Home
Tools
Malybuzz
peepdf
Pub
Advisories
Exploits
Articles
Presentations
Var
Scripts
About
Home
»
Feed aggregator
»
Sources
conexioninversa - Solo es cuestión de In-Seguridad...
Computer Forensics & Security
URL:
http://conexioninversa.blogspot.com/
Updated:
2 years 3 weeks ago
Search this site:
Specifications
Security
Analysis
PDF
Scripts
Botnets
Fraud
peepdf
Research
Black Hat
Shellcode
ZeuS
Malware
Reversing
Citadel
Javascript
Feodo
Spam
Python
NFC
Exploits
Mobile
Exploit kits
Botnet
Tools
Social Networking
Tatanga
Vulnerabilities
Challenge
Conferences
more tags
Latest blog posts
Dridex spam campaign using PDF as infection vector
Adding a scoring system in peepdf
Travelling to the far side of Andromeda at Botconf 2015
Black Hat Arsenal peepdf challenge solution
Black Hat Arsenal peepdf challenge
peepdf news: GitHub, Google Summer of Code and Black Hat
Andromeda/Gamarue bot loves JSON too (new versions details)
Quick analysis of the CVE-2013-2729 obfuscated exploits
Dissecting SmokeLoader (or Yulia's sweet ass proposition)
Released peepdf v0.3
more
Security Posts
Infocon: green
RootedCON 2024: Tus Tempos de MyPublicInbox y tus entradas para OpenExpo Europe 2024
Sifting through the spines: identifying (potential) Cactus ransomware victims
ISC Stormcast For Thursday, April 25th, 2024 https://isc.sans.edu/podcastdetail/8954, (Thu, Apr 25th)
Does it matter if iptables isn't running on my honeypot?, (Thu, Apr 25th)
Nation-state hackers exploit Cisco firewall 0-days to backdoor government networks
Deepfakes in the courtroom: US judicial panel debates new AI evidence rules
'ArcaneDoor' Cyberspies Hacked Cisco Firewalls to Access Government Networks
ArcaneDoor - New espionage-focused campaign found targeting perimeter network devices
5 Best VPN Services (2024): For Routers, PC, iPhone, Android, and More
Understanding how Rationality, Deterrence Theory, and Indeterminism Influence Cybercrime.
ShotSpotter Keeps Listening for Gunfire After Contracts Expire
Phishing Attacks Rise 58% in the Year of AI: ThreatLabz 2024 Phishing Report
5 reasons to strive for better disclosure processes
3 healthcare organizations that are building cyber resilience
5 ways to strengthen healthcare cybersecurity
Cybersecurity Concerns for Ancillary Strength Control Subsystems
Update on Naked Security
more