Wired: Security: Putin Will Put Russia Behind an Internet Curtain
Hacking big companies, building a better voting machine, and more security news this week.
View ArticleWired: Security: What Is Application Shielding?
Security firms are increasingly touting application shielding as an important layer of defense. But it may be better suited to DRM.
View ArticleDancho Danchev's Blog - Mind Streams of Information Security Knowledge:...
Dear blog readers, I wanted to let you know that I've recently launched a currently active Indiegogo crowd-funding campaign regarding my favorite working place throughout the 90's - Astalavista...
View ArticleDancho Danchev's Blog - Mind Streams of Information Security Knowledge:...
It's 2010 and I've recently intercepted a currently circulating malicious and fraudulent scareware-serving campaign courtesy of the Koobface Gang this time successfully typosquatting my name within its...
View ArticleDancho Danchev's Blog - Mind Streams of Information Security Knowledge:...
It's 2010 and I've recently came across to yet another currently active scareware-serving campaign courtesy of the Koobface gang this time successfully introducing a CAPTCHA-breaking module potentially...
View ArticleZero in a bit: On Abusing Email Validation Protocols for Distributed...
Denial of Service (DoS) attacks are still very much in vogue with cybercriminals. They are used for extortion attempts, to attack competitors or detractors, as an ideological statement, as a service...
View ArticleWired: Security: Artificial Intelligence May Not 'Hallucinate' After All
What makes an algorithm mistake a helicopter for a gun? Researchers think the answer has to do more with man than machine.
View ArticleZero in a bit: 2019 Verizon DBIR Shows Web Applications and Human Error as...
According to the 2019 Verizon Data Breach Investigations Report, there was a noticeable shift toward financially motivated crime (80 percent), with 35 percent of all breaches occurring as a result of...
View ArticleWired: Security: Hackers Stole $40 Million From Binance Cryptocurrency Exchange
One of the biggest cryptocurrency exchanges got hit, as thieves nabbed $40 million of bitcoin—along with user two-factor codes and API tokens.
View ArticleWired: Security: Inside China’s Surveillance Crackdown on Uyghurs
In Xinjiang, northwest China, the government is cracking down on the minority Muslim Uyghur population, keeping them under constant surveillance and throwing more than a million people into...
View ArticleCisco Talos: Vulnerability Spotlight: Remote code execution bug in SQLite
Cory Duplantis of Cisco Talos discovered this vulnerability.Executive summarySQLite contains an exploitable use-after-free vulnerability that could allow an attacker to gain the ability to remotely...
View ArticleBreakingPoint Labs Blog: Technology Changes Are Creating Significant...
The education sector is undergoing significant change. National enrollment for higher education has…
View ArticleCisco Talos: Threat Source newsletter (May 9)
Newsletter compiled by Jonathan Munshaw.Welcome to this week’s Threat Source newsletter — the perfect place to get caught up on all things Talos from the past week.If you haven’t yet, there’s still...
View ArticleSANS Internet Storm Center, InfoCON: green: DSSuite - A Docker Container with...
If you follow us and read our daily diaries, you probably already know some famous tools developed by Didier (like oledump.py, translate.py and many more). Didier is using them all the time to analyze...
View ArticleUn informático en el lado del mal: Tu privacidad depende del control y...
Cuando en los medios generalistas se habla de datos se tiende a pensar en un valor evidente para todo el mundo. Se suele tender a utilizar "Datos" refiriéndose a elementos de información entendibles...
View Article/dev/random: [SANS ISC] DSSuite – A Docker Container with Didier’s Tools
I published the following diary on isc.sans.edu: “DSSuite – A Docker Container with Didier’s Tools“:If you follow us and read our daily diaries, you probably already know some famous tools developed by...
View ArticleWired: Security: DOJ Says Chinese Hackers Attacked Anthem, but Not Why
For years, China was rumored to be behind the health insurance company's massive data breach, but now the Justice Department is noticeably silent on the hackers' motives and affiliation.
View ArticleBreakingPoint Labs Blog: Subscriber-Aware Session Monitoring: The ABCs of...
This blog is another in a series devoted to exploring critical aspects of network visibility. The…
View ArticleDidier Stevens: Update: jpegdump.py Version 0.0.7
This new version of jpegdump.py (a tool to analyze JPEG pictures) adds 2 new options: -t and -A.Option -t: consider everything after the first EOI as trailing.Option -A: perform ascii dump with...
View ArticleCisco Talos: Threat Roundup for May 3 to May 10
Today, Talos is publishing a glimpse into the most prevalent threats we've observed between May 03 and May 10. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead, this...
View Article