Fake Movie File Infects PC to Steal Cryptocurrency, Poison Google Results
http://bit.ly/2SRmkvQ
Submitted January 16, 2019 at 05:41PM by ga-vu
via reddit http://bit.ly/2McYVmi
http://bit.ly/2SRmkvQ
Submitted January 16, 2019 at 05:41PM by ga-vu
via reddit http://bit.ly/2McYVmi
BleepingComputer
Fake Movie File Infects PC to Steal Cryptocurrency, Poison Google Results
A malicious Windows shortcut file posing as a movie via The Pirate Bay torrent tracker can trigger a chain of mischievous activities on your computer, like injecting content from the attacker into high-profile web sites such as Wikipedia, Google and Yandex Search or…
Hacking Fortnite
http://bit.ly/2FwjHNd
Submitted January 16, 2019 at 05:31PM by albinowax
via reddit http://bit.ly/2HfJ0Vq
http://bit.ly/2FwjHNd
Submitted January 16, 2019 at 05:31PM by albinowax
via reddit http://bit.ly/2HfJ0Vq
Check Point Research
Hacking Fortnite - Check Point Research
Research by: Alon Boxiner, Eran Vaknin and Oded Vanunu, January 16th, 2018 Played in a virtual world, players of ‘Fortnite’, the massively popular game from game developer Epic Games, are tasked with testing their endurance as they battle for tools and weapons…
Hacking Jenkins Part 1 - Play with Dynamic Routing
http://bit.ly/2su9UyL
Submitted January 16, 2019 at 06:46PM by albinowax
via reddit http://bit.ly/2Dd3lGN
http://bit.ly/2su9UyL
Submitted January 16, 2019 at 06:46PM by albinowax
via reddit http://bit.ly/2Dd3lGN
Orange
Hacking Jenkins Part 1 - Play with Dynamic Routing
This is 🍊 speaking
Distribution of malicious JAR appended to MSI files signed by third parties
http://bit.ly/2DbsYb0
Submitted January 16, 2019 at 07:31PM by TheLantean
via reddit http://bit.ly/2FAaNgW
http://bit.ly/2DbsYb0
Submitted January 16, 2019 at 07:31PM by TheLantean
via reddit http://bit.ly/2FAaNgW
Virustotal
Distribution of malicious JAR appended to MSI files signed by third parties
Microsoft Windows keeps the Authenticode signature valid after appending any content to the end of Windows Installer (.MSI) files signed by ...
Virtuailor: An IDAPython plugin to automate and ease the reversing of C++ code.
http://bit.ly/2HomjOG
Submitted January 16, 2019 at 06:23PM by rvngr12
via reddit http://bit.ly/2VWsehj
http://bit.ly/2HomjOG
Submitted January 16, 2019 at 06:23PM by rvngr12
via reddit http://bit.ly/2VWsehj
GitHub
0xgalz/Virtuailor
IDAPython tool for creating automatic C++ virtual tables in IDA Pro - 0xgalz/Virtuailor
What We Found in the SANS Holiday Hack: A 0day in rssh
http://bit.ly/2VU2K4l
Submitted January 16, 2019 at 11:11PM by grigorescu
via reddit http://bit.ly/2MfyXyC
http://bit.ly/2VU2K4l
Submitted January 16, 2019 at 11:11PM by grigorescu
via reddit http://bit.ly/2MfyXyC
esnet-security.github.io
Command Execution Vulnerability in rssh with allowscp
ESnet Security’s github.io Site
Securely Connecting an Arduino MKR WiFi 1010 to AWS IoT Core
http://bit.ly/2swWpyi
Submitted January 16, 2019 at 11:02PM by gvarisco
via reddit http://bit.ly/2Fuxcgk
http://bit.ly/2swWpyi
Submitted January 16, 2019 at 11:02PM by gvarisco
via reddit http://bit.ly/2Fuxcgk
Arduino Project Hub
Securely connecting an Arduino MKR WiFi 1010 to AWS IoT Core
In this tutorial, you'll learn how to connect your Arduino MKR WiFi 1010 (or MKR 1000) board securely to AWS IoT Core.
Security hole leaves passenger information available to anyone
http://bit.ly/2Rv1khR
Submitted January 16, 2019 at 11:00PM by le-quack
via reddit http://bit.ly/2HsQiW7
http://bit.ly/2Rv1khR
Submitted January 16, 2019 at 11:00PM by le-quack
via reddit http://bit.ly/2HsQiW7
Safety Detective
Major Security Breach Discovered Affecting Nearly Half of All Airline Travelers Worldwide | Safety Detective
New Magecart Attack Delivered Through Compromised Advertising Supply Chain
http://bit.ly/2AKoTsz
Submitted January 16, 2019 at 10:49PM by EvanConover
via reddit http://bit.ly/2FwxLGC
http://bit.ly/2AKoTsz
Submitted January 16, 2019 at 10:49PM by EvanConover
via reddit http://bit.ly/2FwxLGC
Trendmicro
New Magecart Attack Delivered Through Compromised Advertising Supply Chain - TrendLabs Security Intelligence Blog
We looked into Magecart's latest online skimming activity: injecting malicious code to the JavaScript library of a third-party advertising network.
Troy Hunt: The 773 Million Record "Collection #1" Data Breach
http://bit.ly/2QR5qfa
Submitted January 17, 2019 at 05:42AM by raincan
via reddit http://bit.ly/2RuSEIu
http://bit.ly/2QR5qfa
Submitted January 17, 2019 at 05:42AM by raincan
via reddit http://bit.ly/2RuSEIu
Troy Hunt
The 773 Million Record "Collection #1" Data Breach
Many people will land on this page after learning that their email address has appeared in a data breach I've called "Collection #1". Most of them won't have a tech background or be familiar with the concept of credential stuffing so I'm going to write this…
hardened-alpine : hardened alpine Docker image
http://bit.ly/2HglvLP
Submitted January 17, 2019 at 04:24PM by nindustries
via reddit http://bit.ly/2HgnjV3
http://bit.ly/2HglvLP
Submitted January 17, 2019 at 04:24PM by nindustries
via reddit http://bit.ly/2HgnjV3
GitHub
HazCod/hardened-alpine
Hardened alpine linux baseimage for Docker. Contribute to HazCod/hardened-alpine development by creating an account on GitHub.
An Introduction to the WebAuthn API
http://bit.ly/2FAClm7
Submitted January 17, 2019 at 04:57PM by kerberosmansour
via reddit http://bit.ly/2RC8zVD
http://bit.ly/2FAClm7
Submitted January 17, 2019 at 04:57PM by kerberosmansour
via reddit http://bit.ly/2RC8zVD
Medium
Introduction to WebAuthn API
…or Level 1 Credential Management API extension for Public Key Credentials, and the untold stories of managing credentials in the browser…
The curious case of the Raspberry Pi in the network closet
http://bit.ly/2MdLWkd
Submitted January 17, 2019 at 07:37PM by albinowax
via reddit http://bit.ly/2RW9S0A
http://bit.ly/2MdLWkd
Submitted January 17, 2019 at 07:37PM by albinowax
via reddit http://bit.ly/2RW9S0A
The curious case of the Raspberry Pi in the network closet
Personal blog of Christian Haschek
Exposed JIRA server leaks NASA staff and project data!
http://bit.ly/2CkF8N9
Submitted January 17, 2019 at 08:31PM by logic_bomb_1
via reddit http://bit.ly/2RUC7gj
http://bit.ly/2CkF8N9
Submitted January 17, 2019 at 08:31PM by logic_bomb_1
via reddit http://bit.ly/2RUC7gj
Medium
Exposed JIRA server leaks NASA staff and project data!
Here, I’ll be talking about an interesting vulnerability that I have found in NASA Jira (An Atlassian task tracking systems/project management software etc.).
How to write a rootkit without really trying
http://bit.ly/2FH6ekH
Submitted January 17, 2019 at 09:11PM by yossarian_flew_away
via reddit http://bit.ly/2syF0oO
http://bit.ly/2FH6ekH
Submitted January 17, 2019 at 09:11PM by yossarian_flew_away
via reddit http://bit.ly/2syF0oO
Trail of Bits Blog
How to write a rootkit without really trying
We open-sourced a fault injection tool, KRF, that uses kernel-space syscall interception. You can use it today to find faulty assumptions (and resultant bugs) in your programs. Check it out! This p…
MiTM DNS Spoofing: Attack Between Target Windows Machines & DNS
http://bit.ly/2FEn3wN
Submitted January 17, 2019 at 08:59PM by marketingversprite
via reddit http://bit.ly/2CovSYm
http://bit.ly/2FEn3wN
Submitted January 17, 2019 at 08:59PM by marketingversprite
via reddit http://bit.ly/2CovSYm
VerSprite | Integrated Security Services and Consulting
MiTM DNS Spoofing: Attack Between Target Windows Machines & DNS
MiTM attack between target Windows machines and for which of those hostnames the DNS server is responding with a No such name message.
A Deeper Look into XSS Payloads
http://bit.ly/2W0g8nq
Submitted January 17, 2019 at 06:36PM by digitalinterruption
via reddit http://bit.ly/2FwHEE4
http://bit.ly/2W0g8nq
Submitted January 17, 2019 at 06:36PM by digitalinterruption
via reddit http://bit.ly/2FwHEE4
Digitalinterruption
A Deeper Look into XSS Payloads | Digital Interruption Research
Over time, the type of vulnerabilities seen in the web app landscape changes. One that has persisted year in, year out, is cross-site noscripting. It’s been a ...
Google Play Apps Drop Anubis Banking Malware, Use Motion-based Evasion Tactics
http://bit.ly/2CqKp5O
Submitted January 17, 2019 at 11:00PM by EvanConover
via reddit http://bit.ly/2QSrdDn
http://bit.ly/2CqKp5O
Submitted January 17, 2019 at 11:00PM by EvanConover
via reddit http://bit.ly/2QSrdDn
Trendmicro
Google Play Apps Drop Anubis Banking Malware, Use Motion-based Evasion Tactics - TrendLabs Security Intelligence Blog
Malicious apps on Google Play were trying to drop the Anubis banking malware on unsuspecting users. They were also using an innovative new evasion tactic.
Taking a page from the kernel's book: A TLB issue in mremap()
http://bit.ly/2FDqDam
Submitted January 17, 2019 at 10:58PM by Vonter
via reddit http://bit.ly/2VYBstk
http://bit.ly/2FDqDam
Submitted January 17, 2019 at 10:58PM by Vonter
via reddit http://bit.ly/2VYBstk
reddit
r/netsec - Taking a page from the kernel's book: A TLB issue in mremap()
1 vote and 0 comments so far on Reddit
Buffer Overflow Practical Examples , Shellcode Injection and Local Privilege Escalation
http://bit.ly/2QWTwAi
Submitted January 18, 2019 at 01:35AM by Ahm3d_H3sham
via reddit http://bit.ly/2FxV96i
http://bit.ly/2QWTwAi
Submitted January 18, 2019 at 01:35AM by Ahm3d_H3sham
via reddit http://bit.ly/2FxV96i
0xRick Owned Root !
Buffer Overflow Practical Examples , Shellcode Injection and Local Privilege Escalation - protostar stack5
Introduction Hey I’m back with another Buffer Overflow article and today we are going to do a really interesting exploit , Today we will finally escalate privileges using a vulnerable suid binary (you can know more about that by reading the first buffer overflow…
A tale of private key reuse
http://bit.ly/2HuWaOD
Submitted January 18, 2019 at 01:34AM by koenrh
via reddit http://bit.ly/2RBDDEI
http://bit.ly/2HuWaOD
Submitted January 18, 2019 at 01:34AM by koenrh
via reddit http://bit.ly/2RBDDEI
Koen Rouwhorst
A tale of private key reuse
In 2017, while attempting to get some DRM-enabled video player to work on my Mac, I stumbled upon a hard-coded private key. The corresponding public key was used in a valid and publicly trusted Cis…