Lista de Threat Intelligence dominios maliciosos en formato DNS y SNORT para sinkhole dns o para tu ids. Disfruta
https://t.co/zZSkdr5cVz
https://t.co/zZSkdr5cVz
GitHub
kinomakino/Threat-Intelligence-Data
Threat-Intelligence-Data - Snort_rules detection bad actors.
Ejecución remota de código en Hewlett Packard Enterprise Intelligent Management Center #HPE
https://t.co/K4hAf7ktRH
https://t.co/K4hAf7ktRH
CERTSI
Ejecución remota de código en Hewlett Packard Enterprise Intelligent Management Center
Se ha identificado una vulnerabilidad de ejecución remota de código en Hewlett Packard Enterprise Intelligent Management Center (iMC).
PowerShell: How to automatically backup the netlogon debug log
https://social.technet.microsoft.com/wiki/contents/articles/11937.powershell-how-to-automatically-backup-the-netlogon-debug-log.aspx
https://social.technet.microsoft.com/wiki/contents/articles/11937.powershell-how-to-automatically-backup-the-netlogon-debug-log.aspx
Microsoft
PowerShell: How to automatically backup the netlogon debug log - TechNet Articles - United States (English) - TechNet Wiki
Technical articles, content and resources for IT Professionals working in Microsoft technologies
Forwarded from Una al día
unCAPTCHA rompe hasta 450 captchas en cerca de 5 segundos y medio.
http://unaaldia.hispasec.com/2017/10/uncaptcha-rompe-hasta-450-captchas-en.html
http://unaaldia.hispasec.com/2017/10/uncaptcha-rompe-hasta-450-captchas-en.html
Hispasec
unCAPTCHA rompe hasta 450 captchas en cerca de 5 segundos y medio.
Boletín de noticias de seguridad informática unaaldia, ofrecido por Hispasec
#BadRabbit lo ha vuelto a hacer. Descubra cómo reaccionar ante la NUEVA CAMPAÑA DE RANSOMWARE DE GRAN ESCALA
https://t.co/IfAF0MvHEn
https://t.co/IfAF0MvHEn
Talosintelligence
Threat Spotlight: Follow the Bad Rabbit
A blog from the world class Intelligence Group, Talos, Cisco's Intelligence Group
#Oracle
username: OIMINTERNAL
pwd: (single space character)
https://docs.oracle.com/cd/E40329_01/admin.1112/e27149/appdefaultusr.htm#OMADM5326
username: OIMINTERNAL
pwd: (single space character)
https://docs.oracle.com/cd/E40329_01/admin.1112/e27149/appdefaultusr.htm#OMADM5326
APPLE PATCHES KRACK VULNERABILITY IN IOS 11.1
https://threatpost.com/apple-patches-krack-vulnerability-in-ios-11-1/128707/
https://threatpost.com/apple-patches-krack-vulnerability-in-ios-11-1/128707/
Threatpost | The first stop for security news
Apple Patches KRACK Vulnerability in iOS 11.1
Apple has patched the KRACK vulnerability in iOS and elsewhere in its product line, closing a key re-installation vulnerability in the WPA2 protocol implemented used by its software.
Python-based backdoor trojan controlled through
pastebin[.]com,
https://t.co/jQ6tOVGNV9[.]com and
notes[.]io
https://news.drweb.com/show/?i=11528&lng=en
https://vms.drweb.com/virus/?i=15822968&lng=en
pastebin[.]com,
https://t.co/jQ6tOVGNV9[.]com and
notes[.]io
https://news.drweb.com/show/?i=11528&lng=en
https://vms.drweb.com/virus/?i=15822968&lng=en
WordPress Releases Security Update
https://t.co/qy7krNVcJc
https://t.co/qy7krNVcJc
www.us-cert.gov
WordPress Releases Security Update
WordPress versions prior to 4.8.3 are affected by a vulnerability. A remote attacker could exploit this vulnerability to obtain sensitive information.US-CERT encourages users and administrators to review the WordPress Security Release and upgrade to WordPress…
Nearly undetectable #Microsoft Office #exploit installs #malware without an email attachment
https://t.co/1weMpbtzWD
https://t.co/1weMpbtzWD
TechRepublic
Nearly undetectable Microsoft Office exploit installs malware without an email attachment
Security firm Sophos uncovered a zero day exploit that targets a 24-year-old data exchange protocol, and it can be used to silently attack machines with very little means of detection.
WordPress 4.8.3, actualización de seguridad
https://t.co/MlUGsNwa79
https://t.co/MlUGsNwa79
Daboweb | Seguridad y ayuda informática |
[Breves] Wordpress 4.8.3, actualización de seguridad - Daboweb | Seguridad y ayuda informática |
Nueva actualización para WordPress, la 4.8.3 considerada de seguridad que soluciona un problema grave de seguridad sobre la función $wpdb->prepare() que a pesar de no ser vulnerable por si misma podría llegar a inyectar código SQL a través de peticiones inseguras…
DNSCrypt para RPi (o para cualquier sistema si no quieres que nadie vea las webs que visitas)
http://www.hackplayers.com/2017/11/dnscrypt-para-rpi-o-para-cualquier.html?utm_source=dlvr.it&utm_medium=twitter&m=1
http://www.hackplayers.com/2017/11/dnscrypt-para-rpi-o-para-cualquier.html?utm_source=dlvr.it&utm_medium=twitter&m=1
Hackplayers
DNSCrypt para RPi (o para cualquier sistema si no quieres que nadie vea las webs que visitas)
En este post voy a enseñaros a configurar dnscrypt-proxy ( https://dnscrypt.org/ ) y utilizarlo junto con bind en nuestra Raspberry. La e...
What's new in HAProxy 1.8 - HTTP/2 Support, Multithreading, Hitless Reloads, DNS for Service Discovery and more!
https://t.co/YNhq1CgNBI
https://t.co/YNhq1CgNBI
HAProxy Technologies
What's New in HAProxy 1.8 - HAProxy Technologies
The monumental stable release of HAProxy 1.8 is coming! The HAProxy 1.8 release candidate 1 (RC1) has been published by the R&D team here at HAProxy Technologies, and in this blog post we are going to take you through some of the release highlights, new features…
Forwarded from 🔒Seguridad Informática
📃 "Cómo rastrear dispositivos móviles Android sin aplicación instalada" https://www.preyproject.com/es/blog/como-rastrear-dispositivos-moviles-android-sin-aplicacion-instalada
#Android #Google #SeguridadInformática
#Android #Google #SeguridadInformática
Preyproject
Cómo rastrear un celular sin una aplicación instalada
¿Necesitas encontrar tu celular? Descubre cómo rastrear un celular robado, apagado o sin app instalada con métodos efectivos y seguros
Using the DDE Attack with PowerShell Empire
#Hacking #Pentesting #Infosec
https://1337red.wordpress.com/using-the-dde-attack-with-powershell-empire/
#Hacking #Pentesting #Infosec
https://1337red.wordpress.com/using-the-dde-attack-with-powershell-empire/
1337red
Using the DDE attack with PowerShell Empire
Microsoft DDE Exploit Unless you’ve been living under a rock for the past few weeks, you’ll most certainly know about the Microsoft DDE exploit and how it can be abused to weaponise a W…
Full ARM exploitation series on Root-Me. Never stop learning!
Stack, heap, fmt string, UAF, race cond, kernel...
https://t.co/2RoQFbUFYP
Stack, heap, fmt string, UAF, race cond, kernel...
https://t.co/2RoQFbUFYP
www.root-me.org
Challenges/App - System [Root Me : Hacking and Information Security learning platform]
These challenges will help you understand applicative vulnerabilities.
Forensic Analysis of Telegram Messenger on Android Smartphones (PDF)
#telegram #android #forensics
https://t.co/fW1444iVWt
#telegram #android #forensics
https://t.co/fW1444iVWt