New EMPTY CryptoMix Ransomware Variant Released
http://ift.tt/2xizJ5W
Submitted August 25, 2017 at 06:01PM by majorllama
via reddit http://ift.tt/2wuEXhg
http://ift.tt/2xizJ5W
Submitted August 25, 2017 at 06:01PM by majorllama
via reddit http://ift.tt/2wuEXhg
BleepingComputer
New EMPTY CryptoMix Ransomware Variant Released
Today, MalwareHunterTeam discovered a new variant of the CryptoMix ransomware that is appending the .EMPTY extension to encrypted file names. Considering that the previous variant used ERROR as the previous extension and now uses EMPTY, it is clear that the…
Leveraging Duo Security's Default Configuration to Bypass Two-Factor Authentication
http://ift.tt/2wMK4Jr
Submitted August 25, 2017 at 07:25PM by averagesecurityguy
via reddit http://ift.tt/2iwWD6p
http://ift.tt/2wMK4Jr
Submitted August 25, 2017 at 07:25PM by averagesecurityguy
via reddit http://ift.tt/2iwWD6p
Appsecconsulting
Leveraging Duo Security’s Default Configuration to Bypass Two-Factor Authentication | AppSec Consulting
AppSec Consulting provides world-class web application security services, penetration testing, PCI compliance services, and web application security training.
ZDI Researcher Details a Safari Webkit Bug Submitted at Pwn2Own
http://ift.tt/2w47Z6A
Submitted August 25, 2017 at 07:44PM by RedmondSecGnome
via reddit http://ift.tt/2vcRYwk
http://ift.tt/2w47Z6A
Submitted August 25, 2017 at 07:44PM by RedmondSecGnome
via reddit http://ift.tt/2vcRYwk
Zero Day Initiative
Deconstructing a Winning Webkit Pwn2Own Entry
When Simon blogged about the risks of JavaScript a few weeks back, he
mentioned that we've begun to see JIT vulnerabilities in submissions to the
ZDI program and as part of Pwn2Own. Today, I'll expand on his blog post by
covering a vulnerability in…
mentioned that we've begun to see JIT vulnerabilities in submissions to the
ZDI program and as part of Pwn2Own. Today, I'll expand on his blog post by
covering a vulnerability in…
Abusing Token Privileges For Windows Local Privilege Escalation
http://ift.tt/2xjmkdI
Submitted August 25, 2017 at 10:08PM by breen-machine
via reddit http://ift.tt/2w4ymcz
http://ift.tt/2xjmkdI
Submitted August 25, 2017 at 10:08PM by breen-machine
via reddit http://ift.tt/2w4ymcz
Foxglovesecurity
Abusing Token Privileges For Windows Local Privilege Escalation
By @dronesec and @breenmachine This a project my friend drone and I have been poking at for quite some time and are glad to finally be releasing. As the noscript implies, we&#…
Kali Intercepting-Router in Raspberry pi and VM
http://ift.tt/2vpSgvH
Submitted August 26, 2017 at 05:17PM by vaika-varma
via reddit http://ift.tt/2vq3QHf
http://ift.tt/2vpSgvH
Submitted August 26, 2017 at 05:17PM by vaika-varma
via reddit http://ift.tt/2vq3QHf
Password Cracking 201: Beyond the Basics
http://ift.tt/2wyW55w
Submitted August 27, 2017 at 03:43AM by 0xdea
via reddit http://ift.tt/2wIpCKq
http://ift.tt/2wyW55w
Submitted August 27, 2017 at 03:43AM by 0xdea
via reddit http://ift.tt/2wIpCKq
Techsolvency
Tech Solvency: Talk(s)
Public talks by Royce Williams, with references and errata.
Hack In The Box GSEC 2017 - Talks and materials
http://ift.tt/2v7YFzz
Submitted August 27, 2017 at 07:02PM by bigbottlequorn
via reddit http://ift.tt/2wAddI0
http://ift.tt/2v7YFzz
Submitted August 27, 2017 at 07:02PM by bigbottlequorn
via reddit http://ift.tt/2wAddI0
Hacking things by touching them
http://ift.tt/2vtGHDF
Submitted August 27, 2017 at 11:24PM by knoy
via reddit http://ift.tt/2wTHj98
http://ift.tt/2vtGHDF
Submitted August 27, 2017 at 11:24PM by knoy
via reddit http://ift.tt/2wTHj98
Hacking things by touching them: A guide to physical security
http://ift.tt/2vtGHDF
Submitted August 27, 2017 at 11:48PM by knoy
via reddit http://ift.tt/2viC4jW
http://ift.tt/2vtGHDF
Submitted August 27, 2017 at 11:48PM by knoy
via reddit http://ift.tt/2viC4jW
reddit
Hacking things by touching them: A guide to physical... • r/netsec
0 points and 0 comments so far on reddit
Cross-Site Scripting #3 Bad JavaScript Imports Vulnerability
http://ift.tt/2giF0Xh
Submitted August 28, 2017 at 01:02PM by sandeep1337
via reddit http://ift.tt/2xpEuul
http://ift.tt/2giF0Xh
Submitted August 28, 2017 at 01:02PM by sandeep1337
via reddit http://ift.tt/2xpEuul
SecureLayer7
OWASP Top 10 : Cross-Site Scripting #3 Bad JavaScript Imports
Demonstrating the OWASP Top 10 : Cross-Site Scripting #3 Bad JavaScript Imports and with example of the code. To learn about XSS
Just Because a Hacker is Requesting a WordPress Plugin’s File Doesn’t Mean There is a Vulnerability in It
http://ift.tt/2g54SWe
Submitted August 28, 2017 at 03:05PM by campuscodi
via reddit http://ift.tt/2wLv0wA
http://ift.tt/2g54SWe
Submitted August 28, 2017 at 03:05PM by campuscodi
via reddit http://ift.tt/2wLv0wA
A new malware is spreading on Facebook Messenger
http://ift.tt/2whIZae
Submitted August 28, 2017 at 02:42PM by vibedzer
via reddit http://ift.tt/2xFy4XF
http://ift.tt/2whIZae
Submitted August 28, 2017 at 02:42PM by vibedzer
via reddit http://ift.tt/2xFy4XF
Xtreme TechTips
A new malware is spreading on Facebook Messenger - How to protect your computer from malware
A computer security company has reveled the presence of malware on Facebook Messenger application. A virus spreads for several days on Face...
Android Banking Trojan MoqHao Spreading via SMS Phishing in South Korea
http://ift.tt/2wLwOpq
Submitted August 28, 2017 at 05:03PM by majorllama
via reddit http://ift.tt/2wbpOR1
http://ift.tt/2wLwOpq
Submitted August 28, 2017 at 05:03PM by majorllama
via reddit http://ift.tt/2wbpOR1
McAfee Blogs
Android Banking Trojan MoqHao Spreading via SMS Phishing in South Korea | McAfee Blogs
Last month, a number of users started posting on South Korean sites screenshots of suspicious SMS messages phishing texts (also known as smishing) to lure
Armadillo Phone: High-security business smartphones
http://ift.tt/2vJDLFL
Submitted August 28, 2017 at 05:34PM by knoy
via reddit http://ift.tt/2wV7Enk
http://ift.tt/2vJDLFL
Submitted August 28, 2017 at 05:34PM by knoy
via reddit http://ift.tt/2wV7Enk
Why Hackers will target your cell phone to access your company's data
http://ift.tt/2vCJKsN
Submitted August 28, 2017 at 06:19PM by houlila
via reddit http://ift.tt/2vw8yDj
http://ift.tt/2vCJKsN
Submitted August 28, 2017 at 06:19PM by houlila
via reddit http://ift.tt/2vw8yDj
CrossRealms
Why Hackers Will Target Your Cell Phone to Access Your Company's Data
A client sent me a question recently asking whether two factor authentication or password resets using cell phones are safe? My initial reaction was yes.
Disabling Intel ME 11 via undocumented mode
http://ift.tt/2wM8ovK
Submitted August 28, 2017 at 07:39PM by alexlash
via reddit http://ift.tt/2xFYmZI
http://ift.tt/2wM8ovK
Submitted August 28, 2017 at 07:39PM by alexlash
via reddit http://ift.tt/2xFYmZI
Ptsecurity
Disabling Intel ME 11 via undocumented mode
Our team of Positive Technologies researchers has delved deep into the internal architecture of Intel Management Engine (ME) 11, reveali...
The WireX Botnet: a collaborative botnet takedown.
http://ift.tt/2wWpJBo
Submitted August 28, 2017 at 07:46PM by xxdesmus
via reddit http://ift.tt/2wMeixg
http://ift.tt/2wWpJBo
Submitted August 28, 2017 at 07:46PM by xxdesmus
via reddit http://ift.tt/2wMeixg
reddit
The WireX Botnet: a collaborative botnet takedown. • r/netsec
2 points and 0 comments so far on reddit
CrackMe solution: KeyMe by BadSector/k23
http://ift.tt/2wD2pJz
Submitted August 28, 2017 at 08:25PM by khasaia
via reddit http://ift.tt/2wMmzAZ
http://ift.tt/2wD2pJz
Submitted August 28, 2017 at 08:25PM by khasaia
via reddit http://ift.tt/2wMmzAZ
Leveraging Encrypted Data with InnoVault - Tozny
http://ift.tt/2gjqLRS
Submitted August 28, 2017 at 08:22PM by ericmann
via reddit http://ift.tt/2xGr3Wr
http://ift.tt/2gjqLRS
Submitted August 28, 2017 at 08:22PM by ericmann
via reddit http://ift.tt/2xGr3Wr
Tozny
Leveraging Encrypted Data with InnoVault - Tozny
Learn how to read and summarize encrypted data with InnoVault in this tutorial covering both the InnoVault SDK and the e3db SDK for Ruby.
Let's stop punishing IoT devices that embrace HTTPS, shall we? - A proposal to end security interstitials for RFC1918 private IP addresses
http://ift.tt/2giViiR
Submitted August 28, 2017 at 09:59PM by mqudsi
via reddit http://ift.tt/2iC8Pm5
http://ift.tt/2giViiR
Submitted August 28, 2017 at 09:59PM by mqudsi
via reddit http://ift.tt/2iC8Pm5
The NeoSmart Files
Let’s stop punishing IoT devices that embrace HTTPS, shall we?
HTTPS is the future and the future is (finally) here. Secure HTTP requests that provide end-to-end encryption between the client making the request and the server providing it with the requested co…
The Right Way to Manage Secrets with AWS
http://ift.tt/2iDmrxp
Submitted August 28, 2017 at 11:41PM by ForgottenWatchtower
via reddit http://ift.tt/2wWVScd
http://ift.tt/2iDmrxp
Submitted August 28, 2017 at 11:41PM by ForgottenWatchtower
via reddit http://ift.tt/2wWVScd
Segment
The Right Way to Manage Secrets with AWS
The way companies manage application secrets is critical. Even today, improper secrets management has resulted in an astonishing number of high profile breaches.