Quantcast
Channel: BOT24
Browsing all 8064 articles
Browse latest View live

A technical intelligence report on the Pobelka botnet operation

This technical report describes the Pobelka botnet and puts it in the context of global malware operations. Fox-IT’s InTELL unit provides reports like this on a continuous basis to customers in the...

View Article


Facebook Exploits

## By...

View Article


Image may be NSFW.
Clik here to view.

Cridex + Fareit Infection Analysis - "dozakialko.ru:8080" A Credential...

The BackgroundYesterday we found infection of spam which lead us to some url like below:?12h00p://www.piastraollare.com/upload.htmh00p://kompot.designcon.tmweb.ru/upload.htmWe went down to analysis,...

View Article

Atheme IRC Services 7.0.5 DoS

#!/usr/bin/python3####################################################################################                                                       ####                    _  _  .__...

View Article

Microsoft Security Essentials Fails AV-Test Again

For the second time in a row Microsoft’s free antivirus solution – Microsoft Security Essentials (MSE) – has failed to earn certification from AV-Test, the independent German testing lab. The program...

View Article


New slicker Shylock Trojan hooks into Skype

The Shylock banking Trojan has been revamped with extra features that allow the malware to spread using the chat function of Skype, the popular Voice over IP application.Shylock can now roam the Skype...

View Article

FAKEM RAT- Malware Disguised as Windows® Messenger and Yahoo!® Messenger

The perpetrators of targeted attacks aim to maintain persistent presence in atarget network in order to extract sensitive data when needed. To maintainpersistent presence, attackers seek to blend in...

View Article

Blue Coat Appliances Used by Governments to Monitor, Censor Web Traffic

After the discovery that Syria used Blue Coat Systems technology to censor and monitor dissidents, a group of researchers find 61 government networks using the same systems.A group of researchers urged...

View Article


Novell NCP Pre-Auth Remote Stack-Based Buffer Overflow. (CVE-2012-0432) Exploit

In the interest of full-disclosure, here is a remote exploit for thevulnerability found by David Klein:DemonstrationNovell NCP Pre-Auth Remote Stack Buffer OverflowConnecting to host...

View Article


Linksys WRT54GL Firmware 4.30.15 build 2 Multiple Vulnerabilities

evice Name: Linksys WRT54GL v1.1Vendor: Linksys/Cisco============ Vulnerable Firmware Releases: ============Firmware Version: 4.30.15 build 2, 01/20/2011============ Device Description: ============The...

View Article

Image may be NSFW.
Clik here to view.

Spiralling Scale of Mobile Phone Theft Puts Consumers & Businesses at Risk of...

Equifax warns about the risks of keeping personal and business data on mobile devices, as Met Police report over 300 phones stolen in London every dayMobiles, smartphones and tablet devices have become...

View Article

CJIS Security Policies Satisfied With GoldKey Flash Tokens

Marysville Police Department Receives FBI Approval for its CJIS Compliance Strategy Using GoldKey TokensIndependence, MO (PRWEB) January 17, 2013Users of the FBI Criminal Justice Information System...

View Article

MantisBT before 1.2.13 match_type XSS vulnerability

Jakub Galczyk discovered[1][2] a cross site scripting (XSS)vulnerability in MantisBT 1.2.12 and earlier versions that allows amalicious person to trick the browser of a target user into...

View Article


Pwn2Own 2013 Competition

OverviewHP’s DVLabs Zero Day Initiative (ZDI) is expanding the focus of its annual Pwn2Own competition beyond vulnerabilities in the web browser this year. Over the last several years, we have seen...

View Article

Zscaler Uncovers Security Vulnerabilities in ESPN ScoreCenter Mobile App

Security Risks Present in ESPN ScoreCenter Highlight More Widespread Security Problems With Mobile AppsSAN JOSE, Calif.--(BUSINESS WIRE)--Zscaler®, the leading provider of Security Cloud services for...

View Article


A Real Random VirtualAlloc

n this post i will discuss one disadvantage of using the "VirtualAlloc" function to allocate memory and also suggest a trick to play around this disadvantage.If you ever used the "VirtualAlloc"...

View Article

dnsmasq: Incomplete fix for the CVE-2012-3411 issue

The CVE-2012-3411 identifier has been originally assigned to thefollowing issue:When dnsmasq is used in conjunctions with certain configurations of libvirtd, network packets from prohibited networks...

View Article


Threat Outbreak Alert: Fake Bank of America Secure Message Notification...

DescriptionCisco Security Intelligence Operations has detected significant activity related to spam e-mail messages that claim to a secure message from Bank of America for the recipient. The text in...

View Article

Threat Outbreak Alert: Fake Confidential Message Notification E-mail Messages

DescriptionCisco Security Intelligence Operations has detected significant activity related to spam e-mail messages that claim to a confidential message for the recipient. The text in the e-mail...

View Article

new scripts/modules/exploits added to Nmap, OpenVAS, Metasploit, and Nessus...

This report describes any new scripts/modules/exploits added to Nmap,OpenVAS, Metasploit, and Nessus since yesterday.== OpenVAS plugins (21) ==r15192...

View Article
Browsing all 8064 articles
Browse latest View live