SANS Internet Storm Center, InfoCON: green: ISC Stormcast For Wednesday,...
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View ArticleBreakingPoint Labs Blog: Lightwave Innovation Reviews Honors Ixia AresONE...
At Ixia, we were delighted to see one of our most exciting new products, AresONE, be recognized by…
View ArticleWired: Security: In the Face of Danger, We’re Turning to Surveillance
From the Rose Bowl to upstate New York, people are turning to surveillance systems in the face America’s inability to meaningfully address gun violence.
View ArticleArsTechnica: Security Content: Microsoft ships antivirus for macOS as Windows...
Microsoft is bringing its Windows Defender anti-malware application to macOS—and more platforms in the future—as it expands the reach of its Defender Advanced Threat Protection (ATP) platform. To...
View ArticleBreakingPoint Labs Blog: Monitoring performance where the action is: on the...
Intelligence is spreading out in organizations--moving closer to the customer, closer to customer-…
View ArticleSANS Internet Storm Center, InfoCON: green: ISC Stormcast For Thursday, March...
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View ArticleWired: Security: Facebook Stored Millions of Passwords in Plaintext—Change...
Facebook has disclosed that it stored hundreds of millions of user passwords in plaintext, where employees could search them.
View ArticleDancho Danchev's Blog - Mind Streams of Information Security Knowledge:...
Dear blog readers, I wanted to let everyone know that I've recently launched a public hacking and cyber security community repository offering Security Directory Downloads Podcasts and Security Videos...
View ArticleCisco Talos: Cyber Security Week in Review (March 22)
Welcome to this week's Cyber Security Week in Review, where Cisco Talos runs down all of the news we think you need to know in the security world. For more news delivered to your inbox every week, sign...
View ArticleSANS Internet Storm Center, InfoCON: green: Introduction to analysing Go...
Golang is gaining popularity by malware authors, and more golang based malware is being found in the wild. It is also one of my favourite programming languages, especially for all network related...
View ArticleCisco Talos: Threat Roundup for March 15 to March 22
Today, Talos is publishing a glimpse into the most prevalent threats we've observed between March 15 and March 22. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead,...
View ArticleWired: Security: FEMA Leaked Data From 2.3 Million Disaster Survivors
The Homeland Security Department inspector general released a damning report about FEMA's inability to safeguard the personal info of the people it helped.
View ArticleUn informático en el lado del mal: Y esta semana toca... @0xWord @luca_d3...
Como dicta la rutina que he tomado, os dejo un sábado más la lista de eventos, cursos, conferencias, charlas, y demás citas a tener en cuenta de las que realizamos nosotros. Yo estaré de viaje por...
View ArticleDidier Stevens: Quickpost: PDF Tools Download Feature
When I’m asked to perform a quick check of an online PDF document, that I expect to be benign, I will just point my PDF tools to the online document. When you provide an URL argument to pdf-parser, it...
View ArticleWired: Security: Kushner Used WhatsApp, a Very Bad Database Leak, and More...
Jared and Ivanka used private messaging against the rules, and more security news this week.
View ArticleSANS Internet Storm Center, InfoCON: green: "VelvetSweatshop" Maldocs, (Sat,...
Encrypted Excel documents can be opened without entering a password, provided the password is "VelvetSweatshop".There was a new wave of Excel maldocs encrypted with this password. MD5...
View ArticleUn informático en el lado del mal: Un leak en “Pipl” que weaponiza tus leaks...
Las técnicas OSINT (Open Source Intelligence) se basan en extraer información que es pública o que está disponible públicamente. Pero no siempre quiere decir que esa información debiera ser pública. En...
View ArticleSANS Internet Storm Center, InfoCON: green: Decoding QR Codes with Python,...
In diary entry "Sextortion Email Variant: With QR Code", I had to decode a QR code. I didn't mention it in my diary entry, but I used an online service to decode the QR Code (I didn't want to use my...
View Article...And you will know me by the trail of bits: What Application Developers...
TLS 1.3 represents the culmination of over two decades of experience in deploying large-scale transport security. For the most part it simplifies and improves the security of TLS and can act as a...
View ArticleUn informático en el lado del mal: Pentesting con PowerShell: Powershell...
En el blog hemos hablado de diferentes cosas relacionadas con el pentesting con Powershell. Ya hemos hablado sobre la protección de AMSI y las necesidades de hacer un bypass cuando uno está haciendo...
View Article