Marco Ermini
Weitere Ideen von Marco
Phishers imitate SEC, abuse Microsoft feature, to distribute DNSMessenger malware https://www.scmagazine.com/phishers-imitate-sec-abuse-microsoft-feature-to-distribute-dnsmessenger-malware/article/699918/?utm_content=bufferc5d24&utm_medium=social&utm_source=pinterest.com&utm_campaign=buffer

Phishers imitate SEC, abuse Microsoft feature, to distribute DNSMessenger malware https://www.scmagazine.com/phishers-imitate-sec-abuse-microsoft-feature-to-distribute-dnsmessenger-malware/article/699918/?utm_content=bufferc5d24&utm_medium=social&utm_source=pinterest.com&utm_campaign=buffer

ROCA: Vulnerable RSA generation (CVE-2017-15361) [CRoCS wiki] https://crocs.fi.muni.cz/public/papers/rsa_ccs17?utm_content=bufferc8ff4&utm_medium=social&utm_source=pinterest.com&utm_campaign=buffer

ROCA: Vulnerable RSA generation (CVE-2017-15361) [CRoCS wiki] https://crocs.fi.muni.cz/public/papers/rsa_ccs17?utm_content=bufferc8ff4&utm_medium=social&utm_source=pinterest.com&utm_campaign=buffer

BlackOasis APT and new targeted attacks leveraging zero-day exploit https://securelist.com/blackoasis-apt-and-new-targeted-attacks-leveraging-zero-day-exploit/82732/?utm_content=buffer2e398&utm_medium=social&utm_source=pinterest.com&utm_campaign=buffer

BlackOasis APT and new targeted attacks leveraging zero-day exploit https://securelist.com/blackoasis-apt-and-new-targeted-attacks-leveraging-zero-day-exploit/82732/?utm_content=buffer2e398&utm_medium=social&utm_source=pinterest.com&utm_campaign=buffer

Microsoft Office DDE Attack Launches Malware, No Macros Required https://blog.barkly.com/microsoft-office-malware-attack-no-macros?utm_content=buffer8c035&utm_medium=social&utm_source=pinterest.com&utm_campaign=buffer

Microsoft Office DDE Attack Launches Malware, No Macros Required https://blog.barkly.com/microsoft-office-malware-attack-no-macros?utm_content=buffer8c035&utm_medium=social&utm_source=pinterest.com&utm_campaign=buffer

KRACK Attacks: Breaking WPA2 https://www.krackattacks.com/?utm_content=bufferca102&utm_medium=social&utm_source=pinterest.com&utm_campaign=buffer

KRACK Attacks: Breaking WPA2 https://www.krackattacks.com/?utm_content=bufferca102&utm_medium=social&utm_source=pinterest.com&utm_campaign=buffer

Peter Moon: When could a data breach be toxic? https://amp.afr.com/technology/peter-moon-when-could-a-data-breach-be-toxic-20171015-gz1iqi?utm_content=buffer38a9b&utm_medium=social&utm_source=pinterest.com&utm_campaign=buffer

Peter Moon: When could a data breach be toxic? https://amp.afr.com/technology/peter-moon-when-could-a-data-breach-be-toxic-20171015-gz1iqi?utm_content=buffer38a9b&utm_medium=social&utm_source=pinterest.com&utm_campaign=buffer

Severe flaw in WPA2 protocol leaves Wi-Fi traffic open to eavesdropping – Ars Technica https://arstechnica.com/information-technology/2017/10/severe-flaw-in-wpa2-protocol-leaves-wi-fi-traffic-open-to-eavesdropping/?utm_content=bufferc1a52&utm_medium=social&utm_source=pinterest.com&utm_campaign=buffer

Severe flaw in WPA2 protocol leaves Wi-Fi traffic open to eavesdropping – Ars Technica https://arstechnica.com/information-technology/2017/10/severe-flaw-in-wpa2-protocol-leaves-wi-fi-traffic-open-to-eavesdropping/?utm_content=bufferc1a52&utm_medium=social&utm_source=pinterest.com&utm_campaign=buffer

James Stanley - Someone Created a Tor Hidden Service to Phish my Tor Hidden Service

James Stanley - Someone Created a Tor Hidden Service to Phish my Tor Hidden Service

Hackers steal restricted information on F-35 fighter, JDAM, P-8 and C-130 https://nakedsecurity.sophos.com/2017/10/13/hackers-steal-restricted-information-on-f-35-fighter-jdam-p-8-and-c-130/?utm_content=buffere1bcf&utm_medium=social&utm_source=pinterest.com&utm_campaign=buffer

Hackers steal restricted information on F-35 fighter, JDAM, P-8 and C-130 https://nakedsecurity.sophos.com/2017/10/13/hackers-steal-restricted-information-on-f-35-fighter-jdam-p-8-and-c-130/?utm_content=buffere1bcf&utm_medium=social&utm_source=pinterest.com&utm_campaign=buffer

IT Admin Trashes Railroad Company's Network Before He Leaves https://www.bleepingcomputer.com/news/legal/it-admin-trashes-railroad-companys-network-before-he-leaves/?utm_content=bufferd5a16&utm_medium=social&utm_source=pinterest.com&utm_campaign=buffer

IT Admin Trashes Railroad Company's Network Before He Leaves https://www.bleepingcomputer.com/news/legal/it-admin-trashes-railroad-companys-network-before-he-leaves/?utm_content=bufferd5a16&utm_medium=social&utm_source=pinterest.com&utm_campaign=buffer