This media is not supported in your browser
VIEW IN TELEGRAM
Así es cómo se ve #PetYa :O
Planta de Chernobyl suspende operación tras ataque de ransomware
A raíz del ataque con ransomware que se llevó a cabo a lo largo de algunos países del Este de Europa hoy día, la planta nuclear de Chernobyl debió suspender sus obras ya que algunos de sus computadores se vieron afectados.
https://www.fayerwayer.com/2017/06/planta-de-chernobyl-suspende-operacion-tras-ataque-de-ransomware/
A raíz del ataque con ransomware que se llevó a cabo a lo largo de algunos países del Este de Europa hoy día, la planta nuclear de Chernobyl debió suspender sus obras ya que algunos de sus computadores se vieron afectados.
https://www.fayerwayer.com/2017/06/planta-de-chernobyl-suspende-operacion-tras-ataque-de-ransomware/
OutlawCountry: CIA’s Hacking Tool For Linux Computers Revealed
https://fossbytes.com/outlawcountry-cia-hacking-tool-linux/
https://fossbytes.com/outlawcountry-cia-hacking-tool-linux/
Linux no se salva, la CIA también tiene un método para robar datos aunque usemos ese sistema
http://omicrono.elespanol.com/2017/06/malware-para-linux-de-la-cia/
http://omicrono.elespanol.com/2017/06/malware-para-linux-de-la-cia/
DropboxC2C is a post-exploitation agent which uses Dropbox Infrastructure for command and control operations.
https://github.com/0x09AL/DropboxC2C/
https://github.com/0x09AL/DropboxC2C/
A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks
https://github.com/D4Vinci/Dr0p1t-Framework
https://github.com/D4Vinci/Dr0p1t-Framework
In this paper, we demonstrate a complete break of RSA-1024 as implemented in Libgcrypt.
https://eprint.iacr.org/2017/627.pdf
https://eprint.iacr.org/2017/627.pdf
The information age is over, welcome to the machine learning age
https://venturebeat.com/2017/06/25/the-information-age-is-over-welcome-to-the-machine-learning-age/
https://venturebeat.com/2017/06/25/the-information-age-is-over-welcome-to-the-machine-learning-age/
VentureBeat
The information age is over, welcome to the machine learning age
I first used a computer to do real work in 1985.
NGINX and PHP Malware Used in Petya/Nyetya Ransomware Attack
https://www.wordfence.com/blog/2017/07/petya-nyetya-nginx-php-malware/
https://www.wordfence.com/blog/2017/07/petya-nyetya-nginx-php-malware/
Fuiste victima de #Petya #GoldenEye ?
Puedes intentar esto:
Master key:
38dd46801ce61883433048d6d8c6ab8be18654a2695b4723
Puedes intentar esto:
Master key:
38dd46801ce61883433048d6d8c6ab8be18654a2695b4723
Gyrfalcon is an SSH session “sharing” tool that operates on outbound OpenSSH sessions from the target
host on which it is run.
http://u.tpx.mx/Gyrfalcon_ssh_pdf
host on which it is run.
http://u.tpx.mx/Gyrfalcon_ssh_pdf
Satellite phone communications can be decrypted in near real-time.
https://www.helpnetsecurity.com/2017/07/07/satellite-phone-communications-decrypted/
https://www.helpnetsecurity.com/2017/07/07/satellite-phone-communications-decrypted/
Help Net Security
Satellite phone communications can be decrypted in near real-time - Help Net Security
Satellite phone communications encrypted with the GMR-2 cipher can be decrypted in mere fractions of a second, two Chinese researchers have proved.
A Real-time Inversion Attack on the GMR-2 Cipher Used in the Satellite Phones
https://eprint.iacr.org/2017/655.pdf
https://eprint.iacr.org/2017/655.pdf