Use ltrace with pwnlib.tubes.process instances, useful for heap exploitation.
https://ift.tt/2IyKYfq
Submitted April 07, 2018 at 12:43AM by malweisse
via reddit https://ift.tt/2q9b8hY
https://ift.tt/2IyKYfq
Submitted April 07, 2018 at 12:43AM by malweisse
via reddit https://ift.tt/2q9b8hY
GitHub
andreafioraldi/pwntrace
pwntrace - Use ltrace with pwnlib.tubes.process instances, useful for heap exploitation. Pwntools rocks!
Russia Readies Telegram Ban After App Refused to Hand Over Encryption Keys to FSB
https://ift.tt/2IAdPjd
Submitted April 07, 2018 at 01:23AM by alessiodelv
via reddit https://ift.tt/2Jr1uzt
https://ift.tt/2IAdPjd
Submitted April 07, 2018 at 01:23AM by alessiodelv
via reddit https://ift.tt/2Jr1uzt
BleepingComputer
Russia Readies Telegram Ban After App Refused to Hand Over Encryption Keys to FSB
Roskomnadzor, Russia's telecommunications watchdog, has filed today a lawsuit against instant messaging app Telegram, asking a Moscow court to rule in favor of restricting access to the service inside Russia's borders.
Microsoft Adds Anti-Ransomware Features in Office 365
https://ift.tt/2qbn1mz
Submitted April 07, 2018 at 01:22AM by alessiodelv
via reddit https://ift.tt/2EqGh4P
https://ift.tt/2qbn1mz
Submitted April 07, 2018 at 01:22AM by alessiodelv
via reddit https://ift.tt/2EqGh4P
BleepingComputer
Microsoft Adds Anti-Ransomware Features in Office 365
Three months after news first leaked, Microsoft officially announced today the launch of new anti-ransomware features for Office 365, the company's commercial subnoscription-based office tools suite.
Reaper Group's Updated Mobile Arsenal
https://ift.tt/2IvpaRQ
Submitted April 07, 2018 at 01:49AM by intelot
via reddit https://ift.tt/2JsaBj0
https://ift.tt/2IvpaRQ
Submitted April 07, 2018 at 01:49AM by intelot
via reddit https://ift.tt/2JsaBj0
Palo Alto Networks Blog
Reaper Group’s Updated Mobile Arsenal
Unit 42 examines the Reaper Group’s updated mobile arsenal, including a Bitcoin Ticker Widget and a PyeongChang Winter Games application.
Secret Service Warns of Chip Card Scheme
https://ift.tt/2q77vJd
Submitted April 07, 2018 at 02:57AM by volci
via reddit https://ift.tt/2GJ2JrT
https://ift.tt/2q77vJd
Submitted April 07, 2018 at 02:57AM by volci
via reddit https://ift.tt/2GJ2JrT
reddit
Secret Service Warns of Chip Card Scheme • r/security
1 points and 0 comments so far on reddit
A new Mirai-style botnet is targeting the financial sector
https://ift.tt/2qbbiV4
Submitted April 07, 2018 at 02:41AM by Iot_Security
via reddit https://ift.tt/2GETcC8
https://ift.tt/2qbbiV4
Submitted April 07, 2018 at 02:41AM by Iot_Security
via reddit https://ift.tt/2GETcC8
ZDNet
A new Mirai-style botnet is targeting the financial sector
The researchers say it's the largest attack since the Mirai-powered cyberattack in October 2016 that took down large swathes of the Western internet.
T-Mobile Stores Part of Customers' Passwords In Plaintext, Says It Has 'Amazingly Good' Security | A T-Mobile Austria customer representative made a shocking admission in a Twitter thread
https://ift.tt/2qc6BdM
Submitted April 07, 2018 at 04:07AM by Ebadd
via reddit https://ift.tt/2qbH04Q
https://ift.tt/2qc6BdM
Submitted April 07, 2018 at 04:07AM by Ebadd
via reddit https://ift.tt/2qbH04Q
Motherboard
T-Mobile Stores Part of Customers' Passwords In Plaintext, Says It Has 'Amazingly Good' Security
A T-Mobile Austria customer representative made a shocking admission in a Twitter thread.
T-Mobile Austria stores passwords in plaintext and defends this practice on Twitter.
https://twitter.com/tmobileat/status/981418339653300224
Submitted April 07, 2018 at 03:55AM by xatrixx
via reddit https://ift.tt/2GFm1Tb
https://twitter.com/tmobileat/status/981418339653300224
Submitted April 07, 2018 at 03:55AM by xatrixx
via reddit https://ift.tt/2GFm1Tb
Twitter
T-Mobile Austria
@c_pellegrino @PWTooStrong @Telekom_hilft Hello Claudia! The customer service agents see the first four characters of your password. We store the whole password, because you need it for the login for https://t.co/vJapgJ50qc ^andrea
Where to find Security Services In Hammersmith
https://ift.tt/2Jq5S1v
Submitted April 07, 2018 at 04:35AM by alarmpro42
via reddit https://ift.tt/2Iy6XmG
https://ift.tt/2Jq5S1v
Submitted April 07, 2018 at 04:35AM by alarmpro42
via reddit https://ift.tt/2Iy6XmG
Tout
@lessiewasher1971
Next-Generation Video Platform and Content Exchange, Tout powers mobile video publishing and syndication for over 500 leading media brands globally to an audience of over 150MM unique users per month.
Keys for ESET NOD32, Kaspersky, Avast, Dr.Web, Avira
https://ift.tt/2JsKqZS
Submitted April 07, 2018 at 04:31AM by brastagi
via reddit https://ift.tt/2IzA2ya
https://ift.tt/2JsKqZS
Submitted April 07, 2018 at 04:31AM by brastagi
via reddit https://ift.tt/2IzA2ya
DeBrastagi
DeBrastagi : Keys for ESET NOD32, Kaspersky, Avast, Dr.Web, Avira
Exploiting Bluetooth Low Energy using Gattacker for IoT
https://ift.tt/2ErzsQt
Submitted April 07, 2018 at 04:45AM by adi0x90
via reddit https://ift.tt/2uRYgSf
https://ift.tt/2ErzsQt
Submitted April 07, 2018 at 04:45AM by adi0x90
via reddit https://ift.tt/2uRYgSf
Attify Blog - IoT Security, Pentesting and Exploitation
Exploiting Bluetooth Low Energy using Gattacker for IoT - Step-by-Step Guide
Learn how to exploit Bluetooth Low Energy for IoT Devices using a step-by-step guide. In this post, we are using Gattacker to perform sniffing and replay based attacks.
BRACE YOURSELF - Cisco Vulnerabilities are Coming (Read: Reminder to Check Cisco CVEs for recent announcements, hardcoded passwords, etc)
https://ift.tt/20R8XZ4
Submitted April 07, 2018 at 03:53AM by russellvt
via reddit https://ift.tt/2q8JUHs
https://ift.tt/20R8XZ4
Submitted April 07, 2018 at 03:53AM by russellvt
via reddit https://ift.tt/2q8JUHs
Cisco
Cisco Security Threat and Vulnerability Intelligence
The Cisco Security portal provides actionable intelligence for security threats and vulnerabilities in Cisco products and services and third-party products.
T-Mobile digs their own grave
https://ift.tt/2qe2ldV
Submitted April 07, 2018 at 11:38AM by fr34k83
via reddit https://ift.tt/2GFkxIn
https://ift.tt/2qe2ldV
Submitted April 07, 2018 at 11:38AM by fr34k83
via reddit https://ift.tt/2GFkxIn
CVE-2017-17405: Identifying a Vulnerability in Ruby’s FTP Implementation
https://ift.tt/2GDzYkb
Submitted April 07, 2018 at 04:37PM by cji
via reddit https://ift.tt/2H0dDg7
https://ift.tt/2GDzYkb
Submitted April 07, 2018 at 04:37PM by cji
via reddit https://ift.tt/2H0dDg7
Heroku
A Dive into Ruby CVE-2017-17405: Identifying a Vulnerability in Ruby’s FTP Implementation
At Heroku we consistently monitor vulnerability feeds for new issues. Once something drops, we jump into action to triage and determine how our platform...
130,000 Finnish user data exposed in third largest data breach ever happened in the country
https://ift.tt/2qeEbkf
Submitted April 07, 2018 at 08:12PM by Horus_Sirius
via reddit https://ift.tt/2GGx0rd
https://ift.tt/2qeEbkf
Submitted April 07, 2018 at 08:12PM by Horus_Sirius
via reddit https://ift.tt/2GGx0rd
TSecurity Portal
130,000 Finnish user data exposed in third largest data breach ever happened in the country
New variant of the Mirai Botnet targets the financial industry
https://ift.tt/2GJeVwQ
Submitted April 07, 2018 at 08:17PM by Horus_Sirius
via reddit https://ift.tt/2qhElqq
https://ift.tt/2GJeVwQ
Submitted April 07, 2018 at 08:17PM by Horus_Sirius
via reddit https://ift.tt/2qhElqq
TSecurity Portal
New variant of the Mirai Botnet targets the financial industry
the beep command can be used to probe for existence of files owned by other users including root
https://ift.tt/2IAAADS
Submitted April 07, 2018 at 10:09PM by rain5
via reddit https://ift.tt/2GKsurP
https://ift.tt/2IAAADS
Submitted April 07, 2018 at 10:09PM by rain5
via reddit https://ift.tt/2GKsurP
LineageOS 14.1 Blueborne Remote Code Execution
https://ift.tt/2qcF8bW
Submitted April 07, 2018 at 10:48PM by Horus_Sirius
via reddit https://ift.tt/2GELJam
https://ift.tt/2qcF8bW
Submitted April 07, 2018 at 10:48PM by Horus_Sirius
via reddit https://ift.tt/2GELJam
TSecurity Portal
LineageOS 14.1 Blueborne Remote Code Execution
Phishing emails: how to fight back?
Hello, Typically when I receive phishing emails I try and do a few things for the greater good. What else does everyone else do when they receive phishing emails?I block the email domain. They usually spoof the domain and almost never re use but it's a good best practice. If they actually legitimately used someone's email, sometimes based on the SPF/DKIM records, I'll try and email the company to let them know they've been compromised.I click the link in a sandboxed environment to inspect the attack. If it's a password phishing type email, I'll fill it up with a bunch of junk data. This is for fun and usually futile, I just like to see what they are attempting. Like, have they updated their scam to include the new Office365 page finally? I'll also block that URL on the firewall.I'll look up the domain registration and IP address of the server and then reach out to both hosting companies with the information. That usually is pretty effective in having the site shut down. Sometimes when I click the link, the page is already offline meaning either someone else reported it or the hosting company figured it out.I send out some reminders to staff with some examples periodically.note: I am not interested in prevention strategies such as Email filters, Multifactor, Simulated campaigns, etc.
Submitted April 08, 2018 at 02:38AM by mactalker
via reddit https://ift.tt/2ErgMAo
Hello, Typically when I receive phishing emails I try and do a few things for the greater good. What else does everyone else do when they receive phishing emails?I block the email domain. They usually spoof the domain and almost never re use but it's a good best practice. If they actually legitimately used someone's email, sometimes based on the SPF/DKIM records, I'll try and email the company to let them know they've been compromised.I click the link in a sandboxed environment to inspect the attack. If it's a password phishing type email, I'll fill it up with a bunch of junk data. This is for fun and usually futile, I just like to see what they are attempting. Like, have they updated their scam to include the new Office365 page finally? I'll also block that URL on the firewall.I'll look up the domain registration and IP address of the server and then reach out to both hosting companies with the information. That usually is pretty effective in having the site shut down. Sometimes when I click the link, the page is already offline meaning either someone else reported it or the hosting company figured it out.I send out some reminders to staff with some examples periodically.note: I am not interested in prevention strategies such as Email filters, Multifactor, Simulated campaigns, etc.
Submitted April 08, 2018 at 02:38AM by mactalker
via reddit https://ift.tt/2ErgMAo
Reddit
reddit: the front page of the internet
r/security: A friendly and professional place for discussing computer security.
My computer was used in sleep mode
(I hoping this is the correct subreddit for this, if not I do apologize, and I'd like to know where I should ask this instead.)I left my laptop (a Surface Pro 4, if that helps) in sleep mode all last night and this morning, leaving only Microsoft Edge and Krita (drawing program) open. I only had Reddit and a YouTube video open on Edge, and a quick sketch open on Krita. When I pulled up my laptop just now, I had three YouTube videos and a page to download an ebook open on Edge and my drawing had been tampered with. The YouTube videos and ebook were from an MLM scheme, and the canvas was zoomed into another part of the image and the line tool and selection tools had been used (and I never use the line tool myself).I checked the browser history and the tabs were opened last night between 11:30pm and midnight, when my husband and I were watching a movie and the laptop was in sleep mode in the other room (and we are the only people that live in our residence). Has anyone heard of this happening? As far as I can tell, none of my accounts were tampered with and nothing was downloaded, but is there any way I can be sure? I have the laptop off for the time being.Thank you in advance for your help!
Submitted April 08, 2018 at 04:36AM by racecarart
via reddit https://ift.tt/2qgvnJJ
(I hoping this is the correct subreddit for this, if not I do apologize, and I'd like to know where I should ask this instead.)I left my laptop (a Surface Pro 4, if that helps) in sleep mode all last night and this morning, leaving only Microsoft Edge and Krita (drawing program) open. I only had Reddit and a YouTube video open on Edge, and a quick sketch open on Krita. When I pulled up my laptop just now, I had three YouTube videos and a page to download an ebook open on Edge and my drawing had been tampered with. The YouTube videos and ebook were from an MLM scheme, and the canvas was zoomed into another part of the image and the line tool and selection tools had been used (and I never use the line tool myself).I checked the browser history and the tabs were opened last night between 11:30pm and midnight, when my husband and I were watching a movie and the laptop was in sleep mode in the other room (and we are the only people that live in our residence). Has anyone heard of this happening? As far as I can tell, none of my accounts were tampered with and nothing was downloaded, but is there any way I can be sure? I have the laptop off for the time being.Thank you in advance for your help!
Submitted April 08, 2018 at 04:36AM by racecarart
via reddit https://ift.tt/2qgvnJJ
reddit
My computer was used in sleep mode • r/security
(I hoping this is the correct subreddit for this, if not I do apologize, and I'd like to know where I should ask this instead.) I left my laptop...
Did I just fuck up?
trying to pirate a windows iso, got lead to,http://windowsiso.net/windows-7-iso/windows-7-download/ultimate-iso-7/which let me select which service pack THEN re-directed me tohttps://login.microsoftonline.com/common/oauth2/authorize?client_id=499b84ac-1321-427f-aa17-267ca6975798&site_id=501446&response_mode=form_post&response_type=code+id_token&redirect_uri=https%3A%2F%2Fapp.vssps.visualstudio.com%2F_signedin&nonce=85a3a5f0-bfc6-4c42-b89d-723ece8b422d&state=realm%3Dapp.vssps.visualstudio.com%26allow_passthrough%3DTrue%26reply_to%3Dhttps%253A%252F%252Fmy.visualstudio.com%253A443%252F%253Fwt.mc_id%253Do%25257emsft%25257emsdn%25257eoldPortal%2526utm_source%253DMSDNPortal%2526auth_redirect%253Dtrue%26nonce%3D85a3a5f0-bfc6-4c42-b89d-723ece8b422d&resource=https%3A%2F%2Fmanagement.core.windows.net%2F&cid=85a3a5f0-bfc6-4c42-b89d-723ece8b422d&wsucxt=1&prompt=select_account#FileId=46948AND I TRIED SIGNING IN....WHAT DO I DO FROM HERE?, THINKING I JUST GOT PHISHED.
Submitted April 08, 2018 at 07:27AM by Hence4thtranscends
via reddit https://ift.tt/2JuOOHs
trying to pirate a windows iso, got lead to,http://windowsiso.net/windows-7-iso/windows-7-download/ultimate-iso-7/which let me select which service pack THEN re-directed me tohttps://login.microsoftonline.com/common/oauth2/authorize?client_id=499b84ac-1321-427f-aa17-267ca6975798&site_id=501446&response_mode=form_post&response_type=code+id_token&redirect_uri=https%3A%2F%2Fapp.vssps.visualstudio.com%2F_signedin&nonce=85a3a5f0-bfc6-4c42-b89d-723ece8b422d&state=realm%3Dapp.vssps.visualstudio.com%26allow_passthrough%3DTrue%26reply_to%3Dhttps%253A%252F%252Fmy.visualstudio.com%253A443%252F%253Fwt.mc_id%253Do%25257emsft%25257emsdn%25257eoldPortal%2526utm_source%253DMSDNPortal%2526auth_redirect%253Dtrue%26nonce%3D85a3a5f0-bfc6-4c42-b89d-723ece8b422d&resource=https%3A%2F%2Fmanagement.core.windows.net%2F&cid=85a3a5f0-bfc6-4c42-b89d-723ece8b422d&wsucxt=1&prompt=select_account#FileId=46948AND I TRIED SIGNING IN....WHAT DO I DO FROM HERE?, THINKING I JUST GOT PHISHED.
Submitted April 08, 2018 at 07:27AM by Hence4thtranscends
via reddit https://ift.tt/2JuOOHs