Vuln: Ghostscript Multiple Security Vulnerabilities
Ghostscript Multiple Security Vulnerabilities
View ArticleVuln: Rockwell Automation Logix5000 Controllers CVE-2016-9343 Stack Buffer...
Rockwell Automation Logix5000 Controllers CVE-2016-9343 Stack Buffer Overflow Vulnerability
View ArticleVuln: Slurm CVE-2016-10030 Security Bypass Vulnerability
Slurm CVE-2016-10030 Security Bypass Vulnerability
View ArticleVuln: Game Music Emulators Multiple Memory Corruption Vulnerabilities
Game Music Emulators Multiple Memory Corruption Vulnerabilities
View ArticleVuln: IBM Tivoli Storage Manager CVE-2016-6110 Local Information Disclosure...
IBM Tivoli Storage Manager CVE-2016-6110 Local Information Disclosure Vulnerability
View ArticleVuln: Irssi Multiple Memory Corruption Vulnerabilities
Irssi Multiple Memory Corruption Vulnerabilities
View ArticleVuln: Ghostscript 'psi/zht2.c' NULL Pointer Dereference Remote Code Execution...
Ghostscript 'psi/zht2.c' NULL Pointer Dereference Remote Code Execution Vulnerability
View ArticleVuln: Multiple McAfee Products CVE-2016-8006 Local Authentication Bypass...
Multiple McAfee Products CVE-2016-8006 Local Authentication Bypass Vulnerability
View ArticleVuln: Olive Blog CVE-2016-7839 Cross Site Scripting Vulnerability
Olive Blog CVE-2016-7839 Cross Site Scripting Vulnerability
View ArticleVuln: Plone Unspecified Local File Include Vulnerability
Plone Unspecified Local File Include Vulnerability
View ArticleCheck out this neat ransomware timeline from Privacy-PC...
-- John Bambenek bambenek \at\ gmail /dot/ com Fidelis Cybersecurity (c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View ArticleRansomware Operators Cold Calling UK Schools to Get Malware Through, (Fri,...
UK Law Enforcement authorities released an alert on Wednesday about a new tactic to install ransomware. There are generally two approaches to ransomware attacks, napalm the earth and what I call...
View ArticleVuln: Oracle Java SE CVE-2016-3552 Local Security Vulnerability
Oracle Java SE CVE-2016-3552 Local Security Vulnerability
View ArticleGreat Misadventures of Security Vendors: Absurd Sandboxing Edition, (Fri, Jan...
Like many security researchers, I employ a variety of OPSEC techniques to help detect if I have been targeted by something for whatever reason. One of those techniques I use in Virustotal is basically...
View ArticleBugtraq: QuickBooks 2017 Admin Credentials Disclosure
QuickBooks 2017 Admin Credentials Disclosure
View ArticleUS Intelligence Agency Releases Report on Russian Hacking During US Election:...
-- John Bambenek bambenek \at\ gmail /dot/ com Fidelis Cybersecurity (c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View ArticleOnline databases dropping like flies, with >10k falling to ransomware groups
More than 10,000 website databases have been taken hostage in recent days by attackers who are demanding hefty ransoms for the data to be restored, a security researcher said Friday. The affected data...
View ArticleUsing Security Tools to Compromize a Network, (Sat, Jan 7th)
One of our daily tasks is to assess and improve the security of our customers or colleagues. To achieve this use security tools (linked to processes). With the time, we are all building our personal...
View ArticleMerry X-Mas ransomware from Sunday 2017-01-08, (Mon, Jan 9th)
Introduction On Tuesday 2017-01-03, BleepingComputer published an article about Merry X-Mas Ransomware [1]. This ransomware was first seen by people like @PolarToffee, @dvk01uk, and @Techhelplistcom....
View Article