A brief daily summary of what is important in information security. The podcast is published every w
A PNG Image With an Embedded Gift Xavier shows how Python code attached to a PNG image can be used
Alternate Data Streams: Adversary Defense Evasion and Detection Good Primer of alternate data strea
Exploring a Use Case of Artificial Intelligence Assistance with Understanding an Attack Jennifer Wi
SSH authorized_keys File One of the most common techniques used by many bots is to add rogue keys t
SVG Steganography Steganography is not only limited to pixel-based images but can be used to embed
Resilient Secure Backup Connectivity for SMB/Home Users Establishing resilient access to a home ne
New Variant of Crypto Confidence Scam Scammers are offering login credentials for what appears to b
Researchers Scanning the Internet A newish RFC, RFC 9511, suggests researchers identify themselv
RAT Dropped By Two Layers of AutoIT Code Xavier explains how AutoIT was used to install a remote a
xorsearch.py: Python Functions Didier s xorsearch tool now supports python functions to filter outp
Web Scanning SonicWall for CVE-2021-20016 - Update Scans for SonicWall increased by an order of ma
Another day, another phishing campaign abusing google.com open redirects Google s links from it s
Microsoft Patch Tuesday Microsoft patched 70-78 vulnerabilities (depending on how you count them).
Apple Updates Everything Apple patched all of its operating systems. This update ports a patch for
Steganography Challenge Didier revealed the solution to last weekend s cryptography challenge. The
No Internet Access: SSH to the Rescue If faced with restrictive outbound network access policies,
Example of Modular Malware Xavier analyzes modular malware that downloads DLLs from GitHub if spec
Python InfoStealer with Embedded Phishing Webserver Didier found an interesting infostealer that,
Mirai Now Exploits Samsung MagicINFO CMS CVE-2024-7399 The Mirai botnet added a new vulnerability