Quantcast
Channel: BOT24
Browsing all 8064 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

TWiki Security Alert CVE-2014-7236: Remote Perl code execution with query...

This is an advisory for TWiki administrators: The debugenableplugins request parameter allows arbitrary Perl code execution.TWiki ( http://twiki.org ) is an Open Source Enterprise Wiki and Web...

View Article


Image may be NSFW.
Clik here to view.

TWiki Security Alert CVE-2014-7237: Apache configuration file upload on TWiki...

This is an advisory for TWiki administrators: Attaching a specially named file allows remote upload of an Apache configuration file. This applies to native TWiki installations on Windows, the TWiki-VM...

View Article


Image may be NSFW.
Clik here to view.

[ FORENSICS WALK-THROUGH: DFIRCON EAST SMARTPHONE FORENSICS CHALLENGE ]

Today I was asked by a good friend of mine on whether there could be 2 answer(s) to the last question in DFIRCON EAST Smartphone Forensics Challenge.Being the curious cat, i downloaded the Challenge...

View Article

Image may be NSFW.
Clik here to view.

The Rovnix reincarnation

Back in June 2014, we discovered a new malware campaign that was using a new DGA. This sparked our interest.After unpacking, some of the samples that we retrieved contained an interesting debug string...

View Article

Image may be NSFW.
Clik here to view.

Evolution of the Nuclear Exploit Kit

Exploit kits remain an efficient mechanism for cyber criminals to distribute malware. Such kits include exploits for multiple vulnerabilities within a single malicious webpage. Criminals can check...

View Article


Image may be NSFW.
Clik here to view.

Democracy in Hong Kong Under Attack

Over the last few months, Volexity has been tracking a particularly remarkable advanced persistent threat (APT) operation involving strategic web compromises of websites in Hong Kong and Japan. In both...

View Article

Image may be NSFW.
Clik here to view.

Imperva Web Application Attack Report (WAAR) #5

Today, we are proud to release the 5th installment of our annual Web Application Attack Report.For those of you new to this report, Imperva’s Web Application Attack Report (WAAR) is a thorough analysis...

View Article

Image may be NSFW.
Clik here to view.

Enhancements to Dyre Banking Trojan

The Dyre banking Trojan made its first debut in June 2014, targeting large financial institutions across the globe. In September, PhishLabs’ R.A.I.D (Research, Analysis, and Intelligence Division)...

View Article


Image may be NSFW.
Clik here to view.

Blind & Time Based SQL Injection in Yahoo Contributors Network

The Yahoo Contributors Network allows writers, photographers, and videographers to share their knowledge and passion (…) and earn money by pushing your unique perspectives…” From the looks of the...

View Article


Image may be NSFW.
Clik here to view.

CSNC-2014-004 neuroML - Multiple Vulnerabilities

############################################################### COMPASS SECURITY ADVISORY#...

View Article

Image may be NSFW.
Clik here to view.

WordPress Websites Continue to Get Hacked via MailPoet Plugin Vulnerability

The popular Mailpoet(wysija-newsletters) WordPress plugin had a serious file upload vulnerability a few months back, allowing an attacker to upload files to the vulnerable site.This issue was disclosed...

View Article

Image may be NSFW.
Clik here to view.

SAP Security Note 1908531 - XXE in BusinessObjects Explorer

######################################################################### COMPASS SECURITY ADVISORY#...

View Article

Image may be NSFW.
Clik here to view.

The Snappening – 200,000 Snapchat accounts hacked

4 chan has struck again. First there was the celebrity nude leak scandal Fappening, and now there is the Snappening. For a brief history, on August 31, 2014, a collection private and nude pictures of...

View Article


Image may be NSFW.
Clik here to view.

SAP Security Note 1908647 - Cross Site Flashing in BusinessObjects Explorer

######################################################################### COMPASS SECURITY ADVISORY#...

View Article

Image may be NSFW.
Clik here to view.

Automated configuration analysis for Mozilla's TLS guidelines

Last week, we updated Mozilla's Server Side TLS guidelines to add a third recommended configurations. Each configuration maps to a target compatibility levelmore...

View Article


Image may be NSFW.
Clik here to view.

SAP Security Note 1908562 - Port scanning in BusinessObjects Explorer

######################################################################### COMPASS SECURITY ADVISORY#...

View Article

Image may be NSFW.
Clik here to view.

Rustock.B Live Debugging - SwishDbgExt, SysecLabs script.

Here we are, part two! I thought rather than doing a live debugging of runtime2 as I discussed in my last rootkit debugging post, I'd debug a different rootkit. I chose Rustock.B (PE386) as it's a...

View Article


Image may be NSFW.
Clik here to view.

Telefonica O2 Connection Manager 3.4 Local Privilege Escalation

Telefonica O2 Connection Manager 3.4 Local Privilege Escalation VulnerabilityVendor: Telefonica S.A.Product web page: http://www.telefonica.com | http://www.o2.co.ukAffected version: 3.4.R1...

View Article

Image may be NSFW.
Clik here to view.

Telefonica O2 Connection Manager 8.7 Service Trusted Path Privilege Escalation

Telefonica O2 Connection Manager 8.7 Service Trusted Path Privilege EscalationVendor: Telefonica S.A.Product web page: http://www.telefonica.com | http://www.o2.co.ukAffected version: 8.7.6.792Summary:...

View Article

Image may be NSFW.
Clik here to view.

Paper: A Decentralized Public Key Infrastructure with Identity Retention

Public key infrastructures (PKIs) enable users to look up and verify one another’s publickeys based on identities. Current approaches to PKIs are vulnerable because they do not offersufficiently strong...

View Article
Browsing all 8064 articles
Browse latest View live