You might be interested in …

[BleepingComputer] New Windows print spooler zero day exploitable via remote print servers

Another zero day vulnerability in Windows Print Spooler can give a threat actor administrative privileges on a Windows machine through a remote server under the attacker’s control and the ‘Queue-Specific Files’ feature. […] Source: Read More (BleepingComputer)

Read More

[SANS ISC] Video: oledump Cheat Sheet, (Sun, Jun 20th)

All posts, Sans-ISC

I did create a SANS cheat sheet for oledump.py. Here is a short video where I go over the cheat sheet and give some simple demos: Didier Stevens Senior handler Microsoft MVP blog.DidierStevens.com (c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License. Source: Read More (SANS Internet Storm Center, InfoCON: green)

Read More

[TheRecord] Motherboard vendor GIGABYTE hit by RansomExx ransomware gang

Taiwanese computer hardware vendor GIGABYTE has suffered a ransomware attack, and hackers are currently threatening to release more than 112 GB of business data on the dark web unless the company agrees to their ransom demands. The Taiwanese company, primarily known for its high-performance motherboards, confirmed the attack in a phone call and in a […]

Read More

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.