What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
ZDNet.webp 2020-01-13 10:37:27 \'Rosegold\' National Lottery hacker steals £5, lands prison sentence (lien direct) The Sentry MBA brute-force account cracking tool was used to compromise user accounts. Tool ★★★★★
TechRepublic.webp 2020-01-08 15:05:19 Oracle using data science to give retailers an intelligence edge (lien direct) A new tool will use analytics to help retailers better understand the characteristics of their best customers. Tool
TechRepublic.webp 2020-01-07 16:21:48 How to install a bot on Slack (lien direct) Learn how to make onboarding easier with the help of the Donut tool for Slack. Tool
Blog.webp 2020-01-07 07:08:10 Forensic Investigation of Social Networking Evidence using IEF (lien direct) In this article, we will learn about this amazing forensic tool called Magnet Internet Evidence finder (Magnet IEF) which is used to recover or extract evidence from the various data source of the system and then integrate them into a single case file for analysis and reporting. Table of Content Introduction Features of Magnet IEF... Continue reading → Tool
Blog.webp 2020-01-04 08:22:40 (Déjà vu) Windows for Pentester: BITSAdmin (lien direct) In this article, we are going to describe the utility of the BITSAdmin tool and how vital it is in Windows Penetration Testing. TL; DR BITSAdmin is a tool preinstalled on Windows OS that can be used to download malicious files. It is one of the Living Off Land (LOL) Binaries. Disclaimer The main objective... Continue reading → Tool
SecurityAffairs.webp 2019-12-29 09:25:34 A previously undetected FIN7 BIOLOAD loader drops new Carbanak Backdoor (lien direct) Experts uncovered a new tool dubbed BIOLOAD used by the FIN7 cybercrime group used as a dropper for a new variant of the Carbanak backdoor. Security experts from Fortinet’s enSilo have discovered a new loader, dubbed BIOLOAD, associated with the financially-motivated group FIN7. The group that has been active since late 2015 targeted businesses worldwide […] Tool
bleepingcomputer.webp 2019-12-27 11:31:00 FIN7 Hackers\' BIOLOAD Malware Drops Fresher Carbanak Backdoor (lien direct) Malware researchers have uncovered a new tool used by the financially-motivated cybercriminal group known as FIN7 to load newer builds of the Carbanak backdoor. [...] Malware Tool
securityintelligence.webp 2019-12-23 12:00:20 Slowing Data Security Tool Sprawl in a Hybrid Multicloud World (lien direct) Having centralized visibility and control over the organization's data security and compliance posture helps security teams take a comprehensive approach to hybrid multicloud data protection. Tool
Pirate.webp 2019-12-19 15:06:54 WiFi-Dumper – Dump WiFi Profiles and Cleartext Passwords (lien direct) WiFi-Dumper – Dump WiFi Profiles and Cleartext PasswordsWiFi-Dumper is an open-source Python-based tool to dump WiFi profiles and cleartext passwords of the connected access points on a Windows machine. This tool will help you in a Wifi penetration testing and could also be useful when performing red team assessments or internal infrastructure engagements. Each option in the tool generates the “.txt” file as an output, if you run the tool multiple times, the output gets appended to the previous results. Read the rest of WiFi-Dumper – Dump WiFi Profiles and Cleartext Passwords now! Only available at Darknet. Tool
itsecurityguru.webp 2019-12-18 10:17:56 (Déjà vu) Vulnerable Windows PCs identified with New BlueKeep Scanner (lien direct) A new scanning tool is now available for checking if your computer is vulnerable to the BlueKeep security issue in Windows Remote Desktop Services. Despite Microsoft rolling out a patch in mid-May, there are tens of thousands of devices exposing a Remote Desktop Protocol (RDP) service to the public internet. Source: Bleeping Computer Tool
bleepingcomputer.webp 2019-12-18 03:32:00 New BlueKeep Scanner Lets You Find Vulnerable Windows PCs (lien direct) A new scanning tool is now available for checking if your computer is vulnerable to the BlueKeep security issue in Windows Remote Desktop Services. [...] Tool
AlienVault.webp 2019-12-11 14:00:00 Google Cloud Platform security monitoring with USM Anywhere™ (lien direct) According to a 2019 Cyber Security Report published by the International Information System Security Certification Consortium, 93 percent of organizations say they are concerned about cloud security and 28 percent admit to having experienced cloud security incidents during the past year. The reality is, most companies lack the specialized knowledge and skills needed to provide that customer data stored in the cloud is protected Cloud service providers (CSPs) do provide extra security layers, such as automating threat detection, with the intent of making their customers feel more confident in the security of the cloud. However, the number of cloud breaches that are being reported shows that CSPs and organizations alike continue to struggle with cloud security. Much of this is due to a lack of unified visibility not just in the cloud, but across an organization’s entire network, siloed teams and technologies, lack of threat intelligence, and partnerships with third-parties whose security controls are not up to snuff. To address these challenges, many in the industry are advocating for organizations to simplify and unify their security approach, i.e. bring as many controls as possible into a single solution in order to break down the silos between security teams and technologies and to give greater visibility across the organization. We at AT&T Cybersecurity help organizations to accomplish this with our Unified Security Management™ (USM) Anywhere platform.  Of course, the effectiveness of any security solution is largely determined by the threat intelligence underpinning it. In any environment, we need to identify the common tactics, techniques, and procedures (TTPs) adversaries are using in their attacks. Below, we provide an overview of the latest threat intelligence from Alien Labs™ for Google Cloud Platform (GCP), which helps security practitioners to discover issues in their cloud workloads and detect adversaries exploiting attack vectors commonly seen in cloud environments. Google Cloud Platform integration in USM This summer, AT&T Cybersecurity launched the USM Anywhere™ integration with GCP. Through the USM Anywhere Alien App for GCP, USM can now consume all logging information managed by the Stackdriver utility in a configurable and intuitive way. Google Cloud Platform logs are provided through three major channels: Audit Logs. Record all events impacting objects within the environment. These logs are used to monitor any cloud assets, presenting a solid baseline for security detection. VPC Flow Logs. Half way between resource monitoring and cloud infrastructure security, these logs are the delights of NIDS enthusiasts. Firewall Logs. These help with auditing firewall rules events, and they are useful in detecting risky open ports and other configuration issues. In USM, these channels are processed by different plugins, which extract pieces of intelligence and map them to variables that are easy to steer into orchestration rules. The correlation engine allows for the combination of detections from different channels into a single orchestration rule, scaling GCP security to a new level. To prevent an intrusion from being recorded or triggering a notification, adversaries may try to disable audit logging once they get the necessary permissions. To protect against that, the product has out of the box correlation rules to generate an alert if any of the logging features is disabled. Tool Threat Guideline Uber
grahamcluley.webp 2019-12-07 17:48:38 Amazon battles leaky S3 buckets with a new security tool (lien direct) A new AWS feature is supposed to help avoid accidental misconfigurations that could result in sensitive data being exposed, a company’s brand being damaged, and even – potentially – put its customers at risk. Read more in my article on the Bitdefender Business Insights blog. Tool
TechRepublic.webp 2019-12-06 19:25:22 TeamViewer unveils new patch management system (lien direct) The new tool will provide IT departments with system-wide visibility of all the patches needed. Tool
SecurityAffairs.webp 2019-12-05 12:34:51 China used the Great Cannon DDoS Tool against forum used by Hong Kong protestors (lien direct) China is accused to have used the “Great Cannon” DDoS tool to launch attacks against LIHKG, a forum used by Hong Kong residents to organize protests. The Great Cannon Distributed Denial of Service (DDoS) tool was used again by the Chinese government, this time it was used to target the LIHKG forum used by Hong Kong protesters to […] Tool
AlienVault.webp 2019-12-04 15:28:00 The “Great Cannon” has been deployed again (lien direct) Summary The Great Cannon is a distributed denial of service tool (“DDoS”) that operates by injecting malicious Javascript into pages served from behind the Great Firewall. These scripts, potentially served to millions of users across the internet, hijack the users’ connections to make multiple requests against the targeted site. These requests consume all the resources of the targeted site, making it unavailable: Figure 1: Simplified diagram of how the Great Cannon operates The Great Cannon was the subject of intense research after it was used to disrupt access to the website Github.com in 2015. Little has been seen of the Great Cannon since 2015. However, we’ve recently observed new attacks, which are detailed below. Most recent attacks against LIHKG The Great Cannon is currently attempting to take the website LIHKG offline. LIHKG has been used to organize protests in Hong Kong. Using a simple script that uses data from UrlScan.io, we identified new attacks likely starting Monday November 25th, 2019. Websites are indirectly serving a malicious javascript file from either: http://push.zhanzhang.baidu.com/push.js; or http://js.passport.qihucdn.com/11.0.1.js Normally these URLs serve standard analytics tracking scripts. However, for a certain percentage of requests, the Great Cannon swaps these on the fly with malicious code:  Figure 2: Malicious code served from the Great Cannon The code attempts to repeatedly request the following resources, in order to overwhelm websites and prevent them from being accessible: http://lihkg.com/ https://i.loli.net/2019/09/29/hXHglbYpykUGIJu.gif?t= https://na.cx/i/XibbJAS.gif?t= https://na.cx/i/UHr3Dtk.gif?t= https://na.cx/i/9hjf7rg.gif?t= https://na.cx/i/qKE4P2C.gif?t= https://na.cx/i/0Dp4P29.gif?t= https://na.cx/i/mUkDptW.gif?t= https://na.cx/i/ekL74Sn.gif?t= https://i.ibb.co/ZBDcP9K/LcSzXUb.gif?t= https://66.media.tumblr.com/e06eda7617fb1b98cbaca0edf9a427a8/tumblr_oqrv3wHXoz1sehac7o1_540.gif?t= https://na.cx/i/6hxp6x9.gif?t= https://live.staticflickr.com/65535/48978420208_76b67bec15_o.gif?t= https://i.lihkg.com/540/https://img.eservice-hk.net/upload/2018/08/09/181951_60e1e9bedea42535801bc785b6f48e7a.gif?t= https://na.cx/i/E3sYryo.gif?t= https://na.cx/i/ZbShS2F.gif?t= https://na.cx/i/LBppBac.gif?t= http://i.imgur.com/5qrZMPn.gif?t= https://na.cx/i/J3q35jw.gif?t= https://na.cx/i/QR7JjSJ.gif?t= https://na.cx/i/haUzqxN.gif?t= https://na.cx/i/3hS5xcW.gif?t= https://na.cx/i/z340DGp.gif?t= https://luna.komica Tool Threat
NoticeBored.webp 2019-12-03 17:12:11 NBlog Dec 3 - infosec driving principles (lien direct) In an interview for CIO Dive, Maersk's recently-appointed CISO Andy Powell discussed aligning the organization with these five 'key operating principles':"The first is trust. The client has got to trust us with their data, to trust us to look at their business. So we've got to build trust through the cybersecurity solutions that we put in place. That is absolutely fundamental. So client trust, client buy-in has been fundamental to what we tried to drive as a key message. The second is resilience. Because you've got to have resilient systems because clients won't give you business if you're not resilient ... The third really is around the fact that security is everybody's responsibility. And we push that message really hard across the company … be clear about what you need to do and we train people accordingly. ...The fourth one really is accountability of security and I have pushed accountability for cyber risk to the business. ... And the final piece, and this has been one of the big call outs of my team to everybody, is that security is a benefit, not a burden. The reason I say that is people's perception is that security will slow things down, will get in the way ... the reality is that if you involve security early enough, you can build solutions that actually attract additional clients."Fair enough Andy. I wouldn't particularly quarrel with any of them, but as to whether they would feature in my personal top-five I'm not so sure. Here are five others they'd be competing against, with shipping-related illustrations just for fun:Governance involves structuring, positioning, setting things up and guiding the organization in the right overall direction - determining then plotting the optimal route to the ship's ultimate destination, loading up with the right tools, people and provisions. Corporate governance necessarily involves putting things in place for both protecting and exploiting information, a vital and valuable yet vulnerable business asset;Information is subject to risks that can and probably should be managed proactively, just as a ship's captain doesn't merely accept the inclement weather and various other hazards but, where appropriate, actively mitigates or avoids them, dynamically reacting and adjusting course as things change;Flexibility and responsiveness, along with resilience and ro Tool Guideline NotPetya
ESET.webp 2019-12-03 16:40:41 Notorious spy tool taken down in global operation (lien direct) IM-RAT, which could be had for as little as US$25, was bought by nearly 15,000 people Tool ★★★
Mandiant.webp 2019-12-03 16:00:00 Analyse exceller & # 8211;Conseils et astuces pour analyser les données avec Microsoft Excel
Excelerating Analysis – Tips and Tricks to Analyze Data with Microsoft Excel
(lien direct)
Les enquêtes sur la réponse aux incidents n'impliquent pas toujours des artefacts standard basés sur l'hôte avec des outils d'analyse et d'analyse entièrement développés.Chez FireEye Mandiant, nous rencontrons fréquemment des incidents qui impliquent un certain nombre de systèmes et de solutions qui utilisent des données de journalisation ou d'artefacts personnalisés.La détermination de ce qui s'est passé dans un incident consiste à plonger dans le type de données qui nous sont présentés, à l'apprendre et à développer un moyen efficace d'analyser les preuves importantes. L'un des outils les plus efficaces pour effectuer ce type d'analyse est celui qui est dans presque tout le monde \'s Toolkit
Incident response investigations don\'t always involve standard host-based artifacts with fully developed parsing and analysis tools. At FireEye Mandiant, we frequently encounter incidents that involve a number of systems and solutions that utilize custom logging or artifact data. Determining what happened in an incident involves taking a dive into whatever type of data we are presented with, learning about it, and developing an efficient way to analyze the important evidence. One of the most effective tools to perform this type of analysis is one that is in almost everyone\'s toolkit
Tool ★★★
Blog.webp 2019-12-03 09:18:47 Windows for Pentester: Certutil (lien direct) In this article, we are going to describe the utility of Certutil tool and how vital it is in Windows Penetration Testing. TL; DR Certutil is a preinstalled tool on Windows OS that can be used to download malicious files and evade Antivirus. It is one of the Living Off Land (LOL) Binaries. Disclaimer The... Continue reading → Tool
Pirate.webp 2019-12-02 07:09:50 truffleHog – Search Git for High Entropy Strings with Commit History (lien direct) truffleHog – Search Git for High Entropy Strings with Commit HistorytruffleHog is a Python-based tool to search Git for high entropy strings, digging deep into commit history and branches. This is effective at finding secrets accidentally committed. truffleHog previously functioned by running entropy checks on git diffs. This functionality still exists, but high signal regex checks have been added, and the ability to surpress entropy checking has also been added. truffleHog --regex --entropy=False https://github.com/dxa4481/truffleHog.git or truffleHog file:///user/dxa4481/codeprojects/truffleHog/ truffleHog will go through the entire commit history of each branch, and check each diff from each commit, and check for secrets. Read the rest of truffleHog – Search Git for High Entropy Strings with Commit History now! Only available at Darknet. Tool
The_Hackers_News.webp 2019-12-02 06:26:26 New Facebook Tool Let Users Transfer Their Photos and Videos to Google (lien direct) Facebook has finally started implementing the open source data portability framework as the first phase of 'Data Transfer Project,' an initiative the company launched last year in collaboration with Google, Apple, Microsoft, and Twitter. Facebook today announced a new feature that will allow its users to transfer their Facebook photos and videos to their Google Photos accounts-directly and Tool ★★★
The_Hackers_News.webp 2019-11-29 04:41:02 Europol Shuts Down \'Imminent Monitor\' RAT Operations With 13 Arrests (lien direct) In a coordinated International law enforcement operation, Europol today announced to shut down the global organized cybercrime network behind Imminent Monitor RAT, yet another hacking tool that allows cybercriminals to gain complete control over a victim's computer remotely. The operation targeted both buyers and sellers of the IM-RAT (Imminent Monitor Remote Access Trojan), which was sold to Tool ★★★★
TechRepublic.webp 2019-11-28 14:30:00 How to decide when you should DIY or hire a project out (lien direct) Leaders are often faced with questions on whether they should develop a capability or tool in-house or use outside partners. Here are guidelines for making the call. Tool Guideline
Mandiant.webp 2019-11-25 20:00:00 Fidl: Bibliothèque de décompilation Ida de Flare \\
FIDL: FLARE\\'s IDA Decompiler Library
(lien direct)
IDA Pro et les décompiler des rayons hexadécimaux font la base de toute boîte à outils pour la recherche en ingénierie inverse et en vulnérabilité.Dans un article de blog précédent, nous avons expliqué comment l'API des rayons hexadécimaux peut être utilisé pour résoudre de petits problèmes bien définis couramment considérés comme faisant partie de l'analyse des logiciels malveillants.Avoir accès à une représentation de code binaire de niveau supérieur fait du décompilateur des rayons hexagonaux un outil puissant pour l'ingénierie inverse.Cependant, l'interaction avec l'API Hexrays et ses sources de données sous-jacentes peut être intimidante, ce qui rend la création de scripts d'analyse générique difficile ou fastidieux. Ce billet de blog présente le Fla
IDA Pro and the Hex Rays decompiler are a core part of any toolkit for reverse engineering and vulnerability research. In a previous blog post we discussed how the Hex-Rays API can be used to solve small, well-defined problems commonly seen as part of malware analysis. Having access to a higher-level representation of binary code makes the Hex-Rays decompiler a powerful tool for reverse engineering. However, interacting with the HexRays API and its underlying data sources can be daunting, making the creation of generic analysis scripts difficult or tedious. This blog post introduces the FLA
Malware Tool Vulnerability ★★★
TechRepublic.webp 2019-11-25 14:52:48 Samsung adds two modems to help enable wider 5G rollout (lien direct) Verizon will be the first customer to buy a tool that supports 5G networks that are easier to enable, smaller in size and more efficient in how they use power. Tool
TechRepublic.webp 2019-11-25 10:05:09 Azure Arc: Managing hybrid cloud deployment (lien direct) Microsoft's new management tool brings Azure management to any hybrid cloud. Tool
no_ico.webp 2019-11-22 12:33:34 Expert Comments On Audit Voting Machine Arlo (lien direct) The CISA and the DHS's main cyber division announced the launch of Arlo, a new tool to help election and government officials audit voting machines to determine they've been tampered with, and it has already been distributed in six states. The ISBuzz Post: This Post Expert Comments On Audit Voting Machine Arlo Tool
ZDNet.webp 2019-11-21 23:58:53 CISA and VotingWorks release open source post-election auditing tool (lien direct) New Arlo open-source tool will help state officials verify electronically-tallied ballots. Tool
SecurityAffairs.webp 2019-11-20 06:35:59 Ransomware Revival: Troldesh becomes a leader by the number of attacks (lien direct) Ransomware accounted for over half of all malicious mailings in H1 2019, Troldesh aka Shade being the most popular tool among cybercriminals. Group-IB, a Singapore-based cybersecurity company: ransomware accounted for over half of all malicious mailings in H1 2019, detected and analyzed by Group-IB's Computer Emergency Response Team (CERT-GIB), with Troldesh aka Shade being the most popular tool […] Ransomware Tool
NoticeBored.webp 2019-11-19 20:20:14 NBlog Nov 18 - enough is enough (lien direct) Keeping ISO27k Information Security Management Systems tight, constrained within narrow scopes, avoiding unnecessary elaboration, seems an admirable objective. The advantages of ISMS simplicity include having less to design, implement, monitor, manage, maintain, review and audit. There's less to go wrong. The ISMS is more focused, a valuable business tool with a specific purpose rather than a costly overhead. All good. However, that doesn't necessarily mean that it is better to have fewer ISMS documents. In practice, simplifying ISMS documentation generally means combining docs or dispensing with any that are deemed irrelevant. That may not be the best approach for every organization, especially if it goes a step too far.Take information security policies for example. Separate, smaller policy docs are easier to generate and maintain, {re}authorize and {re}circulate individually than a thick monolithic “policy manual”. It's easier for authors, authorisers and recipients to focus on the specific issue/s at hand. That's important from the governance, awareness and compliance perspective. At a basic level, what are the chances of people actually bothering to read the change management/version control/document history info then check out all the individual changes (many of which are relatively insignificant) when yet another updated policy manual update drops into their inbox? In practice, it aint gonna happen, much to the chagrin of QA experts!On the other hand, individual policies are necessarily interlinked, forming a governance mesh: substantial changes in one part can have a ripple effect across the rest, which means someone has the unenviable task of updating and maintaining the entire suite, keeping everything reasonably consistent. Having all the policies in one big document makes maintenance easier for the author/maintainer, but harder for change managers, authorisers and the intended audiences/users. Tool
TechRepublic.webp 2019-11-19 17:00:00 Slack\'s open source Nebula overlay network tool can solve multi region connectivity woes (lien direct) The new point-to-point networking overlay was developed as a replacement to IPsec that allows for multi region connectivity in public cloud, though has broader applications for IoT devices. Tool ★★★★★
TechRepublic.webp 2019-11-18 18:53:17 Joan is the office booking tool you need (lien direct) If you need hardware to help manage the booking of your meeting rooms, Joan may be the ideal solution. Tool
TechRepublic.webp 2019-11-15 21:27:48 How to add container management to Cockpit (lien direct) The Cockpit web-based admin tool can be extended to include container management. Tool
no_ico.webp 2019-11-13 14:12:06 Expert Comments On Why Jailbroken Devices May Threaten Mobile Financial Services (lien direct) Banks and financial institutions have more reason to worry about the threat of jailbroken devices attempting to access their mobile financial services, with the release of the new Checkra1n jailbreak tool this week. The ISBuzz Post: This Post Expert Comments On Why Jailbroken Devices May Threaten Mobile Financial Services Tool Threat
TechRepublic.webp 2019-11-12 19:43:19 How to batch rename files in Windows 10 with the PowerToys PowerRename tool (lien direct) Learn how to use the PowerToys PowerRename tool to rename multiple files in one shot. Tool
BBC.webp 2019-11-12 11:38:43 General election 2019: \'Cyber-attack\' on Labour Party digital platforms (lien direct) The party says the "large-scale" DDoS attack failed, but an online campaigning tool was disrupted. Tool
bleepingcomputer.webp 2019-11-12 06:04:11 YouTube BitCoin Videos Pushing Predator Info-Stealing Trojan (lien direct) A new scam is underway on YouTube that uses videos to promote a tool that can allegedly generate the private key for a bitcoin address. The attackers then claim this key would then allow you to gain access to the bitcoins stored in the bitcoin address, when in reality the victims will be infected with a password stealing Trojan. [...] Tool
SecurityAffairs.webp 2019-11-11 15:44:16 CERTrating a new Tool to evaluate CERT/CSIRT maturity level (lien direct) The Global Cyber Security Center has developed a tool named CERTrating to evaluate the Maturity Level of CERTs and services provided to the Constituency Cyber-attacks that have occurred in recent years have fully confirmed that Cybersecurity is an increasingly complex challenge that represents a priority for all companies both in terms of development and investments. […] Tool
SecurityAffairs.webp 2019-11-08 11:01:36 Capesand is a new Exploit Kit that appeared in the threat landscape (lien direct) A recently discovered exploit kit dubbed Capesand is being involved in live attacks despite the fact that it's still under development. In October 2019, researchers at TrendMicro discovered a new exploit kit dubbed Capesand that is being involved in live attacks. The tool was discovered while analyzing a malvertising campaign employing the RIG EK to […] Tool Threat
TechRepublic.webp 2019-11-07 21:02:02 How to install applications from the command line in CentOS 8 (lien direct) The default package manager for CentOS 8 has migrated from yum to dnf. Find out how this tool is used. Tool
TechRepublic.webp 2019-11-07 16:14:32 11 items project managers should include in a Problem Identification and Tracking document (lien direct) A Problem Identification and Tracking document is an essential tool for every project. Learn what to include in the document to help your team manage and reduce project risks. Tool
CSO.webp 2019-11-07 03:07:00 Best Android antivirus? The top 9 tools (lien direct) The following are the nine best business-class antivirus tools for Android, according to AV-TEST's September 2019 evaluations of 19 Android security apps. (The AV-TEST Institute is a Germany-based independent service provider of IT security and antivirus research.)AV-TEST rates each tool for three areas: protection (six points max), performance (six points max), and usability (six points max). The products listed here all had perfect scores of 18.[ Learn how SandBlast Mobile simplifies mobile security. | Get the latest from CSO by signing up for our newsletters. ] Tool
ZDNet.webp 2019-11-05 21:13:00 Kamerka OSINT tool shows your country\'s internet-connected critical infrastructure (lien direct) Kamerka lets you see what a hacker sees. It plots maps with SCADA equipment, webcams, and printers that have been left exposed on the internet inside any given country. Tool
SecurityAffairs.webp 2019-11-05 06:29:03 Flaws in Able2Extract Professional tool allow hacking targeted machine with malicious image files (lien direct) Researchers found serious flaws in Investintech's Able2Extract Professional tool that could be exploited to execute arbitrary code using specially crafted image files. The Able2Extract Professional has over 250,000 licensed users across 135 countries, it allows them to view, convert and edit PDF files. Cisco Talos experts discovered two high-severity memory corruption vulnerabilities that can be […] Tool
Pirate.webp 2019-11-01 15:21:01 Sooty – SOC Analyst All-In-One CLI Tool (lien direct) Sooty – SOC Analyst All-In-One CLI ToolSooty is a tool developed with the task of aiding a SOC analyst to automate parts of their workflow and speed up their process. The main goal of Sooty is to perform as much of the routine checks as possible which allows the analyst more time to spend on deeper analysis. Features of Sooty SOC Analyst CLI Tool Sanitise URL's to be safe to send in emails Perform reverse DNS and DNS lookups Perform reputation checks from: VirusTotal BadIP's Abuse IPDB Check if an IP address is a TOR exit node Decode Proofpoint URL's, UTF-8 encoded URLS, Office SafeLink URL's and Base64 Strings Get file hashes and compare them against VirusTotal (see requirements) Perform WhoIs Lookups Check Usernames and Emails against HaveIBeenPwned to see if a breach has occurred. Read the rest of Sooty – SOC Analyst All-In-One CLI Tool now! Only available at Darknet. Tool
bleepingcomputer.webp 2019-10-31 13:51:11 Chinese Hackers Steal SMS Messages from Linux Routing Servers (lien direct) Chinese hackers deployed a new cyber-espionage tool on Linux servers belonging to a telecommunications network provider to steal SMS message content for specific recipients. [...] Tool
Mandiant.webp 2019-10-31 08:00:00 Messagetap: Qui lit vos messages texte?
MESSAGETAP: Who\\'s Reading Your Text Messages?
(lien direct)
Fireeye Mandiant a récemment découvert une nouvelle famille de logiciels malveillants utilisé par APT41 (un groupe APT chinois) conçu pour surveiller et enregistrer le trafic SMS à partir de numéros de téléphone spécifiques, de numéros IMSI et de mots clés pour le vol ultérieur.Nommé Messagetap, l'outil a été déployé par APT41 dans un fournisseur de réseaux de télécommunications à l'appui des efforts d'espionnage chinois.Les opérations d'APT41 \\ ont inclus des missions de cyber-espionnage parrainées par l'État ainsi que des intrusions financièrement motivées.Ces opérations se sont déroulées depuis 2012 à nos jours.Pour un aperçu de l'APT41, consultez notre Août 2019 Blog Post ou Malware Tool APT 41 ★★★
ESET.webp 2019-10-30 16:59:04 Facebook builds tool to confound facial recognition (lien direct) However, the social network harbors no plans to deploy the technology in any of its services any time soon Tool
SecurityAffairs.webp 2019-10-30 15:34:12 Emsisoft released a free decryption tool for Paradise ransomware (lien direct) Researchers at Emsisoft firm has released a new free tool to decrypt files encrypted by the Paradise ransomware Security experts at Emsisoft have developed a tool to decrypt files encrypted by the Paradise ransomware. This ransomware family encrypts files using Salsa20 and RSA-1024 and it appends several extensions to theis filenames. “The Paradise ransomware encrypts […] Ransomware Tool
Last update at: 2024-07-02 19:08:25
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter