Search Results for: ex

Results 1 - 10 of 31701 Page 1 of 3171
Results per-page: 10 | 20 | 50 | 100

Tenable Internship Takeaways: Understanding Different Port Scanning Techniques

Posted on: 2017-08-11

As a summer intern for the research and development department at Tenable, I was surprised when my manager gave me a relatively straightforward first task: find every machine in the lab. I knew that some form of port scan was needed. Maybe I could start with a ping sweep of some IP range, or maybe something more comprehensive. But my manager also added some nuance to the project. I had to put myself in the shoes of a Tenable customer, and my objective was to present a plan to discover machines and to identify the Cyber Exposure risk on the…

Tenable Internship Takeaways: Understanding Different Port Scanning Techniques

Posted on: 2017-08-11

As a summer intern for the research and development department at Tenable, I was surprised when my manager gave me a relatively straightforward first task: find every machine in the lab. I knew that some form of port scan was needed. Maybe I could start with a ping sweep of some IP range, or maybe something more comprehensive. But my manager also added some nuance to the project. I had to put myself in the shoes of a Tenable customer, and my objective was to present a plan to discover machines and to identify the Cyber Exposure risk on the…

Powershell Security at Enterprise Customers

Posted on: 2017-05-31

There are some people who don´t have the time to read the whole text – if you are familiar with the topic the text in bold includes the most important points and is just for you. Source: Powershell Security at Enterprise Customers @ May 30, 2017 at 11:37PM

Powershell Security at Enterprise Customers

Posted on: 2017-05-30

There are some people who don´t have the time to read the whole text – if you are familiar with the topic the text in bold includes the most important points and is just for you. Source: Powershell Security at Enterprise Customers @ May 30, 2017 at 11:37PM

Government Organizations Targeted in quot;Netrepserquot; Attacks (SecurityWeek)

Posted on: 2017-05-05

A report published by Bitdefender on Friday details a previously undocumented cyber espionage campaign that leverages a piece of malware dubbed “Netrepser” to target government organizations. The first Netrepser malware samples were discovered by the security firm in May 2016. No information has been shared on the location of the targets, but researchers determined, based on data from the threat’s command and control (C&C) infrastructure, that the malware had infected more than 500 machines. Most of the victims are government agencies. Bitdefender told SecurityWeek that the attacks are ongoing, and the company has not found any evidence linking this campaign…

Jenkins Unauthenticated Remote Code Execution

Posted on: 2017-05-05

submitted by /u/bigshebang [link] [comments] Source: /r/netsec - Information Security Ne... @ May 5, 2017 at 08:35AM

Jenkins Unauthenticated Remote Code Execution

Posted on: 2017-05-05

submitted by /u/bigshebang [link] [comments] Source: /r/netsec - Information Security Ne... @ May 5, 2017 at 08:35AM

Listen up: is this really who you think it is talking?

Posted on: 2017-05-05

“This is yuge, they can make us say anything now, really anything,” says a robotic voice that sounds exactly like Donald Trump – if he had a mouth full of muffin. That’s from a “conversation” between a fake Trump voice, a fake Barack Obama, and a fake Hillary Clinton, as they discuss a new algorithm to copy voices that’s been developed by a startup called Lyrebird. Lyrebird last month released a public demo containing a series of audio samples of fake speech generated using its algorithm and one-minute samples of the speakers. Here’s a sample of the fake Obama voice…

Microsoft’s Windows warning: Hackers hijacked software updater with in-memory malware (ZDNet)

Posted on: 2017-05-05

Microsoft has shown how Windows Defender ATP detected anomalous updater behavior. Image: Microsoft Microsoft is warning software vendors to protect their updater processes after discovering a "well-planned, finely orchestrated" attack that hijacked an unnamed editing tool's software supply chain.As Microsoft's threat response group explains, the attackers used the update mechanism of a popular but unnamed piece of editing software to gain a foothold in several high-profile technology and financial organizations. The software vendor itself was also under attack, it says. The espionage campaign, dubbed WilySupply by Microsoft, is likely to be financially motivated and target updaters to reach mostly finance…

Microsoft’s Windows warning: Hackers hijacked software updater with in-memory malware (ZDNet)

Posted on: 2017-05-05

Microsoft has shown how Windows Defender ATP detected anomalous updater behavior. Image: Microsoft Microsoft is warning software vendors to protect their updater processes after discovering a "well-planned, finely orchestrated" attack that hijacked an unnamed editing tool's software supply chain.As Microsoft's threat response group explains, the attackers used the update mechanism of a popular but unnamed piece of editing software to gain a foothold in several high-profile technology and financial organizations. The software vendor itself was also under attack, it says. The espionage campaign, dubbed WilySupply by Microsoft, is likely to be financially motivated and target updaters to reach mostly finance…