Article: How to secure your home against "Internet of Things" and FUD - published over 9 years ago. Content: TL;DR, most of the security news about IoT is full of FUD. Always put the risks in context - who can exploit this and what can the attacker do with it. Most story only covers the latter. Introduction There is rarely a day without news that another "Internet of Things" got hacked. "Smart" safes, "smart" rifles, "smart" cars, "smart" fridges, "smart" TVs,... https://jumpespjump.blogspot.com/2015/08/how-to-secure-your-home-against.html Published: 2015 08 20 11:37:00 Received: 2024 03 12 23:22:33 Feed: Jump ESP, jump! Source: Jump ESP, jump! Category: Cyber Security Topic: Cyber Security |
Article: Potao Express samples - published over 9 years ago. Content: http://www.welivesecurity.com/2015/07/30/operation-potao-express/ http://www.welivesecurity.com/wp-content/uploads/2015/07/Operation-Potao-Express_final_v2.pdf TL; DR 2011- July 2015 Aka Sapotao and node69 Group - Sandworm / Quedagh APT Vectors - USB, exe as doc, xls Victims - RU, BY, AM, GE Victims - MMM group, UA gov truecryptrussia.ru has be... https://contagiodump.blogspot.com/2015/08/potao-express-samples.html Published: 2015 08 12 12:24:00 Received: 2024 03 13 18:00:19 Feed: contagio Source: contagio Category: Cyber Security Topic: Cyber Security |
Article: DEFCON 23 Badge Challenge - published over 9 years ago. Content: https://potatohatsecurity.tumblr.com/post/126411303994 Published: 2015 08 11 08:21:59 Received: 2021 06 06 09:04:58 Feed: Team PotatoSec Source: Team PotatoSec Category: Cyber Security Topic: Cyber Security |
|
Article: Windows Management Instrumentation (WMI) Offense, Defense, and Forensics - published over 9 years ago. Content: Windows Management Instrumentation (WMI) is a remote management framework that enables the collection of host information, execution of code, and provides an eventing system that can respond to operating system events in real time. FireEye has recently seen a surge in attacker use of WMI to carry out objectives such as system reconnaissance, remote... https://www.fireeye.com/blog/threat-research/2015/08/windows_managementi.html Published: 2015 08 08 18:45:00 Received: 2022 05 23 16:06:46 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
|
Click to Open Code Editor