Using SQL Server for attacking a Forest Trust
Recently I started playing with the awesome PowerUpSQL tool by guys at NetSPI. I was interested in the ability to attack an Active Directory (AD) environment using access to aRead More →
Data Security News | Infosec Blog | Information Security Tutorials
Recently I started playing with the awesome PowerUpSQL tool by guys at NetSPI. I was interested in the ability to attack an Active Directory (AD) environment using access to aRead More →
A new technique named DoubleAgent, discovered by security researchers from Cybellum, allows an attacker to hijack security products and make them take malicious actions. The DoubleAgent attack was uncovered afterRead More →
“I just want my money,” one of the hackers said. A hacker or group of hackers is apparently trying to extort Apple over alleged access to a large cache ofRead More →
Law enforcement agencies across the world are targeting the dark web. Whether that’s through undercover buys of illegal weapons, or deploying malware to catch suspected pedophiles, cops have spent theRead More →
A security researcher has detailed a way to log into any account on the same computer, even without knowing its password. The trick works on all Windows versions, doesn’t requireRead More →
Some Ubiquiti network device models can be hacked thanks to an unpatched vulnerability, allowing attackers to gain control over the device, or use it as a pivot point in theRead More →
WhatsApp and Telegram have patched their respective web clients against a common security flaw discovered by researchers from Israeli firm Check Point, a security issue that would have allowed anRead More →
Don’t assume you can trust the hardware sensors in your phone and other connected devices, researchers warn. Researchers have shown that a malicious music file can trick an accelerometer intoRead More →
In a research paper published at the end of February, a team of five scientists from the Graz University of Technology has described a novel method of leaking data fromRead More →
The Android Security Bulletin for March 2017 contains a bugfix for a unique security flaw exploitable via the headphones audio connector that could be leveraged to leak data from theRead More →