Op-ed: Windows 10 0day exploit goes wild, and so do Microsoft marketers
(credit: Johannes Hemmerlein) There's a zero-day exploit in the wild that exploits a key file-sharing protocol in all supported versions of Windows. That includes Windows 10, the latest and most...
View ArticleVuln: Jenkins CVE-2017-2602 Security Bypass Vulnerability
Jenkins CVE-2017-2602 Security Bypass Vulnerability
View ArticleVuln: Jenkins CVE-2017-2603 Information Disclosure Vulnerability
Jenkins CVE-2017-2603 Information Disclosure Vulnerability
View ArticleVuln: Jenkins CVE-2017-2600 Information Disclosure Vulnerability
Jenkins CVE-2017-2600 Information Disclosure Vulnerability
View ArticleVuln: Jenkins CVE-2017-2610 HTML Injection Vulnerability
Jenkins CVE-2017-2610 HTML Injection Vulnerability
View ArticleVuln: IBM Security Key Lifecycle Manager CVE-2016-6103 Cross Site Request...
IBM Security Key Lifecycle Manager CVE-2016-6103 Cross Site Request Forgery Vulnerability
View ArticleDetecting Undisclosed Vulnerabilities with Security Tools & Features,...
Im a big fan of OSSEC[1]. This tools is an open source HIDS and log management tool.Although often considered asthe SIEM of the poor, it integrates a lot of interesting features and is fully...
View ArticleVuln: Libreswan CVE-2016-3071 Remote Denial of Service Vulnerability
Libreswan CVE-2016-3071 Remote Denial of Service Vulnerability
View ArticleVuln: Jenkins CVE-2017-2607 HTML Injection Vulnerability
Jenkins CVE-2017-2607 HTML Injection Vulnerability
View ArticleVuln: Jenkins CVE-2017-2606 Information Disclosure Vulnerability
Jenkins CVE-2017-2606 Information Disclosure Vulnerability
View ArticleMany Malware Samples Found on Pastebin, (Sun, Feb 5th)
pastebin.com is a wonderful website. Im scrapping all posted pasties (not only from pastebin.com) and pass them to a bunch of regular expressions. As I said in a previous diary[1], it is a good way to...
View ArticleDenuvo forgets to secure server, leaks years of messages from game makers
Enlarge The developers at Denuvo have been in the news thanks to cracks against their notoriously tough digital rights management (DRM) tools, which are normally used to lock down video games from...
View ArticleISC Stormcast For Monday, February 6th 2017...
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View ArticleBugtraq: [SECURITY] [DSA 3781-1] svgsalamander security update
[SECURITY] [DSA 3781-1] svgsalamander security update
View ArticleVuln: Microsoft Windows CVE-2017-0016 Memory Corruption Vulnerability
Microsoft Windows CVE-2017-0016 Memory Corruption Vulnerability
View ArticleVuln: Linux Kernel 'EXT4 image' Local Denial of Service Vulnerability
Linux Kernel 'EXT4 image' Local Denial of Service Vulnerability
View ArticleVuln: TigerVNC CVE-2016-10207 Denial of Service Vulnerability
TigerVNC CVE-2016-10207 Denial of Service Vulnerability
View Article