Frida 10.5 is out with user-defined machine code transformations on a per-thread basis
http://ift.tt/2xiwJX4
Submitted August 25, 2017 at 05:22PM by oleavr
via reddit http://ift.tt/2wuwaw1
http://ift.tt/2xiwJX4
Submitted August 25, 2017 at 05:22PM by oleavr
via reddit http://ift.tt/2wuwaw1
reddit
Frida 10.5 is out with user-defined machine code... • r/netsec
2 points and 0 comments so far on reddit
How Embedi Was Able to Hack Computers With Intel AMT
http://ift.tt/2w3SX0C
Submitted August 25, 2017 at 05:05PM by Embedi
via reddit http://ift.tt/2waA1LV
http://ift.tt/2w3SX0C
Submitted August 25, 2017 at 05:05PM by Embedi
via reddit http://ift.tt/2waA1LV
Embedi
The Adventure of the Final Intel AMT Problem
It's high time to learn how cunning cyber criminals can use Intel AMT powerful capabilities to achieve their malicious goals. See the captivating story of hacking Intel AMT with all its twists and turns and awe-inspiring details with your own eyes. The freshest…
Hackers buy a laptop for $1 by exploiting a POS vulnerability
http://ift.tt/2vcfrxu
Submitted August 25, 2017 at 04:39PM by alexander_polyakov
via reddit http://ift.tt/2iuOPSk
http://ift.tt/2vcfrxu
Submitted August 25, 2017 at 04:39PM by alexander_polyakov
via reddit http://ift.tt/2iuOPSk
Erpscan
How to buy MacBook for $1, or hacking SAP POS | SAP Cyber Security Solutions
SAP POS Xpress Server does not perform any authentication checks for critical functions that require user identity. As a result, administrative and other privileged functions can be accessed without any authentication.
Shining a spotlight on re-identification – Danvers Baillieu – Medium
http://ift.tt/2w3KAlB
Submitted August 25, 2017 at 04:27PM by milly1993
via reddit http://ift.tt/2xiMKfY
http://ift.tt/2w3KAlB
Submitted August 25, 2017 at 04:27PM by milly1993
via reddit http://ift.tt/2xiMKfY
Medium
Shining a spotlight on re-identification
The announcement earlier this month by the UK government of an overhaul of data protection laws sparked headlines heralding the new rights…
Analysis of New Webserver Ronggolawe Ransomware and How to Block It.
http://ift.tt/2v9ZXKA
Submitted August 25, 2017 at 06:01PM by buildops
via reddit http://ift.tt/2wacpXT
http://ift.tt/2v9ZXKA
Submitted August 25, 2017 at 06:01PM by buildops
via reddit http://ift.tt/2wacpXT
Blog | Imperva
Analysis of Ronggolawe Ransomware and How to Block It – Blog | Imperva
Learn about a new ransomware targeted at web servers called Ronggolawe, the code name for AwesomeWare.
New EMPTY CryptoMix Ransomware Variant Released
http://ift.tt/2xizJ5W
Submitted August 25, 2017 at 06:01PM by majorllama
via reddit http://ift.tt/2wuEXhg
http://ift.tt/2xizJ5W
Submitted August 25, 2017 at 06:01PM by majorllama
via reddit http://ift.tt/2wuEXhg
BleepingComputer
New EMPTY CryptoMix Ransomware Variant Released
Today, MalwareHunterTeam discovered a new variant of the CryptoMix ransomware that is appending the .EMPTY extension to encrypted file names. Considering that the previous variant used ERROR as the previous extension and now uses EMPTY, it is clear that the…
Leveraging Duo Security's Default Configuration to Bypass Two-Factor Authentication
http://ift.tt/2wMK4Jr
Submitted August 25, 2017 at 07:25PM by averagesecurityguy
via reddit http://ift.tt/2iwWD6p
http://ift.tt/2wMK4Jr
Submitted August 25, 2017 at 07:25PM by averagesecurityguy
via reddit http://ift.tt/2iwWD6p
Appsecconsulting
Leveraging Duo Security’s Default Configuration to Bypass Two-Factor Authentication | AppSec Consulting
AppSec Consulting provides world-class web application security services, penetration testing, PCI compliance services, and web application security training.
ZDI Researcher Details a Safari Webkit Bug Submitted at Pwn2Own
http://ift.tt/2w47Z6A
Submitted August 25, 2017 at 07:44PM by RedmondSecGnome
via reddit http://ift.tt/2vcRYwk
http://ift.tt/2w47Z6A
Submitted August 25, 2017 at 07:44PM by RedmondSecGnome
via reddit http://ift.tt/2vcRYwk
Zero Day Initiative
Deconstructing a Winning Webkit Pwn2Own Entry
When Simon blogged about the risks of JavaScript a few weeks back, he
mentioned that we've begun to see JIT vulnerabilities in submissions to the
ZDI program and as part of Pwn2Own. Today, I'll expand on his blog post by
covering a vulnerability in…
mentioned that we've begun to see JIT vulnerabilities in submissions to the
ZDI program and as part of Pwn2Own. Today, I'll expand on his blog post by
covering a vulnerability in…
Abusing Token Privileges For Windows Local Privilege Escalation
http://ift.tt/2xjmkdI
Submitted August 25, 2017 at 10:08PM by breen-machine
via reddit http://ift.tt/2w4ymcz
http://ift.tt/2xjmkdI
Submitted August 25, 2017 at 10:08PM by breen-machine
via reddit http://ift.tt/2w4ymcz
Foxglovesecurity
Abusing Token Privileges For Windows Local Privilege Escalation
By @dronesec and @breenmachine This a project my friend drone and I have been poking at for quite some time and are glad to finally be releasing. As the noscript implies, we&#…
Kali Intercepting-Router in Raspberry pi and VM
http://ift.tt/2vpSgvH
Submitted August 26, 2017 at 05:17PM by vaika-varma
via reddit http://ift.tt/2vq3QHf
http://ift.tt/2vpSgvH
Submitted August 26, 2017 at 05:17PM by vaika-varma
via reddit http://ift.tt/2vq3QHf
Password Cracking 201: Beyond the Basics
http://ift.tt/2wyW55w
Submitted August 27, 2017 at 03:43AM by 0xdea
via reddit http://ift.tt/2wIpCKq
http://ift.tt/2wyW55w
Submitted August 27, 2017 at 03:43AM by 0xdea
via reddit http://ift.tt/2wIpCKq
Techsolvency
Tech Solvency: Talk(s)
Public talks by Royce Williams, with references and errata.
Hack In The Box GSEC 2017 - Talks and materials
http://ift.tt/2v7YFzz
Submitted August 27, 2017 at 07:02PM by bigbottlequorn
via reddit http://ift.tt/2wAddI0
http://ift.tt/2v7YFzz
Submitted August 27, 2017 at 07:02PM by bigbottlequorn
via reddit http://ift.tt/2wAddI0
Hacking things by touching them
http://ift.tt/2vtGHDF
Submitted August 27, 2017 at 11:24PM by knoy
via reddit http://ift.tt/2wTHj98
http://ift.tt/2vtGHDF
Submitted August 27, 2017 at 11:24PM by knoy
via reddit http://ift.tt/2wTHj98
Hacking things by touching them: A guide to physical security
http://ift.tt/2vtGHDF
Submitted August 27, 2017 at 11:48PM by knoy
via reddit http://ift.tt/2viC4jW
http://ift.tt/2vtGHDF
Submitted August 27, 2017 at 11:48PM by knoy
via reddit http://ift.tt/2viC4jW
reddit
Hacking things by touching them: A guide to physical... • r/netsec
0 points and 0 comments so far on reddit
Cross-Site Scripting #3 Bad JavaScript Imports Vulnerability
http://ift.tt/2giF0Xh
Submitted August 28, 2017 at 01:02PM by sandeep1337
via reddit http://ift.tt/2xpEuul
http://ift.tt/2giF0Xh
Submitted August 28, 2017 at 01:02PM by sandeep1337
via reddit http://ift.tt/2xpEuul
SecureLayer7
OWASP Top 10 : Cross-Site Scripting #3 Bad JavaScript Imports
Demonstrating the OWASP Top 10 : Cross-Site Scripting #3 Bad JavaScript Imports and with example of the code. To learn about XSS
Just Because a Hacker is Requesting a WordPress Plugin’s File Doesn’t Mean There is a Vulnerability in It
http://ift.tt/2g54SWe
Submitted August 28, 2017 at 03:05PM by campuscodi
via reddit http://ift.tt/2wLv0wA
http://ift.tt/2g54SWe
Submitted August 28, 2017 at 03:05PM by campuscodi
via reddit http://ift.tt/2wLv0wA
A new malware is spreading on Facebook Messenger
http://ift.tt/2whIZae
Submitted August 28, 2017 at 02:42PM by vibedzer
via reddit http://ift.tt/2xFy4XF
http://ift.tt/2whIZae
Submitted August 28, 2017 at 02:42PM by vibedzer
via reddit http://ift.tt/2xFy4XF
Xtreme TechTips
A new malware is spreading on Facebook Messenger - How to protect your computer from malware
A computer security company has reveled the presence of malware on Facebook Messenger application. A virus spreads for several days on Face...
Android Banking Trojan MoqHao Spreading via SMS Phishing in South Korea
http://ift.tt/2wLwOpq
Submitted August 28, 2017 at 05:03PM by majorllama
via reddit http://ift.tt/2wbpOR1
http://ift.tt/2wLwOpq
Submitted August 28, 2017 at 05:03PM by majorllama
via reddit http://ift.tt/2wbpOR1
McAfee Blogs
Android Banking Trojan MoqHao Spreading via SMS Phishing in South Korea | McAfee Blogs
Last month, a number of users started posting on South Korean sites screenshots of suspicious SMS messages phishing texts (also known as smishing) to lure
Armadillo Phone: High-security business smartphones
http://ift.tt/2vJDLFL
Submitted August 28, 2017 at 05:34PM by knoy
via reddit http://ift.tt/2wV7Enk
http://ift.tt/2vJDLFL
Submitted August 28, 2017 at 05:34PM by knoy
via reddit http://ift.tt/2wV7Enk
Why Hackers will target your cell phone to access your company's data
http://ift.tt/2vCJKsN
Submitted August 28, 2017 at 06:19PM by houlila
via reddit http://ift.tt/2vw8yDj
http://ift.tt/2vCJKsN
Submitted August 28, 2017 at 06:19PM by houlila
via reddit http://ift.tt/2vw8yDj
CrossRealms
Why Hackers Will Target Your Cell Phone to Access Your Company's Data
A client sent me a question recently asking whether two factor authentication or password resets using cell phones are safe? My initial reaction was yes.
Disabling Intel ME 11 via undocumented mode
http://ift.tt/2wM8ovK
Submitted August 28, 2017 at 07:39PM by alexlash
via reddit http://ift.tt/2xFYmZI
http://ift.tt/2wM8ovK
Submitted August 28, 2017 at 07:39PM by alexlash
via reddit http://ift.tt/2xFYmZI
Ptsecurity
Disabling Intel ME 11 via undocumented mode
Our team of Positive Technologies researchers has delved deep into the internal architecture of Intel Management Engine (ME) 11, reveali...