Article: Zone-H banned by some Indian ISPs: some workarounds - published over 13 years ago. Content: http://www.zone-h.org/news/id/4740 Published: 2011 07 20 19:38:00 Received: 2021 06 06 09:05:22 Feed: Zone-H.org News Source: Zone-H.org News Category: Cyber Security Topic: Cyber Security |
Article: Turkish hacking group defaces UPS, TheRegister, Acer, Telegraph, Vodafone - published about 13 years ago. Content: http://www.zone-h.org/news/id/4741 Published: 2011 09 04 21:00:00 Received: 2021 06 06 09:05:22 Feed: Zone-H.org News Source: Zone-H.org News Category: Cyber Security Topic: Cyber Security |
|
Article: Zone-H celebrates its 10 years! - published over 12 years ago. Content: http://www.zone-h.org/news/id/4742 Published: 2012 03 09 22:04:00 Received: 2021 06 06 09:05:22 Feed: Zone-H.org News Source: Zone-H.org News Category: Cyber Security Topic: Cyber Security |
|
Article: Hacker diagnosed with brain cancer, hacks the closed source report distributing it to the open source community hoping to get some help - published about 12 years ago. Content: http://www.zone-h.org/news/id/4743 Published: 2012 09 09 17:26:00 Received: 2021 06 06 09:05:22 Feed: Zone-H.org News Source: Zone-H.org News Category: Cyber Security Topic: Cyber Security |
Article: Call for hacker visual artwork - published over 11 years ago. Content: http://www.zone-h.org/news/id/4744 Published: 2013 07 10 09:06:00 Received: 2021 06 06 09:05:22 Feed: Zone-H.org News Source: Zone-H.org News Category: Cyber Security Topic: Cyber Security |
|
Article: The Virtual Graffiti Project - published almost 11 years ago. Content: http://www.zone-h.org/news/id/4745 Published: 2014 02 03 22:47:00 Received: 2021 06 06 09:05:22 Feed: Zone-H.org News Source: Zone-H.org News Category: Cyber Security Topic: Cyber Security |
|
Article: Dedicated to all the hackers - Pho3nix (Roulette Cinese) - published over 10 years ago. Content: http://www.zone-h.org/news/id/4746 Published: 2014 03 24 08:01:00 Received: 2021 06 06 09:05:22 Feed: Zone-H.org News Source: Zone-H.org News Category: Cyber Security Topic: Cyber Security |
Article: Target data breach exposes serious threat of POS malware and botnets - published almost 11 years ago. Content: https://www.techrepublic.com/article/target-data-breach-exposes-serious-threat-of-pos-malware-and-botnets/#ftag=RSS56d97e7 Published: 2014 01 10 02:49:02 Received: 2021 06 06 09:05:21 Feed: IT Security Blog | TechRepublic Source: IT Security Blog | TechRepublic Category: Cyber Security Topic: Cyber Security |
|
Article: Fake security messages more believable than real warnings research shows - published almost 11 years ago. Content: https://www.techrepublic.com/article/fake-security-messages-more-believable-than-real-warnings-research-shows/#ftag=RSS56d97e7 Published: 2014 01 14 20:53:00 Received: 2021 06 06 09:05:21 Feed: IT Security Blog | TechRepublic Source: IT Security Blog | TechRepublic Category: Cyber Security Topic: Cyber Security |
|
Article: Internet of Things botnet may include TVs and a fridge - published almost 11 years ago. Content: https://www.techrepublic.com/article/internet-of-things-botnet-may-include-tvs-and-a-fridge/#ftag=RSS56d97e7 Published: 2014 01 21 17:44:00 Received: 2021 06 06 09:05:21 Feed: IT Security Blog | TechRepublic Source: IT Security Blog | TechRepublic Category: Cyber Security Topic: Cyber Security |
Article: Researchers describe tool that manipulates RAM, misleads cybercrime investigators - published almost 11 years ago. Content: https://www.techrepublic.com/article/researchers-describe-tool-that-manipulates-ram-misleads-cybercrime-investigators/#ftag=RSS56d97e7 Published: 2014 01 27 20:55:00 Received: 2021 06 06 09:05:21 Feed: IT Security Blog | TechRepublic Source: IT Security Blog | TechRepublic Category: Cyber Security Topic: Cyber Security |
|
Article: Malicious intent can turn Chrome speech recognition into spying device - published almost 11 years ago. Content: https://www.techrepublic.com/article/malicious-intent-can-turn-chrome-speech-recognition-into-spying-device/#ftag=RSS56d97e7 Published: 2014 01 29 19:43:00 Received: 2021 06 06 09:05:21 Feed: IT Security Blog | TechRepublic Source: IT Security Blog | TechRepublic Category: Cyber Security Topic: Cyber Security |
|
Article: Droidpak: A sneak attack on Android devices via PC malware - published almost 11 years ago. Content: https://www.techrepublic.com/article/droidpak-a-sneak-attack-on-android-devices-via-pc-malware/#ftag=RSS56d97e7 Published: 2014 02 03 21:29:00 Received: 2021 06 06 09:05:21 Feed: IT Security Blog | TechRepublic Source: IT Security Blog | TechRepublic Category: Cyber Security Topic: Cyber Security |
Article: SMB penny stretching 101: Making the most of your security budget - published almost 11 years ago. Content: https://www.techrepublic.com/article/smb-penny-stretching-101-making-the-most-of-your-security-budget/#ftag=RSS56d97e7 Published: 2014 02 06 15:34:58 Received: 2021 06 06 09:05:21 Feed: IT Security Blog | TechRepublic Source: IT Security Blog | TechRepublic Category: Cyber Security Topic: Cyber Security |
|
Article: User education drops down ASD strategies to prevent security intrusions - published almost 11 years ago. Content: https://www.techrepublic.com/article/user-education-drops-down-asd-strategies-to-prevent-security-intrusions/#ftag=RSS56d97e7 Published: 2014 02 20 05:58:24 Received: 2021 06 06 09:05:21 Feed: IT Security Blog | TechRepublic Source: IT Security Blog | TechRepublic Category: Cyber Security Topic: Cyber Security |
|
Article: 25,000 co-opted Linux servers spread spam, drop malware and steal credentials - published over 10 years ago. Content: https://www.techrepublic.com/article/co-opted-linux-servers-spread-spam-drop-malware-and-steal-credentials/#ftag=RSS56d97e7 Published: 2014 03 19 13:59:07 Received: 2021 06 06 09:05:21 Feed: IT Security Blog | TechRepublic Source: IT Security Blog | TechRepublic Category: Cyber Security Topic: Cyber Security |
Article: List open ports and listening services - published over 9 years ago. Content: https://www.techrepublic.com/article/list-open-ports-and-listening-services/#ftag=RSS56d97e7 Published: 2015 06 04 17:35:00 Received: 2021 06 06 09:05:21 Feed: IT Security Blog | TechRepublic Source: IT Security Blog | TechRepublic Category: Cyber Security Topic: Cyber Security |
|
Article: Call For Testing: Cross-DSO CFI in HardenedBSD - published over 6 years ago. Content: https://www.soldierx.com/news/Call-Testing-Cross-DSO-CFI-HardenedBSD Published: 2018 07 20 19:44:04 Received: 2021 06 06 09:05:21 Feed: SOLDIERX.COM - Nobody Can Stop Information Insemination Source: SOLDIERX.COM - Nobody Can Stop Information Insemination Category: Cyber Security Topic: Cyber Security |
|
Article: SX Corrects Climate Change by Hacking Weather Dominator - published over 5 years ago. Content: https://www.soldierx.com/news/SX-Corrects-Climate-Change-Hacking-Weather-Dominator Published: 2019 04 01 05:01:55 Received: 2021 06 06 09:05:21 Feed: SOLDIERX.COM - Nobody Can Stop Information Insemination Source: SOLDIERX.COM - Nobody Can Stop Information Insemination Category: Cyber Security Topic: Cyber Security |
Article: VulnTrack 1.1 by Ogma Released - published over 5 years ago. Content: https://www.soldierx.com/news/VulnTrack-11-Ogma-Released Published: 2019 04 27 19:51:45 Received: 2021 06 06 09:05:21 Feed: SOLDIERX.COM - Nobody Can Stop Information Insemination Source: SOLDIERX.COM - Nobody Can Stop Information Insemination Category: Cyber Security Topic: Cyber Security |
|
Article: SX April Fools' Day 2020 Cancelled - published over 4 years ago. Content: https://www.soldierx.com/news/SX-April-Fools-Day-2020-Cancelled Published: 2020 04 01 10:50:26 Received: 2021 06 06 09:05:21 Feed: SOLDIERX.COM - Nobody Can Stop Information Insemination Source: SOLDIERX.COM - Nobody Can Stop Information Insemination Category: Cyber Security Topic: Cyber Security |
|
Article: Mojave Phone Booth Altcoin ICO - published over 3 years ago. Content: https://www.soldierx.com/news/Mojave-Phone-Booth-Altcoin-ICO Published: 2021 04 01 05:55:51 Received: 2021 06 06 09:05:21 Feed: SOLDIERX.COM - Nobody Can Stop Information Insemination Source: SOLDIERX.COM - Nobody Can Stop Information Insemination Category: Cyber Security Topic: Cyber Security |
Article: EverestX Releases Pocket POCSAG Transmitter (as seen at Telephreak) - published over 3 years ago. Content: https://www.soldierx.com/news/EverestX-Releases-Pocket-POCSAG-Transmitter-seen-Telephreak Published: 2021 05 05 23:54:57 Received: 2021 06 06 09:05:21 Feed: SOLDIERX.COM - Nobody Can Stop Information Insemination Source: SOLDIERX.COM - Nobody Can Stop Information Insemination Category: Cyber Security Topic: Cyber Security |
|
Article: The June IronNet Threat Intelligence Brief - published over 3 years ago. Content: https://securityboulevard.com/2021/06/the-june-ironnet-threat-intelligence-brief/ Published: 2021 06 04 19:46:06 Received: 2021 06 06 09:05:19 Feed: Security Bloggers Network Source: Security Bloggers Network Category: Cyber Security Topic: Cyber Security |
|
Article: Amazon Sidewalk is right around the corner – do you need to walk away? - published over 3 years ago. Content: https://securityboulevard.com/2021/06/amazon-sidewalk-is-right-around-the-corner-do-you-need-to-walk-away/ Published: 2021 06 04 20:55:42 Received: 2021 06 06 09:05:19 Feed: Security Bloggers Network Source: Security Bloggers Network Category: Cyber Security Topic: Cyber Security |
Article: Qualys Helps Organizations Manage Risk with Cybersecurity Asset Management - published over 3 years ago. Content: https://securityboulevard.com/2021/06/qualys-helps-organizations-manage-risk-with-cybersecurity-asset-management/ Published: 2021 06 04 22:20:47 Received: 2021 06 06 09:05:19 Feed: Security Bloggers Network Source: Security Bloggers Network Category: Cyber Security Topic: Cyber Security |
|
Article: Estadísticas globales del trabajo remoto en el 2020 para el futuro de TI - published over 3 years ago. Content: https://securityboulevard.com/2021/06/estadisticas-globales-del-trabajo-remoto-en-el-2020-para-el-futuro-de-ti/ Published: 2021 06 04 23:04:12 Received: 2021 06 06 09:05:19 Feed: Security Bloggers Network Source: Security Bloggers Network Category: Cyber Security Topic: Cyber Security |
|
Article: Hackers Exploit Zero-day in the Fancy Product Designer Plugin - published over 3 years ago. Content: https://securityboulevard.com/2021/06/hackers-exploit-zero-day-in-the-fancy-product-designer-plugin/ Published: 2021 06 05 10:21:12 Received: 2021 06 06 09:05:19 Feed: Security Bloggers Network Source: Security Bloggers Network Category: Cyber Security Topic: Cyber Security |
Article: Security News in Review: Bugs, Trains, and Private Banks - published over 3 years ago. Content: https://securityboulevard.com/2021/06/security-news-in-review-bugs-trains-and-private-banks/ Published: 2021 06 05 13:00:00 Received: 2021 06 06 09:05:19 Feed: Security Bloggers Network Source: Security Bloggers Network Category: Cyber Security Topic: Cyber Security |
|
Article: Security BSides Dublin 2021 – Matthias Wilson’s ‘Using SOCMINT In Threat Intelligence’ - published over 3 years ago. Content: https://securityboulevard.com/2021/06/security-bsides-dublin-2021-matthias-wilsons-using-socmint-in-threat-intelligence/ Published: 2021 06 05 16:00:00 Received: 2021 06 06 09:05:19 Feed: Security Bloggers Network Source: Security Bloggers Network Category: Cyber Security Topic: Cyber Security |
|
Article: The Joy of Tech® ‘Google’s Hiding Privacy Settings!’ - published over 3 years ago. Content: https://securityboulevard.com/2021/06/the-joy-of-tech-googles-hiding-privacy-settings/ Published: 2021 06 05 17:00:00 Received: 2021 06 06 09:05:19 Feed: Security Bloggers Network Source: Security Bloggers Network Category: Cyber Security Topic: Cyber Security |
Article: Security BSides Dublin 2021 – Chintan Shah’s ‘Digging The Attack Surface Of Microsoft Rich Text Format Files – An OLE Perspective’ - published over 3 years ago. Content: https://securityboulevard.com/2021/06/security-bsides-dublin-2021-chintan-shahs-digging-the-attack-surface-of-microsoft-rich-text-format-files-an-ole-perspective/ Published: 2021 06 05 18:00:00 Received: 2021 06 06 09:05:19 Feed: Security Bloggers Network Source: Security Bloggers Network Category: Cyber Security Topic: Cyber Security |
|
Article: A Swarm of Ransomware Attacks Highlights the Need for High-Quality Threat Detection at the Start of the Attack Chain - published over 3 years ago. Content: https://securityboulevard.com/2021/06/a-swarm-of-ransomware-attacks-highlights-the-need-for-high-quality-threat-detection-at-the-start-of-the-attack-chain/ Published: 2021 06 05 18:17:24 Received: 2021 06 06 09:05:19 Feed: Security Bloggers Network Source: Security Bloggers Network Category: Cyber Security Topic: Cyber Security |
|
Article: Friday Squid Blogging: Picking up Squid on the Beach - published over 3 years ago. Content: Make sure they’re dead. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines here. ... https://www.schneier.com/blog/archives/2021/05/friday-squid-blogging-picking-up-squid-on-the-beach.html Published: 2021 05 21 21:02:31 Received: 2021 06 06 09:05:17 Feed: Schneier on Security Source: Schneier on Security Category: Cyber Security Topic: Cyber Security |
Article: AIs and Fake Comments - published over 3 years ago. Content: This month, the New York state attorney general issued a report on a scheme by “U.S. Companies and Partisans [to] Hack Democracy.” This wasn’t another attempt by Republicans to make it harder for Black people and urban residents to vote. It was a concerted attack on another core element of US democracy – the ability of citizens to express their voice to the... https://www.schneier.com/blog/archives/2021/05/ais-and-fake-comments.html Published: 2021 05 24 11:20:05 Received: 2021 06 06 09:05:17 Feed: Schneier on Security Source: Schneier on Security Category: Cyber Security Topic: Cyber Security |
|
Article: New Disk Wiping Malware Targets Israel - published over 3 years ago. Content: Apostle seems to be a new strain of malware that destroys data. In a post published Tuesday, SentinelOne researchers said they assessed with high confidence that based on the code and the servers Apostle reported to, the malware was being used by a newly discovered group with ties to the Iranian government. While a ransomware note the researchers recovered s... https://www.schneier.com/blog/archives/2021/05/new-disk-wiping-malware-targets-israel.html Published: 2021 05 26 14:33:19 Received: 2021 06 06 09:05:17 Feed: Schneier on Security Source: Schneier on Security Category: Cyber Security Topic: Cyber Security |
|
Article: The Story of the 2011 RSA Hack - published over 3 years ago. Content: Really good long article about the Chinese hacking of RSA, Inc. They were able to get copies of the seed values to the SecurID authentication token, a harbinger of supply-chain attacks to come. https://www.schneier.com/blog/archives/2021/05/the-story-of-the-2011-rsa-hack.html Published: 2021 05 27 11:41:26 Received: 2021 06 06 09:05:17 Feed: Schneier on Security Source: Schneier on Security Category: Cyber Security Topic: Cyber Security |
Article: The Misaligned Incentives for Cloud Security - published over 3 years ago. Content: Russia’s Sunburst cyberespionage campaign, discovered late last year, impacted more than 100 large companies and US federal agencies, including the Treasury, Energy, Justice, and Homeland Security departments. A crucial part of the Russians’ success was their ability to move through these organizations by compromising cloud and local network identity systems... https://www.schneier.com/blog/archives/2021/05/the-misaligned-incentives-for-cloud-security.html Published: 2021 05 28 11:20:29 Received: 2021 06 06 09:05:17 Feed: Schneier on Security Source: Schneier on Security Category: Cyber Security Topic: Cyber Security |
|
Article: Friday Squid Blogging: Underwater Cameras for Observing Squid - published over 3 years ago. Content: Interesting research paper. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines here. ... https://www.schneier.com/blog/archives/2021/05/friday-squid-blogging-underwater-cameras-for-observing-squid.html Published: 2021 05 28 21:09:28 Received: 2021 06 06 09:05:17 Feed: Schneier on Security Source: Schneier on Security Category: Cyber Security Topic: Cyber Security |
|
Article: Security Vulnerability in Apple’s Silicon “M1” Chip - published over 3 years ago. Content: The website for the M1racles security vulnerability is an excellent demonstration that not all vulnerabilities are exploitable. Be sure to read the FAQ through to the end. EDITED TO ADD: Wired article. https://www.schneier.com/blog/archives/2021/06/security-vulnerability-in-apples-silicon-m1-chip.html Published: 2021 06 01 11:26:41 Received: 2021 06 06 09:05:17 Feed: Schneier on Security Source: Schneier on Security Category: Cyber Security Topic: Cyber Security |
Article: The DarkSide Ransomware Gang - published over 3 years ago. Content: The New York Times has a long story on the DarkSide ransomware gang. A glimpse into DarkSide’s secret communications in the months leading up to the Colonial Pipeline attack reveals a criminal operation on the rise, pulling in millions of dollars in ransom payments each month. DarkSide offers what is known as “ransomware as a service,” in which a malware dev... https://www.schneier.com/blog/archives/2021/06/the-darkside-ransomware-gang.html Published: 2021 06 02 14:09:56 Received: 2021 06 06 09:05:17 Feed: Schneier on Security Source: Schneier on Security Category: Cyber Security Topic: Cyber Security |
|
Article: Security and Human Behavior (SHB) 2021 - published over 3 years ago. Content: Today is the second day of the fourteenth Workshop on Security and Human Behavior. The University of Cambridge is the host, but we’re all on Zoom. SHB is a small, annual, invitational workshop of people studying various aspects of the human side of security, organized each year by Alessandro Acquisti, Ross Anderson, and myself. The forty or so attendees incl... https://www.schneier.com/blog/archives/2021/06/security-and-human-behavior-shb-2021.html Published: 2021 06 04 11:05:21 Received: 2021 06 06 09:05:17 Feed: Schneier on Security Source: Schneier on Security Category: Cyber Security Topic: Cyber Security |
|
Article: Friday Squid Blogging: Squids in Space - published over 3 years ago. Content: NASA is sending baby bobtail squid into space. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines here. ... https://www.schneier.com/blog/archives/2021/06/friday-squid-blogging-squids-in-space.html Published: 2021 06 04 20:43:16 Received: 2021 06 06 09:05:17 Feed: Schneier on Security Source: Schneier on Security Category: Cyber Security Topic: Cyber Security |
Article: XSS Vulnerability Found In ReDi Restaurant Reservation WordPress Plugin - published over 3 years ago. Content: https://latesthackingnews.com/2021/06/01/xss-vulnerability-found-in-redi-restaurant-reservation-wordpress-plugin/ Published: 2021 06 01 10:07:31 Received: 2021 06 06 09:05:15 Feed: Latest Hacking News Source: Latest Hacking News Category: Cyber Security Topic: Cyber Security |
|
Article: FBI To Share Pwned Passwords With HIBP As It Goes Open Source - published over 3 years ago. Content: https://latesthackingnews.com/2021/06/01/fbi-to-share-pwned-passwords-with-hibp-as-it-goes-open-source/ Published: 2021 06 01 10:46:03 Received: 2021 06 06 09:05:15 Feed: Latest Hacking News Source: Latest Hacking News Category: Cyber Security Topic: Cyber Security |
|
Article: How to Easily Protect Your PC from Online Threats - published over 3 years ago. Content: https://latesthackingnews.com/2021/06/02/how-to-easily-protect-your-pc-from-online-threats/ Published: 2021 06 02 09:41:09 Received: 2021 06 06 09:05:15 Feed: Latest Hacking News Source: Latest Hacking News Category: Cyber Security Topic: Cyber Security |
Article: Food Processing Giant JBS Foods Shut Down After Ransomware Attack - published over 3 years ago. Content: https://latesthackingnews.com/2021/06/02/food-processing-giant-jbs-foods-shut-down-after-ransomware-attack/ Published: 2021 06 02 10:10:53 Received: 2021 06 06 09:05:15 Feed: Latest Hacking News Source: Latest Hacking News Category: Cyber Security Topic: Cyber Security |
|
Article: How to practice web automation for cybersecurity software? - published over 3 years ago. Content: https://latesthackingnews.com/2021/06/03/how-to-practice-web-automation-for-cybersecurity-software/ Published: 2021 06 03 09:55:14 Received: 2021 06 06 09:05:15 Feed: Latest Hacking News Source: Latest Hacking News Category: Cyber Security Topic: Cyber Security |
|
Article: WordPress Plugins Are Responsible for 98% of All Vulnerabilities - published over 3 years ago. Content: https://latesthackingnews.com/2021/06/03/wordpress-plugins-are-responsible-for-98-of-all-vulnerabilities/ Published: 2021 06 03 11:52:30 Received: 2021 06 06 09:05:15 Feed: Latest Hacking News Source: Latest Hacking News Category: Cyber Security Topic: Cyber Security |
Article: How to enjoy Netflix anywhere by beating regional restrictions - published over 3 years ago. Content: https://latesthackingnews.com/2021/06/03/how-to-enjoy-netflix-anywhere-by-beating-regional-restrictions/ Published: 2021 06 03 14:17:04 Received: 2021 06 06 09:05:15 Feed: Latest Hacking News Source: Latest Hacking News Category: Cyber Security Topic: Cyber Security |
|
Article: 9 Smartphone Cybersecurity Tips You Should Know - published over 3 years ago. Content: https://latesthackingnews.com/2021/06/03/9-smartphone-cybersecurity-tips-you-should-know/ Published: 2021 06 03 14:57:43 Received: 2021 06 06 09:05:15 Feed: Latest Hacking News Source: Latest Hacking News Category: Cyber Security Topic: Cyber Security |
|
Article: Swedish Public Health Agency Disclosed Multiple Hacking Attempts - published over 3 years ago. Content: https://latesthackingnews.com/2021/06/04/swedish-public-health-agency-disclosed-multiple-hacking-attempts/ Published: 2021 06 04 09:00:25 Received: 2021 06 06 09:05:15 Feed: Latest Hacking News Source: Latest Hacking News Category: Cyber Security Topic: Cyber Security |
Article: FUJIFILM Shuts Down Operations Following Suspected Ransomware Attack - published over 3 years ago. Content: https://latesthackingnews.com/2021/06/04/fujifilm-shuts-down-operations-following-suspected-ransomware-attack/ Published: 2021 06 04 10:34:07 Received: 2021 06 06 09:05:15 Feed: Latest Hacking News Source: Latest Hacking News Category: Cyber Security Topic: Cyber Security |
|
Article: Exploiting System Shield AntiVirus Arbitrary Write Vulnerability using SeTakeOwnershipPrivilege - published almost 7 years ago. Content: A kernel vulnerability exists in an antivirus product called “System Shield AntiVirus and AntiSpyware” by Iolo Technologies. This is an arbitrary memory overwrite vulnerability due to the inputted buffer not being validated and has been assigned a CVE ID of CVE-2018-5701. The product version of “System Shield AntiVirus and AntiSpyware” tested on is 5.0.0.136... https://www.greyhathacker.net/?p=1006 Published: 2018 01 29 12:14:21 Received: 2021 06 06 09:05:13 Feed: GreyHatHacker.NET Source: GreyHatHacker.NET Category: Cyber Security Topic: Cyber Security |
|
Article: Exploiting STOPzilla AntiMalware Arbitrary Write Vulnerability using SeCreateTokenPrivilege - published about 6 years ago. Content: A couple of months ago I discovered 9 kernel vulnerabilities a security product called STOPzilla AntiMalware. It’s been over a month with no response from the vendor so I’m going public with this one. All of the vulnerabilities stem from output buffer address not being validated apart from ioctl 80002028 where the size of the output buffer is not validated. ... https://www.greyhathacker.net/?p=1025 Published: 2018 09 13 10:17:25 Received: 2021 06 06 09:05:13 Feed: GreyHatHacker.NET Source: GreyHatHacker.NET Category: Cyber Security Topic: Cyber Security |
Article: Dokany/Google Drive File Stream Kernel Stack-based Buffer Overflow Vulnerability - published almost 6 years ago. Content: Last November I reported a kernel vulnerability to CERT/CC for their help in coordinating the disclosure as it impacted dozens of vendors including Google Drive File Stream (GDFS). The vulnerability was a stack-based buffer overflow in Dokany’s kernel mode file system driver and has been assigned cve id of CVE-2018-5410. With Dokany you can create your own v... https://www.greyhathacker.net/?p=1041 Published: 2019 01 14 17:07:01 Received: 2021 06 06 09:05:13 Feed: GreyHatHacker.NET Source: GreyHatHacker.NET Category: Cyber Security Topic: Cyber Security |
|
Article: Mac Hack Demonstration Content: https://www.f-secure.com/weblog/archives/00002812.html Published: : Received: 2021 06 06 09:05:12 Feed: F-Secure Antivirus Research Weblog Source: F-Secure Antivirus Research Weblog Category: Cyber Security Topic: Cyber Security |
|
Article: Ransomware Spam E-Mails Targeting Users in Italy and Spain Content: https://www.f-secure.com/weblog/archives/00002813.html Published: : Received: 2021 06 06 09:05:12 Feed: F-Secure Antivirus Research Weblog Source: F-Secure Antivirus Research Weblog Category: Cyber Security Topic: Cyber Security |
Article: SMS Exploit Messages Content: https://www.f-secure.com/weblog/archives/00002814.html Published: : Received: 2021 06 06 09:05:12 Feed: F-Secure Antivirus Research Weblog Source: F-Secure Antivirus Research Weblog Category: Cyber Security Topic: Cyber Security |
|
Article: Found Item: UK Wi-Fi Law? Content: https://www.f-secure.com/weblog/archives/00002815.html Published: : Received: 2021 06 06 09:05:12 Feed: F-Secure Antivirus Research Weblog Source: F-Secure Antivirus Research Weblog Category: Cyber Security Topic: Cyber Security |
|
Article: Problematic Wassenaar Definitions Content: https://www.f-secure.com/weblog/archives/00002816.html Published: : Received: 2021 06 06 09:05:12 Feed: F-Secure Antivirus Research Weblog Source: F-Secure Antivirus Research Weblog Category: Cyber Security Topic: Cyber Security |
Article: The Trusted Internet: Who governs who gets to buy spyware from surveillance software companies? Content: https://www.f-secure.com/weblog/archives/00002818.html Published: : Received: 2021 06 06 09:05:12 Feed: F-Secure Antivirus Research Weblog Source: F-Secure Antivirus Research Weblog Category: Cyber Security Topic: Cyber Security |
|
Article: Hacking Team 0-day Flash Wave with Exploit Kits Content: https://www.f-secure.com/weblog/archives/00002819.html Published: : Received: 2021 06 06 09:05:12 Feed: F-Secure Antivirus Research Weblog Source: F-Secure Antivirus Research Weblog Category: Cyber Security Topic: Cyber Security |
|
Article: IOS Crash Report: Blocking "Pop-Ups" Doesn't Really Help Content: https://www.f-secure.com/weblog/archives/00002820.html Published: : Received: 2021 06 06 09:05:12 Feed: F-Secure Antivirus Research Weblog Source: F-Secure Antivirus Research Weblog Category: Cyber Security Topic: Cyber Security |
Article: 'Zero Days', The Documentary Content: https://www.f-secure.com/weblog/archives/00002821.html Published: : Received: 2021 06 06 09:05:12 Feed: F-Secure Antivirus Research Weblog Source: F-Secure Antivirus Research Weblog Category: Cyber Security Topic: Cyber Security |
|
Article: Duke APT group's latest tools: cloud services and Linux support Content: https://www.f-secure.com/weblog/archives/00002822.html Published: : Received: 2021 06 06 09:05:12 Feed: F-Secure Antivirus Research Weblog Source: F-Secure Antivirus Research Weblog Category: Cyber Security Topic: Cyber Security |
|
Article: "IOS Crash Report" Update: Safari Adds Block Feature Content: https://www.f-secure.com/weblog/archives/00002823.html Published: : Received: 2021 06 06 09:05:12 Feed: F-Secure Antivirus Research Weblog Source: F-Secure Antivirus Research Weblog Category: Cyber Security Topic: Cyber Security |
Article: Work In Progress Content: https://www.f-secure.com/weblog/archives/00002824.html Published: : Received: 2021 06 06 09:05:12 Feed: F-Secure Antivirus Research Weblog Source: F-Secure Antivirus Research Weblog Category: Cyber Security Topic: Cyber Security |
|
Article: Soon� Content: https://www.f-secure.com/weblog/archives/00002826.html Published: : Received: 2021 06 06 09:05:12 Feed: F-Secure Antivirus Research Weblog Source: F-Secure Antivirus Research Weblog Category: Cyber Security Topic: Cyber Security |
|
Article: Did It Execute? - published about 11 years ago. Content: You found a malicious executable! Now you've got a crucial question to answer: did the file execute? We'll discuss a few sources of evidence you can use to answer this question. In this post, we will focus on static or "dead drive" forensics on Windows systems. We will cover four main sources of evidence: Windows Prefetch, Registry, Lo... http://www.fireeye.com/blog/threat-research/2013/08/execute.html Published: 2013 08 27 22:26:05 Received: 2021 06 06 09:05:12 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
Article: Back to Basics Series: OpenIOC - published about 11 years ago. Content: Over the next few months, a few of my colleagues and I will be touching on various topics related to Mandiant and computer security. As part of this series, we are going to be talking about OpenIOC - how we got where we are today, how to make and use IOCs, and the future of OpenIOC. This topic can't be rolled into a single blog p... http://www.fireeye.com/blog/threat-research/2013/09/basics-series-openioc.html Published: 2013 09 12 19:33:56 Received: 2021 06 06 09:05:12 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
|
Article: How Will I Fill This Web Historian-Shaped Hole in My Heart? - published about 11 years ago. Content: With the recent integration of Mandiant Web Historian™ into Mandiant Redline™, you may be asking "How do I review my Web History using Redline?" If so, then follow along as I explain how to collect and review web history data in Redline - with a focus on areas where the workflow and features differ from that of Web Historian. For tho... http://www.fireeye.com/blog/threat-research/2013/09/fill-web-historianshaped-hole-heart.html Published: 2013 09 19 01:11:32 Received: 2021 06 06 09:05:12 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
|
Article: OpenIOC: Back to the Basics - published about 11 years ago. Content: Written by Will Gibb & Devon Kerr One challenge investigators face during incident response is finding a way to organize information about an attackers' activity, utilities, malware and other indicators of compromise, called IOCs. The OpenIOC format addresses this challenge head-on. OpenIOC provides a standard format and terms... http://www.fireeye.com/blog/threat-research/2013/10/openioc-basics.html Published: 2013 10 01 18:45:52 Received: 2021 06 06 09:05:12 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
Article: Best of the Best in 2013: The Armory - published almost 11 years ago. Content: Everyone likes something for free. And there is no better place to go to get free analysis, intelligence and tools than The Armory on M-Unition. During the past year, we've offered intelligence and analysis on new threat activity, sponsored open source projects and offered insight on free tools like Redline™, all of which has been high... http://www.fireeye.com/blog/threat-research/2013/12/2013-armory.html Published: 2013 12 20 21:48:44 Received: 2021 06 06 09:05:12 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
|
Article: OpenIOC Series: Investigating with Indicators of Compromise (IOCs) – Part I - published almost 11 years ago. Content: Written by Devon Kerr & Will Gibb The Back to Basics: OpenIOC blog series previously discussed how Indicators of Compromise (IOCs) can be used to codify information about malware or utilities and describe an attacker's methodology. Also touched on were the parts of an IOC, such as the metadata, references, and definition sec... http://www.fireeye.com/blog/threat-research/2013/12/openioc-series-investigating-indicators-compromise-iocs.html Published: 2013 12 16 20:58:10 Received: 2021 06 06 09:05:12 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
|
Article: Investigating with Indicators of Compromise (IOCs) – Part II - published over 10 years ago. Content: Written by Will Gibb & Devon Kerr In our blog post "Investigating with Indicators of Compromise (IOCs) - Part I," we presented a scenario involving the "Acme Widgets Co.," a company investigating an intrusion, and its incident responder, John. John's next objective is to examine the system "ACMWH-KIOSK" for evidence of... http://www.fireeye.com/blog/threat-research/2014/03/investigating-indicators-compromise-iocs-part-ii.html Published: 2014 03 06 01:42:20 Received: 2021 06 06 09:05:12 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
Article: New Tactics. New Motives. New Services. - published about 10 years ago. Content: Every day at Mandiant we respond to some of the largest cyber security incidents around the world. This gives us a front-row seat to witness what works (and what doesn't) when it comes to finding attackers and preventing them from stealing our clients' data. Attackers' tactics and motives are evolving and as a result our security strat... http://www.fireeye.com/blog/threat-research/2014/10/tactics-motives-services.html Published: 2014 10 08 19:16:51 Received: 2021 06 06 09:05:12 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
|
Article: Executive Briefing in New York with Former Secretary of Homeland Security Michael Chertoff - published over 12 years ago. Content: On March 15, Mandiant hosted an executive briefing over breakfast in New York City. The location in the W Hotel in Downtown NYC overlooked the 9/11 Memorial and the rising One World Trade Center-an arresting view and a unique setting for this event. Former Secretary of Homeland Security Michael Chertoff kicked off the morning by discus... http://www.fireeye.com/blog/threat-research/2012/04/executive-briefing-york-secretary-homeland-security.html Published: 2012 04 02 22:17:49 Received: 2021 06 06 09:05:12 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
|
Article: M-Trends #1: Malware Only Tells Half the Story - published over 12 years ago. Content: When I joined Mandiant earlier this year, I was given the opportunity to help write our annual M-Trends report. This is the third year Mandiant has published the report, which is a summary of the trends we've observed in our investigations over the last twelve months. I remember reading Mandiant's first M-Trends report when it ca... http://www.fireeye.com/blog/threat-research/2012/05/mtrends-1-malware-tells-story.html Published: 2012 05 14 20:45:15 Received: 2021 06 06 09:05:12 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
Article: Incident Response with NTFS INDX Buffers – Part 1: Extracting an INDX Attribute - published about 12 years ago. Content: By William Ballenthin & Jeff Hamm On August 30, 2012, we presented a webinar on how to use INDX buffers to assist in an incident response investigation. During the Q&A portion of the webinar we received many questions; however, we were not able to answer all of them. We're going to attempt to answer the remaining question... http://www.fireeye.com/blog/threat-research/2012/09/striking-gold-incident-response-ntfs-indx-buffers-part-1.html Published: 2012 09 18 23:23:24 Received: 2021 06 06 09:05:12 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
|
Article: Utilities Industry in the Cyber Targeting Scope - published over 11 years ago. Content: There's often a lot of rhetoric in the press and in the security community around threats to the utilities industry, and risk exposure surrounding critical infrastructure. We've determined that the utilities industry (power, water, waste) has been, and likely will continue to be, a target for cyber espionage primarily from Chinese APT ... http://www.fireeye.com/blog/threat-research/2013/06/utilities-industry-cyber-targeting-scope.html Published: 2013 06 17 20:40:56 Received: 2021 06 06 09:05:12 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
|
Article: The History of OpenIOC - published about 11 years ago. Content: With the buzz in the security industry this year about sharing threat intelligence, it's easy to get caught up in the hype, and believe that proper, effective sharing of Indicators or Intelligence is something that can just be purchased along with goods or services from any security vendor. It's really a much more complex problem than ... http://www.fireeye.com/blog/threat-research/2013/09/history-openioc.html Published: 2013 09 17 23:36:51 Received: 2021 06 06 09:05:12 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
Article: Leveraging the Power of Solutions and Intelligence - published almost 11 years ago. Content: Welcome to my first post as a FireEye™ employee! Many of you have asked me what I think of FireEye's acquisition of Mandiant. One of the aspects of the new company that I find most exciting is our increased threat intelligence capabilities. This post will briefly explore what that means for our customers, prospects, and the public. By it... http://www.fireeye.com/blog/threat-research/2014/01/leveraging-power-solutions-intelligence.html Published: 2014 01 27 20:40:15 Received: 2021 06 06 09:05:12 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
|
Article: Citrix XenApp and XenDesktop Hardening Guidance - published over 8 years ago. Content: A Joint Whitepaper from Mandiant and Citrix Throughout the course of Mandiant’s Red Team and Incident Response engagements, we frequently identify a wide array of misconfigured technology solutions, including Citrix XenApp and XenDesktop. We often see attackers leveraging stolen credentials from third parties, accessing Citrix solutions, breaking... http://www.fireeye.com/blog/threat-research/2016/03/citrix_xenapp_andxe.html Published: 2016 03 15 12:00:00 Received: 2021 06 06 09:05:12 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
|
Article: Kerberos Tickets on Linux Red Teams - published over 4 years ago. Content: At FireEye Mandiant, we conduct numerous red team engagements within Windows Active Directory environments. Consequently, we frequently encounter Linux systems integrated within Active Directory environments. Compromising an individual domain-joined Linux system can provide useful data on its own, but the best value is obtaining data, such as Ker... http://www.fireeye.com/blog/threat-research/2020/04/kerberos-tickets-on-linux-red-teams.html Published: 2020 04 01 16:00:00 Received: 2021 06 06 09:05:12 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
Article: The Five W’s of Penetration Testing - published about 10 years ago. Content: Often in discussions with customers and potential customers, questions arise about our penetration testing services, as well as penetration testing in general. In this post, we want to walk through Mandiant's take on the five W's of penetration testing, in hopes of helping those of you who many have some of these same questions. Fo... http://www.fireeye.com/blog/threat-research/2014/09/ws-penetration-testing.html Published: 2014 09 16 20:49:32 Received: 2021 06 06 09:05:12 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
|
Article: Connected Cars: The Open Road for Hackers - published over 8 years ago. Content: As vehicles become both increasingly complex and better connected to the Internet, their newfound versatility may be manipulated for malicious purposes. Three of the most concerning potential threats looking ahead to the next few years are those posed by manipulating vehicle operation, ransomware and using vehicular systems as command ... http://www.fireeye.com/blog/threat-research/2016/06/connected_cars_the.html Published: 2016 06 10 14:00:00 Received: 2021 06 06 09:05:12 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
|
Article: Critical Infrastructure Beyond the Power Grid - published about 11 years ago. Content: The term "critical infrastructure" has earned its spot on the board of our ongoing game of cyber bingo--right next to "Digital Pearl Harbor," "Cyber 9/11," "SCADA" and "Stuxnet." With "critical infrastructure" thrown about in references to cyber threats nearly every week, we thought it was time for a closer look at just what the te... http://www.fireeye.com/blog/threat-research/2013/11/critical-infrastructure-power-grid.html Published: 2013 11 19 21:26:40 Received: 2021 06 06 09:05:12 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
Article: Havex, It’s Down With OPC - published over 10 years ago. Content: FireEye recently analyzed the capabilities of a variant of Havex (referred to by FireEye as “Fertger” or “PEACEPIPE”), the first publicized malware reported to actively scan OPC servers used for controlling SCADA (Supervisory Control and Data Acquisition) devices in critical infrastructure (e.g., water and electric utilities), energy, and manufactu... http://www.fireeye.com/blog/threat-research/2014/07/havex-its-down-with-opc.html Published: 2014 07 17 14:00:00 Received: 2021 06 06 09:05:12 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
|
Article: IRONGATE ICS Malware: Nothing to See Here...Masking Malicious Activity on SCADA Systems - published over 8 years ago. Content: In the latter half of 2015, the FireEye Labs Advanced Reverse Engineering (FLARE) team identified several versions of an ICS-focused malware crafted to manipulate a specific industrial process running within a simulated Siemens control system environment. We named this family of malware IRONGATE. FLARE found the samples on VirusTotal while researchi... http://www.fireeye.com/blog/threat-research/2016/06/irongate_ics_malware.html Published: 2016 06 02 12:00:00 Received: 2021 06 06 09:05:12 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
|
Article: Overload: Critical Lessons from 15 Years of ICS Vulnerabilities - published over 8 years ago. Content: In the past several years, a flood of vulnerabilities has hit industrial control systems (ICS) – the technological backbone of electric grids, water supplies, and production lines. These vulnerabilities affect the reliable operation of sensors, programmable controllers, software and networking equipment used to automate and monitor the physi... http://www.fireeye.com/blog/threat-research/2016/08/overload-critical-lessons-from-15-years-of-ics-vulnerabilities.html Published: 2016 08 03 12:00:00 Received: 2021 06 06 09:05:12 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
Article: What About the Plant Floor? Six Subversive Concerns for ICS Environments - published over 7 years ago. Content: Industrial enterprises such as electric utilities, petroleum companies, and manufacturing organizations invest heavily in industrial control systems (ICS) to efficiently, reliably, and safely operate industrial processes. Without this technology operating the plant floor, these businesses cannot exist. Board members, executives, and security offic... http://www.fireeye.com/blog/threat-research/2017/04/six-subversive-concerns-for-ics-environments.html Published: 2017 04 12 12:00:00 Received: 2021 06 06 09:05:12 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
|
Article: Attackers Deploy New ICS Attack Framework “TRITON” and Cause Operational Disruption to Critical Infrastructure - published almost 7 years ago. Content: Introduction Mandiant recently responded to an incident at a critical infrastructure organization where an attacker deployed malware designed to manipulate industrial safety systems. The targeted systems provided emergency shutdown capability for industrial processes. We assess with moderate confidence that the attacker was developing the capab... http://www.fireeye.com/blog/threat-research/2017/12/attackers-deploy-new-ics-attack-framework-triton.html Published: 2017 12 14 15:00:00 Received: 2021 06 06 09:05:11 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
|
Click to Open Code Editor