-
Mar 30, 2017
You are insane! TrendMicro on its blog has published an article about a new 0-Day vulnerability that affects the WebDAV component of Microsoft Internet Information Services 6.0. The vulnerability ( CVE-2017–7269) is a bufferoverflow located into the webdav components of IIS:… read more »
-
Mar 29, 2017
But the remediation is really simple! Andrew Blaich, Jeremy Richards and Kristy Edwards, security researchers at Lookout, have published a research that expose a new technique used by ransomware scammers to spread malware on iOs devices. The attackers have been exploiting… read more »
-
Mar 28, 2017
Kaspersky Lab published an analysis on the cost of a DDoS attack and services available in the black markets Kaspersky Lab has published an analysis on the cost of DDoS attacks that estimated that a managed attack service typically goes for $25… read more »
-
Mar 27, 2017
How many times have you heard this question? Often friends and colleagues ask me “my computer was hacked/infected, what can i do right now?” There are different type of response, often based on the other party’s technical knowledge. However, broadly… read more »
-
Mar 24, 2017
A very talented italian guitarist Today I want to offer a documentary dedicated to Emanuele Segre, one of my favorite performers.The documentary is produced by SKY TV Classica, I found it on youtube divided into three parts. For non italian… read more »
-
Mar 23, 2017
Yep, even in antivirus! Security researchers from Cybellum, an Israeli security firm, has discovered a vulnerability that could allow code injection code technique works on all versions of Microsoft Windows operating systems, starting from Windows XP to the latest release… read more »
-
Mar 22, 2017
Yep, it’s called BrainDamage BrainDamage is a fully featured python based backdoor that uses Telegram as C&C server. It is a hypothetical evolution of backdoor (very unlikely, from my point of view), so it’s a good idea to analyze its… read more »
-
Mar 21, 2017
Using just Task manager and the command line! The security researcher Alexander Korznikov has recently published an article that explain how a local privileged user can hijack the session of any logged-in Windows user who has higher privileges without knowing that… read more »