Article: Episode #176: Step Up to the WMIC - published over 10 years ago. Content: Tim grabs the mic: Michael Behan writes in: Perhaps you guys can make this one better. Haven’t put a ton of thought into it: C:\> (echo HTTP/1.0 200 OK & wmic process list full /format:htable) | nc -l -p 3000 Then visit http://127.0.0.1:3000 This could of course be used to generate a lot more HTML reports via wmic that are quick to save from the ... http://blog.commandlinekungfu.com/2014/03/episode-176-step-up-to-wmic.html Published: 2014 03 31 09:00:00 Received: 2023 03 31 08:44:32 Feed: Command Line Kung Fu Source: Command Line Kung Fu Category: News Topic: Security Tooling |
Article: Android.MisoSMS : Its Back! Now With XTEA - published over 10 years ago. Content: FireEye Labs recently found a more advanced variant of Android.MisoSMS, the SMS-stealing malware that we uncovered last December — yet another sign of cybercriminals’ growing interest in hijacking mobile devices for surveillance and data theft. Like the original version of the malware, the new variant sends copies of users’ text messages to ser... https://www.fireeye.com/blog/threat-research/2014/03/android-misosms-its-back-now-with-xtea.html Published: 2014 03 31 08:00:00 Received: 2022 05 23 16:06:48 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
|
Article: A Little Bird Told Me: Personal Information Sharing in Angry Birds and its Ad Libraries - published over 10 years ago. Content: Many popular mobile apps, including Rovio’s ubiquitous Angry Birds, collect and share players’ personal information much more widely than most people realize. Some news reports have begun to scratch the surface of the situation. The New York Times reported on Angry Birds and other data-hungry apps last October. And in January, the newspaper ... https://www.fireeye.com/blog/threat-research/2014/03/a-little-bird-told-me-personal-information-sharing-in-angry-birds-and-its-ad-libraries.html Published: 2014 03 27 15:30:00 Received: 2022 05 23 16:06:48 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
|
Article: Stop using MD-5, now! - published over 10 years ago. Content: TL;DR: Don't use MD-5 to identify malware samples. Believe me, it is a bad idea. Use SHA-256 or a stronger hash function. This post is dedicated to all malware researchers, still using MD-5 to identify malware samples. Before deep-diving into the details, let me explain my view on this topic. Whenever you want to identify a malware, it is only OK to p... https://jumpespjump.blogspot.com/2014/03/stop-using-md-5-now.html Published: 2014 03 25 08:30:00 Received: 2024 03 12 23:22:35 Feed: Jump ESP, jump! Source: Jump ESP, jump! Category: Cyber Security Topic: Cyber Security |
Article: Spear Phishing the News Cycle: APT Actors Leverage Interest in the Disappearance of Malaysian Flight MH 370 - published over 10 years ago. Content: While many advanced persistent threat (APT) groups have increasingly embraced strategic Web compromise as a malware delivery vector, groups also continue to rely on spear-phishing emails that leverage popular news stories. The recent tragic disappearance of flight MH 370 is no exception. This post will examine multiple instances from different thre... https://www.fireeye.com/blog/threat-research/2014/03/spear-phishing-the-news-cycle-apt-actors-leverage-interest-in-the-disappearance-of-malaysian-flight-mh-370.html Published: 2014 03 25 04:01:00 Received: 2022 05 23 16:06:48 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
Article: Dedicated to all the hackers - Pho3nix (Roulette Cinese) - published over 10 years ago. Content: http://www.zone-h.org/news/id/4746 Published: 2014 03 24 08:01:00 Received: 2021 06 06 09:05:22 Feed: Zone-H.org News Source: Zone-H.org News Category: Cyber Security Topic: Cyber Security |
|
Article: Out Of Control: Overcoming Control-Flow Integrity by Enes Göktaş, Elias Athanasopoulos, Herbert Bos, and Georgios Portokalidis [PDF] - published over 10 years ago. Content: submitted by /u/turnersr [link] [comments] https://www.reddit.com/r/vrd/comments/20wrse/out_of_control_overcoming_controlflow_integrity/ Published: 2014 03 20 15:36:19 Received: 2021 06 06 11:29:11 Feed: Vulnerability Research and Development Source: Vulnerability Research and Development Category: Alerts Topic: Vulnerabilities |
Article: Spammers Abuse KiK for Survey Revenue - published over 10 years ago. Content: Recently I discovered a spam campaign that utilises the popular messaging service kik to monetize the spammers efforts.As you can see the message was sent by the unofficial kik account (upon creating a account you automatically add the official account) and is asking you to visit a unknown website. Two warning signs that should scream at you not to visit. So... http://trojan7malware.blogspot.com/2014/03/spammers-abuse-kik-for-survey-revenue.html Published: 2014 03 20 00:51:00 Received: 2024 03 20 04:23:50 Feed: Trojan7Malware Source: Trojan7Malware Category: Cyber Security Topic: Cyber Security |
|
Article: 25,000 co-opted Linux servers spread spam, drop malware and steal credentials - published over 10 years ago. Content: https://www.techrepublic.com/article/co-opted-linux-servers-spread-spam-drop-malware-and-steal-credentials/#ftag=RSS56d97e7 Published: 2014 03 19 13:59:07 Received: 2021 06 06 09:05:21 Feed: IT Security Blog | TechRepublic Source: IT Security Blog | TechRepublic Category: Cyber Security Topic: Cyber Security |
Article: From Windows to Droids: An Insight in to Multi-vector Attack Mechanisms in RATs - published over 10 years ago. Content: FireEye recently observed a targeted attack on a U.S.-based financial institution via a spear-phishing email. The payload used in this campaign is a tool called WinSpy, which is sold by the author as a spying and monitoring tool. The features in this tool resemble that of many other off-the-shelf RATs (Remote Administration Tools) available today. ... https://www.fireeye.com/blog/threat-research/2014/03/from-windows-to-droids-an-insight-in-to-multi-vector-attack-mechanisms-in-rats.html Published: 2014 03 18 08:00:00 Received: 2022 05 23 16:06:48 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
|
Article: ROPs are for the 99% - Yang Yu (March 2014) - published over 10 years ago. Content: submitted by /u/HockeyInJune [link] [comments]... https://www.reddit.com/r/vrd/comments/20o1qk/rops_are_for_the_99_yang_yu_march_2014/ Published: 2014 03 17 22:28:27 Received: 2021 06 06 11:29:11 Feed: Vulnerability Research and Development Source: Vulnerability Research and Development Category: Alerts Topic: Vulnerabilities |
Article: Hacking Blind by Andrea Bittau, Adam Belay, Ali Mashtizadeh, David Mazieres, and Dan Boneh [PDF] - published over 10 years ago. Content: submitted by /u/turnersr [link] [comments] https://www.reddit.com/r/vrd/comments/20nyk5/hacking_blind_by_andrea_bittau_adam_belay_ali/ Published: 2014 03 17 21:58:24 Received: 2021 06 06 11:29:11 Feed: Vulnerability Research and Development Source: Vulnerability Research and Development Category: Alerts Topic: Vulnerabilities |
|
Article: ISR STEALER Tutorial - published over 10 years ago. Content: ISR STEALER - STEAL PASSWORDS BY JUST SITTING AT HOME HACK BROWSER SAVED PASSWORDS ---------- Guys This is a very Interesting tutorial on HOW TO HACK THE BROWSER SAVED PASSWORDS, Actually this tutorial is mostly for GIRLS who save their passwords in browser huhhh GIRLS r just GIRLS LOLZ..... So, not to waste the time let's begin with our tutorial: ... http://hacking-share.blogspot.com/2014/03/isr-stealer-tutorial.html Published: 2014 03 16 14:49:00 Received: 2024 02 07 05:20:20 Feed: Hacking Share Source: Hacking Share Category: Cyber Security Topic: Cyber Security |
|
Article: Investigating with Indicators of Compromise (IOCs) – Part II - published over 10 years ago. Content: Written by Will Gibb & Devon Kerr In our blog post "Investigating with Indicators of Compromise (IOCs) - Part I," we presented a scenario involving the "Acme Widgets Co.," a company investigating an intrusion, and its incident responder, John. John's next objective is to examine the system "ACMWH-KIOSK" for evidence of... http://www.fireeye.com/blog/threat-research/2014/03/investigating-indicators-compromise-iocs-part-ii.html Published: 2014 03 06 01:42:20 Received: 2021 06 06 09:05:12 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
|
Click to Open Code Editor