Hackers Hijack Ongoing Email Conversations to Insert Malicious Documents - by @campuscodi
https://t.co/4ivtla94mf
https://t.co/4ivtla94mf
BleepingComputer
Hackers Hijack Ongoing Email Conversations to Insert Malicious Documents
A group of hackers is using a sophisticated technique of hijacking ongoing email conversations to insert malicious documents that appear to be coming from a legitimate source and infect other targets participating in the same conversational thread.
SysAdmin 24x7:
DFIR: Documento sobre como detectar las técnicas de ataque de robo de credenciales mediante el uso de herramientas disponibles en Internet. El PDF muestra cómo actúa Microsoft Advanced Threat Analytics (ATA). Muy interesante el escenario de ataques.
https://t.co/RyHVeKMrG2
DFIR: Documento sobre como detectar las técnicas de ataque de robo de credenciales mediante el uso de herramientas disponibles en Internet. El PDF muestra cómo actúa Microsoft Advanced Threat Analytics (ATA). Muy interesante el escenario de ataques.
https://t.co/RyHVeKMrG2
Microsoft
TechNet ATA Suspicious Activity Playbook
This was updated to include the new ATA v1.8 capabilitiesThis article will walk through the credential theft attack techniques by using readily available research tools on the Internet. At each point of the attack we will show how Microsoft’s Advanced Threat…
Rusia usó drones para ‘hackear’ los móviles de la OTAN en Europa del Este
https://t.co/ABa6J1SPWY
#ciberespionaje #ciberseguridad
https://t.co/ABa6J1SPWY
#ciberespionaje #ciberseguridad
TICbeat
Rusia usó drones para ‘hackear’ los móviles de la OTAN en Europa...
Los soldados de la OTAN desplegados en las fronteras con Rusia han sufrido diversos y muy numerosos ataques de origen ruso para comprometer sus teléfonos y... #ciberespionaje #ciberseguridad #drones
Grave #ciberataque ruso a EEUU: roban documentos altamente secretos a la NSA
https://t.co/hjsx7koqYM
https://t.co/hjsx7koqYM
El Confidencial
Grave ciberataque ruso a EEUU: roban documentos altamente secretos a la NSA
Ciberseguridad: Grave ciberataque ruso a EEUU: roban documentos altamente secretos a la NSA. Noticias de Tecnología. Este gravísimo ataque podría haber ayudado a los piratas a infiltrarse en los sistemas del país americano sin ser vistos.
#Apple Allows Uber to Use a Powerful Feature that Lets it Record iPhone Screen.
https://t.co/T0dSsQmJgC
#TheHackerNews
https://t.co/T0dSsQmJgC
#TheHackerNews
The Hacker News
Apple Allows Uber to Use a Powerful Feature that Lets it Record iPhone Screen
Researcher reveals Apple allowed Uber app to use a powerful screen-recording API that lets it record users' iPhone screen
Some Motherboards Plagued by BIOS Firmware Implementation Flaws
https://www.bleepingcomputer.com/news/security/some-motherboards-plagued-by-bios-firmware-implementation-flaws/
https://www.bleepingcomputer.com/news/security/some-motherboards-plagued-by-bios-firmware-implementation-flaws/
BleepingComputer
Some Motherboards Plagued by BIOS Firmware Implementation Flaws
Alex Matrosov, a security researcher for Cylance, has discovered several flaws in how some motherboard vendors implemented Intel's UEFI BIOS firmware into their products.
Corregidas múltiples vulnerabilidades en Trend Micro OfficeScan
http://unaaldia.hispasec.com/2017/10/corregidas-multiples-vulnerabilidades.html
http://unaaldia.hispasec.com/2017/10/corregidas-multiples-vulnerabilidades.html
Hispasec
Corregidas múltiples vulnerabilidades en Trend Micro OfficeScan
Boletín de noticias de seguridad informática unaaldia, ofrecido por Hispasec
A critical vulnerability affects Siemens smart meters
http://securityaffairs.co/wordpress/63936/hacking/flaw-siemens-smart-meters.html
http://securityaffairs.co/wordpress/63936/hacking/flaw-siemens-smart-meters.html
Security Affairs
A critical vulnerability tracked as CVE-2017-9944 affects Siemens smart meters
Siemens has just released a firmware update for the 7KT PAC1200 Siemens smart meters that addresses a critical vulnerability.
Experts discovered a SYSCON Backdoor using FTP Server as C&C
http://securityaffairs.co/wordpress/63873/malware/syscon-backdoor-ftp.html
http://securityaffairs.co/wordpress/63873/malware/syscon-backdoor-ftp.html
Security Affairs
Experts discovered a SYSCON Backdoor using FTP Server as C&C
Security researchers with Trend Micro discovered a backdoor dubbed SYSCON that uses an FTP server for command and control (C&C) purposes.
Netgear patched a slew of security bugs this past week. Firmware updates are available:
https://t.co/qWUNhXA50n
https://t.co/qWUNhXA50n
'Hackean' la web del mayor sindicato policial (y lleva infiltrada desde 2013)
https://t.co/7VtNvIv7ZG
https://t.co/7VtNvIv7ZG
El Confidencial
'Hackean' la web del mayor sindicato policial y se hacen con datos de 17.790 usuarios
Hackean la web del mayor sindicato policial y se hacen con datos de 17.790 usuarios. Noticias de Tecnología. El grupo de hackers La Nueve, vinculado a Anonymous, ha accedido a parte de la base de datos del Sindicato Unificado de Policía (SUP), el mayoritario…
Wifite 2 - A complete re-write of Wifite (Automated Wireless Attack Tool)
https://t.co/8jWXeGGao8
https://t.co/8jWXeGGao8
KitPloit - PenTest Tools for your Security Arsenal ☣
Wifite 2 - A complete re-write of Wifite (Automated Wireless Attack Tool)
A complete re-write of wifite , a Python script for auditing wireless networks. What's new? Lots of files instead of "one big ...
Cyberstalking Suspect Arrested After VPN Providers Shared Logs With the FBI
https://t.co/euipSBZFpd
https://t.co/euipSBZFpd
yro.slashdot.org
Cyberstalking Suspect Arrested After VPN Providers Shared Logs With the FBI
An anonymous reader writes: "VPN providers often advertise their products as a method of surfing the web anonymously, claiming they never store logs of user activity," writes Bleeping Computer, "but a recent criminal case shows that at least some do store…
Devilishly Clever KnockKnock Attack Tries to Break Into System Email Accounts.
https://t.co/eNBEwnRy0R
https://t.co/eNBEwnRy0R
BleepingComputer
Devilishly Clever KnockKnock Attack Tries to Break Into System Email Accounts
Security researchers have spotted a new type of low-and-slow brute-force attack — which they nicknamed KnockKnock — aimed at companies with Office 365 accounts.