Skip to main content

Home/ Information Security/ Group items tagged Exploit

Rss Feed Group items tagged

Skeptical Debunker

Sea World killer whale attack video leads to malware | Graham Cluley's blog - 0 views

  •  
    Dawn Brancheau, a trainer at Sea World in Orlando, was killed yesterday after being attacked by a killer whale. News of the tragedy sped quickly around the world, and now sick cybercriminals are exploiting the story of 40-year-old Brancheau's death for their own commerical gain. Through SEO (search engine optimisation) techniques, hackers have created webpages stuffed with content which appears to be ghoulish video footage of the animal trainer's death - but are really designed to infect visiting computers.
peerlyst

WannaCry no more: ransomware worm IOC's, Tor C2 and technical analysis + SIEM rules, by... - 0 views

  •  
    After a rather long day, night and morning of studying the news, researching and hunting the #WannaCry ransomware worm there are some discoveries to be shared.. This includes Host and Network IOCs, their analysis obtained with help of fellow security researchers and practitioners, review of C2 infrastructure and its interactions with Tor. Last but not least are some free SIEM use cases. What else should a security practitioner know for their handling of WannaCry?
valuementor

What is advanced Penetration testing - 2 views

Advanced penetration testing is a simulated cyber security testing to check for exploitable vulnerabilities in a system. Pen testing may involve attempted breaching of application systems or front...

security Cyber computer identity penetration testing

1 - 4 of 4
Showing 20 items per page