• Home
    • News
  • Individuals
    • Students
    • Senior Nevadans
    • Parents & Educators
  • Business
    • Small Business
    • Medium To Large Business
    • Leadership
  • Resources
  • About Us
    • Sponsors
CybersafeNV - CybersafeNV Website

Category: SANS Full Feed


  • November 19, 2024

    Apple Fixes Two Exploited Vulnerabilities, (Tue, Nov 19th)

    Today, Apple released updates patching two vulnerabilities that have already been exploited. Interestingly, according to Apple, the vulnerabilities have only been exploited against Intel-based systems, but they appear to affect ARM (M”x”) systems as well. CVE-2024-44308 A vulnerability in JavaScriptCore. It could be triggered by the user visiting a malicious web page and may lead…

    Read More

  • November 19, 2024

    Detecting the Presence of a Debugger in Linux, (Tue, Nov 19th)

    Hello from Singapore where I’m with Johannes and Yee! This week, I’m teaching FOR710[1]. I spotted another Python script that looked interesting because, amongst the classic detection of virtualized environments, it also tries to detect the presence of a debugger. The script has been developed to target both environments: Windows & Linux. On Windows, it’s pretty easy to detect…

    Read More

  • November 19, 2024

    ISC Stormcast For Tuesday, November 19th, 2024 https://isc.sans.edu/podcastdetail/9224, (Tue, Nov 19th)

    (c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

    Read More

  • Exploit attempts for unpatched Citrix vulnerability, (Mon, Nov 18th)
    November 18, 2024

    Exploit attempts for unpatched Citrix vulnerability, (Mon, Nov 18th)

    Last week, Watchtowr Labs released details describing a new and so far unpatched vulnerability in Citrix’s remote access solution [1]. Specifically, the vulnerability affects the “Virtual Apps and Desktops.” This solution allows “secure” remote access to desktop applications. It is commonly used for remote work, and I have seen it used in call center setups…

    Read More

  • November 18, 2024

    ISC Stormcast For Monday, November 18th, 2024 https://isc.sans.edu/podcastdetail/9222, (Mon, Nov 18th)

    (c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

    Read More

  • November 17, 2024

    Ancient TP-Link Backdoor Discovered by Attackers, (Sun, Nov 17th)

    There are so many vulnerabilities in commonly used routers that attackers often leave many easily exploited vulnerabilities untouched, as they already have plenty of vulnerabilities to exploit.  Looking today at our “First Seen URL” page, I noticed this odd URL:   /userRpmNatDebugRpm26525557/start_art.html The URL is very “specific” in including a number, and at first, I…

    Read More

  • November 13, 2024

    ISC Stormcast For Wednesday, November 13th, 2024 https://isc.sans.edu/podcastdetail/9220, (Wed, Nov 13th)

    (c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

    Read More

  • November 12, 2024

    Microsoft November 2024 Patch Tuesday, (Tue, Nov 12th)

    This month, Microsoft is addressing a total of 83 vulnerabilities. Among these, 3 are classified as critical, 2 have been exploited in the wild, and another 2 have been disclosed prior to Patch Tuesday. Organizations are encouraged to prioritize these updates to mitigate potential risks and enhance their security posture. Notable Vulnerabilities: NTLM Hash Disclosure…

    Read More

  • November 12, 2024

    ISC Stormcast For Tuesday, November 12th, 2024 https://isc.sans.edu/podcastdetail/9218, (Tue, Nov 12th)

    (c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

    Read More

  • PDF Object Streams, (Mon, Nov 11th)
    November 11, 2024

    PDF Object Streams, (Mon, Nov 11th)

    The first thing to do, when analyzing a potentially malicious PDF, is to look for the /Encrypt name as explained in diary entry Analyzing an Encrypted Phishing PDF. The second thing to do, is to look for the /ObjStm name, as I will explain in this diary entry. Take this phishing PDF and analyze it…

    Read More

←Previous Page
1 … 53 54 55 56 57 … 60
Next Page→

Our Sponsors

Quick Links

About Us
Individuals
Business
Resources

Contact

Twitter
Facebook
LinkedIn

Copyright © 2022 Cyber Safe NV. All Rights Reserved.