Wired: Security: US Tracks Journalists, Chelsea Manning Goes to Jail, and...
A surprisingly common password, an NSA spy program winds down, and more security news this week.
View ArticleAlienVault Blogs: Ban on Smartphones in Secure Federal Facilities
The Federal ban on smartphones for some employees in the workspace makes a lot of sense in post-Snowden days. The phone has a camera, microphone, Bluetooth and other capabilities that can be abused,...
View ArticleArsTechnica: Security Content: An email marketing company left 809 million...
Enlarge (credit: Ullstein Bild | Getty Images)By this point, you've hopefully gotten the message that your personal data can end up exposed in all sorts of unexpected Internet backwaters. But increased...
View ArticleSANS Internet Storm Center, InfoCON: green: A Comparison Study of SSH Port...
I added a while ago to my honeypot TCP 2222 usually associated with SSH traffic to compare the amount of scans targeting port 22 and 2222 over a period of 7 days. What I have noticed, only about 50%...
View ArticleUn informático en el lado del mal: Machine Learning aplicado a...
El Machine Learning está revolucionando el mundo de la empresa y el día a día de la sociedad gracias a infinidad de aplicaciones: sistemas predictivos, de soporte de decisión y recomendación, vehículos...
View ArticleSANS Internet Storm Center, InfoCON: green: ISC Stormcast For Monday, March...
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View ArticleDidier Stevens: Update: re-search.py Version 0.0.13
In this update, you can also save your library with custom regular expressions in the working directory (in prior versions, it would only take it from the application directory).Here is an example with...
View ArticleUn informático en el lado del mal: 3er Reto de BigData, Ciberseguridad e...
Este es el tercer año que abrimos a los estudiantes la posibilidad de participar con sus Proyectos de Fin de Estudios en nuestro Reto de Big Data, Ciberseguridad e Inteligencia Artificial. La idea es...
View ArticleSANS Internet Storm Center, InfoCON: green: Wireshark 3.0.0 and Npcap, (Mon,...
Starting with version 3.0.0, the Wireshark for Windows installation programs are distributed with Npcap in stead of WinPcap. Prior Wireshark Windows versions already supported Npcap, but the installer...
View ArticleHex blog: Hack of the day #1: Decompiling selected functions
Intended audience IDA 7.2 users, who have experience with IDAPython and/or the decompiler. The problem As you may already know, the decompilers allow not only decompiling the current function (shortcut...
View ArticleSANS Internet Storm Center, InfoCON: green: ISC Stormcast For Tuesday, March...
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View ArticleUn informático en el lado del mal: Novedades en iBombShell version 0.2b...
Desde que iBombShell fue a BlackHat en su primera versión hemos ido trabajando para ganar en estabilidad, ampliar funcionalidades básicas y en un Ethical Hacking, incorporar las colaboraciones que nos...
View ArticleCisco Talos: Vulnerability Spotlight: Privilege escalation bug in CleanMyMac...
Tyler Bohan of Cisco Talos discovered this vulnerability.Executive summaryCleanMyMac X contains a privilege escalation vulnerability in its helper service due to improper updating. The application...
View ArticleBreakingPoint Labs Blog: You Can't Manage What You Can't Measure - an RSA...
This week, I had the privilege of enjoying an enlightening and broad-ranging panel discussion…
View ArticleBreakingPoint Labs Blog: Give Your Network An Unfair Advantage Against Hidden...
The IT role is extremely hard today. Whether you are part of the DevOps or SecOps team makes no…
View ArticleSANS Internet Storm Center, InfoCON: green: Binary Analysis with Jupyter and...
Jupyter has become very popular within the data science community, as it is an easy way of working interactively with Python, R and other languages. Within Jupyter you'll create a notebook, which...
View ArticleWired: Security: How Hackers Pulled Off a $20 Million Mexican Bank Heist
Welcome to the world of fake accounts, phantom funds, and money mules.
View ArticleCisco Talos: Cyber Security Week in Review (March 15)
Welcome to this week's Cyber Security Week in Review, where Cisco Talos runs down all of the news we think you need to know in the security world. For more news delivered to your inbox every week, sign...
View ArticleAlienVault Blogs: RSA 2019 - A Case of the Blues
RSA is arguably the biggest business-focussed cyber security event of the year. As over 40,000 security professionals completely take over the Moscone Centre in San Francisco.Of course, one of the...
View ArticleArsTechnica: Security Content: Epic says its Game Store is not spying on you
Enlarge/ Despite what you may have read, Epic says this is not spyware. This week, certain corners of the gaming Internet have been abuzz with a bit of self-described "amateur analysis" suggesting some...
View Article