Attackers Can Use HVAC Systems to Control Malware on Air-Gapped Networks - by @campuscodi
https://t.co/Yp0J9q4VAs
https://t.co/Yp0J9q4VAs
BleepingComputer
Attackers Can Use HVAC Systems to Control Malware on Air-Gapped Networks
Heating, ventilation, and air conditioning (HVAC) systems can be used as a means to bridge air-gapped networks with the outside world, allowing remote attackers to send commands to malware placed inside a target's isolated network.
Cuando las extensiones de Chrome pasan de espiarte y vender tus datos a usarte para minar criptomonedas
https://www.genbeta.com/seguridad/cuando-las-extensiones-de-chrome-pasan-de-espiarte-y-vender-tus-datos-a-usarte-para-minar-criptomonedas
https://www.genbeta.com/seguridad/cuando-las-extensiones-de-chrome-pasan-de-espiarte-y-vender-tus-datos-a-usarte-para-minar-criptomonedas
Genbeta
Cuando las extensiones de Chrome pasan de espiarte y vender tus datos a usarte para minar criptomonedas
Hay un porcentaje bastante elevado de extensiones maliciosas para Chrome y ahora tenemos que preocuparnos también de que nos usen para minar criptomonedas
Anatomía de un hackeo: de un sqli a enterprise admin: https://t.co/Frj6wEreSl
NotSoSecure
Anatomy of a Hack: SQLi to Enterprise Admin
A story of corporate domain compromise featuring SQLi, OSINT, weak creds, password cracking, insecure configs, pivoting, AV & pure pwnage.
📚 Are you ready for 580 pages of awsomeness? Download these 4 free @vmwarensx eBooks: https://t.co/rkk5CDNdwC https://t.co/2Ei0nn9Mn1
cloudmaniac.net
Free NSX Books: 580 pages of awesomeness
You have some spare time? Say no more, you should download the 4 NSX books below for free, and tell your partner that she/he will see you again in 30 hours.
The Shark CryptoMix Ransomware Variant Smells Blood in the Water - by @LawrenceAbrams
https://t.co/IEECsvYSLj
https://t.co/IEECsvYSLj
BleepingComputer
The Shark CryptoMix Ransomware Variant Smells Blood in the Water
Today, I discovered a new variant of the CryptoMix ransomware that is appending the .SHARK extension to encrypted file names. This family of ransomware usually releases a new version almost every week, if not sooner, so it is a bit surprising to see them…
Actualiza a #WordPress 4.8.2 y #Joomla 3.8.0 https://t.co/CGc8Ob23en #actualización https://t.co/QFBFEbYnCJ
blog.segu-info.com.ar
Actualiza a WordPress 4.8.2 y Joomla! 3.8.0
WordPress 4.8.2 Se ha publicado la versión de WordPress 4.8.2 de seguridad y mantenimiento. Las versiones anteriores se ven afectadas por ...
Email attachment using CVE-2017-8759 exploit targets Argentina https://t.co/rNYxe7FTyE
SANS Internet Storm Center
InfoSec Handlers Diary Blog - Internet Storm Center Diary 2017-09-20
SANS Internet Storm Center - A global cooperative cyber threat / internet security monitor and alert system. Featuring daily handler diaries with summarizing and analyzing new threats to networks and internet security events.
#Joomla! has released version 3.8.0 to address a #vulnerability that allows attacker to access sensitive information https://t.co/sPHzoP6FJu
Joomla!
Joomla! 3.8.0 Release
The Joomla! Project is proud to announce the release of Joomla! 3.8.0.
Samba Releases Security Updates https://t.co/v4h5O7XaUJ
www.us-cert.gov
Samba Releases Security Updates | US-CERT
The Samba Team has released security updates to address several vulnerabilities in Samba. An attacker could exploit any of these vulnerabilities to obtain access to potentially sensitive information. The Samba Team has released security updates to address…
IC3 Issues Alert on Disaster-Related Fraud https://t.co/KjGJlTHx5n
www.us-cert.gov
IC3 Issues Alert on Disaster-Related Fraud
The Internet Crime Complaint Center (IC3) has released an announcement on fraudulent cyber activity related to natural disasters. IC3 reports that scammers have recently used email and social-networking sites to solicit money from disaster victims with scams…
Joomla! Releases Security Update https://t.co/kNAoUvIOao
www.us-cert.gov
Joomla! Releases Security Update
Joomla! has released version 3.8.0 of its Content Management System (CMS) software to address a vulnerability. A remote attacker could exploit this vulnerability to obtain access to sensitive information.
Se viene el malware para Bluetooth: publican una PoC de explotación de la vulnerabilidad #BlueBorne en #Android.
https://t.co/CdanCsEXGP
https://t.co/CdanCsEXGP
blog.segu-info.com.ar
BlueBorne: vulnerabilidad de Bluetooth que afecta a 5.000 millones de dispositivos
La empresa de seguridad Armis ha descubierto un conjunto de ocho exploits que permiten vulnerar las conexiones de prácticamente cualquier d...