Writeup and PoC for arbitrary file read/write in locked Samsung Android device via MTP (SVE-2017-10086)
http://ift.tt/2lHkFe5
Submitted January 03, 2018 at 01:29AM by smesoraca
via reddit http://ift.tt/2Cv2ba5
http://ift.tt/2lHkFe5
Submitted January 03, 2018 at 01:29AM by smesoraca
via reddit http://ift.tt/2Cv2ba5
GitHub
smeso/MTPwn
MTPwn - PoC exploit for arbitrary file read/write in locked Samsung Android device via MTP (SVE-2017-10086)
Security Orchestration For Policy Management
http://ift.tt/2DSUMP4
Submitted January 03, 2018 at 02:32AM by abhishekiyer
via reddit http://ift.tt/2qdtb9k
http://ift.tt/2DSUMP4
Submitted January 03, 2018 at 02:32AM by abhishekiyer
via reddit http://ift.tt/2qdtb9k
Demisto
Security Orchestration Use Case: Policy Management with McAfee ePO and Demisto
Learn how Demisto’s integration with McAfee ePolicy Orchestrator (ePO) can bring policy management under the umbrella of security orchestration and automation.
VMSA-2018-0001: vSphere Data Protection (VDP) updates address multiple security issues.
http://ift.tt/2ECDMOb
Submitted January 03, 2018 at 01:26AM by bagaudin
via reddit http://ift.tt/2EAs6LH
http://ift.tt/2ECDMOb
Submitted January 03, 2018 at 01:26AM by bagaudin
via reddit http://ift.tt/2EAs6LH
VMWare
VMSA-2018-0001
vSphere Data Protection (VDP) updates address multiple security issues.
I get this pop up on my phone for EVERY WEBSITE. It’s scary. I cleared cookies but it won’t go away?
http://ift.tt/2lIO9az
Submitted January 03, 2018 at 02:44AM by chriserie
via reddit http://ift.tt/2CtAEqz
http://ift.tt/2lIO9az
Submitted January 03, 2018 at 02:44AM by chriserie
via reddit http://ift.tt/2CtAEqz
Safe file formats
By safe I mean absolutely 100% safe or very close.I know that pdf is not safe due to javanoscriptI know that .docx is unsafe due to macrosI've heard that .rtf is unsafeWhat basic file formats are safe from malware? Mostly interested in text formats but tips on other basic formats are welcome.BONUS QUESTION: If I take an infected file (ex. .pdf) and convert it to a different format (ex. .docx) before opening, does that render the attack useless? I mean, from what I understand .pdf and .docx have different vulnerabilities, so a .pdf attack shouldn't transfer to .docx. What if I then convert it back to pdf?
Submitted January 03, 2018 at 03:47AM by Optymistyk
via reddit http://ift.tt/2CGNMFj
By safe I mean absolutely 100% safe or very close.I know that pdf is not safe due to javanoscriptI know that .docx is unsafe due to macrosI've heard that .rtf is unsafeWhat basic file formats are safe from malware? Mostly interested in text formats but tips on other basic formats are welcome.BONUS QUESTION: If I take an infected file (ex. .pdf) and convert it to a different format (ex. .docx) before opening, does that render the attack useless? I mean, from what I understand .pdf and .docx have different vulnerabilities, so a .pdf attack shouldn't transfer to .docx. What if I then convert it back to pdf?
Submitted January 03, 2018 at 03:47AM by Optymistyk
via reddit http://ift.tt/2CGNMFj
reddit
Safe file formats • r/security
By safe I mean absolutely 100% safe or very close. I know that pdf is not safe due to javanoscript I know that .docx is unsafe due to macros I've...
blackberrymobile.com mining monero?
The site seems to be including a coinhive.com noscript. http://ift.tt/2qSHLiI Address is
Submitted January 03, 2018 at 05:31AM by cryptocripples
via reddit http://ift.tt/2Cv3CVV
The site seems to be including a coinhive.com noscript. http://ift.tt/2qSHLiI Address is
9KNyPFbDqJesaSxBLcQoJZX6PgXN1ld0. The way that it's implemented (before the first byte) makes it look like it got injected.Seems weird that something got injected into a BlackBerry site, since blackberry is supposed to be security-focussed.Is anyone else seeing this miner?Submitted January 03, 2018 at 05:31AM by cryptocripples
via reddit http://ift.tt/2Cv3CVV
reddit
blackberrymobile.com mining monero? • r/security
The site seems to be including a coinhive.com noscript. https://www.blackberrymobile.com/ Address is `9KNyPFbDqJesaSxBLcQoJZX6PgXN1ld0`. The way...
DNS Spoofing www.berkdusunur.net
http://ift.tt/2A8NyUR
Submitted January 03, 2018 at 06:29AM by berkdusunurx
via reddit http://ift.tt/2CwymXt
http://ift.tt/2A8NyUR
Submitted January 03, 2018 at 06:29AM by berkdusunurx
via reddit http://ift.tt/2CwymXt
www.berkdusunur.net
DNS Spoofing (DNS Zehirlenmesi)
Hello everyone :) I'm going to do a dns poisoning scenario today. I want to do DNS spoofing in an open and free network. Okay lets ...
OS Command Injection Unauthorized Access
http://ift.tt/2CHphb9
Submitted January 03, 2018 at 06:19AM by berkdusunurx
via reddit http://ift.tt/2A8PHzB
http://ift.tt/2CHphb9
Submitted January 03, 2018 at 06:19AM by berkdusunurx
via reddit http://ift.tt/2A8PHzB
www.berkdusunur.net
OS Command Injection Unauthorized Access
Hello Everyone :) bWAPP bWAPP, or a buggy web application, is a free and open source deliberately inse...
Academic researchers fire latest shots in adblocking arms race
http://ift.tt/2CsE5wS
Submitted January 03, 2018 at 08:46AM by RandomCollection
via reddit http://ift.tt/2DTpyqX
http://ift.tt/2CsE5wS
Submitted January 03, 2018 at 08:46AM by RandomCollection
via reddit http://ift.tt/2DTpyqX
Ars Technica
Academic researchers fire latest shots in adblocking arms race
Manipulating javanoscript can overcome publishers' software.
Star Wars Episode IV.1.d: The Pentesters Strike Back
http://ift.tt/1kcUBmV
Submitted January 03, 2018 at 10:27AM by antdude
via reddit http://ift.tt/2CeDbkd
http://ift.tt/1kcUBmV
Submitted January 03, 2018 at 10:27AM by antdude
via reddit http://ift.tt/2CeDbkd
Vimeo
Star Wars Episode IV.1.d: The Pentesters Strike Back
It is a period of cyber war. In an effort to sustain commerce during these challenging times, the Galactic Trade Federation has required the Empire retain the services…
Client specific design security booth by Big Booth
https://www.youtube.com/watch?time_continue=2&v=TtuiRzfaFL4
Submitted January 03, 2018 at 12:33PM by phelpsryans
via reddit http://ift.tt/2DWBacN
https://www.youtube.com/watch?time_continue=2&v=TtuiRzfaFL4
Submitted January 03, 2018 at 12:33PM by phelpsryans
via reddit http://ift.tt/2DWBacN
YouTube
B.I.G. Booths Architectural_Harmony.mp4
B.I.G. Booths, Architectural Harmony and Perimeter Security
The new intel vulnerability
It allows normal user programs – from database applications to JavaScript in web browsers – to discern to some extent the layout or contents of protected kernel memory areas.http://ift.tt/2lEEKleSo, does this mean that by visiting a website, the javanoscript can access information from the kernel of my PC?
Submitted January 03, 2018 at 03:19PM by Lumo5
via reddit http://ift.tt/2CjxIZn
It allows normal user programs – from database applications to JavaScript in web browsers – to discern to some extent the layout or contents of protected kernel memory areas.http://ift.tt/2lEEKleSo, does this mean that by visiting a website, the javanoscript can access information from the kernel of my PC?
Submitted January 03, 2018 at 03:19PM by Lumo5
via reddit http://ift.tt/2CjxIZn
www.theregister.co.uk
'Kernel memory leaking' Intel processor design flaw forces Linux, Windows redesign
Other OSes will need an update, performance hits loom
Intel left a fascinating security flaw in its chips for 16 years – here's how to exploit it • The Register
http://ift.tt/2qhD3yD
Submitted January 03, 2018 at 04:23PM by Seiryth
via reddit http://ift.tt/2lKf8Dc
http://ift.tt/2qhD3yD
Submitted January 03, 2018 at 04:23PM by Seiryth
via reddit http://ift.tt/2lKf8Dc
www.theregister.co.uk
Intel left a fascinating security flaw in its chips for 16 years – here's how to exploit it
Howler opens door for SMM rootkits
Bancor's HackMe Security Bounty ends in 1 week! Participate now to win ETH & BNT!
http://ift.tt/2ttpeL2
Submitted January 03, 2018 at 05:17PM by BancorAmbassador
via reddit http://ift.tt/2lL9kcM
http://ift.tt/2ttpeL2
Submitted January 03, 2018 at 05:17PM by BancorAmbassador
via reddit http://ift.tt/2lL9kcM
app.demo.bancor.network
Bancor Protocol
Bancor Protocol is a standard for a new generation of cryptocurrencies called Smart Tokens
Web Application Penetration Testing With WFuzz
http://ift.tt/2ELVQ8x
Submitted January 03, 2018 at 06:37PM by berkdusunurx
via reddit http://ift.tt/2Czg48a
http://ift.tt/2ELVQ8x
Submitted January 03, 2018 at 06:37PM by berkdusunurx
via reddit http://ift.tt/2Czg48a
www.berkdusunur.net
Web Application Penetration Testing With WFuzz (Wfuzz İle Web Uygulama Güvenliği Testleri)
What İs WFuzz? WFuzz is a powerful tool for general web security testing where we can perform security tests on web applications, p...
exploit vulnerable windows using metasploit [kali linux] advanced ethical hacking and pen testing
https://youtu.be/A_xhZPnNWpY
Submitted January 03, 2018 at 07:15PM by jasminsmith1
via reddit http://ift.tt/2lNZnKU
https://youtu.be/A_xhZPnNWpY
Submitted January 03, 2018 at 07:15PM by jasminsmith1
via reddit http://ift.tt/2lNZnKU
YouTube
exploit vulnerable windows using metasploit [kali linux] advanced ethical hacking and pen testing
exploit vulnerable windows using metasploit [kali linux] advanced ethical hacking and pen testing This YouTube Video is all about vulnerability and exploit t...
Security In 5: Episode 144 - Top 10 Tips To Secure Your Network - 9 - Define Strong Rules For Admin Accounts
http://ift.tt/2Cy7oyE
Submitted January 03, 2018 at 07:36PM by BinaryBlog
via reddit http://ift.tt/2COKXlN
http://ift.tt/2Cy7oyE
Submitted January 03, 2018 at 07:36PM by BinaryBlog
via reddit http://ift.tt/2COKXlN
Libsyn
Security In Five Podcast: Episode 144 - Top 10 Tips To Secure Your Network - 9 - Define Strong Rules For Admin Accounts
Continuing with mini-series Top 10 Tips to Secure Your Network we are at number nine. Define strong rules for your administrator accounts. These accounts are the keys to the kingdom, full access for your employees to the their jobs easily but also allows…
Office 365 ATP Safe links giving you a hard time? Check out this bypass technique and how to protect
http://ift.tt/2CA4OHQ
Submitted January 03, 2018 at 07:45PM by oddvarmoe
via reddit http://ift.tt/2E1Tb9o
http://ift.tt/2CA4OHQ
Submitted January 03, 2018 at 07:45PM by oddvarmoe
via reddit http://ift.tt/2E1Tb9o
Oddvar Moe's Blog
Office 365 Safe links bypass
Time for a break from the AppLocker case study to blog about this issue, since I found it very interesting. This issue was actually discovered by me and a customer of mine by coincidence. The issue…
9% of Popular Websites Use Anti-Adblock Scripts
http://ift.tt/2A61rmK
Submitted January 03, 2018 at 09:30PM by DJRWolf
via reddit http://ift.tt/2lRPFHB
http://ift.tt/2A61rmK
Submitted January 03, 2018 at 09:30PM by DJRWolf
via reddit http://ift.tt/2lRPFHB
BleepingComputer
9% of Popular Websites Use Anti-Adblock Scripts
Around 9% of today's most popular websites deployed or are deploying anti-adblock noscripts in an effort to maintain advertising revenues and fight off the rise in the adoption of ad-blocking extensions.
2018: Mobile App Security Outlook
http://ift.tt/2EQh7hs
Submitted January 03, 2018 at 10:09PM by Mi3Security
via reddit http://ift.tt/2CC98Hu
http://ift.tt/2EQh7hs
Submitted January 03, 2018 at 10:09PM by Mi3Security
via reddit http://ift.tt/2CC98Hu
Mi3 Security
2018: Mobile App Security Outlook
2017 was an interesting year for mobile app security, including extensive activity around ransomware, cryptocurrencies and mining apps, rootkits and bootkits, and trojans. Beyond mobile we saw numerous breaches including the likes of Gmail, Docusign, Verizon…
www.itwissen.info infects your computer with a JavaScript cryptocurrency miner
I tested it with Google Chrome, Firefox and Internet Explorer. Everytime I opened the website, my Symantec Endpoint Protection encountered a JavaScript cryptocurrency miner in my cache (Image).http://ift.tt/2CkANbq Do not hesitate to test it yourself in a secure environment.This is illegal and definitely not in the interest of the customer/visitor.Your opinions?
Submitted January 03, 2018 at 09:55PM by BlackyGhosty
via reddit http://ift.tt/2AhVRO7
I tested it with Google Chrome, Firefox and Internet Explorer. Everytime I opened the website, my Symantec Endpoint Protection encountered a JavaScript cryptocurrency miner in my cache (Image).http://ift.tt/2CkANbq Do not hesitate to test it yourself in a secure environment.This is illegal and definitely not in the interest of the customer/visitor.Your opinions?
Submitted January 03, 2018 at 09:55PM by BlackyGhosty
via reddit http://ift.tt/2AhVRO7
Imgur
ITwissen.info is infecting!
Imgur: The magic of the Internet