Security Vulnerabilities

/Security Vulnerabilities

Week 49 In Review – 2016

Events Related BSidesLV - youtube.com Recordings of Security BSides Las Vegas sessions, selected sessions of sister conferences and other Information Security related educational materials. BotConf 2016 This is already the fourth edition of the Botconf security conference, fully dedicated to fighting malware and botnets. Since the first edition, the event location changed every year and it allowed me [...]

Week 48 In Review – 2016

Events Related Kiwicon X - www.youtube.com Resources Curl Security Audit - daniel.haxx.se I asked for, and we were granted a security audit of curl from the Mozilla Secure Open Source program a while ago. This was done by Mozilla getting a 3rd party company involved to do the job and footing the bill for it. CVE-2016-7098 - legalhackers.com "GNU [...]

Week 47 In Review – 2016

Events Related BSides DC 2016 - Opening - www.youtube.com Alex Norman does what Alex Norman does best. Open the con. Inspirational, motivational and most importantly... short. AppSecUSA 2016 - www.youtube.com Recordings from AppSecUSA 2016 in Washington, DC Highlights from the O'Reilly Security Conference in Amsterdam 2016 - www.oreilly.com Watch highlights covering security, defense, tools, and [...]

Week 46 In Review – 2016

Resources Security Conference - conferences.oreilly.com Speaker slides & videos Techniques Nintendo Classic Mini Family Talk of computer contents - translate.google.com As the person who disassembled it released before it was released. Interest in contents has been increased, but in this article I would like to drill down to a bit more detail. When CSI meets [...]

Week 45 In Review – 2016

Resources Ruxcon - ruxcon.org.au Presentation Slides from Ruxcon Australia BlackHat Europe 2016 - www.blackhat.com Techniques Kerberoasting Without Mimikatz - www.harmj0y.net Thanks to an awesome PowerView pull request by @machosec, Kerberoasting is easier than ever using pure PowerShell. I wanted to briefly cover this technique and its background, how we’ve been using it recently, and a few awesome new developments. [...]

Week 44 In Review – 2016

Events Related Charlie Miller Keynote, Automotive Security: A Hacker's Eye View - www.youtube.com The security of today's vehicles involves many moving parts, but while manufactures take a majority of the blame, multiple parties contribute to the security debt in today's vehicle ecosystem. This keynote takes a deep dive into automotive security, current attacks and vulnerabilities, [...]

Week 43 In Review – 2016

Events Related Hack.lu I’m back to Luxembourg for a new edition of hack.lu. In fact, I arrived yesterday afternoon to attend the MISP summit. It was a good opportunity to meet MISP users and to get fresh news about the project. Hack.lu 2016 Wrap-Up Day #1 - blog.rootshell.be Hack.lu 2016 Wrap-Up Day #2 - blog.rootshell.be Hack.lu 2016 [...]

Week 42 In Review – 2016

Resources Published "SecDevOps Risk Workflow" Book (v0.57) - blog.diniscruz.com I just published version v0.57 of the (previously called) Jira Risk Workflow book. Vulnerabilities These 60 dumb passwords can hijack over 500,000 IoT devices into the Mirai botnet - www.grahamcluley.com Mirai has become infamous in recent weeks after blasting the website of security blogger Brian Krebs off the [...]

October 16th, 2016|Security Vulnerabilities, Site News, Week in Review|1 Comment

Week 41 In Review – 2016

Events Related GrrCON 2016 Videos - irongeek.com These are the videos of the presentations from GrrCON 2016. Videos from the DHS Cyber Security Division (CSD) workshop earlier this year - voipsecurityblog.typepad.com Here are a couple of links to the Department of Homeland Security (DHS) Cyber Security Division (CSD) showcase earlier this year. They did a great [...]

Week 38 In Review – 2016

Events Related BSides Augusta 2016 Videos - www.irongeek.com These are the videos from the BSides Augusta conference. Resources Long Secret Stingray Manuals Detail How Police Can Spy On Phones - theintercept.com The Intercept has obtained several Harris instruction manuals spanning roughly 200 pages and meticulously detailing how to create a cellular surveillance dragnet. Techniques Reprogramming the Defcon 24 badge [...]