Tag: Feedly

  • netbiosX/Pentest-Bookmarks

    netbiosX/Pentest-Bookmarks http://ift.tt/2cTVWw5 netbiosX/Pentest-Bookmarks: Maor blawgz Vulnerabilities via Ecstatic Security http://ift.tt/1TuVnt9 September 20, 2016 at 04:10PM

  • HDDCryptor ransomware uses open source tools to thoroughly own systems

    HDDCryptor ransomware uses open source tools to thoroughly own systems http://ift.tt/2cPZhw6 HDDCryptor (aka Mamba) is a particularly destructive piece of ransomware that encrypts files in mounted drives and network shares, locks the computers’ hard disk, and overwrites their boot disk MBR. This last action leaves the systems unable to boot up, and makes the ransom…

  • Symantec Patches Products Against Exploitation via Malicious RAR Files – Softpedia News

    Symantec Patches Products Against Exploitation via Malicious RAR Files – Softpedia News http://ift.tt/2cGOd6X Softpedia News Symantec Patches Products Against Exploitation via Malicious RAR Files Softpedia News Symantec has released updates for its products that address two security issues that allowed an attacker to create a Denial-of-Service (DoS) state and shut down its security software via…

  • Experts found apps in Google Play serving the Overseer malware to overseas travelers

    Experts found apps in Google Play serving the Overseer malware to overseas travelers http://ift.tt/2cTlhWV Google has removed from the Google Play store four apps trojanized with the Overseer malware to target overseas travelers seeking embassy information. Google has removed from the official Google Play store four trojanized apps that targeted overseas travelers seeking embassy information…

  • Hacking ‘Forward’ With Weaponized Intelligence – Dark Reading

    Hacking ‘Forward’ With Weaponized Intelligence – Dark Reading http://ift.tt/2cGOC9y   Hacking ‘Forward’ With Weaponized Intelligence Instead of hacking back and taking the fight to your adversary, what if your organization hacked forward by unearthing breach scenarios before the hackers do? It is a transformational time in IT security. Advances in technologies associated with cloud computing,…

  • Brian Krebs’ Blog Hit by 665 Gbps DDoS Attack

      Brian Krebs’ Blog Hit by 665 Gbps DDoS Attack http://ift.tt/2ct9npq Investigative cybercrime journalist Brian Krebs reported on Tuesday that his website, KrebsOnSecurity.com, was hit by a massive distributed denial-of-service (DDoS) attack that could be the largest in history. According to Krebs, his site was targeted with various types of DDoS attacks, including SYN and…

  • Microsoft lets Beijing fondle its bits in new source code audit hub

    Microsoft lets Beijing fondle its bits in new source code audit hub http://ift.tt/2cqwEbx Microsoft has opened a technology centre in China to reassure Beijing it does not have backdoors in its software. The so-called Transparency Centre is the third Redmond has opened to reassure governments that Microsoft’s wares are secure. Redmond’s trustworthy computing corporate veep…

  • Cisco finds new Zero-Day Exploit linked to NSA Hackers

    Cisco finds new Zero-Day Exploit linked to NSA Hackers http://ift.tt/2czKt4V Network equipment vendor Cisco is finally warning its customers of another zero-day vulnerability the company discovered in the trove of NSA’s hacking exploits and implants leaked by the group calling itself “The Shadow Brokers.” Last month, the Shadow Brokers published firewall exploits, implants, and hacking…

  • Vawtrak v2, a close look at the cybercriminal groups behind the threat

    Vawtrak v2, a close look at the cybercriminal groups behind the threat http://ift.tt/2d2tAk2 Security experts from the cyber threat intelligence firm Blueliv have published a report on the banking Trojan Vawtrak v2 its criminal ecosystem. Security experts from the cyber threat intelligence firm Blueliv have conducted a technical investigation on the banking Trojan Vawtrak v2 and…

  • FenixLocker Virus Decrypt .Centrumfr@india.com!! Files

    FenixLocker Virus Decrypt .Centrumfr@india.com!! Files http://ift.tt/2cxPQBX A dangerous ransomware virus was encountered by malware researchers last week, dubbed FenixLocker and using the .centrumfr@india.com!! file extension which it adds to files encrypted with AES encryption algorithm. Not only this, but the virus is also reported to leave… Read more The post FenixLocker Virus Decrypt . Threat…