Google teaches “AIs” to invent their own crypto and avoid eavesdropping
Google Brain has created two artificial intelligences that evolved their own cryptographic algorithm to protect their messages from a third AI, which was trying to evolve its own method to crack the...
View ArticleVuln: QEMU 'hw/9pfs/9p.c' Denial of Service Vulnerability
QEMU 'hw/9pfs/9p.c' Denial of Service Vulnerability
View ArticleVuln: HP System Management Homepage Multiple Security Vulnerabilities
HP System Management Homepage Multiple Security Vulnerabilities
View ArticleVuln: SAP Hybris Management Console CVE-2016-6857 HTML Injection Vulnerability
SAP Hybris Management Console CVE-2016-6857 HTML Injection Vulnerability
View ArticleiPhone hack that threatened emergency 911 system lands teen in jail
Enlarge Authorities said they arrested an 18-year-old iPhone app developer on charges of felony computer tampering after he unleashed code that threatened to take down emergency 911 systems in a large...
View ArticleVuln: Novell NetIQ Identity Manager CVE-2015-0787 HTML Injection Vulnerability
Novell NetIQ Identity Manager CVE-2015-0787 HTML Injection Vulnerability
View ArticleVuln: Wordpress contus-video-comments Plugin 'save.php' Arbitrary File Upload...
Wordpress contus-video-comments Plugin 'save.php' Arbitrary File Upload Vulnerability
View ArticleVuln: Moodle CVE-2016-7919 Information Disclosure Vulnerability
Moodle CVE-2016-7919 Information Disclosure Vulnerability
View ArticleHelp us improve our daily #podcast by participating in this 2 question survey...
--- Johannes B. Ullrich, Ph.D. STI|Twitter|LinkedIn (c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View ArticleVolatility Bot: Automated Memory Analysis, (Sun, Oct 30th)
Few weeks ago Ive attended the SANS DFIR Summit in Prague, and one of the very interesting talks was from Martin Korman (@MartinKorman), who presented a new tool he developed: Volatility Bot....
View ArticleISC Stormcast For Monday, October 31st 2016...
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View ArticleBugtraq: [SECURITY] [DSA 3691-2] ghostscript regression update
[SECURITY] [DSA 3691-2] ghostscript regression update
View ArticleBugtraq: October 2016 - Crowd - Critical Security Advisory
October 2016 - Crowd - Critical Security Advisory
View ArticleVuln: Microfocus Rumba FTP CVE-2016-5764 Stack Buffer Overflow Vulnerability
Microfocus Rumba FTP CVE-2016-5764 Stack Buffer Overflow Vulnerability
View ArticleVuln: Novell NetIQ Identity Manager CVE-2016-1598 Cross Site Scripting...
Novell NetIQ Identity Manager CVE-2016-1598 Cross Site Scripting Vulnerability
View ArticleVuln: Novell NetIQ Identity Manager CVE-2016-1592 HTML Injection Vulnerability
Novell NetIQ Identity Manager CVE-2016-1592 HTML Injection Vulnerability
View ArticleVuln: OpenJPEG 'convert.c' Remote Heap Based Buffer Overflow Vulnerability
OpenJPEG 'convert.c' Remote Heap Based Buffer Overflow Vulnerability
View ArticleVuln: OpenJPEG 'convert.c' Null Pointer Dereference Denial of Service...
OpenJPEG 'convert.c' Null Pointer Dereference Denial of Service Vulnerability
View ArticleVuln: OpenJPEG 'convert.c' CVE-2016-9116 Null Pointer Dereference Denial of...
OpenJPEG 'convert.c' CVE-2016-9116 Null Pointer Dereference Denial of Service Vulnerability
View Article