Attacks Against Windows PXE Boot Images
If you’ve ever run across insecure PXE boot deployments during a pentest, you know that they can hold a wealth of possibilities for escalation. Gaining access to PXE boot imagesRead More →
If you’ve ever run across insecure PXE boot deployments during a pentest, you know that they can hold a wealth of possibilities for escalation. Gaining access to PXE boot imagesRead More →
Hackers have been taking advantage of the Word macro, the small pieces of code are injected into documents to automate certain tasks, to hide malware within the documents that, whenRead More →
This note will explore the life cycle of an attack, how a victim may be infected and what an attacker could do to avoid detection by antivirus systems (AV). GeneralRead More →
A security flaw in the Skype update process can allow an attacker to gain system-level privileges on a vulnerable computer. “…the error, if exploited, can derive a local user whoRead More →
Lizard Squad is a group of hackers that was dedicated to cause damage through DDoS attacks. Throughout their career they came to knock down many of the most popular services,Read More →
OnePlus has confirmed that more than 40,000 customers have been affected by an attack on the payment page by a malicious code has been operating capturing and sending information fromRead More →
A number of professionals in information security can be asked if at this time the existing technology is reliable enough to make use of a system as widespread as WindowsRead More →
If you haven’t updated your Windows app lately, now would be a good time. Makers of the Telegram instant messenger have fixed a critical vulnerability that hackers were actively exploitingRead More →
The Kali Linux development team, one of the best-known and most widely used information security distributions, has released the first version of 2018. The new Kali Linux 2018.1 version incorporatesRead More →
Every day we hear news of more malware endangering the information security of users. Therefore, the main companies, such as Dropbox, Google Drive and OneDrive, offer an advanced malware protectionRead More →