Microsoft releases often interesting tools to help systemadministratorsand incident handlers to investigate suspicious activities on Windows systems. In 2012, they released a free tool called FCIV( File Checksum Integrity Verifier )(1).
Original release date: August 31, 2015 The US-CERT Cyber Security Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and Technology (NIST) National Vulnerability Database (NVD) in the past week. The NVD is sponsored by the Department of Homeland Security (DHS) National Cybersecurity and Communications Integration Center (NCCIC) / United States Computer Emergency Readiness Team (US-CERT).
A few months ago, researchers found a backdoor in an LTE consumer router. Today, we learned that his hole exists in a number of DSL routers, including ones given to customers by ISPs. Watch the video to learn about this secret admin account, and what you can do to mitigate access to it.
I’ve talked about the Ashley Madison breach before, but the news keeps coming. Today’s video covers, tragic suicides, new attack details, a CTO hacker, and criminals extorting the victims.
The Curious Case of the Document Exploiting an Unknown Vulnerability – Part 2: RATs, Hackers and Rihanna
Previously my colleague Wayne talked about an interesting document exploit targeting CVE-2015-1641. In this post, we will talk about who might be behind the attack. We start our correlation with the analysis of the exploit payload – a remote adminis…
It’s pretty impressive to know an 18 year old Italian teenager is already finding vulnerabilities in OS X. However, I hope he learns to disclose them responsibly, and starts informing vendors first. This week, news surfaced of a zero day privileges escalation flaw in the latest version of OS X Yosemite