Article: 2880823 - Deprecation of SHA-1 Hashing Algorithm for Microsoft Root Certificate Program - Version: 2.0 - published over 8 years ago. Content: Revision Note: V2.0 (May 18, 2016): Advisory updated to provide links to the current information regarding the use of the SHA1 hashing algorithm for the purposes of SSL and code signing. For more information, see Windows Enforcement of Authenticode Code Signing and Timestamping.Summary: Microsoft is announcing a policy change to the Microsoft Root Certificat... https://technet.microsoft.com/en-us/library/security/2880823 Published: 2016 05 18 17:00:00 Received: 2022 04 14 18:03:36 Feed: Latest Security Advisories Source: Latest Security Advisories Category: Alerts Topic: Vulnerabilities |
Article: CERT-UK Annual Report 2015/16 - published over 8 years ago. Content: https://www.ncsc.gov.uk/report/cert-uk-annual-report-201516 Published: 2016 05 10 23:00:00 Received: 2021 04 18 14:04:50 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: 3155527 - Update to Cipher Suites for FalseStart - Version: 1.0 - published over 8 years ago. Content: Revision Note: V1.0 (May 10, 2016): Advisory published.Summary: FalseStart allows the TLS client to send application data before receiving and verifying the server Finished message. This allows an attacker to launch a man-in-the-middle (MiTM) attack to force the TLS client to encrypt the first flight of application_data records using the attacker’s chosen ci... https://technet.microsoft.com/en-us/library/security/3155527 Published: 2016 05 10 17:00:00 Received: 2022 04 14 18:03:36 Feed: Latest Security Advisories Source: Latest Security Advisories Category: Alerts Topic: Vulnerabilities |
Article: [Slide|Video] Kelihos & Peter Severa; the "All Out" version - published over 8 years ago. Content: https://blog.malwaremustdie.org/2016/05/slidevideo-kelihos-peter-severa-all-out.html Published: 2016 05 08 17:33:00 Received: 2021 06 06 09:04:55 Feed: Malware Must Die! Source: Malware Must Die! Category: Cyber Security Topic: Cyber Security |
|
Article: Bypassing Modern WAF's Exemplified At XSS (Webcast) - published over 8 years ago. Content: Past Saturday, I conducted a "Webcast" on "Garage4hackers" on one of my favorite subjects in the field of Information Security i.e. "WAF Bypass". Initially, i had decided to present something on the topic of "Mobile Browser Security" due to the fact that this has been a topic I have been recently conducting a research on. However i later realized that ... http://www.rafayhackingarticles.net/2016/05/bypassing-modern-wafs-exemplified-at-xss.html Published: 2016 05 03 21:37:00 Received: 2023 04 01 05:22:26 Feed: Ethical Hacking - Rafayhackingarticles Source: Ethical Hacking - Rafayhackingarticles Category: Cyber Security Topic: Cyber Security |
|
Article: Deobfuscating Python Bytecode - published over 8 years ago. Content: Introduction During an investigation, the FLARE team came across an interesting Python malware sample (MD5: 61a9f80612d3f7566db5bdf37bbf22cf ) that is packaged using py2exe. Py2exe is a popular way to compile and package Python scripts into executables. When we encounter this type of malware we typically just decompile and read the Python sourc... http://www.fireeye.com/blog/threat-research/2016/05/deobfuscating_python.html Published: 2016 05 03 12:30:00 Received: 2021 11 03 23:00:23 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
|
Click to Open Code Editor