Warning: Built-in Keylogger Found in MantisTek GK2 Mechanical Gaming Keyboards—Caught Sending Data to China
https://t.co/y0wYl97J4Z
https://t.co/y0wYl97J4Z
The Hacker News
Built-in Keylogger Found in MantisTek GK2 Keyboards—Sends Data to China
Mantistek GK2 mechanical gaming keyboard have a built-in keylogger that silently records everything you type and sends data to a Chinese server.
Researcher Details New Windows Code Injection Technique Named PROPagate
https://www.bleepingcomputer.com/news/security/researcher-details-new-windows-code-injection-technique-named-propagate/
https://www.bleepingcomputer.com/news/security/researcher-details-new-windows-code-injection-technique-named-propagate/
BleepingComputer
Researcher Details New Windows Code Injection Technique Named PROPagate
A security researcher has discovered a new code injection technique that works on all recent Windows versions and allows miscreants to inject malicious code into other applications undetected.
Grave vulnerabilidad en iOS demostrada en Pwn2Own.
http://www.seguridadapple.com/2017/11/grave-vulnerabilidad-en-ios-demostrada.html
http://www.seguridadapple.com/2017/11/grave-vulnerabilidad-en-ios-demostrada.html
Seguridadapple
Grave vulnerabilidad en iOS demostrada en Pwn2Own
Apple advierte sobre los ataques WiFi y como pueden hacer que los dispositivos acaben infectados con malware . El equipo de seguridad...
Parrot Security 3.9 - Security GNU/Linux Distribution Designed with Cloud Pentesting and IoT Security in Mind
#Cloudpentesting #ComputerForensic #Cryptography
http://www.kitploit.com/2017/11/parrot-security-39-security-gnulinux.html
#Cloudpentesting #ComputerForensic #Cryptography
http://www.kitploit.com/2017/11/parrot-security-39-security-gnulinux.html
KitPloit - PenTest Tools for your Security Arsenal ☣
Parrot Security 3.9 - Security GNU/Linux Distribution Designed with Cloud Pentesting and IoT Security in Mind
Leading source of Security Tools, Hacking Tools, CyberSecurity and Network Security ☣
Simple guide on how to set up honeypot AD accounts
https://jordanpotti.com/2017/11/06/honey-accounts/
https://jordanpotti.com/2017/11/06/honey-accounts/
JP
Honey Accounts
I recently saw a tweet mentioning the use of an AD account with the password in the description attribute and logon hours set to none. I can’t find that tweet anymore so I apologize for the lack of…
Google #Chrome will automatically block forced website redirects
#Security #Spam #Google #Internet
https://www.hackread.com/google-chrome-will-automatically-block-forced-website-redirects/
#Security #Spam #Google #Internet
https://www.hackread.com/google-chrome-will-automatically-block-forced-website-redirects/
HackRead
Google Chrome will automatically block forced website redirects
Google is onto making some big changes in the way Chrome works as recently the tech and search engine giant has announced that the popular web browser will
Un fallo de seguridad obliga a suspender el certificado digital de los DNI expedidos desde abril de 2015
https://t.co/iAyIKCJ7tt
https://t.co/iAyIKCJ7tt
EL PAÍS
La policía desactiva la firma digital del DNI por fallos de seguridad
La vulnerabilidad ha sido descubierta por una universidad checa y afecta a los expedidos desde 2015
En España hay un bot por cada 30 usuarios de internet
https://bitlifemedia.com/2017/09/espana-bot-30-usuarios-internet/?platform=hootsuite
https://bitlifemedia.com/2017/09/espana-bot-30-usuarios-internet/?platform=hootsuite
Bit Life Media
En España hay un bot por cada 30 usuarios de internet
Hace un año, la botnet Mirai paralizó parte de la actividad en internet. Y ha sido solo un ejemplo, la tendencia de crecimiento de bots ha sido imparable.
LA RED TOR COMO ELEMENTO DE PRIVACIDAD EN NUESTRAS VIDAS
https://revista.seguridad.unam.mx/numero30/la-red-tor-como-elemento-de-privacidad-en-nuestras-vidas?platform=hootsuite
https://revista.seguridad.unam.mx/numero30/la-red-tor-como-elemento-de-privacidad-en-nuestras-vidas?platform=hootsuite
revista.seguridad.unam.mx
La red Tor como elemento de privacidad en nuestras vidas | Revista .Seguridad
Herramienta de diagnóstico de red.
http://www.gurudelainformatica.es/2017/10/herramienta-de-diagnostico-de-red.html
http://www.gurudelainformatica.es/2017/10/herramienta-de-diagnostico-de-red.html
Gurú de la informática
Herramienta de diagnóstico de red.
MyLG es una utilidad de software de código abierto que combina las funciones de las diferentes sondas de red en una herramienta de diagnóstico de red. Es compatible con todos los sabores de Linux, Mac OS X, FreeBSD y Windows 10.
New WikiLeaks publication reveals CIA wrote code to impersonate Kaspersky Labs anti-virus company.
https://wikileaks.org/vault8/
https://wikileaks.org/vault8/
Ya hay lectura para el domingo.
=========================
All write-ups for FlareCTF posted.
Part 1 - https://t.co/bAMtbCfgQ1
Part 2 - https://t.co/zN7Sb3kQ0I
Part 3 - https://t.co/CfRV6fmbpy
Part 4 - https://t.co/9BsSgoXyLs
Part 5 - https://t.co/Nhcp3Ah2Qc
Part 6 - https://t.co/yNZ2MPdnkN
#infosec #ctf #writeup #reversing
=========================
All write-ups for FlareCTF posted.
Part 1 - https://t.co/bAMtbCfgQ1
Part 2 - https://t.co/zN7Sb3kQ0I
Part 3 - https://t.co/CfRV6fmbpy
Part 4 - https://t.co/9BsSgoXyLs
Part 5 - https://t.co/Nhcp3Ah2Qc
Part 6 - https://t.co/yNZ2MPdnkN
#infosec #ctf #writeup #reversing
IoT Exploitation and Mobile Security Pentesting by Attify
Flare-On 4 CTF write-up (part 1)
Flare-On is a CTF challenge organized by the FLARE team at FireEye Labs. The challenges are reverse engineering based. This year there are a total of 12 challenges with increasing difficulty covering
iOS Hacking: Introducción al análisis dinámico de aplicaciones con Frida
#Hacking #iOS
https://hacking-etico.com/2017/11/09/ios-hacking-introduccion-al-analisis-dinamico-aplicaciones-frida/
#Hacking #iOS
https://hacking-etico.com/2017/11/09/ios-hacking-introduccion-al-analisis-dinamico-aplicaciones-frida/