Microsoft Identity Bounty Program Pays $500 to $100,000 for Bugs
https://www.darkreading.com/endpoint/microsoft-identity-bounty-program-pays-$500-to-$100000-for-bugs/d/d-id/1332325?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple
Researchers will be rewarded for vulnerabilities found in identity solutions and implementations of certain OpenID standards.
https://www.darkreading.com/endpoint/microsoft-identity-bounty-program-pays-$500-to-$100000-for-bugs/d/d-id/1332325?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple
Researchers will be rewarded for vulnerabilities found in identity solutions and implementations of certain OpenID standards.
Dark Reading
Microsoft Identity Bounty Program Pays $500 to $100,000 for Bugs
Researchers will be rewarded for vulnerabilities found in identity solutions and implementations of certain OpenID standards.
Google User Content CDN Used for Malware Hosting
https://www.bleepingcomputer.com/news/security/google-user-content-cdn-used-for-malware-hosting/
Hackers are hiding malicious code inside the metadata fields of images hosted on Google's official CDN (content delivery network) —googleusercontent.com. [...]
https://www.bleepingcomputer.com/news/security/google-user-content-cdn-used-for-malware-hosting/
Hackers are hiding malicious code inside the metadata fields of images hosted on Google's official CDN (content delivery network) —googleusercontent.com. [...]
BleepingComputer
Google User Content CDN Used for Malware Hosting
Hackers are hiding malicious code inside the metadata fields of images hosted on Google's official CDN (content delivery network) —googleusercontent.com.
Malwarebytes published reports on Cybercrime tactics and techniques shows the new developments in ransomware and cryptomining attacks. When compared to Q1 the Q2 attacks showed more sophistication. Introduction of complex VPNFilter malware that debuts with 500,000 consumer and business infections. Spyware attacks reduced by 40 percent and trojan attacks detection dropped by 50 percent when […]
The post Top Cybercrime Tactics and Techniques Q2 2018 Cryptomining, GrandCrab, SamSam & VPNFilter (https://gbhackers.com/top-cybercrime-tactics-techniques/) appeared first on GBHackers On Security (https://gbhackers.com/).
The post Top Cybercrime Tactics and Techniques Q2 2018 Cryptomining, GrandCrab, SamSam & VPNFilter (https://gbhackers.com/top-cybercrime-tactics-techniques/) appeared first on GBHackers On Security (https://gbhackers.com/).
Writing a Simple Linux Kernel Module
https://blog.sourcerer.io/writing-a-simple-linux-kernel-module-d9dc3762c234
https://blog.sourcerer.io/writing-a-simple-linux-kernel-module-d9dc3762c234
Medium
Writing a Simple Linux Kernel Module
Grabbing the Golden Ring-0
Bypass Cisco AnyConnect Hostscan
https://gilks.github.io/post/cisco-hostscan-bypass/
https://gilks.github.io/post/cisco-hostscan-bypass/
Iranian Hacker Group Waging Widespread Espionage Campaign in Middle East
https://www.darkreading.com/attacks-breaches/iranian-hacker-group-waging-widespread-espionage-campaign-in-middle-east/d/d-id/1332388?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple
Unlike other threat actors that have a narrow set of targets, Leafminer has over 800 organizations in its sights, Symantec says.
https://www.darkreading.com/attacks-breaches/iranian-hacker-group-waging-widespread-espionage-campaign-in-middle-east/d/d-id/1332388?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple
Unlike other threat actors that have a narrow set of targets, Leafminer has over 800 organizations in its sights, Symantec says.
Darkreading
Iranian Hacker Group Waging Widespread Espionage Campaign in Middle East
Unlike other threat actors that have a narrow set of targets, Leafminer has over 800 organizations in its sights, Symantec says.
Evilginx 2 - Next Generation of Phishing 2FA Tokens
https://breakdev.org/evilginx-2-next-generation-of-phishing-2fa-tokens/
https://breakdev.org/evilginx-2-next-generation-of-phishing-2fa-tokens/
BREAKDEV
Evilginx 2 - Next Generation of Phishing 2FA Tokens
Evilginx becomes a relay between the real website and the phished user. Phished user interacts with the real website, while Evilginx captures all the data.
Forwarded from کانال بایت امن (Sh4DoVV)
#eBook #MalwareAnalysis
📗Learning Malware Analysis
➖Format: EPUB
➖By: Monnappa K A
➖Pages: 510
➖Publisher: Packtpub
➖Pub Date: 2018
➖ISBN : 9781788392501
@securebyte
📗Learning Malware Analysis
➖Format: EPUB
➖By: Monnappa K A
➖Pages: 510
➖Publisher: Packtpub
➖Pub Date: 2018
➖ISBN : 9781788392501
@securebyte