Advanced Threats,Intelligence Technology,CyberSecurity
80.9K views | +51 today
Follow
Your new post is loading...
Your new post is loading...
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

Dark Cloud: Inside The Pentagon's Leaked Internet Surveillance Archive

Dark Cloud: Inside The Pentagon's Leaked Internet Surveillance Archive | Advanced Threats,Intelligence Technology,CyberSecurity | Scoop.it
Unsecured AWS assets left a massive amount of gathered surveillance data open to the internet.
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

Bad Rabbit MS17-010 Exploitation Part One: Leak and Control

Bad Rabbit MS17-010 Exploitation Part One: Leak and Control | Advanced Threats,Intelligence Technology,CyberSecurity | Scoop.it
A new type of ransomware, Bad Rabbit, has been analyzed by the CrowdStrike Security Response team. Get in-depth analysis of this stealthy new threat.
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

Steganography: A Safe Haven for Malware

Steganography: A Safe Haven for Malware | Advanced Threats,Intelligence Technology,CyberSecurity | Scoop.it
Steganography continues to be an incredibly versatile and effective method for obscuring or hiding information in plain sight.
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

There is a Pre-Installed Backdoor in OnePlus 5, 3 and 3T Devices

There is a Pre-Installed Backdoor in OnePlus 5, 3 and 3T Devices | Advanced Threats,Intelligence Technology,CyberSecurity | Scoop.it
If you are using OnePlus 5, 3 or its 3T model an IT security researcher Elliot Alderson (whose real name is Robert Baptiste) has bad news for you. The rese
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

Security Breach and Spilled Secrets Have Shaken the N.S.A. to Its Core

Security Breach and Spilled Secrets Have Shaken the N.S.A. to Its Core | Advanced Threats,Intelligence Technology,CyberSecurity | Scoop.it
A serial leak of the agency’s cyberweapons has damaged morale, slowed intelligence operations and resulted in hacking attacks on businesses and civilians worldwide.
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

nowayout / prochunter : #Linux #Process #Hunter 

nowayout / prochunter : #Linux #Process #Hunter  | Advanced Threats,Intelligence Technology,CyberSecurity | Scoop.it
Linux Process Hunter
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

Forensic Case Files: Windows Update Did It! | Gillware Digital Forensics

Forensic Case Files: Windows Update Did It! | Gillware Digital Forensics | Advanced Threats,Intelligence Technology,CyberSecurity | Scoop.it
Windows has a tendency of doing a lot of things without the user's consent. But does that make Windows Update the perfect "fall guy?" Nope!
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

Connect the Dots on State-Sponsored Cyber Incidents

Connect the Dots on State-Sponsored Cyber Incidents | Advanced Threats,Intelligence Technology,CyberSecurity | Scoop.it
CFR’s Cyber Operations Tracker catalogues over 150 state-sponsored acts of espionage, sabotage and data destruction.
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

Problems and risks for cryptocurrency users

Problems and risks for cryptocurrency users | Advanced Threats,Intelligence Technology,CyberSecurity | Scoop.it
Along with economic benefits, any new technology also comes with a certain number of problems. Cryptocurrencies are no exception.
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

Making a Stand Alone Executable from a Python Script using PyInstaller

Making a Stand Alone Executable from a Python Script using PyInstaller | Advanced Threats,Intelligence Technology,CyberSecurity | Scoop.it
There are plenty of tools available for converting python script into executable. For example, checkout: For Python 2, I used to prefer py2exe. Its a neat tool that does the trick by making a stand…
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

The State of Serverless Security — Fall 2017 – A Cloud Guru

The State of Serverless Security — Fall 2017 – A Cloud Guru | Advanced Threats,Intelligence Technology,CyberSecurity | Scoop.it
A Cloud Guru — The State of Serverless Security — Fall 2017. How are we doing as a community of builders? With serverless, are we building more resilient systems?
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

Silence – a new Trojan attacking financial organizations

Silence – a new Trojan attacking financial organizations | Advanced Threats,Intelligence Technology,CyberSecurity | Scoop.it
In September 2017, we discovered a new targeted attack on financial institutions. Victims are mostly Russian banks but we also found infected organizations in
Constantin Ionel Milos / Milos Constantin's insight:
Share your insight
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

How Safe Are You on Public WiFi? Not Very

How Safe Are You on Public WiFi? Not Very | Advanced Threats,Intelligence Technology,CyberSecurity | Scoop.it
Experts say there are several common ways that hackers compromise public WiFi networks. Here's how you can protect yourself.
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

Kaspersky accepts collecting NSA files, claims they were deleted later on

Kaspersky accepts collecting NSA files, claims they were deleted later on | Advanced Threats,Intelligence Technology,CyberSecurity | Scoop.it
In its latest report, Kaspersky Lab revealed the findings of its internal investigation, which was launched to dispel the accusations that it has ties with
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

Lateral Movement Using Outlook’s CreateObject Method and DotNetToJScript

Lateral Movement Using Outlook’s CreateObject Method and DotNetToJScript | Advanced Threats,Intelligence Technology,CyberSecurity | Scoop.it
In the past, I have blogged about various methods of lateral movement via the Distributed Component Object Model (DCOM) in Windows. This typically involves identifying a DCOM application that has an exposed method allowing for arbitrary code execution. In this example, I’m going to cover Outlook’s CreateObject() method. If you aren’t familiar with CreateObject(), it…
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

ZeroNights ICO Hacking Contest Writeup – ICO Security

ZeroNights ICO Hacking Contest Writeup – ICO Security | Advanced Threats,Intelligence Technology,CyberSecurity | Scoop.it
Prior to ZeroNights security conference, an ICO hacking contest had been announced. The first three contestants to solve the tasks could win invites to the conference. My motivation to participate in…
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

Experts explain the Return on Investments in the cybercriminal underground

Experts explain the Return on Investments in the cybercriminal underground | Advanced Threats,Intelligence Technology,CyberSecurity | Scoop.it
How much is the return on investment in the cybercriminal underground? Let's dig a report recently published by firm Recorded Future to find the answer.
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

Inside a low budget consumer hardware espionage implant

Inside a low budget consumer hardware espionage implant | Advanced Threats,Intelligence Technology,CyberSecurity | Scoop.it
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

How You Can Use the Dark Web for Threat Intelligence | Recorded Future

Download this white paper to learn how threats emerge on the dark web and where you can uncover threat intelligence to inform your security strategy.
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

He Perfected a Password-Hacking Tool—Then the Russians Came Calling

He Perfected a Password-Hacking Tool—Then the Russians Came Calling | Advanced Threats,Intelligence Technology,CyberSecurity | Scoop.it
How a program called Mimikatz became one of the world's most widespread and powerful hacking tools.
more...
Richard Platt's curator insight, November 10, 1:18 PM

Five years ago, Benjamin Delpy walked into his room at the President Hotel in Moscow, and found a man dressed in a dark suit with his hands on Delpy's laptop.  Just a few minutes earlier, the then 25-year-old French programmer had made a quick trip to the front desk to complain about the room's internet connection. He had arrived two days ahead of a talk he was scheduled to give at a nearby security conference and found that there was no Wi-Fi, and the ethernet jack wasn't working. Downstairs, one of the hotel's staff insisted he wait while a technician was sent up to fix it. Delpy refused, and went back to wait in the room instead.

When he returned, as Delpy tells it, he was shocked to find the stranger standing at the room's desk, a small black rollerboard suitcase by his side, his fingers hurriedly retracting from Delpy's keyboard. The laptop still showed a locked Windows login screen.

The man mumbled an apology in English about his keycard working on the wrong room, brushed past Delpy, and was out the door before Delpy could even react. "It was all very strange for me," Delpy says today. "Like being in a spy film." It didn't take Delpy long to guess why his laptop had been the target of a literal black bag job. It contained the subject of his presentation at the Moscow conference, an early version of a program he'd written called Mimikatz. That subtly powerful hacking tool was designed to siphon a Windows user's password out of the ephemeral murk of a computer's memory, so that it could be used to gain repeated access to that computer, or to any others that victim's account could access on the same network. The Russians, like hackers around the world, wanted Delpy's source code.

Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

Tax haven secrets of ultra-rich exposed

Tax haven secrets of ultra-rich exposed | Advanced Threats,Intelligence Technology,CyberSecurity | Scoop.it
A huge new leak reveals how the wealthy and powerful, including the Queen's private estate, invest offshore.
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

Telegram App Store Secret-Chat Messages in Plain-Text Database - Zimperium Mobile Security Blog

Telegram App Store Secret-Chat Messages in Plain-Text Database - Zimperium Mobile Security Blog | Advanced Threats,Intelligence Technology,CyberSecurity | Scoop.it
By: Zuk Avraham Follow Zuk Avraham (@ihackbanme) EDIT: The following post * was not on a rooted or jailbroken device *. In order to access the plain-text secret-chat database containing the messages, we used our implementation of CVE-2014-3153. The claims that the device is rooted / jailbroken are incorrect and misleading. I will start by … Read More
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

Poisoning the Well: #Banking #Trojan Targets #Google Search Results

Poisoning the Well: #Banking #Trojan Targets #Google Search Results | Advanced Threats,Intelligence Technology,CyberSecurity | Scoop.it
A blog from the world class Intelligence Group, Talos, Cisco's Intelligence Group
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

Internet of Things Exploration: 2016 Ford Flex - Black Hills Information Security

Internet of Things Exploration: 2016 Ford Flex - Black Hills Information Security | Advanced Threats,Intelligence Technology,CyberSecurity | Scoop.it
David Fletcher// My wife and I recently purchased a 2016 Ford Flex to replace an aging version of the same make and model that met an untimely fate. During the feature walk-through the salesperson identified how convenient this version of the Sync platform was because you could update the firmware on the infotainment unit over …
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

Introducing GoCrack: A Managed Password Cracking Tool « Threat Research Blog

Introducing GoCrack: A Managed Password Cracking Tool « Threat Research Blog | Advanced Threats,Intelligence Technology,CyberSecurity | Scoop.it
FireEye's Innovation and Custom Engineering team released a tool called GoCrack that allows red teams to efficiently manage password cracking tasks across multiple GPU servers by providing an easy-to-use, web-based real-time UI to create, view, and manage tasks.
more...
No comment yet.