SANS Internet Storm Center, InfoCON: green: Tracking Website Defacers with...
In a previous diary, I explained how pictures may affect your website reputation[1]. Although asuggestedrecommendation was to prevent cross-linking by using the HTTP referer, this is a control that I...
View Article/dev/random: [SANS ISC] Tracking Website Defacers with HTTP Referers
I published the following diary on isc.sans.org: “Tracking Website Defacers with HTTP Referers”.In a previous diary, I explained how pictures may affect your website reputation. Although a suggested...
View ArticleFortinet FortiGuard Blog: Securing The Enterprise Perimeter
Today’s cybercriminals run their operations like a business, and to be successful they constantly invest in the latest tools in order to circumvent security and breach the networks of their targeted...
View ArticleFortinet FortiGuard Blog: Q&A: It’s Time To Automate Security. Part 1
As the threat landscape continues to evolve and the cyberskills gap remains a challenge, automation and intent-based security are becoming timely discussions when thinking about the future of...
View ArticleFortinet FortiGuard Blog: Q&A: It’s Time To Automate Security. Part 2
What follows is Part 2 of a two-part interview with Fortinet’s James Cabe on the journey to security automation. Recognizing that most organizations are not prepared to make the jump to automation...
View ArticleArsTechnica: Security Content: Do you want to play a game? Ransomware asks...
Rensenware's warning screen asks for a high score, rather than the usual pay off, to decrypt your files. At this point, Ars readers have heard countless tales of computer users being forced to pay...
View ArticleDarknet - The Darkside: PowerMemory – Exploit Windows Credentials In Memory
PowerMemory is a PowerShell based tool to exploit Windows credentials present in files and memory, it levers Microsoft signed binaries to hack Windows. The method is totally new. It proves that it can...
View ArticleArsTechnica: Security Content: WikiLeaks just dropped the CIA’s secret how-to...
Enlarge/ The logo of the CIA's Engineering Development Group (EDG), the home of the spy agency's malware and espionage tool developers. (credit: Central Intelligence Agency)WikiLeaks has published what...
View Articlehoneyblog: 2011 Honeynet Project Security Workshop Slides + Videos
The slides and videos from the 2011 Honeynet Project Security Workshop (Paris) are now available! You can get the material from http://www.honeynet.org/SecurityWorkshops/2011_Paris. About the...
View ArticleLost In Security: Españoles por la BlackHat
Siguiendo con la estela del artículo publicado 'Españoles por la Phrack', vuelvo a la carga con un artículo parecido, pero en este caso sobre una de las conferencias de seguridad que más conoce la...
View ArticleLost In Security: El último superviviente (II) - iOS
En el pasado artículo estuvimos revisando los puntos débiles que tiene un malware a la hora de sobrevivir un reinicio del sistema, y nos centramos en OSX. Ahora toca el turno a iOS, que al ser una...
View ArticleKPNC: vulnerability in… WinCalc (Win7, x64)
I will never go out of business in this country. thanks to Microsoft. who would have thought that wincalcis vulnerable? I have not checked all systems yet, so this is my configuration: Windows 7...
View ArticleUn informático en el lado del mal: Cómo proteger Office 365 con Latch Cloud TOTP
Si utilizáis una suscripción profesional de Office365 en tu empresa, en la que el administrador ha habilitado MFA (Multi Factor Authentication) eso significa que puedes poner un Segundo factor de...
View ArticleDidier Stevens: Quickpost: Infinite Control For Bash Bunny
I already used a Teensy to send a CONTROL keypress every 10 seconds. This came in handy to keep machines from going to sleep or auto-locking.Today I wrote a script for my Bash Bunny to do the...
View ArticleArsTechnica: Security Content: Booby-trapped Word documents in the wild...
(credit: Rob Enslin)There's a new zeroday attack in the wild that's surreptitiously installing malware on fully-patched computers. It does so by exploiting a vulnerability in most or all versions of...
View ArticleSANS Internet Storm Center, InfoCON: green: Domain Whitelisting With Alexa...
I read an interesting blogpost: Domain Whitelist Benchmark: Alexa vs UmbrellaThe author reported that around 1400 domains on Malwarebytes hpHosts EMD blacklist were in the top 1,000,000 domains Alexa...
View ArticleUn informático en el lado del mal: Reportes de ataques SQL Injection hechos...
La herramienta Havij es una de las más populares en el mundo del pentesting para hacer ataques de SQL Injeciton. Quizá no es tan versátil como SQLMap, pero tiene tiene un interfaz gráfico que la hace...
View ArticleDidier Stevens: Quickpost: Bash Bunny & Keyboard Layouts
This Quickpost is for my Bash Bunny with the original firmware. Since my first Bash Bunny post a couple of days ago, firmware 1.1 was released, but I have not yet upgraded.When I used my Bash Bunny as...
View ArticleArsTechnica: Security Content: Hackers set off Dallas’ 156 emergency sirens...
Enlarge/ The Dallas skyline. (credit: Abhishek Chinchalkar on flickr)Late Friday night and early Saturday morning, hackers set off 156 emergency sirens in and around the city of Dallas, Texas....
View ArticleSANS Internet Storm Center, InfoCON: green: Domain Whitelisting With Alexa...
A was asked if I could share the files of my last diary entry: Domain Whitelisting With Alexa and Umbrella Lists.You can find the files on my site here. And to teach you how to fish :-), here are the...
View Article