Article: Linux.Agent malware sample - data stealer - published over 8 years ago. Content: Research: SentinelOne, Tim Strazzere Hiding in plain sight?Sample credit: Tim StrazzereList of files9f7ead4a7e9412225be540c30e04bf98dbd69f62b8910877f0f33057ca153b65 malwared507119f6684c2d978129542f632346774fa2e96cf76fa77f377d130463e9c2c malwarefddb36800fbd0a9c9bfffb22ce7eacbccecd1c26b0d3fb3560da5e9ed97ec14c script.decompiled-prettyec5d4f90c91273b3794814be... https://contagiodump.blogspot.com/2016/08/linuxagent-malware-sample-data-stealer.html Published: 2016 08 24 04:18:00 Received: 2023 01 20 05:39:48 Feed: contagio Source: contagio Category: Cyber Security Topic: Cyber Security |
Article: MMD-0055-2016 - Linux/PnScan ; ELF worm that still circles around - published over 8 years ago. Content: https://blog.malwaremustdie.org/2016/08/mmd-0054-2016-pnscan-elf-worm-that.html Published: 2016 08 23 16:09:00 Received: 2021 06 06 09:04:55 Feed: Malware Must Die! Source: Malware Must Die! Category: Cyber Security Topic: Cyber Security |
|
Article: Forensics Quickie: PowerShell Versions and the Registry - published over 8 years ago. Content: http://www.4n6k.com/2016/08/forensics-quickie-powershell-versions.html Published: 2016 08 21 05:00:10 Received: 2021 06 06 09:05:30 Feed: from:mubix #SharedLinks - Twitter Search Source: from:mubix #SharedLinks - Twitter Search Category: News Topic: Hacking |
Article: How to Build Your Own Penetration Testing Drop Box - published over 8 years ago. Content: http://www.blackhillsinfosec.com/?p=5156 Published: 2016 08 21 04:55:12 Received: 2021 06 06 09:05:30 Feed: from:mubix #SharedLinks - Twitter Search Source: from:mubix #SharedLinks - Twitter Search Category: News Topic: Hacking |
|
Article: "i am lady" Linux.Lady trojan samples - published over 8 years ago. Content: Bitcoin mining malware for Linux servers - samples Research: Dr. Web. Linux.Lady Sample Credit: Tim Strazzere MD5 list: 0DE8BCA756744F7F2BDB732E3267C3F4 55952F4F41A184503C467141B6171BA7 86AC68E5B09D1C4B157193BB6CB34007 E2CACA9626ED93C3D137FDF494FDAE7C E9423E072AD5A31A80A31FC1F525D614 Download. Email me if you need the password. ... https://contagiodump.blogspot.com/2016/08/i-am-lady-linuxlady-trojan-samples.html Published: 2016 08 17 04:06:00 Received: 2024 03 13 18:00:19 Feed: contagio Source: contagio Category: Cyber Security Topic: Cyber Security |
|
Article: Separation and cloud security - published over 8 years ago. Content: https://www.ncsc.gov.uk/guidance/separation-and-cloud-security Published: 2016 08 16 23:00:00 Received: 2021 04 18 14:04:50 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: Google Chrome, Firefox Address Bar Spoofing Vulnerability - published over 8 years ago. Content: Introduction Google security team themselves state that "We recognize that the address bar is the only reliable security indicator in modern browsers" and if the only reliable security indicator could be controlled by an attacker it could carry adverse affects, For instance potentially tricking users into supplying sensitive information to a malicious... http://www.rafayhackingarticles.net/2016/08/google-chrome-firefox-address-bar.html Published: 2016 08 16 06:16:00 Received: 2024 02 17 13:21:45 Feed: Ethical Hacking - Rafayhackingarticles Source: Ethical Hacking - Rafayhackingarticles Category: Cyber Security Topic: Cyber Security |
|
Article: DEFCON 24 Badge Challenge Walkthrough - published over 8 years ago. Content: https://potatohatsecurity.tumblr.com/post/148766754684 Published: 2016 08 11 01:46:31 Received: 2021 06 06 09:04:58 Feed: Team PotatoSec Source: Team PotatoSec Category: Cyber Security Topic: Cyber Security |
Article: 3179528 - Update for Kernel Mode Disallowlist - Version: 1.0 - published over 8 years ago. Content: Revision Note: V1.0 (August 9, 2016): Click here to enter text.Summary: Microsoft is disallowlisting some publically released versions of securekernel.exe. This advisory includes a list of hashes for specific operating systems that are on the disallow list https://technet.microsoft.com/en-us/library/security/3179528 Published: 2016 08 09 17:00:00 Received: 2022 04 14 18:03:36 Feed: Latest Security Advisories Source: Latest Security Advisories Category: Alerts Topic: Vulnerabilities |
|
Article: Protective Monitoring for HMG ICT Systems (GPG 13) - published over 8 years ago. Content: httpss://www.ncsc.gov.uk/guidance/protective-monitoring-hmg-ict-systems-gpg-13 Published: 2016 08 08 00:00:00 Received: 2024 03 06 17:21:37 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Application Development Guidance: Introduction - published over 8 years ago. Content: https://www.ncsc.gov.uk/guidance/application-development-guidance-introduction Published: 2016 08 07 04:00:00 Received: 2021 04 18 14:04:50 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: Android Application Development - published over 8 years ago. Content: https://www.ncsc.gov.uk/guidance/android-development-short Published: 2016 08 06 23:00:00 Received: 2021 04 18 14:04:50 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: BYOD: Executive Summary - published over 8 years ago. Content: https://www.ncsc.gov.uk/guidance/byod-executive-summary Published: 2016 08 06 23:00:00 Received: 2021 04 18 14:04:50 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: MIKEY-SAKKE frequently asked questions - published over 8 years ago. Content: https://www.ncsc.gov.uk/guidance/mikey-sakke-frequently-asked-questions Published: 2016 08 06 23:00:00 Received: 2021 04 18 14:04:50 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Android Application Development - published over 8 years ago. Content: https://www.ncsc.gov.uk/guidance/android-development-short Published: 2016 08 06 23:00:00 Received: 2021 04 18 14:04:37 Feed: NCSC – Guidance Feed Source: National Cyber Security Centre (NCSC) Category: Guidance Topic: Cyber Security |
|
Article: BYOD: Executive Summary - published over 8 years ago. Content: https://www.ncsc.gov.uk/guidance/byod-executive-summary Published: 2016 08 06 23:00:00 Received: 2021 04 18 14:04:37 Feed: NCSC – Guidance Feed Source: National Cyber Security Centre (NCSC) Category: Guidance Topic: Cyber Security |
Article: MIKEY-SAKKE frequently asked questions - published over 8 years ago. Content: https://www.ncsc.gov.uk/guidance/mikey-sakke-frequently-asked-questions Published: 2016 08 06 23:00:00 Received: 2021 04 18 14:04:37 Feed: NCSC – Guidance Feed Source: National Cyber Security Centre (NCSC) Category: Guidance Topic: Cyber Security |
|
Article: Overload: Critical Lessons from 15 Years of ICS Vulnerabilities - published over 8 years ago. Content: In the past several years, a flood of vulnerabilities has hit industrial control systems (ICS) – the technological backbone of electric grids, water supplies, and production lines. These vulnerabilities affect the reliable operation of sensors, programmable controllers, software and networking equipment used to automate and monitor the physi... http://www.fireeye.com/blog/threat-research/2016/08/overload-critical-lessons-from-15-years-of-ics-vulnerabilities.html Published: 2016 08 03 12:00:00 Received: 2021 06 06 09:05:12 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
|
Article: Oracle Critical Patch Update Advisory - July 2016
- published over 8 years ago. Content: http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html Published: 2016 07 19 19:30:54 Received: 2021 06 06 09:03:27 Feed: Oracle Security Alerts Source: Oracle Security Alerts Category: Alerts Topic: Vulnerabilities |
Article: Cerber: Analyzing a Ransomware Attack Methodology To Enable Protection - published over 8 years ago. Content: Ransomware is a common method of cyber extortion for financial gain that typically involves users being unable to interact with their files, applications or systems until a ransom is paid. Accessibility of cryptocurrency such as Bitcoin has directly contributed to this ransomware model. Based on data from FireEye Dynamic Threat Intelligence (DTI), ... https://www.fireeye.com/blog/threat-research/2016/07/cerber-ransomware-attack.html Published: 2016 07 18 12:00:00 Received: 2022 05 23 16:06:45 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
|
Article: How I Could Steal Money from Instagram, Google and Microsoft - published over 8 years ago. Content: https://www.arneswinnen.net/2016/07/how-i-could-steal-money-from-instagram-google-and-microsoft/ Published: 2016 07 17 05:09:03 Received: 2021 06 06 09:05:30 Feed: from:mubix #SharedLinks - Twitter Search Source: from:mubix #SharedLinks - Twitter Search Category: News Topic: Hacking |
Article: SLIDES: From zero to SYSTEM of full disk encrypted Windows system (Hack In Paris 2016) - published over 8 years ago. Content: http://blog.ahmednabeel.com/slides-hip16-from-zero-to-system-of-full-disk-encrypted-windows/ Published: 2016 07 10 03:27:22 Received: 2021 06 06 09:05:30 Feed: from:mubix #SharedLinks - Twitter Search Source: from:mubix #SharedLinks - Twitter Search Category: News Topic: Hacking |
|
Article: Disrupting AWS logging - published over 8 years ago. Content: https://danielgrzelak.com/disrupting-aws-logging-a42e437d6594?source=rss----a08c5a243c01---4 Published: 2016 07 10 03:06:19 Received: 2021 06 06 09:05:30 Feed: from:mubix #SharedLinks - Twitter Search Source: from:mubix #SharedLinks - Twitter Search Category: News Topic: Hacking |
|
Article: Exploring an AWS account post-compromise - published over 8 years ago. Content: https://danielgrzelak.com/exploring-an-aws-account-after-pwning-it-ff629c2aae39?source=rss----a08c5a243c01---4 Published: 2016 07 10 03:06:02 Received: 2021 06 06 09:05:30 Feed: from:mubix #SharedLinks - Twitter Search Source: from:mubix #SharedLinks - Twitter Search Category: News Topic: Hacking |
Article: Backdooring an AWS account - published over 8 years ago. Content: https://danielgrzelak.com/backdooring-an-aws-account-da007d36f8f9?source=rss----a08c5a243c01---4 Published: 2016 07 10 03:05:49 Received: 2021 06 06 09:05:30 Feed: from:mubix #SharedLinks - Twitter Search Source: from:mubix #SharedLinks - Twitter Search Category: News Topic: Hacking |
|
Article: Windows 10 x86/wow64 Userland heap - published over 8 years ago. Content: https://www.corelan.be/index.php/2016/07/05/windows-10-x86wow64-userland-heap/?utm_source=rss&utm_medium=rss&utm_campaign=windows-10-x86wow64-userland-heap Published: 2016 07 05 21:59:38 Received: 2023 01 18 09:44:47 Feed: Corelan Team Source: Corelan Team Category: News Topic: Hacking |
|
Article: Project Triforce: Run AFL on Everything by NCCGroup - published over 8 years ago. Content: submitted by /u/svieg [link] [comments]... https://www.reddit.com/r/vrd/comments/4q5z5w/project_triforce_run_afl_on_everything_by_nccgroup/ Published: 2016 06 27 22:05:05 Received: 2021 06 06 11:29:11 Feed: Vulnerability Research and Development Source: Vulnerability Research and Development Category: Alerts Topic: Vulnerabilities |
|
Article: Locky is Back Asking for Unpaid Debts - published over 8 years ago. Content: On June 21, 2016, FireEye’s Dynamic Threat Intelligence (DTI) identified an increase in JavaScript contained within spam emails. FireEye analysts determined the increase was the result of a new Locky ransomware spam campaign. As shown in Figure 1, Locky spam activity was uninterrupted until June 1, 2016, when it stopped for nearly three weeks. Durin... https://www.fireeye.com/blog/threat-research/2016/06/locky-is-back-and-asking-for-unpaid-debts.html Published: 2016 06 24 17:30:00 Received: 2022 05 23 16:06:47 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
|
Article: Vulnerability Summary for the Week of June 6, 2016 - published over 8 years ago. Content: https://www.cisa.gov/news-events/bulletins/sb16-165 Published: 2016 06 13 21:11:54 Received: 2023 03 19 13:24:20 Feed: CISA Bulletins Source: Cybersecurity and Infrastructure Security Agency (CISA) Category: Bulletins Topic: Cyber Security |
|
Article: Wordpress Mobile Detector Incorrect Fix Leads To Stored XSS - published over 8 years ago. Content: Recently, Wordpress Mobile Detector plugin was in news for the "Remote Code Execution" vulnerability that was found inside the resize.php file. The vulnerability allowed an external attacker to upload arbitrary files to the server as there was no validation being performed for the file-type that has to be retrieved from an external source. Soon after... http://www.rafayhackingarticles.net/2016/06/wordpress-mobile-detector-incorrect-fix-leads-to-stored-xss.html Published: 2016 06 13 07:58:00 Received: 2024 02 17 13:21:45 Feed: Ethical Hacking - Rafayhackingarticles Source: Ethical Hacking - Rafayhackingarticles Category: Cyber Security Topic: Cyber Security |
|
Article: One reason why InfoSec sucked in the past 20 years - the "security tips" myth - published over 8 years ago. Content: From time to time, I get disappointed how much effort and money is put into securing computers, networks, mobile phones, ... and yet in 2016 here we are, where not much has changed on the defensive side. There are many things I personally blame for this situation, and one of them is the security tips. The goal of these security tips is that if the averag... https://jumpespjump.blogspot.com/2016/06/one-reason-why-infosec-sucked-in-past.html Published: 2016 06 11 12:56:00 Received: 2024 03 12 23:22:33 Feed: Jump ESP, jump! Source: Jump ESP, jump! Category: Cyber Security Topic: Cyber Security |
Article: Connected Cars: The Open Road for Hackers - published over 8 years ago. Content: As vehicles become both increasingly complex and better connected to the Internet, their newfound versatility may be manipulated for malicious purposes. Three of the most concerning potential threats looking ahead to the next few years are those posed by manipulating vehicle operation, ransomware and using vehicular systems as command ... http://www.fireeye.com/blog/threat-research/2016/06/connected_cars_the.html Published: 2016 06 10 14:00:00 Received: 2021 06 06 09:05:12 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
Article: Rotten Apples: Apple-like Malicious Phishing Domains - published over 8 years ago. Content: At FireEye Labs we have an automated system designed to proactively detect newly registered malicious domains. This system observed some phishing domains registered in the first quarter of 2016 that were designed to appear as legitimate Apple domains. These phony Apple domains were involved in phishing attacks against Apple iCloud users in China an... https://www.fireeye.com/blog/threat-research/2016/06/rotten_apples_apple.html Published: 2016 06 07 12:00:00 Received: 2022 05 23 16:06:47 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
|
Article: MMD-0054-2016 - ATMOS botnet facts you should know - published over 8 years ago. Content: https://blog.malwaremustdie.org/2016/06/mmd-0054-2016-atmos-botnet-and-facts.html Published: 2016 06 07 11:30:00 Received: 2021 06 06 09:04:55 Feed: Malware Must Die! Source: Malware Must Die! Category: Cyber Security Topic: Cyber Security |
Article: Acunetix Website Hack And Lessons Learnt - published over 8 years ago. Content: Update: Acunetix has just released an official response about the incident, read it here. Last night, Website of Acunetix(A Wellknown Automated Web Application Scanner) was hacked by Croatian hackers. From that point of this onward the website has been taken offline and acunetix team are reviewing the root cause for the hack. Currentl... http://www.rafayhackingarticles.net/2016/06/acunetix-website-hack-and-lessons-learnt.html Published: 2016 06 05 08:35:00 Received: 2024 02 17 13:21:45 Feed: Ethical Hacking - Rafayhackingarticles Source: Ethical Hacking - Rafayhackingarticles Category: Cyber Security Topic: Cyber Security |
|
Article: IRONGATE ICS Malware: Nothing to See Here...Masking Malicious Activity on SCADA Systems - published over 8 years ago. Content: In the latter half of 2015, the FireEye Labs Advanced Reverse Engineering (FLARE) team identified several versions of an ICS-focused malware crafted to manipulate a specific industrial process running within a simulated Siemens control system environment. We named this family of malware IRONGATE. FLARE found the samples on VirusTotal while researchi... https://www.fireeye.com/blog/threat-research/2016/06/irongate_ics_malware.html Published: 2016 06 02 12:00:00 Received: 2022 05 23 16:06:45 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
|
Article: 2880823 - Deprecation of SHA-1 Hashing Algorithm for Microsoft Root Certificate Program - Version: 2.0 - published over 8 years ago. Content: Revision Note: V2.0 (May 18, 2016): Advisory updated to provide links to the current information regarding the use of the SHA1 hashing algorithm for the purposes of SSL and code signing. For more information, see Windows Enforcement of Authenticode Code Signing and Timestamping.Summary: Microsoft is announcing a policy change to the Microsoft Root Certificat... https://technet.microsoft.com/en-us/library/security/2880823 Published: 2016 05 18 17:00:00 Received: 2022 04 14 18:03:36 Feed: Latest Security Advisories Source: Latest Security Advisories Category: Alerts Topic: Vulnerabilities |
|
Article: CERT-UK Annual Report 2015/16 - published over 8 years ago. Content: https://www.ncsc.gov.uk/report/cert-uk-annual-report-201516 Published: 2016 05 10 23:00:00 Received: 2021 04 18 14:04:50 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: 3155527 - Update to Cipher Suites for FalseStart - Version: 1.0 - published over 8 years ago. Content: Revision Note: V1.0 (May 10, 2016): Advisory published.Summary: FalseStart allows the TLS client to send application data before receiving and verifying the server Finished message. This allows an attacker to launch a man-in-the-middle (MiTM) attack to force the TLS client to encrypt the first flight of application_data records using the attacker’s chosen ci... https://technet.microsoft.com/en-us/library/security/3155527 Published: 2016 05 10 17:00:00 Received: 2022 04 14 18:03:36 Feed: Latest Security Advisories Source: Latest Security Advisories Category: Alerts Topic: Vulnerabilities |
|
Article: [Slide|Video] Kelihos & Peter Severa; the "All Out" version - published over 8 years ago. Content: https://blog.malwaremustdie.org/2016/05/slidevideo-kelihos-peter-severa-all-out.html Published: 2016 05 08 17:33:00 Received: 2021 06 06 09:04:55 Feed: Malware Must Die! Source: Malware Must Die! Category: Cyber Security Topic: Cyber Security |
|
Article: Bypassing Modern WAF's Exemplified At XSS (Webcast) - published over 8 years ago. Content: Past Saturday, I conducted a "Webcast" on "Garage4hackers" on one of my favorite subjects in the field of Information Security i.e. "WAF Bypass". Initially, i had decided to present something on the topic of "Mobile Browser Security" due to the fact that this has been a topic I have been recently conducting a research on. However i later realized that ... http://www.rafayhackingarticles.net/2016/05/bypassing-modern-wafs-exemplified-at-xss.html Published: 2016 05 03 21:37:00 Received: 2023 04 01 05:22:26 Feed: Ethical Hacking - Rafayhackingarticles Source: Ethical Hacking - Rafayhackingarticles Category: Cyber Security Topic: Cyber Security |
Article: Deobfuscating Python Bytecode - published over 8 years ago. Content: Introduction During an investigation, the FLARE team came across an interesting Python malware sample (MD5: 61a9f80612d3f7566db5bdf37bbf22cf ) that is packaged using py2exe. Py2exe is a popular way to compile and package Python scripts into executables. When we encounter this type of malware we typically just decompile and read the Python sourc... http://www.fireeye.com/blog/threat-research/2016/05/deobfuscating_python.html Published: 2016 05 03 12:30:00 Received: 2021 11 03 23:00:23 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
Article: 3152550 - Update to Improve Wireless Mouse Input Filtering - Version: 1.1 - published over 8 years ago. Content: Revision Note: V1.1 (April 22, 2016): Added FAQs and additional information to clarify that only standalone mouse devices are affected. This is an informational change only.Summary: Microsoft is announcing the availability of an update to improve input filtering for certain Microsoft wireless mouse devices. The update enhances security by filtering out QWERT... https://technet.microsoft.com/en-us/library/security/3152550 Published: 2016 04 22 17:00:00 Received: 2022 04 14 18:03:36 Feed: Latest Security Advisories Source: Latest Security Advisories Category: Alerts Topic: Vulnerabilities |
|
Article: Bypassing Browser Security Policies for Fun and Profit (Full Presentation Video) - published over 8 years ago. Content: Blackhat has just recently released the full video for my talk on the subject of "Browser Security", If you wish to read the Whitepaper/Slides and SOP Test Suite, you can refer to my previous post on "Bypassing Browser Security Policies For Fun And Profit" Abstract Mobile browsers in comparison to desktop browsers are relatively new and have not gone... http://www.rafayhackingarticles.net/2016/04/bypassing-browser-security-policies-for-Fun-And-Profit-Full-Video.html Published: 2016 04 21 18:02:00 Received: 2024 02 17 13:21:45 Feed: Ethical Hacking - Rafayhackingarticles Source: Ethical Hacking - Rafayhackingarticles Category: Cyber Security Topic: Cyber Security |
|
Article: Oracle Critical Patch Update Advisory - April 2016
- published over 8 years ago. Content: http://www-content.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html Published: 2016 04 19 19:30:54 Received: 2021 06 06 09:03:27 Feed: Oracle Security Alerts Source: Oracle Security Alerts Category: Alerts Topic: Vulnerabilities |
Article: MMD-0053-2016 - A bit about ELF/STD IRC Bot: x00's CBack aka xxx.pokemon(.)inc - published over 8 years ago. Content: https://blog.malwaremustdie.org/2016/04/mmd-0053-2016-bit-about-elfstd-irc-bot.html Published: 2016 04 15 16:50:00 Received: 2021 06 06 09:04:55 Feed: Malware Must Die! Source: Malware Must Die! Category: Cyber Security Topic: Cyber Security |
|
Article: How Much Do Hackers Know About You? - published almost 9 years ago. Content: The threat of black hat hackers has never been greater than now, considering the increasing organization of their efforts to make a dollar off of your digital assets and information. The common portrayal of the hacker is someone who knows enough about programming and the internet that they can seemingly access any information or know anything about anyon... http://www.rafayhackingarticles.net/2016/04/how-much-do-hackers-know-about-you.html Published: 2016 04 13 14:07:00 Received: 2024 02 17 13:21:45 Feed: Ethical Hacking - Rafayhackingarticles Source: Ethical Hacking - Rafayhackingarticles Category: Cyber Security Topic: Cyber Security |
|
Click to Open Code Editor