How we Discovered New Vulnerabilities in the ASUS RT-AC3200 Router
https://youtu.be/ckqhWiVSAns
🦠 @Phantasm_Lab
https://youtu.be/ckqhWiVSAns
🦠 @Phantasm_Lab
YouTube
LIVESTREAM: How We Discovered New Vulnerabilities in the ASUS RT-AC3200 Router
Follow us on:
https://twitter.com/ISEsecurity
https://twitter.com/iotvillage
Website:
https://www.securityevaluators.com
https://blog.securityevaluators.com
Abstract
Embedded devices often include applications and services that contain memory corruption…
https://twitter.com/ISEsecurity
https://twitter.com/iotvillage
Website:
https://www.securityevaluators.com
https://blog.securityevaluators.com
Abstract
Embedded devices often include applications and services that contain memory corruption…
Forwarded from DARKNET BR
#DataLeaks | #CIA
@DARKNET_BR
CIA agent hacked computer files, includes intercepted sms, calls + military documents, insurance cards and sensitive informations/documents.
@DARKNET_BR
A massive cyber espionage campaign, which we found so spooked US intelligence that it changed how the government handles DNS registration, was the work of hackers aligned with the Turkish government https://t.co/5jg4WFFI5W
https://twitter.com/Bing_Chris/status/1221806195901636614?s=20
🦠 @Phantasm_Lab
https://twitter.com/Bing_Chris/status/1221806195901636614?s=20
🦠 @Phantasm_Lab
Twitter
Chris Bing
A massive cyber espionage campaign, which we found so spooked US intelligence that it changed how the government handles DNS registration, was the work of hackers aligned with the Turkish government https://t.co/5jg4WFFI5W
New: leaked documents, data, contracts show how hugely popular antivirus Avast now harvests internet browsing data and sells it for millions of dollars. Clients included Home Depot, Google, Microsoft. Documents show a product called "All Clicks Feed" https://t.co/i5s2lX8FJL
https://twitter.com/josephfcox/status/1221796061678694401?s=20
🦠 @Phantasm_Lab
https://twitter.com/josephfcox/status/1221796061678694401?s=20
🦠 @Phantasm_Lab
CVE-2020-0601 | Windows CryptoAPI Spoofing Vulnerability
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0601
🐉 @Phantasm_Lab
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0601
🐉 @Phantasm_Lab
Modern Vulnerability Exploitation: The Heap Overflow
https://www.youtube.com/watch?v=2LSL_vRyCKY
🐉 @Phantasm_Lab
https://www.youtube.com/watch?v=2LSL_vRyCKY
🐉 @Phantasm_Lab
YouTube
Modern Vulnerability Exploitation: The Heap Overflow
A look at the less infamous heap overflow vulnerability.
This video is for educational purposes only.
I did not create this video.
This video is for educational purposes only.
I did not create this video.
Forwarded from Cyber Threat Intelligence
New Ransomware Strain Halts Toll Group Deliveries - by @serghei
https://t.co/n70sVeu5fM http://twitter.com/BleepinComputer/status/1225093601790693376
https://t.co/n70sVeu5fM http://twitter.com/BleepinComputer/status/1225093601790693376
BleepingComputer
New Ransomware Strain Halts Toll Group Deliveries
Australian transportation and logistics company Toll Group confirmed today that systems across multiple sites and business units were encrypted by a new variant of the Mailto ransomware.
The Absolute AppSec Secure Code Review Framework by Seth Law
https://www.youtube.com/watch?v=Kepd1HsoE8o
🐉 @Phantasm_Lab
https://www.youtube.com/watch?v=Kepd1HsoE8o
🐉 @Phantasm_Lab
YouTube
[2019] The Absolute AppSec Secure Code Review Framework by Seth Law
Let’s face it, performing a manual review of someone else’s source code is hard. It takes time, effort, expertise, and grit to actually figure out what the application does, how the developer implemented it, and if there should be any changes. From an application…
Spot the vuln - Identifying security problems in source code by Eldar Marcussen
https://www.youtube.com/watch?v=85Yx4pNSkkY
🧬 @Phantasm_Lab
https://www.youtube.com/watch?v=85Yx4pNSkkY
🧬 @Phantasm_Lab
YouTube
[2019] Spot the vuln - Identifying security problems in source code by Eldar Marcussen
Do you know source code? or perhaps you know vulnerabilities? See where they intersect and how most vulnerabilities are created. This talk will present a ple...
SDLC - Understand the Software Development Life Cycle
https://stackify.com/what-is-sdlc/
🧬 @Phantasm_Lab
SDLC or the Software Development Life Cycle is a process that produces software with the highest quality and lowest cost in the shortest time. SDLC includes a detailed plan for how to develop, alter, maintain, and replace a software system.https://stackify.com/what-is-sdlc/
🧬 @Phantasm_Lab
Stackify
What Is SDLC? Understand the Software Development Life Cycle - Stackify
In this post, we'll diver deeper into how SDLC works, examine each of the phases, and how to choose an SDLC Model.