Monthly Archives: October 2015

Heimdal: Malware campaign uses blackhat SEO to deliver malicious code

Heimdal Security discovered a malware campaign aimed at driving visitors to webpages that contain malicious code through blackhat SEO techniques. According to a blog post on the security provider’s website, users are duped into downloading corrupted files when they search … Continue reading

Posted in Cyber Security, Malware | Tagged | Leave a comment

Chinese Backdoor Zegost delivered via Hacking Team exploit

Zscaler ThreatLabZ has been closely monitoring the usage of Hacking Team’s leaked exploits in the wild since July, 2015 and recently uncovered the Emissary Panda APT attack leveraging these exploits. In past two months, we’ve spotted multiple instances of Zegost … Continue reading

Posted in Cyber Security, Vulnerabilidad | Tagged , | Leave a comment

HOW TO SCAN WHOLE INTERNET 3.7 BILLION IP ADDRESSES IN FEW MINUTES?

Cyber security audit and ethical hacking training professionals normally use scanner to scans the networks. Scanning every IP address on the internet isn’t an easy job, and if you don’t have the resources of a botnet, a single scan can … Continue reading

Posted in Cyber Security | Tagged , , | Leave a comment

Emergency Adobe Flash Zero Day Patch Arrives Ahead of Schedule

Adobe has decided to patch the zero day vulnerability that was disclosed in Flash Player earlier this week today — instead of next week as originally scheduled. According to a security bulletin Adobe posted this morning the update actually fixes … Continue reading

Posted in Vulnerabilidad | Tagged | Leave a comment

Malaysia arrests Kosovo man for ‘hacking US files for IS’

A Kosovan man has been arrested in Malaysia for allegedly hacking into a computer database and providing information on US security officials to the so-called Islamic State group. The man, who is in his 20s, was detained on 15 September, … Continue reading

Posted in Cyber Security | Tagged | Leave a comment

You can hack a PC just by looking at it, say 3M and HP

Thankfully these plastic shields stop data penetrating the retina-consciousness interface. Top security minds at HP have discovered that if you look at a PC, you can read what’s on its screen. And if you’re not the intended reader of that … Continue reading

Posted in Cyber Security | Tagged , | Leave a comment

“Destroy Windows 10 Spying” Can Now Destroy Windows 7 Spying Too

Update brings support for the latest Windows 7 updates If data collection in Windows 10 is one of your main concerns, then you probably already know that there are a lot of apps out there which can help you with … Continue reading

Posted in Cyber Security | Tagged | Leave a comment

NSA SHARKSEER program aims to detect and mitigate malware Zero-Day

The NSA SHARKSEER Program is a project that aims to detect and mitigate web-based malware Zero-Day and Advanced Persistent Threats using COTS technology. Every day, thousands of cyber attack rely on exploitation of zero-day exploits, even more sophisticated ATP groups … Continue reading

Posted in Uncategorized | Tagged | Leave a comment

EL NUEVO MODULO MSU FINDER DE METASPLOIT PARA SOLUCIONAR VULNERABILIDADES DE WINDOWS

La prueba del parche y el análisis son partes importantes en la investigación de las vulnerabilidades y desarrollo de exploits. Uno de los motivos es que la gente que prueba esta técnica es para volver a descubrir vulnerabilidades parcheadas, o … Continue reading

Posted in Cyber Security, Vulnerabilidad | Tagged , | Leave a comment

Apple removes several apps that could spy on encrypted traffic

Third-party root certificates could man-in-the-middle HTTPS connections. Apple has purged its iOS App Store of several titles that it said had the ability to compromise encrypted connections between end users and the servers they connect to. The company advised users … Continue reading

Posted in Cyber Security | Tagged | Leave a comment