Month: September 2016
-
X-Keyscore as a SIGDEV tool 2009 [PDF]
X-Keyscore as a SIGDEV tool 2009 [PDF] http://ift.tt/2ctoa3A X-Keyscore as a SIGDEV tool 2009 [PDF]: Vulnerabilities via Ecstatic Security http://ift.tt/1TuVnt9 September 20, 2016 at 04:10PM
-
netbiosX/Pentest-Bookmarks
netbiosX/Pentest-Bookmarks http://ift.tt/2cTVWw5 netbiosX/Pentest-Bookmarks: Maor blawgz Vulnerabilities via Ecstatic Security http://ift.tt/1TuVnt9 September 20, 2016 at 04:10PM
-
HDDCryptor ransomware uses open source tools to thoroughly own systems
HDDCryptor ransomware uses open source tools to thoroughly own systems http://ift.tt/2cPZhw6 HDDCryptor (aka Mamba) is a particularly destructive piece of ransomware that encrypts files in mounted drives and network shares, locks the computers’ hard disk, and overwrites their boot disk MBR. This last action leaves the systems unable to boot up, and makes the ransom…
-
Symantec Patches Products Against Exploitation via Malicious RAR Files – Softpedia News
Symantec Patches Products Against Exploitation via Malicious RAR Files – Softpedia News http://ift.tt/2cGOd6X Softpedia News Symantec Patches Products Against Exploitation via Malicious RAR Files Softpedia News Symantec has released updates for its products that address two security issues that allowed an attacker to create a Denial-of-Service (DoS) state and shut down its security software via…
-
Experts found apps in Google Play serving the Overseer malware to overseas travelers
Experts found apps in Google Play serving the Overseer malware to overseas travelers http://ift.tt/2cTlhWV Google has removed from the Google Play store four apps trojanized with the Overseer malware to target overseas travelers seeking embassy information. Google has removed from the official Google Play store four trojanized apps that targeted overseas travelers seeking embassy information…
-
Hacking ‘Forward’ With Weaponized Intelligence – Dark Reading
Hacking ‘Forward’ With Weaponized Intelligence – Dark Reading http://ift.tt/2cGOC9y Hacking ‘Forward With Weaponized Intelligence Instead of hacking back and taking the fight to your adversary, what if your organization hacked forward by unearthing breach scenarios before the hackers do? It is a transformational time in IT security. Advances in technologies associated with cloud computing,…
-
Hijacking tons of Instapage expired users Domains & Subdomains via /r/netsec
Hijacking tons of Instapage expired users Domains & Subdomains http://ift.tt/2d9TXJG Submitted September 21, 2016 at 06:32AM by 1lastBr3ath via reddit http://ift.tt/2dfKqfU
-
Brian Krebs’ Blog Hit by 665 Gbps DDoS Attack
Brian Krebs’ Blog Hit by 665 Gbps DDoS Attack http://ift.tt/2ct9npq Investigative cybercrime journalist Brian Krebs reported on Tuesday that his website, KrebsOnSecurity.com, was hit by a massive distributed denial-of-service (DDoS) attack that could be the largest in history. According to Krebs, his site was targeted with various types of DDoS attacks, including SYN and…
-
Untangling the Forget-Me Knot: Secure Account Recovery Made Simple via /r/netsec
Untangling the Forget-Me Knot: Secure Account Recovery Made Simple http://ift.tt/2cX77ry Submitted September 20, 2016 at 10:02PM by sarciszewski via reddit http://ift.tt/2d969Kp
-
How BackConnect Performed BGP Hijacks via /r/netsec
How BackConnect Performed BGP Hijacks http://ift.tt/2cWJiQy Submitted September 20, 2016 at 07:45PM by rattus via reddit http://ift.tt/2devJcU