Article: How Much Do Hackers Know About You? - published over 8 years ago. Content: The threat of black hat hackers has never been greater than now, considering the increasing organization of their efforts to make a dollar off of your digital assets and information. The common portrayal of the hacker is someone who knows enough about programming and the internet that they can seemingly access any information or know anything about anyon... http://www.rafayhackingarticles.net/2016/04/how-much-do-hackers-know-about-you.html Published: 2016 04 13 14:07:00 Received: 2024 02 17 13:21:45 Feed: Ethical Hacking - Rafayhackingarticles Source: Ethical Hacking - Rafayhackingarticles Category: Cyber Security Topic: Cyber Security |
Article: SNMPPLUX - published over 8 years ago. Content: Pentura continually develop new tools and scripts to improve the effectiveness of the team. One such tool called SNMPPLUX is an offshoot of a larger development project (ORR). SNMPPLUX is a USM compliant SNMPv1, SNMPv2c and SNMPv3 authentication scanner powered by pysnmp, re, sys, getopt, array, time and multiprocessing python modules. As well as providin... https://penturalabs.wordpress.com/2016/04/01/snmpplux/ Published: 2016 04 01 08:21:28 Received: 2024 11 09 10:18:55 Feed: Pentura Labs's Blog Source: Pentura Labs's Blog Category: Cyber Security Topic: Cyber Security |
|
Article: Bypassing Browser Security Policies For Fun And Profit (Blackhat Asia 2016) - published over 8 years ago. Content: Few hours back, i delivered a talk at Blackhat Asia 2016 on "Bypassing Browser Security Policies For Fun And Profit", the talk covered wide variety of topics starting from SOP bypasses, CSP bypass so on and so forth. Due to limited time i was only able to cover few topics, however, you can find rest of the topics in the WhitePaper below. The follow... http://www.rafayhackingarticles.net/2016/03/bypassing-browser-security-policies-for-fun-and-profit.html Published: 2016 03 31 11:49:00 Received: 2024 02 17 13:21:46 Feed: Ethical Hacking - Rafayhackingarticles Source: Ethical Hacking - Rafayhackingarticles Category: Cyber Security Topic: Cyber Security |
|
Article: Surge in Spam Campaign Delivering Locky Ransomware Downloaders - published over 8 years ago. Content: FireEye Labs is detecting a significant spike in Locky ransomware downloaders due to a pair of concurrent email spam campaigns impacting users in over 50 countries. Some of the top affected countries are depicted in Figure 1. Figure 1. Affected countries As seen in Figure 2, the steep spike starts on March 21, 2016, where Locky is running cam... https://www.fireeye.com/blog/threat-research/2016/03/surge_in_spam_campai.html Published: 2016 03 25 12:00:00 Received: 2022 05 23 16:06:45 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
|
Article: Oracle Security Alert for CVE-2016-0636 - 23 Mar 2016
- published over 8 years ago. Content: http://www.oracle.com/technetwork/topics/security/alert-cve-2016-0636-2949497.html Published: 2016 03 23 19:30:54 Received: 2021 06 06 09:03:27 Feed: Oracle Security Alerts Source: Oracle Security Alerts Category: Alerts Topic: Vulnerabilities |
|
Article: Citrix XenApp and XenDesktop Hardening Guidance - published over 8 years ago. Content: A Joint Whitepaper from Mandiant and Citrix Throughout the course of Mandiant’s Red Team and Incident Response engagements, we frequently identify a wide array of misconfigured technology solutions, including Citrix XenApp and XenDesktop. We often see attackers leveraging stolen credentials from third parties, accessing Citrix solutions, breaking... http://www.fireeye.com/blog/threat-research/2016/03/citrix_xenapp_andxe.html Published: 2016 03 15 12:00:00 Received: 2021 06 06 09:05:12 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
|
Article: A Growing Number of Android Malware Families Believed to Have a Common Origin: A Study Based on Binary Code - published over 8 years ago. Content: Introduction On Feb. 19, IBM XForce researchers released an intelligence report [1] stating that the source code for GM Bot was leaked to a crimeware forum in December 2015. GM Bot is a sophisticated Android malware family that emerged in the Russian-speaking cybercrime underground in late 2014. IBM also claimed that several Android malware f... https://www.fireeye.com/blog/threat-research/2016/03/android-malware-families.html Published: 2016 03 11 15:04:00 Received: 2022 05 23 16:06:46 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
Article: Whatsapp Spam Leads To Stock Trader Scams. - published over 8 years ago. Content: Today started with just the run of the mill spam campaigns caught by my honeypots (dick pills, dating and malware) but today I received something I haven't seen for a few weeks. Stock Traders masked as "Rich Mom's" scam system but then things got interesting. The scam originally appears as a work from home scam at the site Whois 14,profit,com. upon visiti... http://trojan7malware.blogspot.com/2016/03/whatsapp-spam-leads-to-stock-trader.html Published: 2016 03 07 22:11:00 Received: 2024 03 20 04:23:49 Feed: Trojan7Malware Source: Trojan7Malware Category: Cyber Security Topic: Cyber Security |
|
Article: Ransomware.OSX.KeRanger samples - published over 8 years ago. Content: Research: New OS X Ransomware KeRanger Infected Transmission BitTorrent Client Installer by Claud Xiao Sample credit: Claud Xiao File information d1ac55a4e610380f0ab239fcc1c5f5a42722e8ee1554cba8074bbae4a5f6dbe1 1d6297e2427f1d00a5b355d6d50809cb Transmission-2.90.dmg e3ad733cea9eba29e86610050c1a15592e6c77820927b9edeb77310975393574 56b1d956112b0b7... https://contagiodump.blogspot.com/2016/03/ransomwareosxkeranger-samples.html Published: 2016 03 06 23:39:00 Received: 2024 03 13 18:00:19 Feed: contagio Source: contagio Category: Cyber Security Topic: Cyber Security |
|
Article: KLEE LLVM Execution Engine - published almost 9 years ago. Content: [link] [comments] https://www.reddit.com/r/vrd/comments/47g35g/klee_llvm_execution_engine/ Published: 2016 02 25 00:16:31 Received: 2021 06 06 11:29:11 Feed: Vulnerability Research and Development Source: Vulnerability Research and Development Category: Alerts Topic: Vulnerabilities |
Article: Files download information - published almost 9 years ago. Content: After 7 years of Contagio existence, Google Safe Browsing services notified Mediafire (hoster of Contagio and Contagiominidump files) that "harmful" content is hosted on my Mediafire account. It is harmful only if you harm your own pc and but not suitable for distribution or infecting unsuspecting users but I have not been able to resolve this with ... https://contagiodump.blogspot.com/2016/02/files-download-information.html Published: 2016 02 23 20:48:00 Received: 2024 03 13 18:00:19 Feed: contagio Source: contagio Category: Cyber Security Topic: Cyber Security |
|
Article: Maimed Ramnit Still Lurking in the Shadow - published almost 9 years ago. Content: Newspapers have the ability to do more than simply keep us current with worldly affairs; we can use them to squash bugs! Yet, as we move from waiting on the newspaper delivery boy to reading breaking news on ePapers, we lose the subtle art of bug squashing. Instead, we end up exposing ourselves to dangerous digital bugs that can affect our virtual ... https://www.fireeye.com/blog/threat-research/2016/02/maimed_ramnit_still.html Published: 2016 02 18 17:00:00 Received: 2022 05 23 16:06:45 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
|
Article: Exploiting the parsing of Internet Key Exchange payloads in Cisco's ASA software - published almost 9 years ago. Content: submitted by /u/turnersr [link] [comments] https://www.reddit.com/r/vrd/comments/45eq3o/exploiting_the_parsing_of_internet_key_exchange/ Published: 2016 02 12 13:32:25 Received: 2021 06 06 11:29:11 Feed: Vulnerability Research and Development Source: Vulnerability Research and Development Category: Alerts Topic: Vulnerabilities |
|
Article: 3137909 - Vulnerabilities in ASP.NET Templates Could Allow Tampering - Version: 1.1 - published almost 9 years ago. Content: Revision Note: V1.1 (February 10, 2016): Advisory updated to include download information for Microsoft ASP.NET Web Frameworks, and Tools and Microsoft ASP.NET and Web Tools. This is an informational change only.Summary: Microsoft is releasing this security advisory to provide information about a vulnerability in the public versions of Visual Studio 2013, Vi... https://technet.microsoft.com/en-us/library/security/3137909 Published: 2016 02 10 18:00:00 Received: 2022 04 14 18:03:36 Feed: Latest Security Advisories Source: Latest Security Advisories Category: Alerts Topic: Vulnerabilities |
|
Article: 7 Qualities of Highly Effective Hackers - published almost 9 years ago. Content: When asked to write on this topic, I admit that it made me fringe just a bit. Because I don't consider myself to be a highly effective hacker. I find myself as a noob everywhere that I'm trying to learn new things, or I am frustrated with the most ridiculous "hacker" material on the web, written by school-taught programmers that follow step by step... http://www.rafayhackingarticles.net/2013/12/7-qualities-of-highly-effective-hackers.html Published: 2016 02 09 21:03:00 Received: 2024 02 17 13:21:46 Feed: Ethical Hacking - Rafayhackingarticles Source: Ethical Hacking - Rafayhackingarticles Category: Cyber Security Topic: Cyber Security |
Article: 2871997 - Update to Improve Credentials Protection and Management - Version: 5.0 - published almost 9 years ago. Content: Revision Note: V5.0 (February 9, 2016): Rereleased advisory to announce the release of update 3126593 to enable the Restricted Admin mode for Credential Security Support Provider (CredSSP) by default. See Updates Related to this Advisory for details.Summary: Microsoft is announcing the availability of updates for supported editions of Windows 7, Windows Serv... https://technet.microsoft.com/en-us/library/security/2871997 Published: 2016 02 09 18:00:00 Received: 2022 04 14 18:03:36 Feed: Latest Security Advisories Source: Latest Security Advisories Category: Alerts Topic: Vulnerabilities |
|
Article: FLARE Script Series: flare-dbg Plug-ins - published almost 9 years ago. Content: Introduction This post continues the FireEye Labs Advanced Reverse Engineering (FLARE) script series. In this post, we continue to discuss the flare-dbg project. If you haven’t read my first post on using flare-dbg to automate string decoding, be sure to check it out! We created the flare-dbg Python project to support the creation of plug-ins ... https://www.fireeye.com/blog/threat-research/2016/02/flare_script_series.html Published: 2016 02 09 12:00:00 Received: 2022 05 23 16:06:47 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
|
Article: MMD-0052-2016 - Overview of "SkidDDoS" ELF++ IRC Botnet - published almost 9 years ago. Content: https://blog.malwaremustdie.org/2016/02/mmd-0052-2016-skidddos-elf-distribution.html Published: 2016 02 07 10:08:00 Received: 2021 06 06 09:04:55 Feed: Malware Must Die! Source: Malware Must Die! Category: Cyber Security Topic: Cyber Security |
|
Article: MMD-0051-2016 - Debunking a tiny ELF remote backdoor (shellcode shellshock part 2) - published almost 9 years ago. Content: https://blog.malwaremustdie.org/2016/02/mmd-0051-2016-debungking-tiny-elf.html Published: 2016 02 03 09:33:00 Received: 2021 06 06 09:04:55 Feed: Malware Must Die! Source: Malware Must Die! Category: Cyber Security Topic: Cyber Security |
|
Article: EncFSGui – GUI Wrapper around encfs for OSX - published almost 9 years ago. Content: https://www.corelan.be/index.php/2016/01/31/encfsgui-gui-wrapper-around-encfs-for-osx/?utm_source=rss&utm_medium=rss&utm_campaign=encfsgui-gui-wrapper-around-encfs-for-osx Published: 2016 01 31 21:08:51 Received: 2023 01 18 09:44:47 Feed: Corelan Team Source: Corelan Team Category: News Topic: Hacking |
Article: Hot or Not? The Benefits and Risks of iOS Remote Hot Patching - published almost 9 years ago. Content: Introduction Apple has made a significant effort to build and maintain a healthy and clean app ecosystem. The essential contributing component to this status quo is the App Store, which is protected by a thorough vetting process that scrutinizes all submitted applications. While the process is intended to protect iOS users and ensure apps meet Ap... https://www.fireeye.com/blog/threat-research/2016/01/hot_or_not_the_bene.html Published: 2016 01 27 13:00:00 Received: 2022 05 23 16:06:47 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
|
Article: [a little old, but a very interesting writeup] Android privilege escalation to mediaserver from zero permissions (CVE-2014-7920 + CVE-2014-7921) - published almost 9 years ago. Content: submitted by /u/0x3d5157636b525761 [link] [comments]... https://www.reddit.com/r/vrd/comments/42k7vf/a_little_old_but_a_very_interesting_writeup/ Published: 2016 01 25 07:16:11 Received: 2021 06 06 11:29:11 Feed: Vulnerability Research and Development Source: Vulnerability Research and Development Category: Alerts Topic: Vulnerabilities |
|
Article: Oracle Critical Patch Update Advisory - January 2016
- published almost 9 years ago. Content: http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html Published: 2016 01 19 19:30:54 Received: 2021 06 06 09:03:27 Feed: Oracle Security Alerts Source: Oracle Security Alerts Category: Alerts Topic: Vulnerabilities |
|
Article: From Crash To Exploit: CVE-2015-6086 – Out of Bound Read/ASLR Bypass - published almost 9 years ago. Content: submitted by /u/hacksysteam [link] [comments] https://www.reddit.com/r/vrd/comments/41mr2q/from_crash_to_exploit_cve20156086_out_of_bound/ Published: 2016 01 19 03:42:14 Received: 2021 06 06 11:29:11 Feed: Vulnerability Research and Development Source: Vulnerability Research and Development Category: Alerts Topic: Vulnerabilities |
Article: Facebook Account Hacked! What To Do Now? - published almost 9 years ago. Content: Every single day i get emails in my inbox and on my facebook page from users querying about how to recover hacked facebook account and a common problem i see in all of them is that they are proactive. Everyone searches for Facebook account recovery softwares, Facebook hacking softwares and recovery mechanisms after their facebook or any other email accou... http://www.rafayhackingarticles.net/2016/01/facebook-account-hacked-what-to-do-know.html Published: 2016 01 17 16:51:00 Received: 2024 02 17 13:21:46 Feed: Ethical Hacking - Rafayhackingarticles Source: Ethical Hacking - Rafayhackingarticles Category: Cyber Security Topic: Cyber Security |
|
Article: 3109853 - Update to Improve TLS Session Resumption Interoperability - Version: 1.0 - published almost 9 years ago. Content: Revision Note: V1.0 (January 12, 2016): Advisory published.Summary: Microsoft is announcing the availability of an update to improve interoperability between Schannel-based TLS clients and 3rd-party TLS servers that enable RFC5077-based resumption and that send the NewSessionTicket message in the abbreviated TLS handshake. The update addresses an issue in sc... https://technet.microsoft.com/en-us/library/security/3109853 Published: 2016 01 12 18:00:00 Received: 2022 04 14 18:03:36 Feed: Latest Security Advisories Source: Latest Security Advisories Category: Alerts Topic: Vulnerabilities |
|
Article: 3118753 - Updates for ActiveX Kill Bits 3118753 - Version: 1.0 - published almost 9 years ago. Content: Revision Note: V1.0 (January 12, 2016): Advisory published.Summary: Microsoft is releasing a new set of ActiveX kill bits with this advisory. These ActiveX kill bits are included in the Internet Explorer cumulative update released on January 12, 2016. https://technet.microsoft.com/en-us/library/security/3118753 Published: 2016 01 12 18:00:00 Received: 2022 04 14 18:03:36 Feed: Latest Security Advisories Source: Latest Security Advisories Category: Alerts Topic: Vulnerabilities |
Article: MMD-0050-2016 - Incident report: ELF Linux/Torte infection (in Wordpress) - published almost 9 years ago. Content: https://blog.malwaremustdie.org/2016/01/mmd-0050-2016-incident-report-elf.html Published: 2016 01 12 03:20:00 Received: 2021 06 06 09:04:55 Feed: Malware Must Die! Source: Malware Must Die! Category: Cyber Security Topic: Cyber Security |
|
Article: MMD-0049-2016 - A case of java trojan (downloader/RCE) for remote minerd hack - published almost 9 years ago. Content: https://blog.malwaremustdie.org/2016/01/mmd-0049-2016-case-of-java-trojan.html Published: 2016 01 09 11:50:00 Received: 2021 06 06 09:04:55 Feed: Malware Must Die! Source: Malware Must Die! Category: Cyber Security Topic: Cyber Security |
|
Article: Crypto in the box, stone age edition - published almost 9 years ago. Content: https://www.corelan.be/index.php/2016/01/06/crypto-in-the-box-stone-age-edition/?utm_source=rss&utm_medium=rss&utm_campaign=crypto-in-the-box-stone-age-edition Published: 2016 01 06 11:55:33 Received: 2023 01 18 09:44:47 Feed: Corelan Team Source: Corelan Team Category: News Topic: Hacking |
Article: 2755801 - Update for Vulnerabilities in Adobe Flash Player in Internet Explorer and Microsoft Edge - Version: 53.0 - published almost 9 years ago. Content: Revision Note: V53.0 (January 5, 2016): Added the 3133431 update to the Current Update section.Summary: Microsoft is announcing the availability of an update for Adobe Flash Player in Internet Explorer on all supported editions of Windows 8, Windows Server 2012, Windows RT, Windows 8.1, Windows Server 2012 R2, Windows RT 8.1, and Windows 10; the update is al... https://technet.microsoft.com/en-us/library/security/2755801 Published: 2016 01 05 18:00:00 Received: 2022 04 14 18:03:36 Feed: Latest Security Advisories Source: Latest Security Advisories Category: Alerts Topic: Vulnerabilities |
|
Article: MMD-0048-2016 - DDOS.TF = (new) ELF & Win32 DDoS service with ASP + PHP/MySQL MOF webshells - published almost 9 years ago. Content: https://blog.malwaremustdie.org/2016/01/mmd-0048-2016-ddostf-new-elf-windows.html Published: 2016 01 05 02:39:00 Received: 2021 06 06 09:04:55 Feed: Malware Must Die! Source: Malware Must Die! Category: Cyber Security Topic: Cyber Security |
Article: CERT-UK Annual Report 2015/16 - published almost 9 years ago. Content: https://www.ncsc.gov.uk/report/cert-uk-annual-report-201516 Published: 2016 01 01 23:00:00 Received: 2022 07 14 16:02:10 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Finding and Exploiting Same Origin Method Execution vulnerabilities - published almost 9 years ago. Content: Recently it came to my attention that it was possible to abuse JSONP callbacks using a vulnerability known as SOME – Same Origin Method Execution which can be used by an attacker to widely abuse a user’s trust between the web application and the intended flow of execution. For example, using the SOME attack it is possible for an attacker to trick a user to v... https://penturalabs.wordpress.com/2015/12/30/finding-and-exploiting-same-origin-method-execution-vulnerabilities/ Published: 2015 12 30 23:37:46 Received: 2024 11 09 10:18:55 Feed: Pentura Labs's Blog Source: Pentura Labs's Blog Category: Cyber Security Topic: Cyber Security |
|
Article: FLARE Script Series: Automating Obfuscated String Decoding - published almost 9 years ago. Content: Introduction We are expanding our script series beyond IDA Pro. This post extends the FireEye Labs Advanced Reverse Engineering (FLARE) script series to an invaluable tool for the reverse engineer – the debugger. Just like IDA Pro, debuggers have scripting interfaces. For example, OllyDbg uses an asm-like scripting language, the Immunity debugger... https://www.fireeye.com/blog/threat-research/2015/12/flare_script_series.html Published: 2015 12 28 14:01:00 Received: 2022 05 23 16:06:47 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
|
Article: MMD-0047-2015 - SSHV: SSH bruter ELF botnet malware w/hidden process kernel module - published almost 9 years ago. Content: https://blog.malwaremustdie.org/2015/12/mmd-0047-2015-sshv-ssh-bruter-elf.html Published: 2015 12 23 17:52:00 Received: 2021 06 06 09:04:55 Feed: Malware Must Die! Source: Malware Must Die! Category: Cyber Security Topic: Cyber Security |
|
Click to Open Code Editor