-
Archives
- May 2018
- April 2018
- March 2018
- February 2018
- December 2017
- September 2016
- August 2016
- July 2016
- June 2016
- May 2016
- April 2016
- March 2016
- February 2016
- January 2016
- December 2015
- November 2015
- October 2015
- September 2015
- August 2015
- July 2015
- June 2015
- May 2015
- April 2015
- March 2015
- February 2015
- January 2015
- December 2014
- November 2014
- October 2014
- September 2014
- August 2014
- July 2014
- June 2014
- May 2014
- April 2014
- March 2014
- February 2014
- January 2014
-
Meta
Monthly Archives: October 2015
Heimdal: Malware campaign uses blackhat SEO to deliver malicious code
Heimdal Security discovered a malware campaign aimed at driving visitors to webpages that contain malicious code through blackhat SEO techniques. According to a blog post on the security provider’s website, users are duped into downloading corrupted files when they search … Continue reading
Chinese Backdoor Zegost delivered via Hacking Team exploit
Zscaler ThreatLabZ has been closely monitoring the usage of Hacking Team’s leaked exploits in the wild since July, 2015 and recently uncovered the Emissary Panda APT attack leveraging these exploits. In past two months, we’ve spotted multiple instances of Zegost … Continue reading
HOW TO SCAN WHOLE INTERNET 3.7 BILLION IP ADDRESSES IN FEW MINUTES?
Cyber security audit and ethical hacking training professionals normally use scanner to scans the networks. Scanning every IP address on the internet isn’t an easy job, and if you don’t have the resources of a botnet, a single scan can … Continue reading
Emergency Adobe Flash Zero Day Patch Arrives Ahead of Schedule
Adobe has decided to patch the zero day vulnerability that was disclosed in Flash Player earlier this week today — instead of next week as originally scheduled. According to a security bulletin Adobe posted this morning the update actually fixes … Continue reading
Malaysia arrests Kosovo man for ‘hacking US files for IS’
A Kosovan man has been arrested in Malaysia for allegedly hacking into a computer database and providing information on US security officials to the so-called Islamic State group. The man, who is in his 20s, was detained on 15 September, … Continue reading
You can hack a PC just by looking at it, say 3M and HP
Thankfully these plastic shields stop data penetrating the retina-consciousness interface. Top security minds at HP have discovered that if you look at a PC, you can read what’s on its screen. And if you’re not the intended reader of that … Continue reading
NSA SHARKSEER program aims to detect and mitigate malware Zero-Day
The NSA SHARKSEER Program is a project that aims to detect and mitigate web-based malware Zero-Day and Advanced Persistent Threats using COTS technology. Every day, thousands of cyber attack rely on exploitation of zero-day exploits, even more sophisticated ATP groups … Continue reading
EL NUEVO MODULO MSU FINDER DE METASPLOIT PARA SOLUCIONAR VULNERABILIDADES DE WINDOWS
La prueba del parche y el análisis son partes importantes en la investigación de las vulnerabilidades y desarrollo de exploits. Uno de los motivos es que la gente que prueba esta técnica es para volver a descubrir vulnerabilidades parcheadas, o … Continue reading
Apple removes several apps that could spy on encrypted traffic
Third-party root certificates could man-in-the-middle HTTPS connections. Apple has purged its iOS App Store of several titles that it said had the ability to compromise encrypted connections between end users and the servers they connect to. The company advised users … Continue reading