SSTIC research paper on smart TVs
https://ift.tt/2HZq20g
Submitted June 18, 2018 at 01:32PM by hemorro
via reddit https://ift.tt/2HY4lxD
https://ift.tt/2HZq20g
Submitted June 18, 2018 at 01:32PM by hemorro
via reddit https://ift.tt/2HY4lxD
Tessian Raises $13M to Build a Machine Learning Approach For Enterprise Email Security
https://ift.tt/2tgEAmR
Submitted June 18, 2018 at 03:17PM by cpt_snowcrash
via reddit https://ift.tt/2lhKLUn
https://ift.tt/2tgEAmR
Submitted June 18, 2018 at 03:17PM by cpt_snowcrash
via reddit https://ift.tt/2lhKLUn
All about Robots - All you need to know about robots.txt (For noobs)
https://ift.tt/2t5XD4a
Submitted June 18, 2018 at 03:08PM by silentsniffer
via reddit https://ift.tt/2MCZ3vc
https://ift.tt/2t5XD4a
Submitted June 18, 2018 at 03:08PM by silentsniffer
via reddit https://ift.tt/2MCZ3vc
WST
All about Robots - All you need to know about robots.txt | WST
What are crawlers a.k.a spiders? Content of robots.txt. Allow and Disallow commands. How secure is robots.txt. Robot exclusion standard or simply robot.txt
F-Secure to buy MWR InfoSecurity for ~$106M+ to offer better threat hunting
https://ift.tt/2t4Qm4y
Submitted June 18, 2018 at 04:30PM by beautify
via reddit https://ift.tt/2M2J4p9
https://ift.tt/2t4Qm4y
Submitted June 18, 2018 at 04:30PM by beautify
via reddit https://ift.tt/2M2J4p9
TechCrunch
F-Secure to buy MWR InfoSecurity for ~$106M+ to offer better threat hunting
The ongoing shift of emphasis in the cyber security industry from defensive, reactive actions towards pro-active detection and response has fueled veteran Finnish security company F-Secure’s …
Advanced CORS Exploitation Techniques
https://ift.tt/2JQMNFy
Submitted June 17, 2018 at 02:12AM by sxcurity
via reddit https://ift.tt/2JUx20k
https://ift.tt/2JQMNFy
Submitted June 17, 2018 at 02:12AM by sxcurity
via reddit https://ift.tt/2JUx20k
www.sxcurity.pro
Advanced CORS Exploitation Techniques
Preface
I’ve seen some fantastic research done by Linus Särud and by Bo0oM on how Safari’s handling of special characters could be abused.
I’ve seen some fantastic research done by Linus Särud and by Bo0oM on how Safari’s handling of special characters could be abused.
Dissecting a Bug in the EternalRomance Client
https://ift.tt/2t5Gacb
Submitted June 18, 2018 at 06:03PM by Scene_News
via reddit https://ift.tt/2Mzt3rO
https://ift.tt/2t5Gacb
Submitted June 18, 2018 at 06:03PM by Scene_News
via reddit https://ift.tt/2Mzt3rO
Blogspot
Dissecting a Bug in the EternalRomance Client (FuzzBunch)
Note: This post does not explain the EternalRomance exploit chain, just a quirky bug in the Equation Group's client. For comprehensive expl...
Exploring PowerShell AMSI and Logging Evasion
https://ift.tt/2tj7dzM
Submitted June 18, 2018 at 07:00PM by dmchell
via reddit https://ift.tt/2MBqCFe
https://ift.tt/2tj7dzM
Submitted June 18, 2018 at 07:00PM by dmchell
via reddit https://ift.tt/2MBqCFe
VDOO Discovers Significant Vulnerabilities in Axis Cameras
https://ift.tt/2tjfwf1
Submitted June 18, 2018 at 06:55PM by KenjiKawai
via reddit https://ift.tt/2t9f4kc
https://ift.tt/2tjfwf1
Submitted June 18, 2018 at 06:55PM by KenjiKawai
via reddit https://ift.tt/2t9f4kc
VDOO
VDOO Discovers Significant Vulnerabilities in Axis Cameras
For the past several months, VDOO’s security research teams have been undertaking broad-scale security research of leading IoT products, from the fields of safety and security. In most cases, the r…
SSTIC2018: Backdooring your server through its BMC: the HPE iLO4 case [PDF]
https://ift.tt/2ynPPzO
Submitted June 18, 2018 at 09:00PM by alain_proviste
via reddit https://ift.tt/2tmu4e6
https://ift.tt/2ynPPzO
Submitted June 18, 2018 at 09:00PM by alain_proviste
via reddit https://ift.tt/2tmu4e6
Using radare2 and its new GUI to reverse engineer APT33's Dropshot malware - Part 2
https://ift.tt/2JWQ6Le
Submitted June 18, 2018 at 09:54PM by Megabeets
via reddit https://ift.tt/2yo1E9a
https://ift.tt/2JWQ6Le
Submitted June 18, 2018 at 09:54PM by Megabeets
via reddit https://ift.tt/2yo1E9a
Megabeets
Decrypting APT33's Dropshot Malware with Radare2 and Cutter – Part 2
In this part, we'll continue the analysis of APT33's Dropshot using Cutter, a GUI for radare2. We'll learn how to decrypt Dropshot's payload and write a noscript to do it quickly.
Your encrypted photos revealed in macOS cache
https://ift.tt/2td0k47
Submitted June 18, 2018 at 10:12PM by EvanConover
via reddit https://ift.tt/2I1uNX3
https://ift.tt/2td0k47
Submitted June 18, 2018 at 10:12PM by EvanConover
via reddit https://ift.tt/2I1uNX3
Finding phishing sites with certificate transparency
https://ift.tt/2HZicE4
Submitted June 19, 2018 at 12:47AM by rspeed
via reddit https://ift.tt/2MCuSUX
https://ift.tt/2HZicE4
Submitted June 19, 2018 at 12:47AM by rspeed
via reddit https://ift.tt/2MCuSUX
Scott Helme
Finding phishing sites with CT
I've spoken a couple of time recently about CT and it really is an awesome thing to have. We can now add one more wicked feature to our arsenal thanks to CT and Facebook, and that's the ability to easily detect phishing sites. Certificate Transparency I've…
MysteryBot.Spotted
https://ift.tt/2ym4OKt
Submitted June 19, 2018 at 02:50AM by ericnyamu
via reddit https://ift.tt/2JQMvCo
https://ift.tt/2ym4OKt
Submitted June 19, 2018 at 02:50AM by ericnyamu
via reddit https://ift.tt/2JQMvCo
OSINT Information gathering - enumerate all valid fqdn's by using domain names
https://ift.tt/2MDNmo6
Submitted June 19, 2018 at 02:49PM by CoolUsernamesAreGone
via reddit https://ift.tt/2MDQPD6
https://ift.tt/2MDNmo6
Submitted June 19, 2018 at 02:49PM by CoolUsernamesAreGone
via reddit https://ift.tt/2MDQPD6
GitHub
ozzi-/tld_scanner
tld_scanner - Scan all possible TLD's for a given domain name
Top Five Actions NOT to Take When Your Pentest Results are High Risk
https://ift.tt/2K3XGak
Submitted June 19, 2018 at 08:12PM by usgmlp
via reddit https://ift.tt/2JVZ8bv
https://ift.tt/2K3XGak
Submitted June 19, 2018 at 08:12PM by usgmlp
via reddit https://ift.tt/2JVZ8bv
Security Exploits & News
Top Five Actions NOT to Take When Your Pentest Results are High Risk - Security Exploits & News
Sometimes managers must deal with penetration test results that are not what they wanted to see. Raxis CTO, Brian Tant, talks about next steps.
AWS Privilige Escalation - Methods and Mitigation
https://ift.tt/2I26ZCD
Submitted June 19, 2018 at 08:05PM by hackers_and_builders
via reddit https://ift.tt/2I2EswG
https://ift.tt/2I26ZCD
Submitted June 19, 2018 at 08:05PM by hackers_and_builders
via reddit https://ift.tt/2I2EswG
Rhino Security Labs
AWS Privilege Escalation – Methods and Mitigation
At Rhino Security Labs, we do a lot of penetration testing for AWS architecture, and related AWS security research. This will cover findings in Privilege Escalation methods
Hack Of US Navy Contractor Nets China 614 Gigabytes Of Classified Information
https://ift.tt/2HJ0ft3
Submitted June 19, 2018 at 08:33PM by HouseJustice
via reddit https://ift.tt/2M4yFJp
https://ift.tt/2HJ0ft3
Submitted June 19, 2018 at 08:33PM by HouseJustice
via reddit https://ift.tt/2M4yFJp
Spyhood
Hack of US Navy contractor nets China 614 Gigabytes of classified information
Hacker news | China supposedly exfiltrated classified data pertaining to the US Navy projects after a successful cyber-attack on an unnamed Navy contractor caused the loss of 614 gigabytes of cryptographic information, sensor data
Deserialization Vulnerabilities: Attacking Deserialization in JS
https://ift.tt/2ynImRk
Submitted June 19, 2018 at 09:28PM by agrrrdog
via reddit https://ift.tt/2I2TzX8
https://ift.tt/2ynImRk
Submitted June 19, 2018 at 09:28PM by agrrrdog
via reddit https://ift.tt/2I2TzX8
Acunetix
Deserialization Vulnerabilities: Attacking Deserialization in JS - Acunetix
This research on "Deserialization vulnerabilities in various languages" uses examples of vulnerable implementations of the deserialization processes. In this post, we show the results of the research and the new approach of attacking deserialization in JS.
Timeless Debugging of Complex Software: Root Cause Analysis of a Non-Deterministic JavaScriptCore Vulnerability
https://ift.tt/2K3ai1y
Submitted June 19, 2018 at 09:25PM by gaasedelen
via reddit https://ift.tt/2JQM5vZ
https://ift.tt/2K3ai1y
Submitted June 19, 2018 at 09:25PM by gaasedelen
via reddit https://ift.tt/2JQM5vZ
Ret2 Systems Blog
Timeless Debugging of Complex Software
In software security, root cause analysis (RCA) is the process used to “remove the mystery” from irregular software execution and measure the security impact...
WebAssembly: potentials and pitfalls (security issues)
https://ift.tt/2yoaZxA
Submitted June 19, 2018 at 06:59PM by CyberBullets
via reddit https://ift.tt/2li4oLR
https://ift.tt/2yoaZxA
Submitted June 19, 2018 at 06:59PM by CyberBullets
via reddit https://ift.tt/2li4oLR
Forcepoint
WebAssembly: potentials and pitfalls
We at Forcepoint have recently touched on the topic of WebAssembly (also known as WA or Wasm). Part of this effort was discussed briefly in an earlier blog post on in-browser coin mining. Today we are going to talk more about the basics of Wasm, and discuss…
BYOL - A Novel Technique to Execute .NET Assemblies Entirely Within Memory by Using the “execute-assembly” Command
https://ift.tt/2tlOcNe
Submitted June 20, 2018 at 11:25AM by TechLord2
via reddit https://ift.tt/2t9e67C
https://ift.tt/2tlOcNe
Submitted June 20, 2018 at 11:25AM by TechLord2
via reddit https://ift.tt/2t9e67C
FireEye
Bring Your Own Land (BYOL) – A Novel Red Teaming Technique « Bring Your Own Land (BYOL) – A Novel Red Teaming Technique
By developing custom C#-based assemblies, attackers no longer need to rely on the tools present on the target system; they can instead write and deliver their own tools using a technique we call Bring Your Own Land (BYOL).