SANS Internet Storm Center, InfoCON: green: ISC Stormcast For Tuesday, August...
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View ArticleSANS Internet Storm Center, InfoCON: green: Voice Message Notifications...
Bad guys need to constantly find new ways to lure their victims. If billing notifications were very common for a while, not all people in a company are working with such kind of documents. Which types...
View Article/dev/random: [SANS ISC Diary] Voice Message Notifications Deliver Ransomware
I published the following diary on isc.sans.org: “Voice Message Notifications Deliver Ransomware“.Bad guys need to constantly find new ways to lure their victims. If billing notifications were very...
View ArticleArsTechnica: Security Content: NSA-linked Cisco exploit poses bigger threat...
EnlargeRecently released code that exploits Cisco System firewalls and has been linked to the National Security Agency can work against a much larger number of models than many security experts...
View ArticleUn informático en el lado del mal: Big Data Security Tales: WSO2 Carbon y la...
A los productos de WSO2 Carbon voy a dedicarle varias entradas, porque hemos visto bastantes cosas en ellas, pero antes de nada quería avisaros a todos los que tenéis alguno de estos productos de algo...
View ArticleSANS Internet Storm Center, InfoCON: green: ISC Stormcast For Wednesday,...
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View Articlecontagio: Linux.Agent malware sample - data stealer
Research: SentinelOne, Tim Strazzere Hiding in plain sight?Sample credit: Tim StrazzereList of files9f7ead4a7e9412225be540c30e04bf98dbd69f62b8910877f0f33057ca153b65...
View ArticleSANS Internet Storm Center, InfoCON: green: Stay on Track During IR, (Wed,...
When responding to incidents, its easy to go down a rabbit hole that likely wont produce results to the questions we are always after: How did the attacker get in? What information is contained on the...
View ArticleSANS Internet Storm Center, InfoCON: green: New VMware Patches...
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View ArticleArsTechnica: Security Content: Military submarine maker springs leak after...
Enlarge (credit: The Last Ship, Warner Bros Television)A massive leak of documents on India’s new military submarines from French shipbuilder DCNS is the result of a hack, the country's defence...
View ArticleArsTechnica: Security Content: HTTPS and OpenVPN face new attack that can...
Enlarge/ From an upcoming paper laying out a new attack against 64-bit block ciphers used by HTTPS and OpenVPN. (credit: Karthikeyan Bhargavan and Gaëtan Leurent)Researchers have devised a new attack...
View ArticleDarknet - The Darkside: An Introduction To Web Application Security Systems
In the world of web application security systems, there exists a myriad of systems to protect public-facing services in any number of ways. They come packed with all the elements necessary to play an...
View ArticleWired: Threat Level: Matthew Keys Sentenced to Two Years for Aiding Anonymous
The former Tribune Company employee was convicted of giving Anonymous information that helped hackers access an LA Times server and alter a headline. The post Matthew Keys Sentenced to Two Years for...
View ArticleSANS Internet Storm Center, InfoCON: green: ISC Stormcast For Thursday,...
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View ArticleUn informático en el lado del mal: Vídeos de ElevenPaths Talks Season 2 en...
Desde finales del mes de Julio comenzamos la segunda temporada de ElevenPaths Talks. Ya han tenido lugar 4 sesiones y esta misma tarde - como todos los jueves - tiene lugar un nuevo seminario online...
View ArticleSANS Internet Storm Center, InfoCON: green: Example of Targeted Attack...
Yesterday, I discovered a nice example of targeted attack against a Brazilian bank. It started with an email sample like this:This message was sent to a Brazilian citizen. Redacted in Portuguese, it...
View Article/dev/random: [SANS ISC Diary] Example of Targeted Attack Through a Proxy PAC...
I published the following diary on isc.sans.org: “Example of Targeted Attack Through a Proxy PAC File“.Yesterday, I discovered a nice example of targeted attack against a Brazilian bank. It started...
View ArticleArsTechnica: Security Content: Hackers attack site of Ghostbusters star...
Enlarge (credit: Getty Images/Gregg DeGuire/WireImage)Leslie Jones, the black comedian who starred in the recent all-female remake of Ghostbusters, has been forced to take her website down after...
View ArticleArsTechnica: Security Content: Apple releases iOS 9.3.5 to fix 3 zero-day...
Enlarge (credit: Andrew Cunningham)Just a few weeks after posting iOS 9.3.4 to fix a jailbreaking-related bug, Apple has released iOS 9.3.5 to all supported iPhones and iPads. The update provides an...
View ArticleArsTechnica: Security Content: Actively exploited iOS flaws that hijack...
Enlarge/ iPhone Spyware known as Pegasus intercepts confidential data. (credit: Lookout)Apple has patched three high-severity iOS vulnerabilities that are being actively exploited to infect iPhones so...
View Article