China banned letter N from internet after people used it to attack Xi Jinping March 1, 2018 | sento | Leave a comment China censored the letter N from its internet for at least a day.The ban came as China cracked down on online discussion over the Chinese Communist Party’s proposal to scrap presidential term limits.Abolishing term limits would allow President Xi Jinping to rule indefinitely.It’s not entirely clear why the government targeted N, but we have a… Read More
Malware Analysis Report: A new variant of Mobef Ransomware March 1, 2018 | sento | Leave a comment A deep analysis of the Mobef ransomware revealed that it implements a number of functionalities, such as the capability to encrypt files, not only on the local drive but also on removable drives and network shares. Source: securityaffairs… Read More
PS4-4.55-Kernel-Exploit: A fully implemented kernel exploit for the PS4 on 4.55FW March 1, 2018 | sento | Leave a comment In this project you will find a full implementation of the “bpf” kernel exploit for the PlayStation 4 on 4.55. It will allow you to run arbitrary code as kernel, to allow jailbreaking and kernel-level modifications to the system. This release however, does not contain any code related to defeating anti-piracy mechanisms or running homebrew.… Read More
Privilege Escalation in 2.3M WooCommerce Shops March 1, 2018 | sento | Leave a comment The WordPress plugin WooCommerce runs on approximately 2,300,000 live websites1 and is currently the most prominent eCommerce platform used on the Web. During our research we discovered a PHP object injection vulnerability in WooCommerce that allows to escalate privileges. The vulnerability was responsibly disclosed to the Automattic security team and was fixed last year with… Read More
Honeytrap: Advanced Honeypot framework. March 1, 2018 | sento | Leave a comment Honeytrap is an extensible and opensource system for running, monitoring and managing honeypots. Source: github… Read More
Welcome to Indigo Defense! May 12, 2017 | sendai | Leave a comment [et_pb_section bb_built=”1″ admin_label=”section”][et_pb_row admin_label=”row” background_position=”top_left” background_repeat=”repeat” background_size=”initial”][et_pb_column type=”4_4″][et_pb_text background_layout=”light” text_orientation=”left” border_style=”solid” background_position=”top_left” background_repeat=”repeat” background_size=”initial” _builder_version=”3.0.69″] We are a London and New York based business focusing on proactive and reactive Cyber security, welcome to our website! On this website you’ll find cyber security related content, including our collection of Threat Actors which is a database about the top… Read More