Forwarded from CTF Community | Hints
module 1- Introduction to WAFs, WAF types and WAF Bypassing.pdf
481.3 KB
Introduction to WAFs, WAF types and WAF Bypassing #Web
Unofficial Telegram App Secretly Loads Infinite Malicious Sites
MobonoGram 2019 app was downloaded more than 100,000 times and performed adfraud clicks.
https://www.symantec.com/blogs/threat-intelligence/unofficial-telegram-app-malicious-sites
MobonoGram 2019 app was downloaded more than 100,000 times and performed adfraud clicks.
https://www.symantec.com/blogs/threat-intelligence/unofficial-telegram-app-malicious-sites
Forwarded from P0SCon
💻 P0SCon2019
Join P0SCon2019 and send your abstract of speech or workshop to be a speaker at P0SCon.
More information:
http://poscon.ir
Deadline:
11 Sep 2019
Conference Date:
12 Oct 2019
Urmia University of Technology
Join P0SCon2019 and send your abstract of speech or workshop to be a speaker at P0SCon.
More information:
http://poscon.ir
Deadline:
11 Sep 2019
Conference Date:
12 Oct 2019
Urmia University of Technology
Researchers Claim They Bypassed Cylance's AI-Based Antivirus
Researchers at Australia-based cybersecurity firm Skylight claim to have found a way to trick Cylance’s AI-based antivirus engine into classifying malicious files as benign.
Cylance, which last year was acquired by BlackBerry and is now called BlackBerry Cylance, told SecurityWeek it has launched an investigation to determine if the researchers’ findings are valid or if their method works as a result of a misconfiguration of the product.
https://www.securityweek.com/researchers-claim-they-bypassed-cylances-ai-based-antivirus
Researchers at Australia-based cybersecurity firm Skylight claim to have found a way to trick Cylance’s AI-based antivirus engine into classifying malicious files as benign.
Cylance, which last year was acquired by BlackBerry and is now called BlackBerry Cylance, told SecurityWeek it has launched an investigation to determine if the researchers’ findings are valid or if their method works as a result of a misconfiguration of the product.
https://www.securityweek.com/researchers-claim-they-bypassed-cylances-ai-based-antivirus
SecurityWeek
Researchers Claim They Bypassed Cylance’s AI-Based Antivirus
Researchers at Australia-based cybersecurity firm Skylight claim to have found a way to trick Cylance’s AI-based antivirus engine into classifying malicious files as benign.
Russian Intelligence Found Trying to Crack Tor Browser by Taking part in the Network
A hacker group compromised Russia’s Secret Intelligence Agency and they gained access to terabytes of data stored by the FSB contractor that includes the secret project details.
BBC learned that hackers who breached Russian intelligence contractor found that they are working towards cracking Tor browser as part of their secret project. It is still unclear how successful it will be, it heavily depends on the luck matching to Tor users activity.
A hacker group compromised Russia’s Secret Intelligence Agency and they gained access to terabytes of data stored by the FSB contractor that includes the secret project details.
BBC learned that hackers who breached Russian intelligence contractor found that they are working towards cracking Tor browser as part of their secret project. It is still unclear how successful it will be, it heavily depends on the luck matching to Tor users activity.
Forwarded from P0SCon
Buy a ticket and join #P0SCon2019
https://evand.com/events/دومین-نشست-بین-المللی-امنیت-سایبری-p0scon-68836830
Topics of Interest:
✅ Malware Analysis
✅ Software Exploitation
✅ Embedded Devices
✅ OSINT
✅ Cryptocurrency
✅ DarkNet
✅ Attack or Defense Tools
✅ Web Security
Date:
12 Oct 2019
Urmia University of Technology
@P0SCon
https://evand.com/events/دومین-نشست-بین-المللی-امنیت-سایبری-p0scon-68836830
Topics of Interest:
✅ Malware Analysis
✅ Software Exploitation
✅ Embedded Devices
✅ OSINT
✅ Cryptocurrency
✅ DarkNet
✅ Attack or Defense Tools
✅ Web Security
Date:
12 Oct 2019
Urmia University of Technology
@P0SCon
ایوند
دومین نشست بین المللی امنیت سایبری P0SCon - شنبه ۲۰ مهر ۹۸
خرید بلیت و ثبتنام دومین نشست بین المللی امنیت سایبری P0SCon در ایوند - زمان: شنبه ۲۰ مهر ۹۸ - موضوع: غیره
Forwarded from Mir Saman Tajbakhsh
Demo of creating Hidden Mail Service over TOR:
https://youtu.be/E2x5CmjPXPw
More information can be found in:
https://mstajbakhsh.ir/creating-hidden-mail-service/
https://youtu.be/E2x5CmjPXPw
More information can be found in:
https://mstajbakhsh.ir/creating-hidden-mail-service/
YouTube
Installing and Configure Hidden Mail Service over TOR
Demo of installing and configuring a hidden email service behind TOR anonymity network using hMailServer. Additionally it is shown that using Thunderbird (the email client), users can access the hidden email server and communicate over it.
More information…
More information…