Hacking

Cybergeddon: Why the Internet could be the next “failed state” -ArsTechnica

By |2022-06-15T01:25:09-04:00February 26th, 2015|Categories: Cyber, Hacking|Tags: , |

Excellent article by Sean Gallagher from ArsTechnica. It truly captures the essence of how our world is likely headed into an unfortunate collision with technology. http://arstechnica.com/information-technology/2015/02/fear-in-the-digital-city-why-the-internet-has-never-been-more-dangerous/1/

Comments Off on Cybergeddon: Why the Internet could be the next “failed state” -ArsTechnica

How to exploit Domain Controllers with MS14-068 / From Zero 2 Hero

By |2022-06-13T18:39:44-04:00December 7th, 2014|Categories: Demo, Hacking|Tags: , , |

Hello! This is jfer from compsec direct. I would like to show you how to leverage the new Kerberos exploit against Windows domain controllers called ms14-068. This vulnerability allows a user with domain credentials to forge a Kerberos ticket and receive domain admin privileges via the forged ticket. I want to thank Sylvain Monné aka Bidord [...]

Comments Off on How to exploit Domain Controllers with MS14-068 / From Zero 2 Hero

CSO – Survey shows the cost of security breaches is on the rise

By |2022-06-15T01:19:50-04:00October 22nd, 2014|Categories: Breach, Hacking|Tags: , , , |

Excellent post associating the attributed costs of security breaches over time.

Comments Off on CSO – Survey shows the cost of security breaches is on the rise

IT threat evolution Q2 2014 – Kaspersky

By |2022-06-15T01:06:41-04:00September 7th, 2014|Categories: Hacking, Reports|Tags: , , , |

Please take time to read this insightful publication by David Emm, Roman Unuchek, Victor Chebyshev, Maria Garnaeva and Denis Makrushin from Kaspersky Labs. The publication offers unparalleled insight and examples of current evolving threats through the info sec lens. Click to Download

Comments Off on IT threat evolution Q2 2014 – Kaspersky

Ransomware going strong, despite takedown of Gameover Zeus – ArsTechnica

By |2022-06-15T01:08:52-04:00September 7th, 2014|Categories: Hacking|Tags: , , , |

Despite numerous public takedowns, cyber criminals will continue to extort users by leveraging their own data as ransom.Click Here for Original Post

Comments Off on Ransomware going strong, despite takedown of Gameover Zeus – ArsTechnica

Advanced Persistent Threat Awareness Study Results 2014 – ISACA

By |2022-06-15T01:02:21-04:00August 29th, 2014|Categories: Hacking|

According to the study by ISACA, 15% of companies are prepared, or feel prepared to handle APT’s. Download Report Here

Comments Off on Advanced Persistent Threat Awareness Study Results 2014 – ISACA

Dark Reading – How to Defend Your Network from Advanced Persistent Threats (APTs)

By |2022-06-15T01:09:53-04:00August 29th, 2014|Categories: Hacking|

Good presentation from Bit9 on using sandboxing to potentially identify APT’s. Click Here

Comments Off on Dark Reading – How to Defend Your Network from Advanced Persistent Threats (APTs)