Quantcast
Channel: eternal-todo.com aggregator
Browsing all 12054 articles
Browse latest View live

SANS Internet Storm Center, InfoCON: green: Tracking Website Defacers with...

In a previous diary, I explained how pictures may affect your website reputation[1]. Although asuggestedrecommendation was to prevent cross-linking by using the HTTP referer, this is a control that I...

View Article


Image may be NSFW.
Clik here to view.

/dev/random: [SANS ISC] Tracking Website Defacers with HTTP Referers

I published the following diary on isc.sans.org: “Tracking Website Defacers with HTTP Referers”.In a previous diary, I explained how pictures may affect your website reputation. Although a suggested...

View Article


Fortinet FortiGuard Blog: Securing The Enterprise Perimeter

Today’s cybercriminals run their operations like a business, and to be successful they constantly invest in the latest tools in order to circumvent security and breach the networks of their targeted...

View Article

Fortinet FortiGuard Blog: Q&A: It’s Time To Automate Security. Part 1

As the threat landscape continues to evolve and the cyberskills gap remains a challenge, automation and intent-based security are becoming timely discussions when thinking about the future of...

View Article

Fortinet FortiGuard Blog: Q&A: It’s Time To Automate Security. Part 2

What follows is Part 2 of a two-part interview with Fortinet’s James Cabe on the journey to security automation. Recognizing that most organizations are not prepared to make the jump to automation...

View Article


Image may be NSFW.
Clik here to view.

ArsTechnica: Security Content: Do you want to play a game? Ransomware asks...

Rensenware's warning screen asks for a high score, rather than the usual pay off, to decrypt your files. At this point, Ars readers have heard countless tales of computer users being forced to pay...

View Article

Image may be NSFW.
Clik here to view.

Darknet - The Darkside: PowerMemory – Exploit Windows Credentials In Memory

PowerMemory is a PowerShell based tool to exploit Windows credentials present in files and memory, it levers Microsoft signed binaries to hack Windows. The method is totally new. It proves that it can...

View Article

Image may be NSFW.
Clik here to view.

ArsTechnica: Security Content: WikiLeaks just dropped the CIA’s secret how-to...

Enlarge/ The logo of the CIA's Engineering Development Group (EDG), the home of the spy agency's malware and espionage tool developers. (credit: Central Intelligence Agency)WikiLeaks has published what...

View Article


honeyblog: 2011 Honeynet Project Security Workshop Slides + Videos

The slides and videos from the 2011 Honeynet Project Security Workshop (Paris) are now available! You can get the material from http://www.honeynet.org/SecurityWorkshops/2011_Paris. About the...

View Article


Lost In Security: Españoles por la BlackHat

Siguiendo con la estela del artículo publicado 'Españoles por la Phrack', vuelvo a la carga con un artículo parecido, pero en este caso sobre una de las conferencias de seguridad que más conoce la...

View Article

Lost In Security: El último superviviente (II) - iOS

En el pasado artículo estuvimos revisando los puntos débiles que tiene un malware a la hora de sobrevivir un reinicio del sistema, y nos centramos en OSX. Ahora toca el turno a iOS, que al ser una...

View Article

Image may be NSFW.
Clik here to view.

KPNC: vulnerability in… WinCalc (Win7, x64)

I will never go out of business in this country. thanks to Microsoft. who would have thought that wincalcis vulnerable? I have not checked all systems yet, so this is my configuration: Windows 7...

View Article

Image may be NSFW.
Clik here to view.

Un informático en el lado del mal: Cómo proteger Office 365 con Latch Cloud TOTP

Si utilizáis una suscripción profesional de Office365 en tu empresa, en la que el administrador ha habilitado MFA (Multi Factor Authentication) eso significa que puedes poner un Segundo factor de...

View Article


Image may be NSFW.
Clik here to view.

Didier Stevens: Quickpost: Infinite Control For Bash Bunny

I already used a Teensy to send a CONTROL keypress every 10 seconds. This came in handy to keep machines from going to sleep or auto-locking.Today I wrote a script for my Bash Bunny to do the...

View Article

Image may be NSFW.
Clik here to view.

ArsTechnica: Security Content: Booby-trapped Word documents in the wild...

(credit: Rob Enslin)There's a new zeroday attack in the wild that's surreptitiously installing malware on fully-patched computers. It does so by exploiting a vulnerability in most or all versions of...

View Article


Image may be NSFW.
Clik here to view.

SANS Internet Storm Center, InfoCON: green: Domain Whitelisting With Alexa...

I read an interesting blogpost: Domain Whitelist Benchmark: Alexa vs UmbrellaThe author reported that around 1400 domains on Malwarebytes hpHosts EMD blacklist were in the top 1,000,000 domains Alexa...

View Article

Image may be NSFW.
Clik here to view.

Un informático en el lado del mal: Reportes de ataques SQL Injection hechos...

La herramienta Havij es una de las más populares en el mundo del pentesting para hacer ataques de SQL Injeciton. Quizá no es tan versátil como SQLMap, pero tiene tiene un interfaz gráfico que la hace...

View Article


Image may be NSFW.
Clik here to view.

Didier Stevens: Quickpost: Bash Bunny & Keyboard Layouts

This Quickpost is for my Bash Bunny with the original firmware. Since my first Bash Bunny post a couple of days ago, firmware 1.1 was released, but I have not yet upgraded.When I used my Bash Bunny as...

View Article

Image may be NSFW.
Clik here to view.

ArsTechnica: Security Content: Hackers set off Dallas’ 156 emergency sirens...

Enlarge/ The Dallas skyline. (credit: Abhishek Chinchalkar on flickr)Late Friday night and early Saturday morning, hackers set off 156 emergency sirens in and around the city of Dallas, Texas....

View Article

Image may be NSFW.
Clik here to view.

SANS Internet Storm Center, InfoCON: green: Domain Whitelisting With Alexa...

A was asked if I could share the files of my last diary entry: Domain Whitelisting With Alexa and Umbrella Lists.You can find the files on my site here. And to teach you how to fish :-), here are the...

View Article
Browsing all 12054 articles
Browse latest View live