Microsoft Signatures to be REQUIRED for Windows 10 Kernel-Mode Drivers
Nobody likes having to sign their 64-bit Windows kernel-mode drivers. But after you’ve done it a few times, you get used to it. And after all, you tell yourself, it’s probably worth it in terms of...
View ArticleBeware the “Insert and Link” Feature in Microsoft Office
Throughout course of my monitoring future and possible targeted attacks, I recently chanced upon a spear-phishing email sent to an undisclosed recipient that contains three seemingly harmless...
View ArticleDridex Code Breaking – Modify the Malware to Bypass the VM Bypass
The arrival of spring brings many good things, but it’s also prime season for tax-themed phishing emails. A partner of ours recently reported an email with the subject “Your Tax rebate” that contained...
View ArticleMac OS X 10.10.2 IOHIDFamily.kext IOHIDSecurePromptClient Heap Overflow
I have recently found an exploitable heap overflow in a core OS X driver.Particularly, the injectString function is vulnerable to an heap overflow and can be triggered without privileges of any...
View ArticleMac OS X 10.10.2 Default KEXT heap overflow LPE
I have recently found an exploitable heap overflow in a core OS X driver.Particularly, the injectString function is vulnerable to an heap overflow and can be triggered without privileges of any...
View ArticleMac OS X 10.10.2 kernel extension heap overflow resulting in LPE
I have recently found an exploitable heap overflow in a core OS X driver.Particularly, the injectString function is vulnerable to an heap overflow and can be triggered without privileges of any...
View ArticleChamilo LMS 1.9.10 Multiple XSS & CSRF Vulnerabilities
I. Overview========================================================Chamilo LMS 1.9.10 or prior versions are prone to a multiple Cross-Site Scripting (Stored + Reflected) & CSRF vulnerabilities....
View ArticleWeb-Dorado ECommerce-WD for Joomla plugin multiple unauthenticated SQL...
Version 1.2.5 of the ECommerce-WD plugin for Joomla! has multipleunauthenticated SQL injections available via the advanced searchfunctionality.http://extensions.joomla.org/extension/ecommerce-wdThe...
View ArticleWindows: Local WebDAV NTLM Reflection Elevation of Privilege
A default installation of Windows 7/8 can be made to perform a NTLM reflection attack through WebDAV which allows a local user to elevate privileges to local system.more...
View ArticleThis report summarizes the results of research and analysis into advanced...
The first part of this report AIMS to Reveal Methods USED in Apts based on actual Cases and to Widely Promote a Deeper Understanding of Cyber-attacks.In the Second part, we Present some of the results...
View ArticleHow I Exposed Your Private Photos - Facebook Private Photos Hack
What if your private mobile photos got exposed publicly?All of us have the habit of taking photos using our mobile, in that there would definitely be some private photos. what if it's hacked? This post...
View ArticleHTTP(S) specific MITM SSL Proxies
Man In The Middle (MITM) SSL Proxies - Simple ways to see traffic between an SSL server and client in clear text here..........https://gist.github.com/jeremiahsnapp/6426298
View ArticlePaper: Obfuscating Malware through Cache Memory Architecture Features
AbstractThere is no doubt that malicious software (malware) is one of the most important threatin computer security. With increasing of the information systems and computer networkusage in the...
View Articlewifiphisher- Fast automated phishing attacks against WiFi networks
Wifiphisher is a security tool that mounts fast automated phishing attacks against WiFi networks in order to obtain secret passphrases and other credentials. It is a social engineering attack that...
View ArticleOpenSSL Security Advisory [19 Mar 2015] & Appears only 5 CVE's affect...
=======================================OpenSSL 1.0.2 ClientHello sigalgs DoS (CVE-2015-0291)=====================================================Severity: HighIf a client connects to an OpenSSL 1.0.2...
View ArticleForensic Challenge 14 – “Weird Python“
BackgroundYour boss John went to a BYOD conference lately. Yeah, he's that kind of security guy... After some mumble about targeted attacks happening during the event, your team finally got their hands...
View ArticleHello World, ZeroDB Here
We're building an end-to-end encrypted database that lets you run queries without exposing the decrypted data to the server.We decided to build ZeroDB because (1) as developers we've struggled with how...
View ArticleEat Your Malware With a Side of Macaroni – Free Research Tool from iSIGHT...
Free browser extension developed by iSIGHT Partners that brings yara signatures directly into the Virus Total Intelligence user interface…At iSIGHT Partners, we do a lot of malware research as part of...
View ArticleTHE OLD IS NEW, AGAIN. CVE-2011-2461 IS BACK!
As part of an ongoing investigation on Adobe Flash SOP bypass techniques, we identified a vulnerability affecting old releases of the Adobe Flex SDK compiler. Further investigation traced the issue...
View Article