The Other Side of Masque Attacks: Data Encryption Not Found in iOS Apps
Based on our research into the iOS threat Masque Attacks announced last week, Trend Micro researchers have found a new way that malicious apps installed through successful Masque Attacks can pose a...
View ArticlePUPs and Java Removal Tools, Oh My
When it comes to online threats, these days website ads could be considered a grey area. For the majority of site owners providing free services or content, they’re good to have because they generate...
View ArticleIE11 ImmutableApplicationSettings EPM Privilege Escalation
IE11 exposes a shared memory section to all tab process which contains configuration settings, named Immutable Application Settings. This contains settings such as whether protected mode is currently...
View ArticleDoubleDirect – Zimperium Discovers Full-Duplex ICMP Redirect Attacks in the...
Zimperium Mobile Security Labs have investigated during the last year a new type of attack technique in the wild being exploited by attackers. Aptly named “DoubleDirect,” this attack technique is a...
View ArticlePayPal takes 18 months to patch critical remote code execution hole
Paypal has closed a remote code execution vulnerability in its service some 18 months after it was reported.more here........http://www.theregister.co.uk/2014/11/21/paypal_vuln/?mt=1416565446664
View ArticleCVE-2014-6332 (Internet Explorer) and Exploits Kits
For this CVE referer to :http://technet.microsoft.com/security/bulletin/MS14-064The first encounter I had with this CVE in exploit kit, was in the Sweet Orange from the actor pushing DarkShell via KR...
View ArticleSanta
A binary whitelisting/blacklisting system for Mac OS Xmore here..........https://github.com/google/santa
View ArticleAttack Vector Linux
For anonymized penetration testing & security auditing. 2 distributions combinedmore here........http://turing.slu.edu/~hastint/AttackVector.htm
View ArticleDetekt
Detekt is a free tool that scans your Windows computer for traces of FinFisher and Hacking Team RCS, commercial surveillance spyware that has been identified to be also used to target and monitor human...
View ArticlePrivacyware Privatefirewall 7.0 - Unquoted Service Path Privilege Escalation
Privacyware Privatefirewall 7.0 Unquoted Service Path Privilege EscalationVendor: PWI, Inc.Product web page: http://www.privacyware.comAffected version: 7.0.30.3Summary: Privatefirewall multi-layered...
View ArticleNetgear Wireless Router WNR500 - Parameter Traversal Arbitrary File Access...
Netgear Wireless Router WNR500 Parameter Traversal Arbitrary File Access ExploitVendor: NETGEARProduct web page: http://www.netgear.comAffected version: WNR500 (firmware: 1.0.7.2)Summary: The NETGEAR...
View ArticleHacking RFID Payment Cards Made Possible with Android App
We recently encountered a high-risk Android app detected as ANDROIDOS_STIP.A in Chile. This app, found distributed through forums and blogs, can be used to hack into the user’s RFID bus transit card to...
View ArticleThe Regin Espionage Toolkit
Regin is the latest in the line of sophisticated espionage toolkits used to target a range of organizations around the world. As already reported, it's one of the more complex pieces of malware around,...
View Articlelinux-native-backdoors
Repository holding all alternatives of *nix backdoors.more here.........https://github.com/ulissescastro/linux-native-backdoors
View ArticleRegin: Top-tier espionage tool enables stealthy surveillance
An advanced spying tool, Regin displays a degree of technical competence rarely seen and has been used in spying operations against governments, infrastructure operators, businesses, researchers, and...
View ArticleMagnitude Exploit Kit Backend Infrastructure Insight - Part II
Welcome back to another edition of “exposing Magnitude exploit-kit internals”! As already mentioned in our previous posts (1st and 2nd), the back-end infrastructure of this highly prevalent Exploit Kit...
View ArticleSony Pictures hacked, entire computer system reportedly unusable
Reports that Sony Pictures has been hacked have been trickling in this morning, after a thread appeared on Reddit claiming all computers at the company were offline due to a hack.more...
View ArticleRegin: Nation-state ownage of GSM networks
"Beware of Regin, the master! His heart is poisoned. He would be thy bane..."more here.......http://securelist.com/blog/research/67741/regin-nation-state-ownage-of-gsm-networks/
View ArticleReal HSM Breaches
Hardware Security Modules (HSMs) are temper-resistant special-purpose computers that protect the most sensitive cryptographic key material in an organisation. They are used for security-critical...
View ArticleCraigslist's Netsol account was compromised, name servers changed
The craigslist account at one of our registrars was compromised and the NSrecords migrated away from their rightful home. That issue has since beencorrected, but the various caches around the Internet...
View Article