Darknet - The Darkside: Snort – Free Network Intrusion Detection & Prevention...
Snort is an open-source, lightweight, free network intrusion detection system (NIDS) software for Linux and Windows to detect emerging threats. It’s capable of of performing real-time traffic analysis...
View ArticleUn informático en el lado del mal: Eventos, Cursos y Charlas del 1 al 10 de...
Aprovechando el día de fiesta del día de hoy, os he hecho un resumen de la lista de eventos, cursos y conferencias en los que vamos a participar durante los diez primeros días del mes de Noviembre. La...
View Article/dev/random: Debriefing the BruCON Network
The eighth BruCON edition is already over! Don’t expect a wrap-up because I just don’t have time. I’m always keeping an eye on the attendees’ bits & bytes! Based on the first feedback that I...
View ArticleArsTechnica: Security Content: UK government vows to sink $2.3 billion into...
Enlarge (credit: Defence Images)The UK government has promised to spend nearly £2 billion over the next five years to try to tackle the growing problem of cyber attacks in the country.Recent research...
View ArticleArsTechnica: Security Content: New, more-powerful IoT botnet infects 3,500...
There's a new, more powerful Internet-of-things botnet in town, and it has managed to infect almost 3,500 devices in just five days, according to a recently published report.Linux/IRCTelnet, as the...
View ArticleDidier Stevens: Maldoc With Process Hollowing Shellcode
Last week I came across a new Hancitor maldoc sample. This sample contains encoded shellcode that starts a new (suspended) explorer.exe process, injects its own code (an embedded, encoded exe) and...
View ArticleArsTechnica: Security Content: Windows zero-day exploited by same group...
Enlarge/ That bear looks familiar. On Oct. 31, Google's Threat Analysis Group revealed a vulnerability in most versions of Windows that is actively being exploited by malware attacks. Today, Terry...
View ArticleSANS Internet Storm Center, InfoCON: green: ISC Stormcast For Wednesday,...
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View ArticleUn informático en el lado del mal: Cloakify: Exfiltrar datos usando Pokemons,...
En alguna ocasión hemos hablado de la prueba de Data Exfiltration que en un proceso de Ethical Hacking se debe realizar en algunas ocasiones. La tarea siempre es divertida, ya que te pones en el lugar...
View Article/dev/random: Popularity of a Talk VS. Internet Usage?
When I analyzed the data collected during the last BruCON edition, I had the idea to correlate the timeslots assigned to talks with the amount of Internet traffic. First a big disclaimer: My goal is...
View ArticleSANS Internet Storm Center, InfoCON: green: What Does a Pentest Look Like?,...
I recently got asked what does a typical pentest look like?Actually, it usually starts with some education, where we start by asking the client if they really want a pentest? If theyve never had an...
View ArticleSANS Internet Storm Center, InfoCON: green: Using the Cloud Securely:...
--- Johannes B. Ullrich, Ph.D.STI|Twitter|LinkedIn (c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View ArticleDarknet - The Darkside: UK Teen Earned More Than US$385,000 From DDoS Service
Another DDoS service down after the owner got busted, this time a UK teenager who created the service called Titanium Stresser when he was just 15. Not long ago we wrote about the two Israeli guys who...
View ArticleSANS Internet Storm Center, InfoCON: green: As a very timely follow on to...
=============== Rob VandenBrink Metafore (c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View ArticleSANS Internet Storm Center, InfoCON: green: ISC Stormcast For Thursday,...
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View ArticleKPNC: vulnerability in… WinCalc (Win7, x64)
I will never go out of business in this country. thanks to Microsoft. who would have thought that wincalcis vulnerable? I have not checked all systems yet, so this is my configuration: Windows 7...
View ArticlePandaLabs: PowerLocker
PowerLocker, also called PrisonLocker, is a new family of ransomware which in addition to encrypting files on the victim’s computer (as with other such malware) threatens to block users’ computers...
View ArticleWired: Threat Level: Hacker Lexicon: What Are White Hat, Gray Hat, and Black...
Here's how to distinguish the colors of the hacker rainbow. The post Hacker Lexicon: What Are White Hat, Gray Hat, and Black Hat Hackers? appeared first on WIRED.
View ArticleInfosec Events: Information Security Events For November
Here are information security events in North America this month: NIST 2016 : November 1 to 2 in Kansas City, MO, USA Root66 Information Security Conference 2016 : November 1 in Oklahoma City, OK, USA...
View ArticleUn informático en el lado del mal: Cómo crear un Bot para Twitter usando...
En la actualidad, la cantidad de información que se genera en Internet es inmanejable de la forma tradicional, por lo que la forma natural de trabajar es con la capacidad de procesamiento automático...
View Article