The IoT Attack Vector “BlueBorne” Exposes Almost Every Connected Device https://www.armis.com/blueborne/#/technical
Armis
BlueBorne Cyber Threat Impacts Amazon Echo and Google Home
Following the disclosure of the BlueBorne attack vector this past September, Armis discovered that critical Bluetooth vulnerabilities impact the Amazon Echo and Google Home.
Anyone know more about this Golang ELF SSH Scanner/Bruteforcer/Worm? No persistence #IoT #HoneyPot
https://pastebin.com/agDytSDS
https://pastebin.com/agDytSDS
Best Buy elimina las ventas de Kaspersky por sospechas de espionaje
https://www.redeszone.net/2017/09/11/best-buy-elimina-las-ventas-kaspersky-sospechas-espionaje/
https://www.redeszone.net/2017/09/11/best-buy-elimina-las-ventas-kaspersky-sospechas-espionaje/
Documento de los detalles técnicos que afectan a los dispositivos Bluetooth usando el ataque BlueBorne
http://go.armis.com/hubfs/BlueBorne%20Technical%20White%20Paper.pdf
http://go.armis.com/hubfs/BlueBorne%20Technical%20White%20Paper.pdf
0patching Stream Object Remote Code Execution in Acrobat Reader DC (CVE-2017-11254)
https://www.youtube.com/watch?v=HOGYQStnPaU
https://www.youtube.com/watch?v=HOGYQStnPaU
YouTube
0patching Stream Object Remote Code Execution in Acrobat Reader DC (CVE-2017-11254)
This video demonstrates micropatching of CVE-2017-11254, a use-after-free bug in Acrobat Reader DC that gets exploited by a opening a malicious PDF. First, a...
This media is not supported in your browser
VIEW IN TELEGRAM
Passing data through UNIX file privilege numbers (RWX Triplets)
https://github.com/operatorequals/chmod-stego
https://github.com/operatorequals/chmod-stego
Researchers Demonstrated How Attackers Can Steal Data from Air-Gapped Computers Using IR CCTV camera 🎥 https://amp.thehackernews.com/thn/2017/09/airgap-network-malware-hacking.html
El día de hoy participamos con una conferencia en el XI congreso de ciencias exactas de la Universidad Autonoma de Aguascalientes.
Muchas gracias por la invitación
#HappyHacking
Muchas gracias por la invitación
#HappyHacking
CCleaner Command and Control Causes Concern
http://blog.talosintelligence.com/2017/09/ccleaner-c2-concern.html
http://blog.talosintelligence.com/2017/09/ccleaner-c2-concern.html
Joomla! 3.7.5 - Takeover in 20 Seconds with LDAP Injection
https://blog.ripstech.com/2017/joomla-takeover-in-20-seconds-with-ldap-injection-cve-2017-14596/
https://blog.ripstech.com/2017/joomla-takeover-in-20-seconds-with-ldap-injection-cve-2017-14596/
This Ransomware Demands Nudes Instead of Bitcoin
https://motherboard.vice.com/en_us/article/yw3w47/this-ransomware-demands-nudes-instead-of-bitcoin
https://motherboard.vice.com/en_us/article/yw3w47/this-ransomware-demands-nudes-instead-of-bitcoin