Tags » Exploit

Safari Bug Could Make Dangerous Phishing Attacks Easier than Ever

Phishing is a “hacker” tactic as old as the internet. The process is simple, and involves a person, the phisher, setting up a fake website that looks nearly identical to the real thing. 701 more words

Apple

Instrument Microsoft Office applications to defeat macro obfuscations

With the recent increase in documents with macros used to deliver malwares, researchers spend considerable amount of time to analyze these attached scripts to understand the inner workings. 379 more words

Malware

Exploit alat Angler širi novi, neimenovani kripto-ransomware

Exploit alat Angler i dalje se koristi za širenje različitih vrsta ransomwarea.

Prethodnih nedelja u pitanju je bio AlphaCrypt, ransomware koji imitira TeslaCrypt, ali koji funkcioniše kao… 149 more words

Ransomware

The VENOM "virtual machine escape" bug - what you need to know

Thanks to Mike Wood and Andrew Ludgate of SophosLabs
for their behind-the-scenes work for this article.

Plenty of vulnerabilities have been fixed in the past week, with at least Adobe, Microsoft, Mozilla and… 1,121 more words

Featured

Russian Hackers Plot to Attack Banks Foiled

Russian state-sponsored cyber hackers or other organizations with specific state ties were allegedly preparing to target and hack Western banks and financial institutions, according to a report from cyber security firm Root9B. 560 more words

Cybersecurity

MS15-051 PoC

A nice local privilege escalation exploit example for Windows 2003 onwards (kb3057191) by @hfiref0x, this was used as part of an APT campaign”Operation Russia” as detailed by FireEye… 15 more words

Tutorial