New Hampshire CitySec Meetup on June 6th
https://ift.tt/2kzb5ZI
Submitted May 31, 2018 at 02:45AM by Kv603
via reddit https://ift.tt/2H4nHAA
https://ift.tt/2kzb5ZI
Submitted May 31, 2018 at 02:45AM by Kv603
via reddit https://ift.tt/2H4nHAA
Eventbrite
June PineSec: A Meetup for InfoSec, Data Security, Hackers, Programmers
PineSec is a"CitySec" Information Security Meetup in Manchester, New Hampshire
Our topic for June is the Internet of Insecure Things. Bring your favorite IoT gadget to be torn apart (literally or figuratively) for our amusement.
PineSec is an informal monthly…
Our topic for June is the Internet of Insecure Things. Bring your favorite IoT gadget to be torn apart (literally or figuratively) for our amusement.
PineSec is an informal monthly…
Understanding Java deserialization
https://ift.tt/2J2nuzR
Submitted May 31, 2018 at 03:50AM by nytrorst
via reddit https://ift.tt/2IVZfr7
https://ift.tt/2J2nuzR
Submitted May 31, 2018 at 03:50AM by nytrorst
via reddit https://ift.tt/2IVZfr7
Nytro Security
Understanding Java deserialization
Some time ago I detailed PHP Object Injection vulnerabilities and this post will get into details of Java deserialization vulnerabilities. The concept is simple: developers use a feature of the pro…
Side-channel attacking browsers through CSS3 features
https://ift.tt/2J3CI7V
Submitted May 31, 2018 at 11:19AM by mandatoryprogrammer
via reddit https://ift.tt/2stzumO
https://ift.tt/2J3CI7V
Submitted May 31, 2018 at 11:19AM by mandatoryprogrammer
via reddit https://ift.tt/2stzumO
ForgotDoor: Routers in Singapore accidentally give complete access to potential IoT attackers
https://ift.tt/2kBSs7f
Submitted May 31, 2018 at 12:59PM by polar
via reddit https://ift.tt/2IZyja7
https://ift.tt/2kBSs7f
Submitted May 31, 2018 at 12:59PM by polar
via reddit https://ift.tt/2IZyja7
NewSky Security
ForgotDoor: Routers in Singapore accidentally give complete access to potential IoT attackers
IoT attacks can be classified into three levels: Level 0 (attacking device with no authentication), Level 1 (guessing a weak/default…
US Cert Alert : HIDDEN COBRA – Joanap Backdoor Trojan and Brambul Server Message Block Worm
https://ift.tt/2GZyD2I
Submitted May 31, 2018 at 01:32PM by RookieJoey
via reddit https://ift.tt/2H8SufJ
https://ift.tt/2GZyD2I
Submitted May 31, 2018 at 01:32PM by RookieJoey
via reddit https://ift.tt/2H8SufJ
www.us-cert.gov
HIDDEN COBRA – Joanap Backdoor Trojan and Brambul Server Message Block Worm | US-CERT
According to reporting of trusted third parties, HIDDEN COBRA actors have likely been using both Joanap and Brambul malware since at least 2009 to target multiple victims globally and in the United States—including the media, aerospace, financial, and critical…
Analysis of a Steam client RCE vulnerability
https://ift.tt/2H88tuB
Submitted May 31, 2018 at 02:10PM by teesee23
via reddit https://ift.tt/2kBgPC8
https://ift.tt/2H88tuB
Submitted May 31, 2018 at 02:10PM by teesee23
via reddit https://ift.tt/2kBgPC8
Context Information Security
Frag Grenade! A Remote Code Execution Vulnerability in the Steam Client | Context Information Security
This blog post explains the story behind a bug which had existed in the Steam client for at least the last ten years, and until last July would have resulted in remote code execution (RCE) in all 15 million active clients.
Rewriting History: A Brief Introduction to Long Range Attacks
https://ift.tt/2sm0wNI
Submitted May 31, 2018 at 05:25PM by alexlash
via reddit https://ift.tt/2noscript4xW
https://ift.tt/2sm0wNI
Submitted May 31, 2018 at 05:25PM by alexlash
via reddit https://ift.tt/2noscript4xW
ICO Security
Rewriting History: A Brief Introduction to Long Range Attacks
Proof of Stake protocols are in the spotlight as more and more high-profile blockchains attempt to switch over from Proof of Work…
Firebird fbudf Module Authenticated Remote Code Execution : CVE-2017-11509
https://ift.tt/2xrUVdG
Submitted May 31, 2018 at 04:47PM by mariuz
via reddit https://ift.tt/2slpjS6
https://ift.tt/2xrUVdG
Submitted May 31, 2018 at 04:47PM by mariuz
via reddit https://ift.tt/2slpjS6
APT28 Rollercoaster: The Lowdown on Hijacked LoJack
https://ift.tt/2H7Ldgd
Submitted June 01, 2018 at 01:43AM by teksquisite
via reddit https://ift.tt/2syL6oW
https://ift.tt/2H7Ldgd
Submitted June 01, 2018 at 01:43AM by teksquisite
via reddit https://ift.tt/2syL6oW
Lastline
APT28 Rollercoaster: The Lowdown on Hijacked LoJack
Recently, the ASERT team at Arbor Networks, published a report on an old version of the Absolute Software product, Absolute LoJack for laptops, being illicitly modified by suspected APT28 actors. The LoJack implant, previously known
Phishing Protection at the DNS level - Comparing DNS Security Filters
https://ift.tt/2H898fE
Submitted June 01, 2018 at 02:13AM by nykzhang
via reddit https://ift.tt/2svc7JE
https://ift.tt/2H898fE
Submitted June 01, 2018 at 02:13AM by nykzhang
via reddit https://ift.tt/2svc7JE
Medium
Phishing Protection — Comparing DNS Security Filters
I was reading an article from Brian Krebs about the Real Jokers Stash and the crazy stuff that goes into the darkweb / cybercrime forums…
Hacker Defaces Ticketfly’s Website, Steals Customer Database
https://ift.tt/2H83t9a
Submitted June 01, 2018 at 02:21AM by Nekronicle
via reddit https://ift.tt/2IZ4oid
https://ift.tt/2H83t9a
Submitted June 01, 2018 at 02:21AM by Nekronicle
via reddit https://ift.tt/2IZ4oid
Motherboard
Hacker Defaces Ticketfly’s Website, Steals Customer Database
A hacker took control of Ticketfly's website and claims to have stolen the company's customer database.
Interactive Shell via BlueTooth
https://ift.tt/2H7fig1
Submitted June 01, 2018 at 01:18PM by gid0rah
via reddit https://ift.tt/2LOfq7y
https://ift.tt/2H7fig1
Submitted June 01, 2018 at 01:18PM by gid0rah
via reddit https://ift.tt/2LOfq7y
Tarlogic Security - Cyber Security and Ethical hacking
Interactive Shell via BlueTooth
Occasionally, one or several phases requiring physical access to a machine are included during Red Team exercises. This requires redesigning how to confront this type of particular scenarios. In this post, it is explained the physical intrusion process followed…
Only an Electron Away from Code Execution
https://ift.tt/2H8SFb9
Submitted June 01, 2018 at 02:44PM by albinowax
via reddit https://ift.tt/2Jjbspf
https://ift.tt/2H8SFb9
Submitted June 01, 2018 at 02:44PM by albinowax
via reddit https://ift.tt/2Jjbspf
BSides Lisbon 2018 Call For Presentations and Workshops
https://ift.tt/2LMlkGm
Submitted June 01, 2018 at 02:37PM by clviper
via reddit https://ift.tt/2Lc2ZRP
https://ift.tt/2LMlkGm
Submitted June 01, 2018 at 02:37PM by clviper
via reddit https://ift.tt/2Lc2ZRP
cfp.bsideslisbon.org
BSidesLisbon2018
Schedule, talks and talk submissions for BSidesLisbon2018
Hunting Certificate Transparency Log with Google BigQuery
https://ift.tt/2JnLeSv
Submitted June 01, 2018 at 05:16PM by jekapats
via reddit https://ift.tt/2JogqB1
https://ift.tt/2JnLeSv
Submitted June 01, 2018 at 05:16PM by jekapats
via reddit https://ift.tt/2JogqB1
GitHub
phishai/hunting-ct-bigquery
hunting-ct-bigquery - Hunting Certificate Transparency log with BigQuery
Only an Electron Away from Code Execution
https://ift.tt/2kHhFgU
Submitted June 01, 2018 at 06:18PM by albinowax
via reddit https://ift.tt/2JaxBTu
https://ift.tt/2kHhFgU
Submitted June 01, 2018 at 06:18PM by albinowax
via reddit https://ift.tt/2JaxBTu
Proactive Hunting with Certificate Transparency Log and Google BigQuery | PhishAI
https://ift.tt/2LdIRie
Submitted June 01, 2018 at 05:58PM by jekapats
via reddit https://ift.tt/2kGjQkL
https://ift.tt/2LdIRie
Submitted June 01, 2018 at 05:58PM by jekapats
via reddit https://ift.tt/2kGjQkL
PhishAI
Proactive Hunting with Certificate Transparency Log and Google BigQuery | PhishAI
In this blog, we will quickly go through what is the Certificate Transparency log and how we used BigQuery to search for bad domains trying to spoof a business’s domain (and how you can do it as well). Certificate Transparency … Read More
Quest DR Series Disk Backup Multiple Vulnerabilities (including unauthenticated RCE)
https://ift.tt/2H8rm0w
Submitted June 01, 2018 at 05:58PM by maximilianov
via reddit https://ift.tt/2sjXbPp
https://ift.tt/2H8rm0w
Submitted June 01, 2018 at 05:58PM by maximilianov
via reddit https://ift.tt/2sjXbPp
Core Security
Quest DR Series Disk Backup Multiple Vulnerabilities
1. Advisory InformationTitle: Quest DR Series Disk Backup Multiple VulnerabilitiesAdvisory ID: CORE-2018-0002Advisory URL: http://www.coresecurity.com/advisories/quest-dr-series-disk-backup-multiple-vulnerabilitiesDate published: 2018-05-31Date of last update:…
Quest KACE System Management Appliance Multiple Vulnerabilities (including unauthenticated RCE)
https://ift.tt/2Jk2GaC
Submitted June 01, 2018 at 05:57PM by maximilianov
via reddit https://ift.tt/2sxi2y5
https://ift.tt/2Jk2GaC
Submitted June 01, 2018 at 05:57PM by maximilianov
via reddit https://ift.tt/2sxi2y5
Core Security
Quest KACE System Management Appliance Multiple Vulnerabilities
1. Advisory InformationTitle: Quest KACE System Management Appliance Multiple VulnerabilitiesAdvisory ID: CORE-2018-0004Advisory URL: http://www.coresecurity.com/advisories/quest-kace-system-management-appliance-multiple-vulnerabilitiesDate published: 2018…
Quest DR Series Disk Backup Multiple Vulnerabilities
https://ift.tt/2H8rm0w
Submitted June 01, 2018 at 08:51PM by maximilianov
via reddit https://ift.tt/2HbXhx1
https://ift.tt/2H8rm0w
Submitted June 01, 2018 at 08:51PM by maximilianov
via reddit https://ift.tt/2HbXhx1
Core Security
Quest DR Series Disk Backup Multiple Vulnerabilities
1. Advisory InformationTitle: Quest DR Series Disk Backup Multiple VulnerabilitiesAdvisory ID: CORE-2018-0002Advisory URL: http://www.coresecurity.com/advisories/quest-dr-series-disk-backup-multiple-vulnerabilitiesDate published: 2018-05-31Date of last update:…
PowerShell: In-Memory Injection Using CertUtil.exe
https://ift.tt/2Ha7EBF
Submitted June 01, 2018 at 09:42PM by coalfirelabs
via reddit https://ift.tt/2JbPVv6
https://ift.tt/2Ha7EBF
Submitted June 01, 2018 at 09:42PM by coalfirelabs
via reddit https://ift.tt/2JbPVv6
Coalfire.com
Post
Coalfire Labs blog posts with opinions, findings and research from the technical testing of IT perspective.