Frishit Security
Follow
5.3K views | +0 today
Frishit Security
News about security, reversing, exploit packs, etc.
Curated by Gal Frishman
Your new post is loading...
Your new post is loading...
Scooped by Gal Frishman
Scoop.it!

Designing a minimal operating system to emulate 32/64bits x86 code snippets, shellcode or malware in Bochs

more...
No comment yet.
Scooped by Gal Frishman
Scoop.it!

InfoSec Resources – NGR Rootkit

InfoSec Resources – NGR Rootkit | Frishit Security | Scoop.it
more...
No comment yet.
Scooped by Gal Frishman
Scoop.it!

Sinowal: MBR rootkit never dies! ITSEC

Sinowal: MBR rootkit never dies! ITSEC | Frishit Security | Scoop.it
more...
No comment yet.
Scooped by Gal Frishman
Scoop.it!

Wild Wild West – 06/2012 | Kahu Security

more...
No comment yet.
Scooped by Gal Frishman
Scoop.it!

The Flame: Questions and Answers

The Flame: Questions and Answers | Frishit Security | Scoop.it
Flame is a sophisticated attack toolkit, which is a lot more complex than Duqu. It is a backdoor, a Trojan, and it has worm-like features, allowing it to replicate in a local network and on removable media if it is commanded so by its master.
more...
No comment yet.
Scooped by Gal Frishman
Scoop.it!

Implementation of Runtime PE-Crypter

more...
No comment yet.
Scooped by Gal Frishman
Scoop.it!

Intercepting System Calls on x86_64 Windows | Development & Security

Intercepting System Calls on x86_64 Windows | Development & Security | Frishit Security | Scoop.it
more...
No comment yet.
Scooped by Gal Frishman
Scoop.it!

Cybercriminals release ‘Sweet Orange’ – new web malware exploitation kit

Cybercriminals release ‘Sweet Orange’ – new web malware exploitation kit | Frishit Security | Scoop.it
By Dancho Danchev From DIY (do-it-yourself) exploit generating tools, to efficient platforms for exploitation of end and corporate users, today’s efficiency-oriented cybercriminals are consta...
more...
No comment yet.
Scooped by Gal Frishman
Scoop.it!

OSX.FlashBack.K – An Overview and its Inner Workings | Symantec Connect Community

OSX.FlashBack.K – An Overview and its Inner Workings | Symantec Connect Community | Frishit Security | Scoop.it
Symantec helps consumers and organizations secure and manage their information-driven world.
more...
No comment yet.
Scooped by Gal Frishman
Scoop.it!

XyliBox: Fragus exploit kit

XyliBox: Fragus exploit kit | Frishit Security | Scoop.it
more...
No comment yet.
Scooped by Gal Frishman
Scoop.it!

A Wild Exploit Kit Appears... Meet RedKit - SpiderLabs Anterior

A Wild Exploit Kit Appears... Meet RedKit - SpiderLabs Anterior | Frishit Security | Scoop.it
During our research we have recently encountered a new private exploit kit. The developers behind this private kit decided to promote it with a standard banner.
more...
No comment yet.
Scooped by Gal Frishman
Scoop.it!

XyliBox: Phoenix Exploit's Kit 3.1 full

XyliBox: Phoenix Exploit's Kit 3.1 full | Frishit Security | Scoop.it
more...
No comment yet.
Scooped by Gal Frishman
Scoop.it!

Permanent Reverse Backdoor for IPhone / IPad

Permanent Reverse Backdoor for IPhone / IPad | Frishit Security | Scoop.it
more...
No comment yet.
Scooped by Gal Frishman
Scoop.it!

The Secret of a Successful Programming Language? A Really Great Beard

The Secret of a Successful Programming Language? A Really Great Beard | Frishit Security | Scoop.it
 Why do some programming languages take over the world while others wallow in obscurity?Two academics at Princeton and the University o...
more...
No comment yet.
Scooped by Gal Frishman
Scoop.it!

‘Bioskits’ Join Ranks of Stealth Malware | Blog Central

‘Bioskits’ Join Ranks of Stealth Malware | Blog Central | Frishit Security | Scoop.it
more...
No comment yet.
Scooped by Gal Frishman
Scoop.it!

Windows Exploratory Surgery with Process Hacker

This talk will use the free, open source tool named "Process Hacker" to explore Windows
processes, threads, handles and other operating system internals.

more...
No comment yet.
Scooped by Gal Frishman
Scoop.it!

Sakura Exploit Kit 1.1 - SpiderLabs Anterior

Sakura Exploit Kit 1.1 - SpiderLabs Anterior | Frishit Security | Scoop.it
Even though it’s sometimes easy to forget that there are exploit kits other than BlackHole, other groups still strive for sales in the exploit kits market.
more...
No comment yet.
Scooped by Gal Frishman
Scoop.it!

sKyWIper: A complex malware for targeted attacks

more...
No comment yet.
Scooped by Gal Frishman
Scoop.it!

The anatomy of Flashfake. Part 2

The anatomy of Flashfake. Part 2 | Frishit Security | Scoop.it
In the first part of our analysis we looked at the distribution and infection mechanisms used by the Flashfake...
more...
No comment yet.
Scooped by Gal Frishman
Scoop.it!

How Malicious Code Can Run in Microsoft Office Documents

How Malicious Code Can Run in Microsoft Office Documents | Frishit Security | Scoop.it
One of the most effective methods of compromising computer security, especially as part of a targeted attack, involves emailing the victim a malicious Microsoft Office document. Even though the notion...
more...
No comment yet.
Scooped by Gal Frishman
Scoop.it!

Packing Heat! (AthCon 2012)

more...
No comment yet.
Scooped by Gal Frishman
Scoop.it!

Malwares don't need Coffee: Inside RedKit

more...
No comment yet.
Scooped by Gal Frishman
Scoop.it!

Portable Executable 101 - a windows executable walkthrough

Portable Executable 101 - a windows executable walkthrough | Frishit Security | Scoop.it
more...
No comment yet.
Scooped by Gal Frishman
Scoop.it!

The Institute for National Security Studies (Israel) falls prey to Poison Ivy infection - Security Labs

The Institute for National Security Studies (Israel) falls prey to Poison Ivy infection - Security Labs | Frishit Security | Scoop.it
more...
No comment yet.
Scooped by Gal Frishman
Scoop.it!

Mac EFI Rootkits

more...
No comment yet.