Kenan Abdullahoğlu is one of the Turkey's cryptocurrency leaders. He has been interviewed with many news networks including Al Jazeera and BloombergHT about the different aspects of cryptocurrency including its security. Kenan will be present at poscon2018. More information and registration:
http://poscon.ir
@P0SCon
http://poscon.ir
@P0SCon
CVE-2018-13784: PrestaShop 1.6.x Privilege Escalation
https://www.ambionics.io/blog/prestashop-privilege-escalation
https://www.ambionics.io/blog/prestashop-privilege-escalation
Ambionics
PrestaShop 1.6 Privilege Escalation
Prestashop 1.6.1.19 sessions can be read and written by an attacker, resulting in a range of vulnerabilities including privilege escalation and remote code execution.
Microsoft Identity Bounty Program Pays $500 to $100,000 for Bugs
https://www.darkreading.com/endpoint/microsoft-identity-bounty-program-pays-$500-to-$100000-for-bugs/d/d-id/1332325?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple
Researchers will be rewarded for vulnerabilities found in identity solutions and implementations of certain OpenID standards.
https://www.darkreading.com/endpoint/microsoft-identity-bounty-program-pays-$500-to-$100000-for-bugs/d/d-id/1332325?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple
Researchers will be rewarded for vulnerabilities found in identity solutions and implementations of certain OpenID standards.
Dark Reading
Microsoft Identity Bounty Program Pays $500 to $100,000 for Bugs
Researchers will be rewarded for vulnerabilities found in identity solutions and implementations of certain OpenID standards.
Google User Content CDN Used for Malware Hosting
https://www.bleepingcomputer.com/news/security/google-user-content-cdn-used-for-malware-hosting/
Hackers are hiding malicious code inside the metadata fields of images hosted on Google's official CDN (content delivery network) —googleusercontent.com. [...]
https://www.bleepingcomputer.com/news/security/google-user-content-cdn-used-for-malware-hosting/
Hackers are hiding malicious code inside the metadata fields of images hosted on Google's official CDN (content delivery network) —googleusercontent.com. [...]
BleepingComputer
Google User Content CDN Used for Malware Hosting
Hackers are hiding malicious code inside the metadata fields of images hosted on Google's official CDN (content delivery network) —googleusercontent.com.
Malwarebytes published reports on Cybercrime tactics and techniques shows the new developments in ransomware and cryptomining attacks. When compared to Q1 the Q2 attacks showed more sophistication. Introduction of complex VPNFilter malware that debuts with 500,000 consumer and business infections. Spyware attacks reduced by 40 percent and trojan attacks detection dropped by 50 percent when […]
The post Top Cybercrime Tactics and Techniques Q2 2018 Cryptomining, GrandCrab, SamSam & VPNFilter (https://gbhackers.com/top-cybercrime-tactics-techniques/) appeared first on GBHackers On Security (https://gbhackers.com/).
The post Top Cybercrime Tactics and Techniques Q2 2018 Cryptomining, GrandCrab, SamSam & VPNFilter (https://gbhackers.com/top-cybercrime-tactics-techniques/) appeared first on GBHackers On Security (https://gbhackers.com/).
Writing a Simple Linux Kernel Module
https://blog.sourcerer.io/writing-a-simple-linux-kernel-module-d9dc3762c234
https://blog.sourcerer.io/writing-a-simple-linux-kernel-module-d9dc3762c234
Medium
Writing a Simple Linux Kernel Module
Grabbing the Golden Ring-0