You might be interested in …

[ESET] Plugging the holes: How to prevent corporate data leaks in the cloud

All posts, ESET feed

Misconfigurations of cloud resources can lead to various security incidents and ultimately cost your organization dearly. Here’s what you can do to prevent cloud configuration conundrums. The post Plugging the holes: How to prevent corporate data leaks in the cloud appeared first on WeLiveSecurity Source: Read More (WeLiveSecurity)

Read More

[BleepingComputer] Hands on with WSLg: Running Linux GUI apps in Windows 10

Windows 10 preview builds can now run Linux apps directly on the Windows 10 desktop using the new Windows Subsystem for Linux GUI. In this article, we go hands on with the new WSLg feature to demonstrate the types of graphical Linux apps you can now run. […] Source: Read More (BleepingComputer)

Read More

[SANS ISC] Finding Strings With oledump.py, (Sat, Jul 3rd)

All posts, Sans-ISC

In diary entry “CFBF Files Strings Analysis” I show how to extract strings from CFBF/ole files with my tool oledump.py. What if you have found an interesting string, and want to know from which stream it was extracted? Like the URL extracted in my previous diary entry: hxxp://example[.]com/phishing oledump has an option to check the […]

Read More

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.