Quantcast
Channel: BOT24
Browsing all 8064 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Paper: The Rotten Tomato Campaign

Malware authors are not shy about borrowing ideas. One of the most typical cases is theTomato Garden case,where several different groups used the same zero-day Microsoft Wordexploit.more...

View Article


Image may be NSFW.
Clik here to view.

Smuggler - An interactive 802.11 wireless shell without the need for...

I’ve always been fascinated by wireless communications. The ability to launch seemingly invisible packets of information up into the air without even the need to consider aerodynamics itself seems like...

View Article


Image may be NSFW.
Clik here to view.

BE2 Custom Plugins, Router Abuse, and Target Profiles

New observations on BlackEnergy2 APT activitymore here...........http://securelist.com/blog/research/67353/be2-custom-plugins-router-abuse-and-target-profiles/

View Article

Image may be NSFW.
Clik here to view.

nogotofail

Nogotofail is a network security testing tool designed to help developers and security researchers spot and fix weak TLS/SSL connections and sensitive cleartext traffic on devices and applications in a...

View Article

Image may be NSFW.
Clik here to view.

CVE-2014-1635 BELKIN N750 BUFFER OVERFLOW

A remote unauthenticated attacker may execute commands as root by sending an unauthenticated crafted POST request to the httpd that serves authentication on the guest login network.more...

View Article


Image may be NSFW.
Clik here to view.

KL-001-2014-004 : VMWare vmx86.sys Arbitrary Kernel Read

Title: VMWare vmx86.sys Arbitrary Kernel ReadAdvisory ID: KL-001-2014-004Publication Date: 2014.11.04Publication URL: https://www.korelogic.com/Resources/Advisories/KL-001-2014-004.txt1. Vulnerability...

View Article

Image may be NSFW.
Clik here to view.

Paper: Harvesting High Value Foreign Currency Transactions from EMV...

In this paper we present an attack, which allows fraudulenttransactions to be collected from EMV contactless credit and debitcards without the knowledge of the cardholder. The attackexploits a...

View Article

Image may be NSFW.
Clik here to view.

WireLurker: A New Era in OS X and iOS Malware

Today we published a new research paper on WireLurker, a family of malware targeting both Mac OS and iOS systems for the past six months. We believe that this malware family heralds a new era in...

View Article


Image may be NSFW.
Clik here to view.

What You Need to Know About WireLurker

Mobile Security company Palo Alto Networks has released a new white paper titled WireLurker: A New Era in iOS and OS X Malware. I’ve gone through their findings, and also managed to get a hold of the...

View Article


Image may be NSFW.
Clik here to view.

Root Cause Analysis of CVE-2014-1772 – An Internet Explorer Use After Free...

We see many kinds of vulnerabilities on a regular basis. These range from user-after-free (UAF) vulnerabilities, to type confusion, to buffer overflows, to cross-site scripting (XSS) attacks. It’s...

View Article

Image may be NSFW.
Clik here to view.

Malicious iFrame Injector Found in Adobe Flash File (.SWF)

Finding malware in Adobe Flash files (.swf) is nothing new, but it usually affects personal computers, not servers. Typically, a hidden iFrame is used to drop a binary browser exploit with .SWF files,...

View Article

Image may be NSFW.
Clik here to view.

“CVE-2014-8517″ vulnerability: Remote command execution in FreeBSD

[CVE-2014-8517] – a dangerous vulnerability in FTP-client, which allows the attacker to use a utility ftp.exe interactively and execute arbitrary commands on the victim’s computer.The vulnerability is...

View Article

Image may be NSFW.
Clik here to view.

SEC Consult SA-20141106-0 :: XXE & XSS & Arbitrary File Write vulnerabilities...

SEC Consult Vulnerability Lab Security Advisory < 20141106-0 >=======================================================================              title: XXE & XSS & Arbitrary File Write...

View Article


Image may be NSFW.
Clik here to view.

FROM 0-DAY TO EXPLOIT – BUFFER OVERFLOW IN BELKIN N750 (CVE-2014-1635)

A vulnerability in the guest network web interface of the Belkin N750 DB Wi-Fi Dual-Band N+ Gigabit Router with firmware F9K1103_WW_1.10.16m, allows an unauthenticated remote attacker to gain root...

View Article

Image may be NSFW.
Clik here to view.

Using SystemTap to determine the exploitability of unbound memory overflows

Hello, my name is Nikos Naziridis and I am a security researcher at CENSUS. In this post, I will present how SystemTap and kernel instrumentation in general, could be used to aid the process of...

View Article


Image may be NSFW.
Clik here to view.

Cryptolocker variant Torrentlocker making new victims in NL

Since past weekend, the Netherlands were hit with another spam run spreading the Cryptolocker variant known as Torrentlocker. Torrentlocker presents itself to victims as Cryptolocker in all cases,...

View Article

Image may be NSFW.
Clik here to view.

Insecure management of login credentials in PicsArt Photo Studio for Android...

Fundación Dr. Manuel Sadosky - Programa STIC Advisory      http://www.fundacionsadosky.org.arInsecure management of login credentials in PicsArt Photo Studio forAndroid1. *Advisory Information*Title:...

View Article


Image may be NSFW.
Clik here to view.

“Rootpipe” Vulnerability

A new critical vulnerability titled “Rootpipe” affecting the Mac OS X operating system has been discovered courtesy of Swedish security researcher and consultant Emil Kvarnhammar (@emilkvarnhammar).The...

View Article

Image may be NSFW.
Clik here to view.

Wordpress bulletproof-security

Vulnerability title: Wordpress bulletproof-security <=.51 multiplevulnerabilitiesAuthor: Pietro OlivaCVE: CVE-2014-7958, CVE-2014-7959, CVE-2014-8749Vendor: AITproProduct:...

View Article

Image may be NSFW.
Clik here to view.

The proof is in the cookie

During the past few weeks, we have a heard a lot about malvertising, this technique of delivering malware through booby-trapped adverts.more...

View Article
Browsing all 8064 articles
Browse latest View live