All Objective-See tools are now 100% open source Security News & Discussion |
- All Objective-See tools are now 100% open source
- ShadowMove: Lateral Movement by Duplicating Existing Connected Sockets
- Instrumenting Windows APIs with Frida
- Releasing PatrowlHears - Open Source Vulnerability Intelligence Center
- The Dangers of Endpoint Discovery in VIPRE Endpoint Security
- Bazar, No Ryuk?
- Software Verification and Analysis Using Z3
- My Lightweight Cryptography for IoT lecture videos, hope you enjoy
- PoC for CVE-2021-3156 on Ubuntu 18.04 and 20.04
- Zinc Group Attacks Against Security Researchers
- Blog post that explains how the Solarwinds threat actor used application permissions in Azure to read email. Other takeaways: 1. SUNBURST backdoor not used 2. Threat group activity goes back to Jan 2020
All Objective-See tools are now 100% open source Posted: 01 Feb 2021 07:25 AM PST |
ShadowMove: Lateral Movement by Duplicating Existing Connected Sockets Posted: 01 Feb 2021 01:53 AM PST |
Instrumenting Windows APIs with Frida Posted: 01 Feb 2021 10:52 AM PST |
Releasing PatrowlHears - Open Source Vulnerability Intelligence Center Posted: 01 Feb 2021 04:45 AM PST |
The Dangers of Endpoint Discovery in VIPRE Endpoint Security Posted: 01 Feb 2021 09:37 AM PST |
Posted: 31 Jan 2021 04:19 PM PST |
Software Verification and Analysis Using Z3 Posted: 30 Jan 2021 01:39 PM PST |
My Lightweight Cryptography for IoT lecture videos, hope you enjoy Posted: 30 Jan 2021 08:25 AM PST |
PoC for CVE-2021-3156 on Ubuntu 18.04 and 20.04 Posted: 29 Jan 2021 08:04 PM PST |
Zinc Group Attacks Against Security Researchers Posted: 29 Jan 2021 08:34 PM PST |
Posted: 29 Jan 2021 08:18 PM PST |
You are subscribed to email updates from /r/netsec - Information Security News & Discussion. To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google, 1600 Amphitheatre Parkway, Mountain View, CA 94043, United States |
No comments:
Post a Comment