Quantcast
Channel: eternal-todo.com aggregator
Browsing all 12054 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

SANS Internet Storm Center, InfoCON: green: Know What You Are Logging, (Mon,...

I helped out someone who was seeing entries in his log file he could not make sense of.He has an Arduino, running a custom program listening on a TCP port. His router is configured with port...

View Article


SANS Internet Storm Center, InfoCON: green: VMware Security Advisory...

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

View Article


Wired: Security: The Imperfect Truth About Finding Facts in a World of Fakes

It used to make sense to believe something until it was debunked; now, it makes sense to assume certain claims are fake—unless they are verified.

View Article

Image may be NSFW.
Clik here to view.

Cisco Talos: JavaScript bridge makes malware analysis with WinDbg easier

IntroductionAs malware researchers, we spend several days a week debugging malware in order to learn more about it. We have several powerful and popular user mode tools to choose from, such as OllyDbg,...

View Article

SANS Internet Storm Center, InfoCON: green: ISC Stormcast For Tuesday,...

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

View Article


Image may be NSFW.
Clik here to view.

Un informático en el lado del mal: El movimiento lateral a través de DCOM...

Hace bastante tiempo que quería hablar sobre este tema que me parece muy interesante en lo que a técnicas de movimiento lateral se refiere. Si sigues el trabajo de investigadores como Matt Nelson, el...

View Article

Wired: Security: Russian Hackers Go From Foothold to Full-On Breach in 19...

A new ranking of nation-state hacker speed puts Russia on top by a span of hours.

View Article

Image may be NSFW.
Clik here to view.

SANS Internet Storm Center, InfoCON: green: More Russian language malspam...

IntroductionRussian language spam pushing Shade ransomware (also known as Troldesh ransomware) has remained active since my previous ISC diary about it on 2018-11-29.  However, sometime in February...

View Article


SANS Internet Storm Center, InfoCON: green: ISC Stormcast For Wednesday,...

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

View Article


Image may be NSFW.
Clik here to view.

Un informático en el lado del mal: El movimiento lateral a través de DCOM...

En la primera parte de este artículo hablamos de cómo se podía utilizar un componente DCOM con el atributo de ShellWindows para hacer una movimiento lateral en un proceso de Ethical Hacking, para...

View Article

Image may be NSFW.
Clik here to view.

Un informático en el lado del mal: MorterueloCON: Hack&Beers, X1Red+Segura y...

Como sabéis, vamos a colaborar en la próxima MorterueloCON que tiene un cartel muy ambicioso. En ella, desde este jueves un Hack&Beers, el viernes y sábado el plato fuerte de las charlas y el...

View Article

SANS Internet Storm Center, InfoCON: green: ISC Stormcast For Thursday,...

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

View Article

SANS Internet Storm Center, InfoCON: green: Simple Powershell Keyloggers are...

Powershell is a very nice language in Windows environments. With only a few lines of code, we can implement nice features… for the good or the bad!While hunting, I found a bunch of malicious Powershell...

View Article


Wired: Security: A 'Smart Wall' Could Spark a New Kind of Border Crisis

A technological barrier might be preferable to a physical one. But it raises civil liberties concerns that have largely been dropped from the border debate.

View Article

Image may be NSFW.
Clik here to view.

/dev/random: [SANS ISC] Simple Powershell Keyloggers are Back

I published the following diary on isc.sans.edu: “Simple Powershell Keyloggers are Back”:Powershell is a very nice language in Windows environments. With only a few lines of code, we can implement nice...

View Article


Wired: Security: The Russian Sleuth Who Outs Moscow's Elite Hackers and...

Roman Dobrokhotov has been playing a dangerous game for a Russian reporter: identifying agents of the GRU military intelligence agency.

View Article

Image may be NSFW.
Clik here to view.

Zscaler Research: Murkios bot drops files and controls system remotely

The Zscaler ThreatLabZ team came across the Murkios bot, which silently installs itself onto a user’s system and connects to a command-and-control (C&C) server by opening Secure Shell (SSH)...

View Article


SANS Internet Storm Center, InfoCON: green: ISC Stormcast For Friday,...

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

View Article

Image may be NSFW.
Clik here to view.

Un informático en el lado del mal: Cómo ubicar fotos en un mapa a partir de...

Es impresionante la cantidad de fotografías que tomamos hoy en día con nuestros teléfonos móviles. Casi se puede decir que toda la vida la documentamos con nuestras imágenes. Algunas compartiéndolas en...

View Article

Image may be NSFW.
Clik here to view.

Cisco Talos: Cyber Security Week in Review (Feb. 22)

Welcome to this week's Cyber Security Week in Review, where Cisco Talos runs down all of the news we think you need to know in the security world. For more news delivered to your inbox every week, sign...

View Article
Browsing all 12054 articles
Browse latest View live