[ MDVSA-2013:064 ] bogofilter
-----BEGIN PGP SIGNED MESSAGE-----Hash: SHA1 _______________________________________________________________________ Mandriva Linux Security Advisory...
View Article[ MDVSA-2013:065 ] boost
-----BEGIN PGP SIGNED MESSAGE-----Hash: SHA1 _______________________________________________________________________ Mandriva Linux Security Advisory...
View ArticleThreat Outbreak Alert: Fake Deposit Transfer Confirmation Notification E-mail...
DescriptionCisco Security Intelligence Operations has detected significant activity related to spam e-mail messages that claim to contain a deposit transfer confirmation notification for the recipient....
View Article[ MDVSA-2013:066 ] bugzilla
-----BEGIN PGP SIGNED MESSAGE-----Hash: SHA1 _______________________________________________________________________ Mandriva Linux Security Advisory...
View Article[ MDVSA-2013:067 ] couchdb
-----BEGIN PGP SIGNED MESSAGE-----Hash: SHA1 _______________________________________________________________________ Mandriva Linux Security Advisory...
View Article[RHSA-2013:0714-01] Moderate: stunnel security update
-----BEGIN PGP SIGNED MESSAGE-----Hash: SHA1===================================================================== Red Hat Security AdvisorySynopsis: Moderate: stunnel...
View ArticlePoshing the hashes: Using PowerShell to play with hashes
What do Pen Testers generally do after dumping hashes (or creds)? I asked this question during my workshop at BlackHat Europe. The answer was use of tools like psexec (independent or msf) to replay or...
View ArticleInfonetics: Managed Security Services Top $13 Billion in 2012; Strong Growth...
CAMPBELL, Calif.--(BUSINESS WIRE)--Market research firm Infonetics Research released excerpts from its latest Cloud and CPE Managed Security Services report, which analyzes and forecasts the market for...
View ArticleSolera Networks Introduces Innovative Black Box Data Recorder for Immediate...
Solera DeepSee™ BlackBox Recorder Offers Incident Responders Simple, Flexible and Cost-Effective Breach Investigation, Providing Crucial Intelligence When an Incident HappensSALT LAKE CITY--(BUSINESS...
View ArticleTell-tale Signs that a Site has been Compromised
If a website is compromised by a careful, talented, and well-funded attacker, then the scary reality is that no one will probably ever know that the site had been hacked at all. However, most attackers...
View ArticleIANS to Host LogRhythm Sponsored Webinar Discussing How Big Data Security...
BOULDER, Colo.--(BUSINESS WIRE)--LogRhythm, the largest and fastest growing independent Security Information and Event Management (SIEM) provider in the world, will sponsor a webinar hosted by...
View ArticleBit9 Free Webcast—How Integrating Server, Endpoint and Network Tools will...
Get a Holistic View of Everything Happening Across your Enterprise—in Real Time—without Scanning or PollingWALTHAM, Mass.--(BUSINESS WIRE)--Bit9, the leader in Trust-based Security, will present the...
View ArticleWHY WE LOVE APACHE PIG
The Umbrella Security Labs research team is constantly processing terabytes of log files through dozens of Hadoop jobs in order to build the data we need for our predictive models. Some tools have...
View ArticleSTICKY: what, precisely, is a "DNS leak?"
OK... <cracks knuckles>DNS leaks. All the cool kids are talking about them. The boffins at Wilder's have achingly long threads discussing them. Some VPN companies promise super-secret-magickal...
View ArticleReflected XSS in phpMyAdmin 3.5.7
[waraxe-2013-SA#102] - Reflected XSS in phpMyAdmin 3.5.7===============================================================================Author: Janek Vind "waraxe"Date: 09. April 2013Location: Estonia,...
View ArticleSysax Multi Server 6.10 - SSH DoS
#!/usr/bin/env ruby# Sysax Multi Server 6.10 SSH DoS# Matt "hostess" Andreko < mandreko [at] accuvant.com ># http://www.mattandreko.com/2013/04/sysax-multi-server-610-ssh-dos.htmlrequire...
View ArticleSecrets of FBI Smartphone Surveillance Tool Revealed in Court Fight
A legal fight over the government’s use of a secret surveillance tool has provided new insight into how the controversial tool works and the extent to which Verizon Wireless aided federal agents in...
View ArticleZAPms 1.41- SQLi Vulnerability
============================================================================================================= [o] ZAPms <= SQL Injection Vulnerability Software : ZAPms Version : 1.41...
View ArticleThreat Outbreak Alert: Fake Naked Personal Picture Sharing Notification...
DescriptionCisco Security Intelligence Operations has detected significant activity related to spam e-mail messages that claim to contain a personal picture sharing notification for the recipient. The...
View ArticleThreatAgent Breachbot Released
'm excited to announce the immediate availability of our latest web app ThreatAgent Breachbot. Breachbot monitors relevant website static<embed>, <iframe>, <meta>, and <script>...
View Article