Home
Tools
Malybuzz
peepdf
Pub
Advisories
Exploits
Articles
Presentations
Var
Scripts
About
Home
»
Feed aggregator
»
Sources
ESET
WeLiveSecurity
URL:
https://www.welivesecurity.com
Updated:
36 min 14 sec ago
Search this site:
Shellcode
Conferences
Exploits
Black Hat
Mobile
Python
Vulnerabilities
Analysis
Fraud
Tools
Security
Social Networking
PDF
ZeuS
Exploit kits
peepdf
Reversing
Botnet
Challenge
Research
Botnets
Tatanga
Scripts
Specifications
Javascript
NFC
Citadel
Feodo
Malware
Spam
more tags
Latest blog posts
Dridex spam campaign using PDF as infection vector
Adding a scoring system in peepdf
Travelling to the far side of Andromeda at Botconf 2015
Black Hat Arsenal peepdf challenge solution
Black Hat Arsenal peepdf challenge
peepdf news: GitHub, Google Summer of Code and Black Hat
Andromeda/Gamarue bot loves JSON too (new versions details)
Quick analysis of the CVE-2013-2729 obfuscated exploits
Dissecting SmokeLoader (or Yulia's sweet ass proposition)
Released peepdf v0.3
more
Security Posts
Infocon: green
Critical vulnerabilities in BIG-IP appliances leave big networks open to intrusion
Dell responds to return-to-office resistance with VPN, badge tracking
Robot dogs armed with AI-targeting rifles undergo US Marines Special Ops evaluation
Top FBI Official Urges Agents to Use Warrantless Wiretaps on US Soil
Talos discloses multiple zero-day vulnerabilities, two of which could lead to code execution
Using benchmarks to speed up Echidna
A (Strange) Interview With the Russian-Military-Linked Hackers Targeting US Water Utilities
Analyzing Synology Disks on Linux, (Wed, May 8th)
VASA-1: Un modelo de de GenAI para "Visual Affective Skills" que potencia la expresividad de los Humanos Digitales (y de DeepFakes & FakeNews)
ISC Stormcast For Wednesday, May 8th, 2024 https://isc.sans.edu/podcastdetail/8972, (Wed, May 8th)
New VPN Risk Report: 56% of Enterprises Attacked via VPN Vulnerabilities
CVE-2024-3661, a.k.a. TunnelVision, Exposes a VPN Bypass Vulnerability
2024 Cyber Resilience Research Reveals a Complex Terrain
Key Insights from the OpenText 2024 Threat Perspective
Sifting through the spines: identifying (potential) Cactus ransomware victims
Cybersecurity Concerns for Ancillary Strength Control Subsystems
Update on Naked Security
more