SANS Internet Storm Center, InfoCON: green: Help us improve our daily...
--- Johannes B. Ullrich, Ph.D.STI|Twitter|LinkedIn (c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View ArticleUn informático en el lado del mal: Documental "El cazador de cerebros: La...
Hoy domingo, víspera de la Noche de Halloween, os voy a dejar algo fácil de procesar. Se trata del programa "El Cazador de Cerebros: Más allá del móvil", que emitieron la semana pasada en La 2. Se...
View ArticleDancho Danchev's Blog - Mind Streams of Information Security Knowledge:...
Dear, blog, readers, I decided to invite selected, blog, readers, to, a, private, party, hosted, in, my, town, for, the, opening, of, Kings of Wisdom [hard copy] magazine. If, you're, interested, in,...
View ArticleDancho Danchev's Blog - Mind Streams of Information Security Knowledge: Book...
Dear, blog, readers, as, I'm, currently, busy, writing, a, book, I'm looking for, a publisher, who's, interested, in, publishing, it, with, the, book, proposal, available, on, request. Send your...
View ArticleDancho Danchev's Blog - Mind Streams of Information Security Knowledge:...
Dear blog readers, I'm currently seeking an investment regarding a cybercrime research project, with, the, project, proposal, available, on request. Send your proposal at: ddanchev@protonmail.ch
View ArticleDancho Danchev's Blog - Mind Streams of Information Security Knowledge:...
Dear blog readers, as I'm currently busy launching a private security community, I decided, to publicly announce, its, existence. Topics of discussion: - cybercrime research - threat intelligence -...
View ArticleDancho Danchev's Blog - Mind Streams of Information Security Knowledge:...
Looking for a full time threat intelligence analyst, cybercrime researcher, or a security blogger? Send your proposition to: ddanchev@protonmail.ch
View ArticleSANS Internet Storm Center, InfoCON: green: Volatility Bot: Automated Memory...
Few weeks ago Ive attended the SANS DFIR Summit in Prague, and one of the very interesting talks was from Martin Korman (@MartinKorman), who presented a new tool he developed: Volatility Bot.According...
View ArticleUn informático en el lado del mal: Latch Cloud TOTP versus Google Authenticator
Cuando hablamos de un Segundo Factor de Autenticación, los tokens TOTP (Time One-Time Password) son unos de los más populares. Servicios tan populares como Google, Microsoft, Dropbox o Facebook tienen...
View ArticleSANS Internet Storm Center, InfoCON: green: ISC Stormcast For Monday, October...
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View ArticleInfosec Events: Week 44 In Review – 2016
Events RelatedCharlie Miller Keynote, Automotive Security: A Hacker’s Eye View– www.youtube.com The security of today’s vehicles involves many moving parts, but while manufactures take a majority of...
View ArticleLost In Security: El último superviviente (II) - iOS
En el pasado artículo estuvimos revisando los puntos débiles que tiene un malware a la hora de sobrevivir un reinicio del sistema, y nos centramos en OSX. Ahora toca el turno a iOS, que al ser una...
View ArticleKPNC: vulnerability in… WinCalc (Win7, x64)
I will never go out of business in this country. thanks to Microsoft. who would have thought that wincalcis vulnerable? I have not checked all systems yet, so this is my configuration: Windows 7...
View ArticlePandaLabs: PowerLocker
PowerLocker, also called PrisonLocker, is a new family of ransomware which in addition to encrypting files on the victim’s computer (as with other such malware) threatens to block users’ computers...
View ArticleWired: Threat Level: Hacker Lexicon: What Are White Hat, Gray Hat, and Black...
Here's how to distinguish the colors of the hacker rainbow. The post Hacker Lexicon: What Are White Hat, Gray Hat, and Black Hat Hackers? appeared first on WIRED.
View ArticleWired: Threat Level: Matthew Keys Sentenced to Two Years for Aiding Anonymous
The former Tribune Company employee was convicted of giving Anonymous information that helped hackers access an LA Times server and alter a headline. The post Matthew Keys Sentenced to Two Years for...
View ArticleArsTechnica: Security Content: New leak may show if you were hacked by the NSA
Enlarge (credit: Mustafa Al-Bassam)Shadow Brokers—the name used by a person or group that created seismic waves in August when it published some of the National Security Agency's most elite hacking...
View ArticleArsTechnica: Security Content: Trick or Treat! Google issues warning of...
Enlarge/ Win32k.sys has some problems. Again. Recently, Google’s Threat Analysis Group discovered a set of zero-day vulnerabilities in Adobe Flash and the Microsoft Windows kernel that were already...
View ArticleSANS Internet Storm Center, InfoCON: green: SEC505 DFIR capture script:...
I just spent a fair bit of time preparing to take the GIAC Security Expert exam as part of the requirement to recertify every four years. I first took the exam in 2012, and I will tell you, for me, one...
View ArticleSANS Internet Storm Center, InfoCON: green: ISC Stormcast For Tuesday,...
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View Article