Latest Security News
-
Dissecting the Bybit Cryptocurrency Exchange Malicious UI Spoofing
Javascript
-
Based on the recently released Bybit Investigation documents I was able to
obtain the malicious javascript in question and I decided to dig a little
bit ...
1 hour ago
-
VSCode extensions with 9 million installs pulled over security risks
-
Microsoft has removed two popular VSCode extensions, 'Material Theme -
Free' and 'Material Theme Icons - Free,' from the Visual Studio
Marketplace for all...
2 hours ago
-
How to scan huge file storage | Kaspersky official blog
-
A full list of the checks and settings needed to scan tens of terabytes of
files for malware without disturbing users or putting data at risk.
3 hours ago
-
Balance patient and staff experiences with data security
-
Identity and access management (IAM) is a crucial part of healthcare
digital transformation. However, limited budgets and resources can cause
friction ov...
7 hours ago
-
An iCloud Backdoor Would Make Our Phones Less Safe
-
Last month, the UK government demanded that Apple weaken the security of
iCloud for users worldwide. On Friday, Apple took steps to comply for users
in t...
9 hours ago
-
New LightSpy spyware variant comes with enhanced data collection features
targeting social media platforms
-
Researchers found an updated LightSpy spyware with enhanced data collection
features targeting social media platforms like Facebook and Instagram.
Cybersec...
12 hours ago
-
Trump 2.0 Brings Cuts to Cyber, Consumer Protections
-
One month into his second term, President Trump's actions to shrink the
government through mass layoffs, firings and withholding funds allocated by
Congres...
2 days ago
-
Update: cs-decrypt-metadata.py Version 0.0.5
-
This is a bugfix version. cs-decrypt-metadata_V0_0_5.zip (http)MD5:
3C37C994709AAE7F56FEC8C8A35F6A61SHA256:
A47616A8C7A484A70D011EA4B8189097CF6FD61358DAEA8...
2 weeks ago
-
The CISO’s Mindset for 2025: Outcomes, Automation, and Leadership
-
As the year 2025 rushes forward, the responsibilities of CISOs are
continuing to evolve. We increasingly recognize the importance of not just
identifying r...
2 weeks ago
-
הגליון המאה ושבעים של DigitalWhisper שוחרר!
-
הגליון המאה ושבעים של DigitalWhisper שוחרר!פורסם ב- January 31, 2025
14:57:10, על ידי- cp77fk4r
ברוכים הבאים לדברי הפתיחה של הגליון ה-170 של DigitalWhi...
3 weeks ago
-
Happy 22nd Birthday TaoSecurity Blog
-
Happy birthday TaoSecurity Blog, born on this day in 2003!
The best way to digest the key lessons from this site is to browse my four
volume Best of Tao...
1 month ago
-
Andrew Hay’s 2025 Cybersecurity Predictions
-
As we approach 2025, the ever-evolving landscape of cybersecurity continues
to challenge professionals and organizations alike. Based on observed
trends an...
2 months ago
-
Recommended: Is Security Analytics the key to High-Fidelity, Context-Rich
Alerts?
-
I recommended Is Security Analytics the key to High-Fidelity, Context-Rich
Alerts? on TysonRhame.
About me: http://www.chuvakin.org
2 months ago
-
North Korean hackers posing as IT workers steal over $1B in cyberattack
-
North Korean hackers posing as IT workers steal over $1B in cyberattack
l33tdawg Fri, 11/29/2024 - 10:31
2 months ago
-
SafeLine - Serve As A Reverse Proxy To Protect Your Web Services From
Attacks And Exploits
-
SafeLine is a self-hosted *WAF(Web Application Firewall)* to protect your
web apps from attacks and exploits.
A web application firewall helps protect w...
5 months ago
-
Eye care company suffers 377K-record data breach
-
Panorama Eyecare, a Fort… read more
8 months ago
-
-
זמין מיידית לעבודה חדשה
-
שלום למבקרים באתר, אני זמין כעת מיידית לעבודה חדשה, כשכיר או כעצמאי, כמובן
בתחום אבטחת המידע. אפשר למצוא פרטים מקצועיים נוספים אודותיי וגם ליצור אתי
קשר ...
1 year ago
-
What a lovely sunset
-
Oh, hi. Long time no blog, eh?
Well, it is time to sunset this blog, I will be deleting it in the next few
weeks.
So long, and thanks for all the fis...
1 year ago
-
Simple PHP webshell with php filter chains
-
Recently found an LFI in a PHP application and one of the cool things I
learned about recently was PHP filter chains. More info here:
https://www.synacktiv...
1 year ago
-
A Scam in the Family—How a Close Relative Lost $100,000 to an Elder Scam
-
Written by James Schmidt Editor’s Note: We often speak of online scams in
our blogs, ones that cost victims hundreds...
The post A Scam in the Family—Ho...
2 years ago
-
Symantec Identity: Stepping Up to Meet the COVID-19 Crisis
-
COVID-19 confronted healthcare providers and governments with unprecedented
requests for access, aid, and assistance. Here’s how one team at Symantec
is ri...
4 years ago
-
SSRFing External Service Interaction and Out of Band Resource Load
(Hacker's Edition)
-
In the recent past we encountered two relativly new type of Attacks.
External Service Interaction (ESI) and Out-of-band resource loads (OfBRL).
1. An ...
5 years ago
-
Getting DNS Client Cached Entries with CIM/WMI
-
What is DNS Cache The DNS cache maintains a database of recent DNS
resolution in memory. This allows for faster resolution of hosts that have
been queried ...
5 years ago
-
How Reverse Engineering (and Cyber-Criminals’ Mistakes) Can Help You When
You’ve Been a Ransomware Victim
-
Ransomware is a type of malware that threatens to publish the victim’s data
or perpetually block access to it unless a ransom is paid. In the last two
year...
5 years ago
-
-
Random CSO Musing
-
One of the biggest challenges of running a security organization is
balancing the ongoing efforts, with strategic directions, all while keeping
the “pressu...
6 years ago
-
Lucky Break
-
One of the things I do from time to time is throw out an open ended
question on Twitter. Sometimes I’m making a point, sometimes I just want
to amuse myse...
6 years ago
-
Indonesian Spam Communities
-
In our last post we tried to shed some light at what seemed to appear as a
very common PayPal phishing email at first glance, but evidently turned out
to b...
6 years ago
-
TekThing 161 – Bitcoin Sucks For Gaming PCs!!! Our Video Gear, Fingbox Home
Network Security
-
—— Thank You Patrons! Without your support via patreon.com/tekthing, we
wouldn’t be able to make the show for you every week!
https://www.patreon.com/tekth...
7 years ago
-
Romania is vice-champion at the European Cyber Security
-
CERT-RO The National Response Center for Cyber Security Incidents affirmed
on Friday that Romania, for the second consecutive year, has become the
European...
7 years ago
-
CoalaBot : http Ddos Bot
-
CoalaBot appears to be build on August Stealer code (Panel and Traffic are
really alike)
I found it spread as a tasks in a Betabot and in an Andromeda sp...
7 years ago
-
Social-Engineer Toolkit (SET) v7.7 “Blackout” Released
-
TrustedSec is proud to announce a major release of the Social-Engineer
Toolkit (SET) v7.7. This version incorporates support for hostnames in the
HTA att...
7 years ago
-
Big Changes Around the Corner for the IoT
-
The IoT is transforming before our eyes due to increasing regulations,
growing demand for security standards and advancements in the telecom
industry.
T...
7 years ago
-
ClearEnergy ransomware can destroy process automation logics in critical
infrastructure, SCADA and industrial control systems.
-
Schneider Electric, Allen-Bradley, General Electric (GE) and more vendors
are vulnerable to ClearEnergy ransomware. Researchers at CRITIFENCE®
Critical I...
7 years ago
-
ROOTCON 10 Capture The Flag Statistics
-
During ROOTCON 10, we introduced a new dedicated track for our Capture The
Flag, with the comfortable CTF tables and chairs the game was well
participated ...
8 years ago
-
קיר הבושה: מחצית ראשונה של שנת 2016 - מגמות בפגיעה במידע רפואי בארה"ב
-
תרגום מאמר :
http://www.healthcareinfosecurity.com/wall-shame-mid-year-2016-breach-trends-a-9245
שני דברים שאני, יאיר, לוקח מהמאמר הזה כלקחים נכון להיום:1....
8 years ago
-
The ‘Compliance Only / CISSP / Minimum Viable Product / HR firewall’
infosec trapezoid of fuck
-
Yesterday (thurs, 3/24/16) I went on a tirade on twitter, regarding an
experience I had in San Francisco during RSA week, while at a vendor party.
I’ll let...
8 years ago
-
Citadel 0.0.1.1 (Atmos)
-
Guys of JPCERT, 有難う御座います!
Released an update to their Citadel decrypter to make it compatible with
0.0.1.1 sample.
Citadel 0.0.1.1 don't have a lot of do...
9 years ago
-
Dridex Down Under
-
Raytheon | Websense® Security Labs™ has been tracking malicious email
campaigns associated with the Dridex banking Trojan since 2014. An
interesting deve...
9 years ago
-
[Updated] Nurturing JavaScript Obfuscation and Fast Flux DNS - "Whats App
Voicemail Spamming" for Russian Online Pharmacies!
-
Recently, we analyzed that spammers are doing "Whats App Fake Voicemail"
spamming to trick end-users to visit online pharmacies' websites. There are
high...
9 years ago
-
What Verizon Missed in the Latest Threat Reports
-
* By: Zuk Avraham, Joshua Drake, Yaniv Karta, Jimmy Sha *
* Read the full report - here Recently, Veriz...
9 years ago
-
Forensic
-
אחת מהבעיות העיקריות בביצוע תהליך FORENSIC הוא לאחר ביצוע תהליך שיכפול ה -
Harddisk (על פי כל התקנים של שיכפול ביט אחרי ביט), היא לבצע מחקר על *מחשב
חי...
9 years ago
-
Blog Moved
-
Please see the Trustwave SpiderLabs Blog.
9 years ago
-
TrustKeeper Scan Engine Update – February 4, 2015
-
The latest update to the TrustKeeper scan engine that powers our Trustwave
Vulnerability Management product (including both internal and external
vulnerabi...
10 years ago
-
RSA Announces End of RSA Security Conference
-
Aims to bring clarity to cloudy marketing messages through exhibit hall
chotskies Bedford, MA., – April 1, 2014 – RSA, the security division of
EMC, today ...
10 years ago
-
botCloud – an emerging platform for cyber-attacks
-
Hosting network services on Cloud platforms is getting more and more
popular. It is not in the scope of this article to elaborate the advantage
of using Cl...
12 years ago
-
mimikatz: Tool To Recover Cleartext Passwords From Lsass
-
I meant to blog about this a while ago, but never got round to it. Here’s a
brief post about very cool feature of a tool called mimikatz. I’m very
grateful...
13 years ago
-
Pentestify.
-
i’m over here now.
13 years ago
-
-
-
-
-
-
-
-
-
יומן שבועי 21-27- אוקטובר 2012
חשבתי ככה לרשום לעצמי ראשי פרקים עבור אירועי אבטחה ושאר דברים מעניינים שנתקלתי בהם השבוע שעבר - עוד לא סגור באיזה יום - אבל הרעיון הוא להתמיד...המממ קשה... טוב נתחיל בניסוי:
-2012 21-27
- JAVA update - שוב חוזר הניגון ... למי שעוד לא עדכון -זה הזמן לשדרג ל 6.37 או ל 7.09 / אפשר להתחיל לזהות את גרסת ה JAVA המותקנת דרך אתר זה ולהתקדם באתר של JAVA לשדרוג - או לחלופין לשדרך אוטומאטית.דרך אגב ,לפגיעות האחרונה שהוגשה לריוויו ע"י חוקר אבטח מידע פולני - עדיין לא כתבו תיקון - לפי ORACLE יטופל ברבעון הראשון של 2013 , מומלץ למי שאין לו צורך בהרצת אפליקציות מבססות JAVA להסיר את תוסף הדפדפן עבור ג'אוה ,ובכל מקרה לעבוד עם כרום או FF ו .ל א עם IE
2. נסיון חדירה והתקפת CYBER על מחשבי המשטרה -עוד פרטים כאן , מקריאה ראשונית , נראה כי הנסיון מזכיר עשרות נסיונות שיכנוע ללחוץ על לינק או לפתוח קובץ דרך המייל ,בדרך כלל מיילים אלו קשורים לפשיעת סייבר - אך במקרה הספציפי הזה יתכן והיה מדוהר על מתקפת טרור קיברנטי ע"י אירן ( כך טוענים מומחי האבטחה שחקרו את העניין). קצת תמוהה בעיניי ,הצעד הקיצוני של ניתוק מחשבי המשטרה מהאינטרנט וממערכות נוספות מחשש לזליגת מידע ,ובנוסף חסימת DOK בכל החברה.
- האם אין למשטרה מערכות ניטור לזליגת מידע שעובדת על רקע קבוע?
- האם אין למשטרה יכולת לנתח פניות חשודות מתוך החברה לאינטרנט?
- מדוע לא חסום DOK כברירת מחדל?
- מעבר לאנטי וירוס המותקן במערכת הדואר - מדוע לא חוסמים במשטרה כ ל קובץ מסוכן כגון EXE ו DLL??? כל סוג כזה מומלץ שישלך לתיבה מיוחדש המאושרת רק ע"י אנשים אבטחת מידע.
- בקיצור ניראה כי פאניקה והחלטות קשות , היו כאן למחוויר.