Microsoft

/Tag:Microsoft

Week 23 in Review – 2012

Resources Efficient Padding Oracle Attacks on Cryptographic Hardware - hal.inria.fr Stealing RSA private keys from hardware using oracle attacks in a few hours. JSLR - thespanner.co.uk Cross-Site Scripting (XSS) has been around for ages – with first incidents being reported in the late nineties. Despite the attack technique not being the most complex of all, [...]

2017-03-12T17:39:48-07:00 June 10th, 2012|Security Tools, Security Vulnerabilities|0 Comments

Week 17 in Review – 2012

Event Related Our CanSecWest 2012 slides on passive DNS and Picviz - picviz.blogspot.fr Alexandre Dulaunoy from CIRCL.LU and Sebastien Tricaud from Picviz Labs have been talking at CanSecWest 2012 in Vancouver, Canada, on how to scrutinize a country using passive DNS and Picviz. SyScan 2012 Singapore slides - www.xchg.info Conference and slides of SyScan 2012 [...]

Week 13 in Review – 2012

Event Related Pwn2Own Lesson From Pwn2Own: Focus On Exploitability - darkreading.com The Pwn2Own contest earlier this month at the CanSecWest Conference showed off the speed with which knowledgeable security professionals can code exploits for known vulnerabilities. On the failings of Pwn2Own 2012 - scarybeastsecurity.blogspot.com This year's Pwn2Own and Pwnium contests were interesting for many reasons. [...]

Week 24 in Review – 2009

Tools: CANVAS 6.47 Includes the VMware 6.5.0/6.5.1 workstation/player breakout “cloudburst” vulnerability Not free, but certainly should be in a penetration testers bag of goodies DVWA – Damn Vulnerable Web App A PHP/MySQL web application that is vulnerable to be used for learning the art of web application security. Author’s blog is ethicalhack3r.co.uk KeyKeriki Open source [...]

2017-03-12T17:40:20-07:00 June 15th, 2009|Security Tools, Security Vulnerabilities|0 Comments

Microsoft Security Intelligence Report v5

The latest Microsoft Security Intelligence Report (SIR) is now out. The Microsoft Security Intelligence Report (SIR) provides an in-depth perspective on the changing threat landscape including software vulnerability disclosures and exploits, malicious software (malware), and potentially unwanted software. Using data derived from hundreds of millions of Windows users, and some of the busiest online services [...]

2017-03-12T17:40:22-07:00 November 13th, 2008|Security Vulnerabilities|0 Comments

Microsoft Exploitability Index

Starting this month, Microsoft will be providing exploitability information about their patches to everyone. The Microsoft Exploitability Index is designed to provide additional information to help customers better prioritize the deployment of Microsoft security updates. This index provides customers with guidance on the likelihood of functioning exploit code being developed for vulnerabilities addressed by Microsoft [...]

2017-03-12T17:40:22-07:00 October 21st, 2008|Security Vulnerabilities, Vendor News|0 Comments

Vendor Parties @ Black Hat USA

Vendor parties during Black Hat USA is always interesting, because the conference is in Las Vegas. Here is a list of vendors that I know of that are throwing parties this year at Black Hat USA 2008. Tuesday, August 5th Qualys Fortify Wednesday, August 6th Arbor Networks MANDIANT WASC / OWASP Thursday, August 7th Accuvant [...]

2008-08-06T00:24:17-07:00 August 6th, 2008|Parties|0 Comments

Microsoft Hates Jews (@ RSA Party)

With my ever growing RSA party list, my friends made me decide which party we should  attend, so I selected Microsoft's party. I figured you can't go wrong with a huge company, and it was at the Cartoon Art Museum. The current theme for the main exhibit was Sex and Sensibility, and it contained many [...]

2017-03-12T17:40:28-07:00 April 9th, 2008|Parties|1 Comment

Vendor Parties @ RSA

Now that I have my RSA schedule in place, I have to figure out what I am doing in the evenings. So far I've been invited to seventeen (17!) vendor parties. In no particular order, the list of vendors are: Blue Coat, MessageLabs, SenSage, ESET, Ping Identity, Microsoft, Secure Computing, WASC, F-Secure, Voltage, Commtouch, Porter [...]

2008-04-02T20:55:06-07:00 April 2nd, 2008|Parties|0 Comments