Darknet - The Darkside: SecLists – Usernames, passwords, URLs, sensitive data...
SecLists is the security tester’s companion. It’s a collection of multiple types of lists used during security assessments, collected in one place.List types include usernames, passwords, URLs,...
View ArticleZero in a bit: Your AppSec Program Can Make Your Developers and Your CFO Happy
While cybersecurity risk is steadily growing, so too is the recognition that application security (AppSec) is critical to protecting valuable enterprise resources. More than ever, ensuring that you...
View ArticleWired: Security: Security Experts Unite Over the Right to Repair
Securepairs.org is pushing back against a tech industry that wants independent repair legislation to be scary.
View ArticleZero in a bit: Learning From the Vodafone-Huawei Backdoor Scandal
Yesterday, Bloomberg reported that Vodafone uncovered hidden backdoors in Huawei equipment used for the carrier’s Italian business, which could have given Huawei unauthorized access to Italian homes...
View ArticleCisco Talos: Sodinokibi ransomware exploits WebLogic Server vulnerability
This blog was authored by Pierre Cadieux, Colin Grady, Jaeson Schultz and Matt ValitesAttackers are actively exploiting a recently disclosed vulnerability in Oracle WebLogic to install a new variant of...
View ArticleWired: Security: Trump’s World Still Faces 16 Known Criminal Probes
Mueller is done and Rosenstein is on his way out the door, but federal and state authorities around the country are still investigating the president and those in his orbit.
View ArticleUn informático en el lado del mal: Conferencias y Charlas del 1 al 12 de...
Llega el mes de Mayo y con él ya olemos cerca el calor del verano en esta España mía que tanto quiero. Pero también llega un mes en el que voy a tener bastante actividad en charlas y conferencias. La...
View ArticleSANS Internet Storm Center, InfoCON: green: ISC Stormcast For Wednesday, May...
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View Article/dev/random: [SANS] Another Day, Another Suspicious UDF File
I published the following diary on isc.sans.edu: “Another Day, Another Suspicious UDF File“:In my last diary, I explained that I found a malcious UDF image used to deliver a piece of malware. After...
View ArticleCisco Talos: JasperLoader Emerges, Targets Italy with Gootkit Banking Trojan
Nick Biasini and Edmund Brumaghin authored this blog post with contributions from Andrew Williams.Introduction to JasperLoaderMalware loaders are playing an increasingly important role in malware...
View ArticleWired: Security: Hacktivists Are on the Rise—but Less Effective Than Ever
Groups like Anonymous are still trying to make waves in Sudan and elsewhere, but the old tools don't work as well as they used to.
View ArticleCisco Talos: Qakbot levels up with new obfuscation techniques
Ashlee Benge of Cisco Talos and Nick Randolph of the Threat Grid Research and Efficacy team authored this blog post.Executive summaryQakbot, also known as Qbot, is a well-documented banking trojan that...
View ArticleBreakingPoint Labs Blog: What to do when traffic overwhelms your monitoring...
Growing traffic volume is a challenge for NetOps and SecOps as they work to ensure high-quality…
View ArticleSANS Internet Storm Center, InfoCON: green: ISC Stormcast For Friday, May 3rd...
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View ArticleSANS Internet Storm Center, InfoCON: green: A few Ghidra tips for IDA users,...
In this entry in my series, I'll look at a few more of the features I regularly use in IDA and how to accomplish the same in Ghidra.The first one is simple conversion. In this case, hex to ASCII...
View ArticleUn informático en el lado del mal: Google Cloud Natural Language Analysis...
Hace unos días estuve probando los servicios de Visión Artificial en Microsoft Azure para el reconocimiento de Celebrities, y un poco más aún, cómo funcionaban algunos servicios de Sentiment Análisis...
View ArticleWired: Security: A Mysterious Hacker Group Is On a Supply Chain Hijacking Spree
A group of likely Chinese hackers has poisoned the software of at least six companies in just the last three years.
View ArticleCisco Talos: Threat Roundup for April 26 to May 3
Today, Talos is publishing a glimpse into the most prevalent threats we've observed between April 26 and May 03. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead,...
View ArticleWired: Security: A Hacking Spree, a Fight for Open Internet, and More News
Catch up on the most important news today in 2 minutes or less.
View ArticleUn informático en el lado del mal: Style GAN: Una AI para crear perfiles de...
Ya hemos hablado en muchas ocasiones de las GANs (Generative Adversarial Networks) que empezamos a utilizar para hacer un Face Swapping (el que me hicieron con Axl Rose) y generar unos vídeos falsos...
View Article