ArsTechnica: Security Content: Samsung’s Tizen is riddled with security...
Enlarge/ Samsung's Smart TV interface, which seems to be running on Tizen. (credit: Samsung)Tizen, the open source operating system that Samsung uses on a range of Internet-of-Things devices and...
View ArticleThe Security Shoggoth: Malware Analysis Course on Pluralsight!
Since 2010, I have been running my Introduction to Malware Analysis course at various conferences and organizations, and have taught over 200 students. I've heard from many of my former students that...
View ArticleSANS Internet Storm Center, InfoCON: green: Encryption inside Utility...
Industrial control systems are sensitive systems that must make decisions in real time to ensure the operation of the industrial process they govern. The latency and reliability in packet transmission...
View ArticleUn informático en el lado del mal: Fileless 2: Un nuevo (sí, uno más otra...
Hace unos meses Enigma0x3 publicaba un Bypass UAC distinto a los conocidos hasta el momento, se trataba de un bypass UAC Fileless, es decir, sin necesidad de subir una DLL o un binario al equipo para...
View ArticleSANS Internet Storm Center, InfoCON: green: ISC Stormcast For Wednesday,...
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View ArticleSANS Internet Storm Center, InfoCON: green: Whitelists: The Holy Grail of...
As a defender, take the time to put yourself in the place of a bad guy for a few minutes. Youre writing some malicious code and you need to download payloads from the Internet or hide your code on a...
View Article/dev/random: [SANS ISC] Whitelists: The Holy Grail of Attackers
I published the following diary on isc.sans.org: “Whitelists: The Holy Grail of Attackers“.As a defender, take the time to put yourself in the place of a bad guy for a few minutes. You’re writing some...
View ArticleFortinet FortiGuard Blog: Video Gallery: Ladi Adefala and Hussein Syed...
On February 21, Hussein Syed, Chief Information Security Officer at Barnabas Health System, and Ladi Adefala, Senior Security Strategist at Fortinet, led a roundtable discussion at HIMSS17 about the...
View ArticleArsTechnica: Security Content: Android devices can be fatally hacked by...
Enlarge (credit: IntelFreePress)A broad array of Android phones is vulnerable to attacks that use booby-trapped Wi-Fi signals to achieve full device takeover, a researcher has demonstrated.The...
View ArticleUn informático en el lado del mal: Certificate Transparency Checker para...
La iniciativa de Certificate Transparency viene impulsada desde el equipo de seguridad de Google y busca justo lo que el nombre pone: Que haya transparencia sobre los certificados digitales que se...
View ArticleSANS Internet Storm Center, InfoCON: green: Java Struts2 Vulnerability Used...
[We do have a special webcast about the Struts2 Vulnerability scheduled for 11am ET today. Sign up here]Since about a month, we are tracking numerous attempts to exploit the Java Struts2 vulnerability...
View ArticleSANS Internet Storm Center, InfoCON: green: ISC Stormcast For Thursday, April...
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View ArticleLost In Security: Españoles por la BlackHat
Siguiendo con la estela del artículo publicado 'Españoles por la Phrack', vuelvo a la carga con un artículo parecido, pero en este caso sobre una de las conferencias de seguridad que más conoce la...
View ArticleLost In Security: El último superviviente (II) - iOS
En el pasado artículo estuvimos revisando los puntos débiles que tiene un malware a la hora de sobrevivir un reinicio del sistema, y nos centramos en OSX. Ahora toca el turno a iOS, que al ser una...
View ArticleFortinet FortiGuard Blog: Fortinet Fabric-Ready Partner Spotlight: Silver...
Q&A with Fraser Street, VP of Technical Alliances at Silver Peak Fortinet sits down with Fabric-Ready Partner, Silver Peak to learn what’s top of mind for its customers, the key IT challenges they...
View ArticleArsTechnica: Security Content: Researchers find China tried infiltrating...
Enlarge/ Chinese President Xi Jinping meets with the prime minister of Finland, Juha Sipila, during an official visit in Helsinki, Finland, on April 5, 2017. President Xi is traveling to the US today....
View ArticleArsTechnica: Security Content: Rash of in-the-wild attacks permanently...
Enlarge (credit: Guinnog)Researchers have uncovered a rash of ongoing attacks designed to damage routers and other Internet-connected appliances so badly that they become effectively inoperable.PDoS...
View ArticleUn informático en el lado del mal: Ataque de Growth Hacking con WhatsApp...
Hace ya varias semanas apareció la nueva actualización de WhatsApp conlos famosos “Estados”. La experiencia nos ha dicho que con cada nueva modificación del código y con la ampliación de funciones,...
View ArticleDidier Stevens: Quickpost: Using My Bash Bunny To “Snag Creds From A Locked...
FYI: This is nothing new, I’m just documenting how I configured and used my new Bash Bunny for “SNAGGING CREDS FROM LOCKED MACHINES” as Mubix explained.After setting up my Bash Bunny, I used it on a...
View ArticleSANS Internet Storm Center, InfoCON: green: ISC Stormcast For Friday, April...
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View Article