security-obscurity.blogspot.com
Security Obscurity Blog: About the new java 0 day vulnerability (CVE-2013-0422)
http://security-obscurity.blogspot.com/2013/01/about-new-java-0-day-vulnerability.html
Yes, another blog. Thursday, January 10, 2013. About the new java 0 day vulnerability (CVE-2013-0422). A couple of hours ago @Kafeine. Discovered a new java 0 day exploit in the wild. This exploit is served by most exploit kits like Blackhole, Cool exploit kit and Nuclear pack.When the malicious applet is executed its download and execute a copy of Zeus. A curious thing is that Zbot comes with a self signed digital certificate. But detection rate is quite good with 12/46 link. You can find both files here.
security-obscurity.blogspot.com
Security Obscurity Blog: March 2013
http://security-obscurity.blogspot.com/2013_03_01_archive.html
Yes, another blog. Tuesday, March 19, 2013. 32 AntiVirus versus the latest Java Exploit (CVE-2013-1493). Image a scenario where someone wants to target. Your computer to get access to your files. This task can be accomplished in several ways and one of them is using a java exploit on a crafted/compromised website. What i want to test is how AntiVirus manage "unknown" threads or forbidden behavior (an unsigned applet shouldn't be allowed to download files to your local disk). The exploit is CVE-2013-1493.
security-obscurity.blogspot.com
Security Obscurity Blog: January 2013
http://security-obscurity.blogspot.com/2013_01_01_archive.html
Yes, another blog. Thursday, January 10, 2013. About the new java 0 day vulnerability (CVE-2013-0422). A couple of hours ago @Kafeine. Discovered a new java 0 day exploit in the wild. This exploit is served by most exploit kits like Blackhole, Cool exploit kit and Nuclear pack.When the malicious applet is executed its download and execute a copy of Zeus. A curious thing is that Zbot comes with a self signed digital certificate. But detection rate is quite good with 12/46 link. You can find both files here.
bsodtutorials.wordpress.com
Other Pages | Machines Can Think
https://bsodtutorials.wordpress.com/otherpages
Windows Internals, Theorectical Computer Science, Mathematics and Philosophy. There are many good websites and blogs which are related to Reverse Engineering, BSOD Debugging and Mathematics. This page has been created to house all the websites which teach the aforementioned topics to the best of my knowledge. If you would like for your website to be added to the list, then please post a request in the comments section. Adam Pooley Web Developer. BSOD Kernel Dump Analysis. Jared is a Global Moderator at S...
aroundcyber.wordpress.com
Ссылки | Around Cyber
https://aroundcyber.wordpress.com/links
Вокруг киберпространства — новости, отчеты и мнения. Коронные фишки вредоносных программ. Как Эраст безопасником стал. 8212; независимый информационно-аналитический центр;. 8212; блоги сотрудников Dr. Web;. 8212; агрегатор блогов экспертов в области IT;. 8212; дайджест ИБ от R-Vision;. 8212; об интернет-безопасности от Kaspersky Lab;. 8212; информационный портал по безопасности от Positive Technologies;. 8212; популярный российский журнал о взломе и безопасности. 8212; just a cracker from xUSSR;. 8212; б...
nethekk.blogspot.com
NetHack: január 2013
http://nethekk.blogspot.com/2013_01_01_archive.html
Az oldalon több mint 100 bejegyzés van és még több hozzászólás, amennyiben tényleg érdekel egy téma nyugodtan használd a kereső-t, hogy megtaláld amit keresel! 2013 január 31., csütörtök. Ma is kerestem valamit és ezeket találtam. Erre Itt bukkantam: http:/ 3.bp.blogspot.com/- dij7HWXlN8/UI3NGLBVP1I/AAAAAAAACI0/sAgyBZR8EjY/s1600/screenshot 1132.png. Mondjuk nem tudom, hogy ezt ki veszi be.). Nagyon jó kis oldalak még ezek is :. Http:/ www.malwaresigs.com/. Https:/ blog.damballa.com/. Találtam továbbá egy...
cyberfrontsecurity.blogspot.com
Cyber Front Security: The Security Triad: Protection, Detection, and Response
http://cyberfrontsecurity.blogspot.com/2015/02/the-security-triad-protection-detection.html
The Front Line Is Everywhere. Thursday, February 19, 2015. The Security Triad: Protection, Detection, and Response. It's been a while since I've posted anything at all. I could cite a variety of excuses but the truth is that I've been cutting my teeth in the industry and adapting from my previous life to my new one. I've finally found the time and desire to continue writing, so without further ado. Each industry places more emphasis on a given phase than others and we often see. In infosec, Protection is...
cyberfrontsecurity.blogspot.com
Cyber Front Security: August 2011
http://cyberfrontsecurity.blogspot.com/2011_08_01_archive.html
The Front Line Is Everywhere. Monday, August 29, 2011. An Apple, Today, Gave Your Data Away. I'm not really huge on writing about events in the news but this one seems pretty huge and I think there are some people that might not see the implications. Http:/ www.theregister.co.uk/2011/08/26/mac osx lion security hole/. Think about it, if you have an ambitious employee with open access to every piece of data on the domain what kind of trouble could they get into? They probably don't want to actively damage...
SOCIAL ENGAGEMENT