Macro-less Code Exec in MSWord
In our context DDE works by executing an application, that will provide the data (data provider). In a previous post1 We discussed using DDE in MSExcel to gain command execution,Read More →
Cyber Security Incident News | Infosec Blog | Information Security Tutorials
In our context DDE works by executing an application, that will provide the data (data provider). In a previous post1 We discussed using DDE in MSExcel to gain command execution,Read More →
The Australia’s foreign intelligence Agency ASD has revealed military sensitive information has been stolen by hackers who breached a Department of Defence contractor. The Australia’s foreign intelligence agency, the Australian Signals DirectorateRead More →
The four exposed servers had no password, but contained the “keys to the kingdom.” Technology and cloud giant Accenture has confirmed it inadvertently left a massive store of private dataRead More →
The Iran-Linked cyberespionage group OilRig has been using a new Trojan in attacks aimed at targets in the Middle East. Experts from Palo Alto Networks spotted a new campaign launched byRead More →
Websites are hijacking computers to mine digital coins. Cloudflare, an internet security company founded in 2010, has quickly become an integral part of how many websites operate. As one ofRead More →
Wimonitor is a wonderful product from Hacker Arsenal that saves pentesters the hassle of having to configure VMs, carry compatible wireless cards that support monitor mode etc. and comes with aRead More →
Forrester Research announced today that Forrester.com experienced a security breach this week, attackers were ultimately detected and shut out of the system Forrester, one of the most influential research andRead More →
The company is sending out password reset emails to users whose passwords were exposed. Disqus has confirmed its web commenting system was hacked. The company, which builds and provides aRead More →
Windows Digital Signature check is a mechanism included in Microsoft Windows to make sure that the software or driver you’re trying to install is signed by a trusted entity, andRead More →
According to intelligence experts the recent Zapad drills conducted by Russia simulated an attack on all Baltic countries, it included the use of cyber weapons. Baltic and NATO officials claim RussiaRead More →