background preloader

HTTB Afternoon Ed. (V1)

Facebook Twitter

Strategic Re-Tweet(s) Exploit The Power Of The Video Youtube Made Simple. [APT Sources] [ZippyShare] 0day pack - 23.07.2012 - Apps, Ebooks, Mobile. Debate: The evasiveness of Flame may have been what prevented. August 01, 2012 Mikko Hyppönen, chief research officer F-Secure When Flame malware became front-page news, we went digging through our collections for related samples.

Debate: The evasiveness of Flame may have been what prevented

We were surprised to find out that we had samples of Flame already from 2010, sent to us via automated systems. They had been classified as clean. Pastebin.com - #1 paste tool since 2002! SQL Injection Vulnerability. NVidia binary driver exploit working. How SQL Injection Attacks Work. ICS-CERT report, a worrying increase of cyber attacks. It’s been long debated the need to protect critical infrastructures from cyber attacks, cyber threats could hit foreign countries causing loss of human lives identically to a conventional attack.

Don’t forget that similar attacks con be organized by state-sponsored hackers or cyber criminals with the different purposes, target destroying or cyber espionage. Emergency Response Teams of every country are approaching the problem, they are working to complete a census of the structures examining their safety level, these groups of works are also working on awareness programs and information sharing, key activities to mitigate the risks.

Strategic Re-Tweet(s)

High Technology Threat Brief (HTTB) #!/bin/sh PROCS='dos2.pl stealth kaiten dos.pl exploit msfconsole ddos tfn-ch.