Tag: IFTTT
-
Apple ImageIO bug allows remote code exec / buffer overflow via malicious TIFF sent by MMS or viewed in Safari via /r/netsec
Apple ImageIO bug allows remote code exec / buffer overflow via malicious TIFF sent by MMS or viewed in Safari http://ift.tt/29S8454 Submitted July 19, 2016 at 10:44PM by The_Reverend via reddit http://ift.tt/2a72V5X
-
oss-security – Ruining the Magic of Magento’s Encryption Library via /r/netsec
oss-security – Ruining the Magic of Magento’s Encryption Library http://ift.tt/2a7HX6C Submitted July 19, 2016 at 06:14PM by nexxai via reddit http://ift.tt/29JK3Mc
-
Turkish coup document leak delayed do to ‘sustained cyberattack’ – The Hill
Turkish coup document leak delayed do to ‘sustained cyberattack’ – The Hill http://ift.tt/2a9kXUI WikiLeaks claims a cyberattack has kept it from leaking hundreds of thousands of documents related to the attempted Turkish coup. The site, both famous and controversial for leaking State Department cables, Sony emails and other high profile documents, had announced a Tuesday…
-
Office Maldoc: Let’s Focus on the VBA Macros Later…, (Tue, Jul 19th)
Office Maldoc: Let’s Focus on the VBA Macros Later…, (Tue, Jul 19th) http://ift.tt/29M2Phw I received another malicious Office document. oledump.py shows it contains VBA macros, but also a userform (A6 and A7). Before we look at the VBA macros, we’ll take a look at the values in the userform (A7 …/o). …
-
Locking Down Windows 10: 6 New Features
Locking Down Windows 10: 6 New Features http://ift.tt/2aqO3ym Locking Down Windows 10: 6 New Features With expanded identity and access controls, advanced Bitlocker encryption and malware protection, Microsoft says that Windows 10 is its most secure operating system ever. 1 of 7 For enterprises the number one reason to upgrade to Windows 10 is…
-
2016-07-19 – Guest blog: Thomas Hegel – Neutrino EK – EITest Campaign
2016-07-19 – Guest blog: Thomas Hegel – Neutrino EK – EITest Campaign http://ift.tt/2a826wk Threat Intel via Malware-Traffic-Analysis.net – Blog Entries http://ift.tt/MiNM2G July 19, 2016 at 09:47AM
-
How to craft a threat intelligence strategy – IT World Canada
How to craft a threat intelligence strategy – IT World Canada http://ift.tt/2a8fmBv An increasing number of CISOs are realizing the value of threat intelligence to protecting the enterprise, helping the infosec team doing the day-to-day defending. But if you don’t already have a unit/person assigned for doing this it may be daunting to start. Adam…
-
New Locky Variant Functions Offline
New Locky Variant Functions Offline http://ift.tt/2a8fSPy The latest version of the well known ransomware, Locky, is now able to function offline… Most ransomware variants need to “talk” to their command center to actually encrypt your files. They use public key cryptography from their command center and if this is unavailable, the encryption process typic .…
-
VU#790839: Objective Systems ASN1C generates code that contains a heap overlow vulnerability
VU#790839: Objective Systems ASN1C generates code that contains a heap overlow vulnerability http://ift.tt/29Rofj0 Vulnerability Note VU#790839 Objective Systems ASN1C generates code that contains a heap overlow vulnerability Original Release date: 19 Jul 2016 | Last revised: 19 Jul 2016 Overview ASN.1 is a standard representation of data for networking and telecommunications applications. Objective System’s ASN1C…
-
New search engine lets you search for vulnerabilities in Javascript code via /r/netsec
New search engine lets you search for vulnerabilities in Javascript code http://ift.tt/29JuVhT)®ex=true Submitted July 19, 2016 at 04:40PM by cwings via reddit http://ift.tt/2a83hfC