HackDig : Dig high-quality web security articles for hacker

Windows Insight: Code integrity and WDAC

The Windows Insight repository now hosts three articles on Windows code integrity and WDAC (Windows Defender Application Control): Device Guard Image Integrity: Architecture Overview (Aleksandar Milenkoski, Dominik Phillips): In this work, we present the high-level architecture of the code integrity mechanism implemented as part of Windows 10. Windows Defen
Publish At:2019-11-12 00:15 | Read:72 | Comments:0 | Tags:Misc Windows

Dissection of an Incident – Part 2

After our last blogpost regarding Emotet and several other Emotet and Ransomware samples that we encountered, we recently stumbled across a variant belonging to the Gozi, ISFB, Dreambot respectively Ursnif family. In this blogpost, we want to share our insights from the analysis of this malware, whose malware family is mainly known for being a banking trojan
Publish At:2019-11-12 00:15 | Read:107 | Comments:0 | Tags:Misc forensics incident incident analysis malware

Medical Device Security Summit 2019, 19th of November of 2019

*This event will be held in German* Inspiriert durch die erfolgreichen Round-Table-Diskussionen der TROOPERS-Konferenz freuen wir uns, Ihnen heute mit dem Medical Device Security Summit 2019, eine weitere Veranstaltung in einer Reihe zu Trend-Themen im Bereich der IT-Sicherheit vorzustellen. Die Veranstaltung beginnt am Morgen mit einem Eröffnungsvortrag vo
Publish At:2019-10-09 12:15 | Read:189 | Comments:0 | Tags:Misc

Emotet at Heise, Emotet there, Emotet everywhere – Dissection of an Incident

After the Emotet Incident at Heise, where ERNW has been consulted for Incident Response, we decided to start a blogpost series, in which we want to regularly report on current attacks that we observe. In particular we want to provide details about the utilized pieces of malware, different stages, and techniques used for the initial infection and lateral move
Publish At:2019-09-19 17:15 | Read:199 | Comments:0 | Tags:Misc emotet heise incident incident analysis malware

LibreOffice – A Python Interpreter (code execution vulnerability CVE-2019-9848)

While waiting for a download to complete, I stumbled across an interesting blogpost. The author describes a flaw in LibreOffice that allowed an attacker to execute code. Since this was quite recent, I was interested if my version is vulnerable to this attack and how they fixed it. Thus, I looked at the sources and luckily it was fixed. What I didn’t know bef
Publish At:2019-09-19 17:15 | Read:135 | Comments:0 | Tags:Misc LibreOffice vulnerability Vulnerability

A Follow-Up on the Heisec Webinar on Emotet & Some Active Directory Security Sources

Some weeks ago, Heinrich and I had the pleasure to participate in the heisec-Webinar “Emotet bei Heise – Lernen aus unseren Fehlern”. We really enjoyed the webinar and the (alas, due to the format: too short) discussions and we hope we could contribute to understand how to make Active Directory implementations out there a bit safer in the f
Publish At:2019-09-19 17:15 | Read:170 | Comments:0 | Tags:Misc Active Directory emotet heise incident

PSD2 – Mandatory Account Access for Third Party Providers

On September 14th the final deadline of complying with the new Payment Service Directive PSD2 will be reached. Among other things, this directive will bring quite a few technical challenges for credit institutions. These include new requirements on two-factor authentication and API access for third parties. In this blog post we will give a short overview of
Publish At:2019-09-19 17:15 | Read:207 | Comments:0 | Tags:Misc banking finance web

Georg Lukas: Multi-window Mutt with Screen

As a long-time Mutt user I always looked with envy atyou Thunderbird and Kmail and what-not fans, as you could spawn new windows forreading and writing e-mails with a mere click (or sometimes a double-click).It was just too bothersome to have $EDITOR block my inbox until I finishwriting or give up and postpone the mail, losing track. As I am usingScreen
Publish At:2014-08-10 17:26 | Read:3872 | Comments:0 | Tags:misc net


Share high-quality web security related articles with you:)


Tag Cloud