will explore their research topics with our...
View ArticleDancho Danchev's Blog - Mind Streams of Information Security Knowledge:...
Dear blog readers, I wanted to let everyone know that I'm currently offering unlimited and exclusive access to Threat Data - The World's Most Comprehensive Threats Database in the true spirit of the...
View ArticleUn informático en el lado del mal: El cuento de Papá Noel y el niño de la...
Mañana es Nochebuena, y hoy os quiero traer un cuento que les narro a los niños sobre la Torre del Reloj del edificio de Telefónica en Gran Vía 28. Si subes allí, podrás ver que hay una sala con una...
View ArticleSANS Internet Storm Center, InfoCON: green: Scanning Activity, end Goal is to...
While reviewing my honeypot logs, I found some interesting entries associated with the Mirai botnet starting the 30 November 2018. This is the last log sample that was captured 2 days...
View ArticleUn informático en el lado del mal: Despedida y cierre de 2018
Como no pude hacer un resumen de todo el año 2018 desde un punto de vista profesional - solo os hice una breve repaso de lo personal - hoy que estoy en Telefónica he decidido grabar un pequeño vídeo de...
View ArticleWired: Security: Cryptojacking Took Over the Internet in 2018
Move over, ransomware. Cryptojacking is officially the scourge of the internet.
View ArticleAlienVault Blogs: The Dangers of Free VPNs
If you use a free VPN, then you have to wonder how your provider earns money to cover their own costs. The answer often involves advertising, but it can also be through far more sinister means.Running...
View ArticleHex blog: IDA 7.2 – The Mac Rundown
We posted an addendum to the release notes for IDA 7.2: The Mac Rundown. It dives much deeper into the Mac-specific features introduced in 7.2, and should be great reference material for users...
View ArticleSANS Internet Storm Center, InfoCON: green: Live memory analysis using...
If you are doing memory forensics using Volatility, maybe you have noticed that one of the disadvantages that you can’t do a live analysis. If you need to do live memory forensics, then Rekall is your...
View ArticleWired: Security: How China Helped Make the Internet Less Free in 2018
Tech companies, democratic governments, and civil society need to work together to fight back against growing surveillance and censorship online.
View ArticleSANS Internet Storm Center, InfoCON: green: Bitcoin "Blacklists", (Wed, Dec...
At the Internet Storm Center, we regularly get malware and fraudulent emails including Bitcoin addresses. Like the extortion emails including leaked passwords. And we often search online for these...
View ArticleWired: Security: Privacy Law Showdown Between Congress and Tech Looms in 2019
Lawmakers spend the better part of 2018 talking tough to tech companies. Now the pressure is on for Congress to act.
View ArticleWired: Security: Pan Am Flight 103: Robert Mueller’s 30-Year Search for Justice
Known as the Lockerbie bombing, in December 1988 a bomb downed a Pan Am jet, leaving 270 dead. It was the first mass killing of Americans by terrorists. As the head of the Justice Department’s criminal...
View ArticleAlienVault Blogs: How Malware Sandboxes and SIEMs Work in Tandem to...
Rohan Viegas of VMRay explains some of the key factors IT security teams should consider when evaluating a malware analysis sandbox and whether it’s a good fit for their existing SIEM environment. He...
View ArticleWired: Security: The Most-Read Security Stories of 2018
This year saw the most devastating cyberattack in history, a gang of teen hackers, and so much Mueller news.
View ArticleSANS Internet Storm Center, InfoCON: green: ISC Stormcast For Friday,...
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View ArticleUn informático en el lado del mal: Y para Reyes Magos puedes pedir un LEGO...
Ya sabéis que soy muy aficionado a los cómics, los posters, los libros, las figuras, y demás, y por ello he cortado mi periodo de desconexión invernal para daros esta noticia. Ya conocéis de mí que me...
View ArticleDidier Stevens: Update: numbers-to-string.py Version 0.0.7
In this update, I added option -T. This is an alternative for option -t (table for number to character conversion). In stead of providing the full table with option -t, now you can provide a partial...
View ArticleWired: Security: We’re all Just Starting to Realize the Power of Personal Data
This year revealed consumers have a lot more to learn about what happens to their information online.
View ArticleAlienVault Blogs: How Malware Sandboxes and SIEMs Work in Tandem to...
Rohan Viegas of VMRay explains some of the key factors IT security teams should consider when evaluating a malware analysis sandbox and whether it’s a good fit for their existing SIEM environment. He...
View Article