SANS Internet Storm Center, InfoCON: green: Know What You Are Logging, (Mon,...
I helped out someone who was seeing entries in his log file he could not make sense of.He has an Arduino, running a custom program listening on a TCP port. His router is configured with port...
View ArticleSANS Internet Storm Center, InfoCON: green: VMware Security Advisory...
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View ArticleWired: Security: The Imperfect Truth About Finding Facts in a World of Fakes
It used to make sense to believe something until it was debunked; now, it makes sense to assume certain claims are fake—unless they are verified.
View ArticleCisco Talos: JavaScript bridge makes malware analysis with WinDbg easier
IntroductionAs malware researchers, we spend several days a week debugging malware in order to learn more about it. We have several powerful and popular user mode tools to choose from, such as OllyDbg,...
View ArticleSANS Internet Storm Center, InfoCON: green: ISC Stormcast For Tuesday,...
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View ArticleUn informático en el lado del mal: El movimiento lateral a través de DCOM...
Hace bastante tiempo que quería hablar sobre este tema que me parece muy interesante en lo que a técnicas de movimiento lateral se refiere. Si sigues el trabajo de investigadores como Matt Nelson, el...
View ArticleWired: Security: Russian Hackers Go From Foothold to Full-On Breach in 19...
A new ranking of nation-state hacker speed puts Russia on top by a span of hours.
View ArticleSANS Internet Storm Center, InfoCON: green: More Russian language malspam...
IntroductionRussian language spam pushing Shade ransomware (also known as Troldesh ransomware) has remained active since my previous ISC diary about it on 2018-11-29. However, sometime in February...
View ArticleSANS Internet Storm Center, InfoCON: green: ISC Stormcast For Wednesday,...
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View ArticleUn informático en el lado del mal: El movimiento lateral a través de DCOM...
En la primera parte de este artículo hablamos de cómo se podía utilizar un componente DCOM con el atributo de ShellWindows para hacer una movimiento lateral en un proceso de Ethical Hacking, para...
View ArticleUn informático en el lado del mal: MorterueloCON: Hack&Beers, X1Red+Segura y...
Como sabéis, vamos a colaborar en la próxima MorterueloCON que tiene un cartel muy ambicioso. En ella, desde este jueves un Hack&Beers, el viernes y sábado el plato fuerte de las charlas y el...
View ArticleSANS Internet Storm Center, InfoCON: green: ISC Stormcast For Thursday,...
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View ArticleSANS Internet Storm Center, InfoCON: green: Simple Powershell Keyloggers are...
Powershell is a very nice language in Windows environments. With only a few lines of code, we can implement nice features… for the good or the bad!While hunting, I found a bunch of malicious Powershell...
View ArticleWired: Security: A 'Smart Wall' Could Spark a New Kind of Border Crisis
A technological barrier might be preferable to a physical one. But it raises civil liberties concerns that have largely been dropped from the border debate.
View Article/dev/random: [SANS ISC] Simple Powershell Keyloggers are Back
I published the following diary on isc.sans.edu: “Simple Powershell Keyloggers are Back”:Powershell is a very nice language in Windows environments. With only a few lines of code, we can implement nice...
View ArticleWired: Security: The Russian Sleuth Who Outs Moscow's Elite Hackers and...
Roman Dobrokhotov has been playing a dangerous game for a Russian reporter: identifying agents of the GRU military intelligence agency.
View ArticleZscaler Research: Murkios bot drops files and controls system remotely
The Zscaler ThreatLabZ team came across the Murkios bot, which silently installs itself onto a user’s system and connects to a command-and-control (C&C) server by opening Secure Shell (SSH)...
View ArticleSANS Internet Storm Center, InfoCON: green: ISC Stormcast For Friday,...
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View ArticleUn informático en el lado del mal: Cómo ubicar fotos en un mapa a partir de...
Es impresionante la cantidad de fotografías que tomamos hoy en día con nuestros teléfonos móviles. Casi se puede decir que toda la vida la documentamos con nuestras imágenes. Algunas compartiéndolas en...
View ArticleCisco Talos: Cyber Security Week in Review (Feb. 22)
Welcome to this week's Cyber Security Week in Review, where Cisco Talos runs down all of the news we think you need to know in the security world. For more news delivered to your inbox every week, sign...
View Article