Cisco Talos: Registration for the 2019 Talos Threat Research Summit is now open
The Talos Threat Research Summit is officially back.Registration is open now for the second year of our conference by defenders, for defenders. Tickets sold out quickly last year for our inaugural...
View ArticleSANS Internet Storm Center, InfoCON: green: Annotating Golang binaries with...
In my previous post we've gone through some of the basics of analysing Golang binaries. This post will annotate source path and line information to the disassembly in Cutter. If you're not familiair...
View ArticleUn informático en el lado del mal: 3 Cursos online de Hacking en Abril, 2...
Ayer no me dio la vida para sacaros el post del blog, pero tenía que pasarme por el Equinox de Telefónica, preparar las diapositivas de la RootedCON para luego dar la charla y firmar los libros y...
View ArticleWired: Security: Google Play Store’s Malware Problem, and More Security News...
Plus, Russia cracks down on VPNs, Microsoft cracks down on Iranian hackers, and more of the week's top security news.
View ArticleFox-IT: mkYARA – Writing YARA rules for the lazy analyst
Writing YARA rules based on executable code within malware can be a tedious task. An analyst cannot simply copy and paste raw executable code into a YARA rule, because this code contains variable...
View ArticleAlienVault Blogs: Things I hearted this week, 29th March 2019
I search long and hard each week to find the best and most interesting security stories. These aren’t just news stories, but also interesting blogs and experiences people share.One thing I’ve felt (I...
View ArticleSANS Internet Storm Center, InfoCON: green: "404" is not Malware, (Sat, Mar...
Reader Chris submitted a PowerShell log. These are interesting too. Here's what we saw:A typical downloader command.When I tried to download this using wget and the URL, I got a 404 page.Next, I did a...
View ArticleUn informático en el lado del mal: 2FWB: Second Factor Web Browsing [Parte 1...
Tengo la suerte de ser un "papaete" que tiene dos niñas que me vuelven loco. Son totalmente distintas, la mayor es "Mi Hacker" y la pequeña "Mi Survivor". Cada una es como es ella. No es fácil...
View Article...And you will know me by the trail of bits: Performing Concolic Execution...
Alan CaoFor my winternship and springternship at Trail of Bits, I researched novel techniques for symbolic execution on cryptographic protocols. I analyzed various implementation-level bugs in...
View ArticleSANS Internet Storm Center, InfoCON: green: Maldoc Analysis of the Weekend by...
This week, reader Ahmed Elshaer submitted a malicious document. Which he was later able to analyse himself:Today we have detected a Doc File containing Macro. I would like to share with you my analysis...
View ArticleSANS Internet Storm Center, InfoCON: green: Analysis of PDFs Created with...
From time to time, I get a question about PDFs that have an /OpenAction, but don't seem to contain (malicious) code.When you look at such a PDF with pdfid.py, everything looks OK, except that there is...
View ArticleWired: Security: Right to Repair Is Now a National Issue
Opinion: Elizabeth Warren endorsed Right to Repair for farm equipment, pushing the cause to a new level of prominence.
View ArticleZero in a bit: How Many Web Applications Does Your Organization Have? It’s...
“Automation has saved a tremendous amount of time. We went from a day per app to review and now we are essentially reviewing through automation 18,000 scans a day with only 20 AppSec engineers. You do...
View ArticleAlienVault Blogs: Information on open source vulnerabilities is as...
Nothing gets the AppSec / InfoSec community abuzz quite like a good old 0-day vulnerability.I mean, what’s not to love here? These vulnerabilities involve the thrill of adversaries knowing something we...
View ArticleZero in a bit: Veracode Dynamic Analysis: Reduce the Risk of a Breach
This blog post has been updated as of April 2, 2019Veracode Dynamic Analysis is a dynamic scanning solution that features automation, depth of coverage, and unmatched scalability. Built on...
View ArticleAlienVault Blogs: Xwo - A Python-based bot scanner
Jaime Blasco and Chris Doman collaborated on this blog.Overview:Recently, AT&T Alien Labs identified a new malware family that is actively scanning for exposed web services and default passwords....
View ArticleArsTechnica: Security Content: To catch a drug thief, hospital secretly...
Enlarge/ Not where you want a hidden camera. (credit: Getty | Brendan Hoffman)A California hospital faces a lawsuit from 81 women who allege they were secretly filmed by hidden cameras in labor and...
View ArticleWired: Security: Third-Party Apps Exposed Over 540 Million Facebook Records
A cybersecurity firm found that two different third-party Facebook apps left millions of records about users sitting unprotected on Amazon’s servers.
View ArticleWired: Security: It’s Time to End the NSA’s Metadata Collection Program
Opinion: Congress needs to pull the plug and end the authority for the CDR program.
View ArticleWired: Security: Mar-a-Lago's Security Problems Go Way Beyond a Thumb Drive
A Chinese woman was arrested for sneaking into Trump's "Winter White House," a reminder of how exposed the president's private club is to physical and cybersecurity risks.
View Article