-
Sep 26, 2017
A simple and useful snippet Recently i’ve developed a simple webscraper that extract magnet links from a specific page and starts the download with bittorrent. The core of the script is the code snippet below, that uses pyquery in order to… read more »
-
Sep 22, 2017
Looking for a good alternative to CCleaner? Take a look to BleachBit! A good analysis by Cisco Talos Version 5.33 of the CCleaner downloaded between August 15 and September 12 was modified to include the Floxif malware: We would like to… read more »
-
Sep 21, 2017
A bug really difficult to reproduce! Hanno Böck, a freelance journalist, has disclosed a bug in Apache Web Server causes servers to leak pieces of arbitrary memory in a way that could expose passwords or other secrets, like the most… read more »
-
Sep 20, 2017
How to share code snippets from command line Gist.github.com is a great service provided by GitHub, useful to share code snippets. You can share single files, parts of files, or full applications: every gist is a Git repository, which means that… read more »
-
Sep 18, 2017
Useful during analysis of malicious sites Yesterday in my twitter stream i’ve seen this tweet by Florian Roth: [embed]https://twitter.com/cyb3rops/status/902934898700320770[/embed] During the analysis of a malicious site, one of the first step is the deobfuscation of the suspicious javascript. There are… read more »
-
Sep 15, 2017
Do you know what is the blockchain? You should! How an independent, transparent, and permanent database coexisting in multiple locations and shared by a community will changing money and business? In this lucid and simple talk, Bettina Warburg describes how… read more »
-
Sep 13, 2017
In a big company, with a lot of windows systems, checking the correct patching for Wannacry could be a little tricky. Security update MS17–010 addresses several vulnerabilities in Windows SMB v1 exploited by the WannaCrypt ransomware. However, the KB that contains… read more »
-
Sep 11, 2017
A research about supersonic voice command hacking Chinese researchers have discovered a vulnerability in voice assistants from Apple, Google, Amazon, Microsoft, Samsung, and Huawei. Using a technique called “DolphinAttack”, a team from Zhejiang University translated typical vocal commands into ultrasonic frequencies… read more »