David Kennedy and the TrustedSec crew have released Magic Unicorn v2.8.
Magic Unicorn is “a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory, based on Matthew Graeber’s PowerShell attacks and the Powe…
The WireX Botnet: An Example of Cross-Organizational Cooperation
On August 17th, 2017, multiple Content Delivery Networks (CDNs) and content providers were subject to significant attacks from a botnet dubbed WireX. The botnet is named for an anagram for one of the delimiter strings in its command and control protoco…
Court Rulings Limit Privacy Protections From Data Residency
Jurisdictions around the world, including the European Union and Canada, are enacting laws and creating regulations forcing companies that collect personally identifiable information (PII) to store the data of their residents within their nati…
Toolsmith #127: OSINT with Datasploit
I was reading an interesting Motherboard article, Legal Hacking Tools Can Be Useful for Journalists, Too, that includes reference to one of my all time OSINT favorites, Maltego. Joseph Cox’s article also mentions Datasploit, a 2016 favorite for fe…
Evading Microsoft ATA > Another reason to use 2FA for Windows Admins
Nikhil “SamratAshok” Mittal has a great series of posts on how to avoid detection by Microsoft’s Advanced Threat Analytics (ATA).
We won’t say that you shouldn’t deploy ATA to monitor your network for suspicious behavior, especially if your licensing …
If everybody could read your email, are you secure?
Email is one of the most critical business tools and a major component of the lives of many people. At the same time, it seems to lack adequate security as the Clinton campaign email leaks and the publication of France’s Macron emails have sho…
India RSS website hacked by Anonymous
Today the Hacktivist group Anonymous successfully hacked the official rss.org website based on India as cyberguerrilla website claims. Anonymous said the RSS have killed a lot of innocents people and that is the reason for this RSS Data Leak.
The…
ITAR compliance: ignorance is no excuse
The ITAR (International Traffic in Arms Regulations) legislation details what measures businesses and individuals must take to comply with ITAR requirements and specifies severe penalties, both civil and criminal, for non-compliance. The reach…
MalwareTech Arrested Because Creating Kronos Banking Trojan
MalwareTech — the security researcher who stopped the WannaCry ransomware outbreak — was arrested in Las Vegas on accusations of creating the Kronos banking trojan together with another person.
The arrest — first reported by Motherboard — took place…
FBI Arrests Researcher Who Found ‘Kill-Switch’ to Stop Wannacry Ransomware
The 22-year-old British security researcher who gained fame for discovering the “kill switch” that stopped the outbreak of the WannaCry ransomware—has been reportedly arrested in the United States after attending the Def Con hacking conference in Las…