CONAN Mobile es una aplicación gratuita que te ayuda a proteger tu dispositivo móvil #Android
#INCIBE
https://t.co/JhSq0MTjpD https://t.co/BhbgZEzkm5
#INCIBE
https://t.co/JhSq0MTjpD https://t.co/BhbgZEzkm5
Google Play
CONAN mobile - Aplicaciones de Android en Google Play
Comprueba el estado de seguridad y las aplicaciones instaladas en tu dispositivo
#FBI reportedly advising companies to ditch #Kaspersky apps
The law enforcement agency has met with firms in the energy and tech sectors.
https://www.engadget.com/2017/08/21/fbi-kaspersky-lab-private-sector/?utm_source=tpx.mx
The law enforcement agency has met with firms in the energy and tech sectors.
https://www.engadget.com/2017/08/21/fbi-kaspersky-lab-private-sector/?utm_source=tpx.mx
Engadget
FBI reportedly advising companies to ditch Kaspersky apps
The FBI has reportedly been briefing firms on the cyberespionage threat posed by Kaspersky.
Éste es un posible #malware que imita una oferta de @ZARA. Por precaución: NO la abras, NO lo reenvíes y BÓRRALO inmediatamente. Vía @OfeTG. https://t.co/YBqyl3nZFW
Twitter
Grifo-Box
Éste es un posible #malware que imita una oferta de @ZARA. Por precaución: NO la abras, NO lo reenvíes y BÓRRALO inmediatamente. Vía @OfeTG.
NorkNork - #Powershell #Empire Persistence Finder
http://www.kitploit.com/2017/09/norknork-powershell-empire-persistence.html
http://www.kitploit.com/2017/09/norknork-powershell-empire-persistence.html
KitPloit - PenTest Tools for your Security Arsenal ☣
NorkNork - Powershell Empire Persistence Finder
This script was designed to identify Powershell Empire persistence payloads on Windows systems. It currently supports checks for these...
#Vulnerability Spotlight: TALOS-2017-0430/0431: Multiple Vulnerabilities in FreeXL Library
http://blog.talosintelligence.com/2017/09/vulnerability-spotlight-talos-2017.html
http://blog.talosintelligence.com/2017/09/vulnerability-spotlight-talos-2017.html
Talosintelligence
Vulnerability Spotlight: TALOS-2017-0430/0431: Multiple Vulnerabilities in FreeXL Library
A blog from the world class Intelligence Group, Talos, Cisco's Intelligence Group
Flu Project: #Bettercap Una navaja suiza para realizar ataques ... https://t.co/U9OVFa2koO
Flu-Project
Bettercap: Una navaja suiza para realizar ataques de red
Flu Project Blog sobre seguridad informatica y hacking etico. Malware, Analisis Forense, Exploits, Firewalls, Anubis, Flunym0us, FluBlockers, LaW.
Pwning the #Dlink 850L routers and abusing the MyDlink #Cloud protocol
https://t.co/gqIhdLtdNw #FullDisclosure
https://t.co/gqIhdLtdNw #FullDisclosure
seclists.org
Full Disclosure: Pwning the Dlink 850L routers and abusing the MyDlink Cloud
protocol
protocol
❗️ "Seis euros por número de móvil, 1,5 por e-mail: el lucrativo negocio de Change.org"
http://www.vozpopuli.com/economia-y-finanzas/empresas/change-org-Peticiones-Data_mining-Change-org-Avaaz-Peticiones_online-data_mining_0_823717647.html
http://www.vozpopuli.com/economia-y-finanzas/empresas/change-org-Peticiones-Data_mining-Change-org-Avaaz-Peticiones_online-data_mining_0_823717647.html
Vozpópuli
Seis euros por número de móvil, 1,5 por e-mail: el lucrativo negocio de Change.org
Es un negocio “del orden de decenas de millones de dólares”. La página de peticiones online más popular es pura minería de datos.
WIRELESS ‘BLUEBORNE’ ATTACKS TARGET BILLIONS OF #BLUETOOTH DEVICES
https://threatpost.com/wireless-blueborne-attacks-target-billions-of-bluetooth-devices/127921/
https://threatpost.com/wireless-blueborne-attacks-target-billions-of-bluetooth-devices/127921/
Threatpost
Wireless ‘BlueBorne’ Attacks Target Billions of Bluetooth Devices
Bluetooth attack vector, dubbed ‘BlueBorne’, leaves billions of smart Bluetooth devices open to attack including Android and Apple phones and millions more Linux-based smart devices.
⚠️ "BlueBorne: una vulnerabilidad en Bluetooth pone en riesgo a millones de dispositivos."
Noticia ⤵️ https://derechodelared.com/2017/09/12/blueborne/
Informe detallado ⤵️ http://go.armis.com/hubfs/BlueBorne%20Technical%20White%20Paper.pdf
Noticia ⤵️ https://derechodelared.com/2017/09/12/blueborne/
Informe detallado ⤵️ http://go.armis.com/hubfs/BlueBorne%20Technical%20White%20Paper.pdf
Derecho de la Red
BlueBorne: una vulnerabilidad en Bluetooth pone en riesgo a millones de dispositivos.
Los dispositivos Android, Windows, iOS y Linux están en peligro.
#Adobe Releases Security Updates https://t.co/4obE5n5aG1
www.us-cert.gov
Adobe Releases Security Updates
Adobe has released security updates to address vulnerabilities in Adobe RoboHelp, Flash Player, and ColdFusion. Exploitation of some of these vulnerabilities may allow a remote attacker to take control of an affected system.
#Windows 0-day is exploited to install creepy #Finspy malware (again)
https://arstechnica.com/?p=1164963
https://arstechnica.com/?p=1164963
Ars Technica
Windows 0-day is exploited to install creepy Finspy malware (again)
Microsoft patches flaw after researchers report it was used by undisclosed country.
US-CERT Current Activity
Cisco Releases Security Update
https://www.us-cert.gov/ncas/current-activity/2017/09/11/Cisco-Releases-Security-Update
Original release date: September 11, 2017
Cisco has released an update to address an Apache Struts 2 vulnerability affecting multiple Cisco products. A remote attacker could exploit this vulnerability to take control of an affected system.
US-CERT encourages users and administrators to review the #Cisco Security Advisory and apply the necessary update.
Cisco Releases Security Update
https://www.us-cert.gov/ncas/current-activity/2017/09/11/Cisco-Releases-Security-Update
Original release date: September 11, 2017
Cisco has released an update to address an Apache Struts 2 vulnerability affecting multiple Cisco products. A remote attacker could exploit this vulnerability to take control of an affected system.
US-CERT encourages users and administrators to review the #Cisco Security Advisory and apply the necessary update.
www.us-cert.gov
Cisco Releases Security Update | US-CERT
Cisco has released an update to address an Apache Struts 2 vulnerability affecting multiple Cisco products. A remote attacker could exploit this vulnerability to take control of an affected system.US-CERT encourages users and administrators to review the…
http://e-r00t.net/test-de-penetracion-de-pasarelas-que-realizan-nat-basado-en-connection-tracking/
Test de penetración de pasarelas que realizan NAT basado en “Connection Tracking”.
Connection Tracking, es un método para que las pasarelas realicen automáticamente el reenvío de puertos basado en la inspección de paquetes. Como algunos protocolos (IRC, FTP, SIP, …) requieren que se establezca un canal de comunicación secundario, los dispositivos que realizan NATting requieren un mecanismo que detecte las instrucciones de este protocolo y reenvíe los […]
Test de penetración de pasarelas que realizan NAT basado en “Connection Tracking”.
Connection Tracking, es un método para que las pasarelas realicen automáticamente el reenvío de puertos basado en la inspección de paquetes. Como algunos protocolos (IRC, FTP, SIP, …) requieren que se establezca un canal de comunicación secundario, los dispositivos que realizan NATting requieren un mecanismo que detecte las instrucciones de este protocolo y reenvíe los […]
e-r00t.net
Test de penetración de pasarelas que realizan NAT basado en “Connection Tracking”. – e-r00t
Noticias Informáticas y Hacking
Bashware Attack Undetectable by All Anti-Virus & Security Solutions
According to CheckPoint researchers, the Bashware attack technique could be abused even by a known Linux malware family, because security solutions for Windows are not designed to detect such threats.
http://thehackernews.com/2017/09/windows-10-linux-evade-malware.html?m=1
According to CheckPoint researchers, the Bashware attack technique could be abused even by a known Linux malware family, because security solutions for Windows are not designed to detect such threats.
http://thehackernews.com/2017/09/windows-10-linux-evade-malware.html?m=1
SysAdmin 24x7:
RouteX Malware Uses Netgear Routers for Credential Stuffing Attacks
https://t.co/uBpXREJrtE
RouteX Malware Uses Netgear Routers for Credential Stuffing Attacks
https://t.co/uBpXREJrtE
BleepingComputer
RouteX Malware Uses Netgear Routers for Credential Stuffing Attacks
A Russian-speaking hacker has been infecting Netgear routers over the past months with a new strain of malware named RouteX that he uses to turn infected devices into SOCKS proxies and carry out credential stuffing attacks.
Actualización de seguridad de #SAP de septiembre de 2017 https://t.co/6v6PWKVK3Q
CERTSI
Actualización de seguridad de SAP de septiembre de 2017
SAP ha corregido problemas de seguridad en diferentes productos.