Pentester.es: Ataques Evil-Maid con Hibernación
He colgado la charla que di en la última RootedCon Valencia sobre la técnica de ataque Evil-Maid explotando el fichero de hibernación de Windows. Esta técnica no es nueva (ni la he descubierto yo),...
View ArticleInfosec Events: Week 51 In Review – 2016
Events RelatedDefCamp– def.campResourcesMcAfee Virus Scan for Linux – state.actor A system running Intel’s McAfee VirusScan Enterprise for Linux can be compromised by remote attackers due to a number...
View ArticleArsTechnica: Security Content: Op-ed: Why I’m not giving up on PGP
(credit: Aurich Lawson / Thinkstock)Neal H. Walfield is a hacker at g10code working on GnuPG. This op-ed was written for Ars Technica by Walfield, in response to Filippo Valsorda's "I'm giving up on...
View ArticleFortinet FortiGuard Blog: Making Smart Cities Safe
For years now, we’ve been hearing about “smart cities.” Cities with the ability to leverage innovative technology, and automation to optimize resources and improve services for their citizens, with the...
View ArticleCarnal0wnage Blog: Hacking Complex Systems
Back in the day, you could download a piece of software, reverse engineer / fuzz it, find bugs, notify the vendor, post on Full Disclosure, watch a patch come out, and move on to the next bug.These...
View ArticleSANS Internet Storm Center, InfoCON: green: Holiday release of nmap 7.40 with...
--John Bambenekbambenek \at\ gmail /dot/ comFidelis Cybersecurity (c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View ArticleSANS Internet Storm Center, InfoCON: green: VMWare releases security advisory...
--John Bambenekbambenek \at\ gmail /dot/ comFidelis Cybersecurity (c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View ArticleSANS Internet Storm Center, InfoCON: green: What are your 2017 infosec...
Its that time of year again where the technical press starts running security prediction stories for the upcoming year. I know Ive done a few interviews on it already and sure other handlers have as...
View ArticleSANS Internet Storm Center, InfoCON: green: ISC Stormcast For Wednesday,...
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View ArticleMcAfee Avert Labs: Taking a Look at W32/Ramnit
Today we’re going to take a look at an interesting file-infector virus. W32/Ramnit infects EXE, DLL and HTML files. That last one is right; W32/Ramnit also infects HTML files to replicate itself.Let’s...
View Articlehoneyblog: 2011 Honeynet Project Security Workshop Slides + Videos
The slides and videos from the 2011 Honeynet Project Security Workshop (Paris) are now available! You can get the material from http://www.honeynet.org/SecurityWorkshops/2011_Paris. About the...
View ArticleLost In Security: Españoles por la BlackHat
Siguiendo con la estela del artículo publicado 'Españoles por la Phrack', vuelvo a la carga con un artículo parecido, pero en este caso sobre una de las conferencias de seguridad que más conoce la...
View ArticleLost In Security: El último superviviente (II) - iOS
En el pasado artículo estuvimos revisando los puntos débiles que tiene un malware a la hora de sobrevivir un reinicio del sistema, y nos centramos en OSX. Ahora toca el turno a iOS, que al ser una...
View ArticleKPNC: vulnerability in… WinCalc (Win7, x64)
I will never go out of business in this country. thanks to Microsoft. who would have thought that wincalcis vulnerable? I have not checked all systems yet, so this is my configuration: Windows 7...
View ArticleDarknet - The Darkside: Kiev Power Outage Linked To Cyber Attacks
A Kiev power outage last weekend in Ukraine has been linked to a cyber attack, which is worryingly similar to an attack that happened around the same time last year. Sub-stations and transmission...
View ArticleSANS Internet Storm Center, InfoCON: green: ISC Stormcast For Thursday,...
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View ArticleFortinet FortiGuard Blog: Byline: Four Things To Look For When Choosing A...
Financial services organizations are shifting applications to the cloud, seeking the efficiencies and cost reductions this move holds. However, with cybercriminals eager to get their hands on financial...
View ArticleSANS Internet Storm Center, InfoCON: green: Holiday Gift Idea, a Rasberry Pi...
--John Bambenekbambenek \at\ gmail /dot/ comFidelis Cybersecurity (c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View ArticleDancho Danchev's Blog - Mind Streams of Information Security Knowledge:...
There's no such thing as free porn, unless there are client-side, exploits, served. We've, recently, intercepted, a, currently, circulating, malicious, spam, campaign, enticing, end, users, into,...
View ArticleDancho Danchev's Blog - Mind Streams of Information Security Knowledge:...
In, a, cybercrime, dominated, by, fraudulent, propositions, historical, OSINT, remains, a, crucial, part, in, the, process, of, obtaining, actionable. intelligence, further, expanding, a, fraudulent,...
View Article